Beating the photon-number-splitting attack in practical quantum cryptography.

@article{Wang2004BeatingTP,
  title={Beating the photon-number-splitting attack in practical quantum cryptography.},
  author={Xiang‐Bin Wang},
  journal={Physical review letters},
  year={2004},
  volume={94 23},
  pages={
          230503
        }
}
  • Xiang‐Bin Wang
  • Published 11 October 2004
  • Physics, Computer Science
  • Physical review letters
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only… 

Tables from this paper

Fast and simple one-way quantum key distribution

A new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate, featuring a high efficiency in terms of distilled secret bit per qubit.

Thwarting the photon-number-splitting attack with entanglement-enhanced BB84 quantum key distribution

We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to improve the security of the scheme and enhance its resilience to the

Decoy State Quantum Key Distribution with Odd Coherent State

We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum

Fast quantum key distribution with decoy number states

We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a

Photon-number-resolving decoy-state quantum key distribution

It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.

High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal

Nonorthogonal decoy-state Quantum Key Distribution

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and

Security of decoy-state quantum key distribution with imperfect phase randomization

This work provides a security proof for decoy-state QKD with correlated phases that provides key rates close to the ideal scenario and paves the way towards high-performance QkD with practical laser sources.

Security of the decoy state method for quantum key distribution

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

Practical decoy-state quantum random number generator with weak coherent sources

Numerical simulation results show that the proposed decoy-state quantum random number generator with weak coherent sources can extract out randomness close to the asymptotic case where the fraction of single-photon pulses are exactly known.
...

References

SHOWING 1-10 OF 29 REFERENCES

Quantum computation and quantum information

  • T. Paul
  • Physics
    Mathematical Structures in Computer Science
  • 2007
This special issue of Mathematical Structures in Computer Science contains several contributions related to the modern field of Quantum Information and Quantum Computing. The first two papers deal

Lo,N.Lutkenhause and J.Preskill,quant-ph/0212066.418,450(2002);J

  • G .Raty etal,New
  • 2002

Phys

  • Rev. Lett. 91, 057901
  • 2003

Phys. Rev. Lett

  • Phys. Rev. Lett
  • 2003

Im aiforhi s l ong-term support. Ithank Toshi yukiShi m ono for

    pdf: D ecoy state quantum key di stri buti on (Q K D )

      Comput

      • Mach. 48, 351
      • 2001

      http://www.fields.utoronto.ca/programs/scientific/04- 05/quantumIC/abstracts/lo.ppt; /lo.pdf: Decoy state quantum key distribution (QKD)

      • http://www.fields.utoronto.ca/programs/scientific/04- 05/quantumIC/abstracts/lo.ppt; /lo.pdf: Decoy state quantum key distribution (QKD)

      Proc. IEEE Int. Conf. on Computers, systems, and signal processing

      • Proc. IEEE Int. Conf. on Computers, systems, and signal processing
      • 1984

      Phys. Rev. Lett

      • Phys. Rev. Lett
      • 2000