Security of Decoy-State Quantum Key Distribution with Correlated Intensity Fluctuations

12Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

One of the most prominent techniques to enhance the performance of practical quantum key distribution (QKD) systems with laser sources is the decoy-state method. Current decoy-state QKD setups operate at gigahertz repetition rates, a regime where memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses. This translates into information leakage about the selected intensities, which cripples a crucial premise of the decoy-state method, thus invalidating the use of standard security analyzes. To overcome this problem, a security proof that exploits the Cauchy-Schwarz constraint has been introduced recently. Its main drawback is, however, that the achievable key rate is significantly lower than that of the ideal scenario without intensity correlations. Here, we improve this security proof technique by combining it with a fine-grained decoy-state analysis, which can deliver a tight estimation of the relevant parameters that determine the secret key rate. This results in a notable performance enhancement, being now the attainable distance double that of previous analyzes for certain parameter regimes. Also, we show that when the probability density function of the intensity fluctuations, conditioned on the current and previous intensity choices, is known, our approach provides a key rate very similar to the ideal scenario, which highlights the importance of an accurate experimental characterization of the correlations.

Cite

CITATION STYLE

APA

Sixto, X., Zapatero, V., & Curty, M. (2022). Security of Decoy-State Quantum Key Distribution with Correlated Intensity Fluctuations. Physical Review Applied, 18(4). https://doi.org/10.1103/PhysRevApplied.18.044069

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free