• Acta Optica Sinica
  • Vol. 37, Issue 5, 527002 (2017)
Hu Kang, Mao Qianping, and Zhao Shengmei
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/aos201737.0527002 Cite this Article Set citation alerts
    Hu Kang, Mao Qianping, Zhao Shengmei. Round Robin Differential Phase Shift Quantum Key Distribution Protocol Based on Heralded Single Photon Source and Detector Decoy State[J]. Acta Optica Sinica, 2017, 37(5): 527002 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceeding of IEEE International Conference on Computers, Systems and Signal Processing, 1984: 175-179.

    [2] Liu Y, Chen T Y, Wang J, et al. Decoy-state quantum key distribution with polarized photons over 200 km[J]. Opt Express, 2010, 18(8): 8587-8594.

    [3] Wang L, Zhao S M, Gong L Y , et al. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum[J]. Chin Phys B, 2015, 24(12): 120307.

    [4] Yan Long, Sun Hao, Zhao Shengmei. Study on decoyed measurement device independent quantum key distribution protocol using orbital angular momentum[J]. Journal of Signal Processing, 2014, 30(11): 1275-1278.

    [5] Xiao Hong, Shi Peng, Zhao Shengmei. A reconciliation protocol with delayed error correction for quantum key distribution[J]. Scientia Sinica: Technologica, 2015, 45(8): 843-848.

    [6] Wang Yunyan, Guo Dabo, Zhang Yanhuang, et al. Algorithm of multidimensional reconciliation for continuous-variable quantum key distribution[J]. Acta Optica Sinica, 2014, 34(8): 0827002.

    [7] Chen Yan, Shen Yong, Zou Hongxin. An all-fiber continuous variable quantum key distribution based on multi-bits coding of single pulse[J]. Acta Optica Sinica, 2015, 35(7): 0727001.

    [8] Leverrier A, Grangier P. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation[J]. Phys Rev A, 2011, 83(4): 042312.

    [9] Huang P, He G, Fang J, et al. Performance improvement of continuous-variable quantum key distribution via photon subtraction[J]. Phys Rev A, 2013, 87(1): 012317.

    [10] Sasaki T, Yamamoto Y, Koashi M. Practical quantum key distribution protocol without monitoring signal disturbance[J]. Nature, 2014, 509(7501): 475-478.

    [11] Zhang Z, Yuan X, Cao Z, et al. Round-robin differential-phase-shift quantum key distribution[EB/OL]. (2015-05-11)[2016-12-20]. https: ∥arxiv.org/abs/1505.02481.

    [12] Mizutani A, Imoto N, Tamaki K. Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws[J]. Phys Rev A, 2015, 92(6): 060303.

    [13] Sasaki T, Koashi M. Round-robin differential phase-shift quantum key distribution protocol with threshold detectors[C]. 5th International Conference on Quantum Cryptography, 2015.

    [14] Yin H L, Fu Y, Mao Y, et al. Detector-decoy quantum key distribution without monitoring signal disturbance[J]. Phys Rev A, 2016, 93(2): 022330.

    [15] Zhang Y Y, Bao W S, Zhou C, et al. Practical round-robin differential phase-shift quantum key distribution[J]. Opt Express, 2016, 24(18): 20763-20773.

    [16] Takesue H, Sasaki T, Tamaki K, et al. Experimental quantum key distribution without monitoring signal disturbance[J]. Nature Photonics, 2015, 9: 827-831.

    [17] Wang S, Yin Z Q, Chen W, et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring[J]. Nature Photonics, 2015, 9: 832-836.

    [18] Li Y H, Cao Y, Dai H, et al. Experimental round-robin differential phase-shift quantum key distribution[J]. Phys Rev A, 2016, 93(3): 030302.

    [19] Guan J Y, Cao Z, Liu Y, et al. Experimental passive round-robin differential phase-shift quantum key distribution[J]. Phys Rev Lett, 2015, 114(18): 180502.

    [20] Lütkenhaus N. Security against individual attacks for realistic quantum key distribution[J]. Phys Rev A, 2000, 61(5): 052304.

    [21] Moroder T, Curty M, Lütkenhaus N. Detector decoy quantum key distribution[J]. New J Phys, 2009, 11(4): 045008.

    [22] Ma X, Qi B, Zhao Y, et al. Practical decoy state for quantum key distribution[J]. Phys Rev A, 2005, 72(1): 012326.

    CLP Journals

    [1] ZHOU Xiaodong, WANG Sheng, ZHANG Tianbing, HU Zongfu, FENG Bao, XIAO Hong. Continuous-variable QKD data reconciliation protocol based on concatenated Polar coding and multistage decoding[J]. Chinese Journal of Quantum Electronics, 2022, 39(3): 411

    [2] ZHOU Wenting, WANG Xin, BIAN Yuxiang, QIAO Han, FENG Bao. Multidimensional reverse negotiation protocol for continuous variable quantum key distribution based on polar code[J]. Chinese Journal of Quantum Electronics, 2021, 38(4): 460

    Hu Kang, Mao Qianping, Zhao Shengmei. Round Robin Differential Phase Shift Quantum Key Distribution Protocol Based on Heralded Single Photon Source and Detector Decoy State[J]. Acta Optica Sinica, 2017, 37(5): 527002
    Download Citation