# Beating the photon-number-splitting attack in practical quantum cryptography.

@article{Wang2004BeatingTP, title={Beating the photon-number-splitting attack in practical quantum cryptography.}, author={Xiang‐Bin Wang}, journal={Physical review letters}, year={2004}, volume={94 23}, pages={ 230503 } }

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only…

## 1,018 Citations

### Thwarting the photon-number-splitting attack with entanglement-enhanced BB84 quantum key distribution

- PhysicsDefense + Commercial Sensing
- 2012

We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to improve the security of the scheme and enhance its resilience to the…

### Decoy State Quantum Key Distribution with Odd Coherent State

- Physics
- 2008

We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum…

### Photon-number-resolving decoy-state quantum key distribution

- Physics, Computer Science
- 2006

It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.

### High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

- Physics
- 2006

The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal…

### Nonorthogonal decoy-state Quantum Key Distribution

- Physics
- 2005

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and…

### An enhanced proposal on decoy-state measurement device-independent quantum key distribution

- PhysicsQuantum Inf. Process.
- 2016

By employing pulses involving three-intensity, a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources is proposed that can approach very closely the asymptotic case of using an infinite number of decoy-states and exhibits excellent behavior in both the secure transmission distance and the final key generation rate.

### An enhanced proposal on decoy-state measurement device-independent quantum key distribution

- PhysicsQuantum Information Processing
- 2016

By employing pulses involving three-intensity, we propose a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources. We make a comparative study of…

### Security of decoy-state quantum key distribution with imperfect phase randomization

- Computer Science
- 2022

This work provides a security proof for decoy-state QKD with correlated phases that provides key rates close to the ideal scenario and paves the way towards high-performance QkD with practical laser sources.

### Security of the decoy state method for quantum key distribution

- Computer Science, MathematicsPhysics-Uspekhi
- 2020

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

### Decoy state method for quantum cryptography based on phase coding into faint laser pulses

- Computer Science, Physics
- 2017

It is shown that this attack, as well as the structural equations for the PNS attack for phase encoding, differs physically from the analogous attack applied to the polarization coding.

## References

SHOWING 1-3 OF 3 REFERENCES

### Lo,N.Lutkenhause and J.Preskill,quant-ph/0212066.418,450(2002);J

- G .Raty etal,New
- 2002