Quantum key distribution using decoy state protocol

Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible...

Full description

Bibliographic Details
Main Authors: Ali, Sellami, Saharudin, Shuhairi, Wahiddin, Mohamed Ridza
Format: Article
Language:English
Published: Science Publications 2009
Subjects:
Online Access:http://irep.iium.edu.my/1018/
http://irep.iium.edu.my/1018/
http://irep.iium.edu.my/1018/
http://irep.iium.edu.my/1018/1/Quantum_key_distribution_using_decoy_state_protocol.pdf
id iium-1018
recordtype eprints
spelling iium-10182011-07-18T03:29:19Z http://irep.iium.edu.my/1018/ Quantum key distribution using decoy state protocol Ali, Sellami Saharudin, Shuhairi Wahiddin, Mohamed Ridza QA76 Computer software Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS) attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD). Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator) in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM). We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than QKD system without decoy state. Science Publications 2009 Article PeerReviewed application/pdf en http://irep.iium.edu.my/1018/1/Quantum_key_distribution_using_decoy_state_protocol.pdf Ali, Sellami and Saharudin, Shuhairi and Wahiddin, Mohamed Ridza (2009) Quantum key distribution using decoy state protocol. American Journal of Engineering and Applied Sciences, 2 (4). pp. 694-698. ISSN 1941-7020 http://thescipub.com/abstract/10.3844/ajeassp.2009.694.698 DOI: 10.3844/ajeassp.2009.694.698
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
Quantum key distribution using decoy state protocol
description Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS) attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD). Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator) in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM). We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than QKD system without decoy state.
format Article
author Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
author_facet Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
author_sort Ali, Sellami
title Quantum key distribution using decoy state protocol
title_short Quantum key distribution using decoy state protocol
title_full Quantum key distribution using decoy state protocol
title_fullStr Quantum key distribution using decoy state protocol
title_full_unstemmed Quantum key distribution using decoy state protocol
title_sort quantum key distribution using decoy state protocol
publisher Science Publications
publishDate 2009
url http://irep.iium.edu.my/1018/
http://irep.iium.edu.my/1018/
http://irep.iium.edu.my/1018/
http://irep.iium.edu.my/1018/1/Quantum_key_distribution_using_decoy_state_protocol.pdf
first_indexed 2023-09-18T20:08:13Z
last_indexed 2023-09-18T20:08:13Z
_version_ 1777407302058377216