Author:
Ali Sellami,Djaouida Benlahcene
Abstract
This paper simulated the operation of vacuum state and single decoy state protocols in the BB84 and SARG04 QKD schemes by utilizing the features of the commercial ID-3000 QKD system. Numerical modeling identified an optimal signal-to-decoy state ratio of 0.95:0.05 and an intensity of μ=0.85 for the signal state and ν1=0.05 for the decoy state, ensuring the highest key generation rate and a secure distance of up to 50 km. These protocols were validated experimentally over various transmission distances with standard telecom fiber, using the ID-3000 QKD system in a conventional bi-directional plug-and-play setup. Simulations predicted secure key rates of 1.2 × 10 5 bits/s for SARG04 and 8.5 × 104 bits/s for BB84 at 10 km, with secure distances of 45 km and 35 km, respectively. The experimental results confirmed these predictions, showing a 30% higher key rate and 20% longer secure distance compared to non-decoy methods. The SARG04 protocol surpassed BB84 in key rate and secure distance, highlighting the two-photon component's role in key generation. This study concludes that the decoy-state method significantly enhances key generation rates and secure distances, optimizing QKD protocols for secure quantum communication.
Publisher
Engineering, Technology & Applied Science Research
Reference47 articles.
1. C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in International Conference on Computers, Systems, and Signal Processing, Bangalore, India, Dec. 1984, pp. 175–179.
2. H. Inamori, N. Lutkenhaus, and D. Mayers, "Unconditional security of practical quantum key distribution," The European Physical Journal D, vol. 41, no. 3, pp. 599–627, Mar. 2007.
3. B. Huttner, N. Imoto, N. Gisin, and T. Mor, "Quantum cryptography with coherent states," Physical Review A, vol. 51, no. 3, pp. 1863–1869, Mar. 1995.
4. W.-Y. Hwang, "Quantum Key Distribution with High Loss: Toward Global Secure Communication," Physical Review Letters, vol. 91, no. 5, Aug. 2003, Art. no. 057901.
5. D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," Quantum Information & Computation, vol. 4, no. 5, pp. 325–360, 2004.