# Decoy-state quantum key distribution with more than three types of photon intensity pulses

@article{Chau2017DecoystateQK, title={Decoy-state quantum key distribution with more than three types of photon intensity pulses}, author={Hoi Fung Chau}, journal={Physical Review A}, year={2017}, volume={97} }

Decoy state method closes source security loophole in quantum key distribution (QKD) using laser source. In this method, accurate estimates of the detection rates of vacuum and single photon events plus the error rate of single photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which uses three types of photon intensities, is accurate up to about 1% relative error. Here I report an…

## 12 Citations

### Application of an improved version of McDiarmid inequality in finite-key-length decoy-state quantum key distribution

- Computer ScienceNew Journal of Physics
- 2020

An improved version of McDiarmid inequality in statistics is reported and used to directly compute a lower bound of R via the so-called centering sequence and a novelty in this work is the optimization of the bound through the freedom of choosing possible centering sequences.

### Experimental 4-intensity decoy-state quantum key distribution with asymmetric basis-detector efficiency

- PhysicsPhysical Review A
- 2019

The decoy-state method has been developed rapidly in quantum key distribution (QKD) since it is immune to photon-number splitting attacks. However, two basis detector efficiency asymmetry, which…

### Higher key rate of measurement-device-independent quantum key distribution through joint data processing

- Physics, Computer Science
- 2021

Numerical results show that the double-scanning method can improve the key rate of measurement-device-independent quantum key distribution drastically and the optimization of MDI-QKD protocol with all parameters including the source parameters and failure probability parameters, over symmetric channel or asymmetric channel.

### Security of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys

- Mathematics
- 2020

In quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak…

### Reference-Frame-Independent Quantum Key Distribution Using Fewer States

- Computer SciencePhysical Review Applied
- 2019

It is shown that the RFI QKD protocol can be secured in the case where Alice sends fewer states, and transmitting three states is sufficient to obtain the comparable secret key rates and the covered distances.

### Sending-or-not-sending twin-field quantum key distribution: Breaking the direct transmission key rate

- Computer Science, Physics
- 2020

We present improved method of sending-or-not-sending twin-field quantum key distribution (SNS TF-QKD) based on its structure and the application of error rejection. %And we present iteration formula…

### Passive BB84 decoy-state protocol with a flawed source

- Computer ScienceJournal of Physics: Conference Series
- 2021

This work takes into account the influence of various laser imperfections and shows that the new bound on the secret key rate of the passive protocol stays similar to the one of an active scheme, thus proving passive generation to be a practical means of constructing QKD systems.

### Adaptive Techniques in Practical Quantum Key Distribution

- Computer Science
- 2020

Adapt techniques with innovative protocol and algorithm design, as well as novel techniques such as machine learning, are developed to address some of these key challenges, including atmospheric turbulence in channels for free-space QKD, asymmetric losses in channel for QKKD network, and efficient parameter optimization in real time.

### Zigzag approach to higher key rate of sending-or-not-sending twin field quantum key distribution with finite-key effects

- Computer ScienceNew Journal of Physics
- 2020

A zigzag approach to verify the phase-flip error of the survived bits after OPER or AOPP and produces the highest key rate over all distances among all existing methods, improving the key rate by more than 100% to 3000% in comparison with different prior art methods with typical experimental setting.

### Optimizing Decoy‐State Protocols for Practical Quantum Key Distribution Systems

- Computer ScienceAdvanced Quantum Technologies
- 2021

This work compares the key‐rate performance of 38 decoy‐state protocols using the particle swarm optimization (PSO) algorithm and forms a guideline for practical QKD systems, where the optimal decoy-state protocols are found with the change of five system parameters.

## References

SHOWING 1-10 OF 40 REFERENCES

### Decoy-state quantum key distribution with polarized photons over 200 km.

- PhysicsOptics express
- 2010

A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock.

### Satellite-to-ground quantum key distribution

- PhysicsNature
- 2017

This work reports the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD—a form ofQKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected.

### Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

### General theory for decoy-state quantum key distribution with an arbitrary number of intensities

- Mathematics
- 2007

We develop a general theory for quantum key distribution (QKD) in both the forward error correction and the reverse error correction cases when the QKD system is equipped with phase-randomized…

### Practical Decoy State for Quantum Key Distribution

- Computer Science
- 2005

It is suggested that, even for long-distance QKD, the two-decoy-state protocol can be implemented with only a few hours of experimental data, and the decoy state quantum key distribution is highly practical.

### Decoy-state quantum key distribution with two-way classical postprocessing

- Computer Science
- 2006

Two data postprocessing schemes for the decoy-state method using two-way classical communications with decoy states are developed and it is concluded that decoys-state QKD with two- way classical postprocessing is of practical interest.

### Finite-key security analysis for multilevel quantum key distribution

- Computer Science
- 2015

A detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario and the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons is discussed.

### An information-theoretic security proof for QKD protocols

- Computer Science, Mathematics
- 2005

A new technique based on direct information-theoretic arguments is presented, which gives new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute.

### Information-theoretic security proof for quantum-key-distribution protocols (17 pages)

- Computer Science, Mathematics
- 2005

This work investigates a general class of QKD protocols with one-way classical post-processing and gives new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute.

### Practical issues in quantum-key-distribution postprocessing

- Computer Science
- 2010

This result is applicable to the BB84 protocol with a single or entangled photon source and serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys.