# Beating the photon-number-splitting attack in practical quantum cryptography.

@article{Wang2005BeatingTP, title={Beating the photon-number-splitting attack in practical quantum cryptography.}, author={Xiang‐Bin Wang}, journal={Physical review letters}, year={2005}, volume={94 23}, pages={ 230503 } }

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only…

## Tables and Topics from this paper

## 896 Citations

Fast and simple one-way quantum key distribution

- Physics, Mathematics
- 2005

We present and demonstrate a new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate. The key is obtained by a…

Thwarting the photon number splitting attack with entanglement enhanced BB84 quantum key distribution

- Physics, EngineeringDefense + Commercial Sensing
- 2012

We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to increase the security of the scheme and enhance its resilience to the…

Thwarting the Photon Number Splitting Attack with Entanglement Enhanced BB84 Quantum Key Distribution

- Physics
- 2012

We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to improve the security of the scheme and enhance its resilience to the…

Quantum key distribution with multiphoton pulses: an advantage

- PhysicsOptics Continuum
- 2022

In this article we present proof-of-concept implementation of quantum key distribution protocol based on BB84 with imperfect devices. We show that using coincidence measurements to monitor…

Fast quantum key distribution with decoy number states

- Physics
- 2008

We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a…

Decoy State Quantum Key Distribution with Odd Coherent State

- Physics
- 2008

We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum…

Photon-number-resolving decoy-state quantum key distribution

- Physics
- 2006

In this paper, a photon-number-resolving decoy-state quantum key distribution (QKD) scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused…

High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

- Physics
- 2006

The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal…

Nonorthogonal decoy-state Quantum Key Distribution

- Physics
- 2005

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and…

An enhanced proposal on decoy-state measurement device-independent quantum key distribution

- Physics, Computer ScienceQuantum Inf. Process.
- 2016

By employing pulses involving three-intensity, a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources is proposed that can approach very closely the asymptotic case of using an infinite number of decoy-states and exhibits excellent behavior in both the secure transmission distance and the final key generation rate.

## References

SHOWING 1-10 OF 27 REFERENCES

Quantum computation and quantum information

- Mathematics, Computer ScienceMathematical Structures in Computer Science
- 2007

This special issue of Mathematical Structures in Computer Science contains several contributions related to the modern field of Quantum Information and Quantum Computing. The first two papers deal…

Phys

- Rev. Lett. 91, 057901
- 2003

Appl. Phys. Lett

- Appl. Phys. Lett
- 2004

Phys. Rev. Lett

- Phys. Rev. Lett
- 2003

Nature (London) 418

- 270 (2002); C. Kurtsiefer et al, Nature (London) 418, 450(2002); J. G. Raty et al, New J. Phys. 4, 82(2002); R. J. Hughes et al, New J. Phys. 4, 43
- 2002

Nature Nature New J. Phys. New J. Phys

- Nature Nature New J. Phys. New J. Phys
- 2002

New J

- Phys., 4, 44
- 2002

New J. Phys

- New J. Phys
- 2002

Phys

- Rev. A 66, 042315
- 2002

Phys. Rev. A

- Phys. Rev. A
- 2002