# Decoy state quantum key distribution.

@article{Lo2005DecoySQ, title={Decoy state quantum key distribution.}, author={Hoi-Kwong Lo and Xiongfeng Ma and Kai Chen}, journal={Physical review letters}, year={2005}, volume={94 23}, pages={ 230504 } }

There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states…

## Figures from this paper

## 1,095 Citations

Security Bounds for Efficient Decoy-State Quantum Key Distribution

- Computer ScienceIEEE Journal of Selected Topics in Quantum Electronics
- 2015

The protocol is reviewed and a map by Ahrens is exploited to rigorously upper bound the hypergeometric distribution resulting from a general eavesdropping, which is only marginally smaller than its predecessor in all cases of practical interest.

Hacking on decoy-state quantum key distribution system with partial phase randomization

- Computer ScienceScientific reports
- 2014

It is shown that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states, and the eavesdropper is able to steal all the key information without discovered by the users.

Experimental quantum key distribution with decoy states.

- Computer Science, PhysicsPhysical review letters
- 2006

By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber.

The security of practical quantum key distribution

- Computer Science
- 2009

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

Experimental quantum key distribution with uncharacterized sources and projective measurements.

- PhysicsOptics letters
- 2019

This work reports an experimental decoy-state QKD demonstration with uncharacterized encoding sources, which only requires that the encoding states are two-dimensional and the measurement operation of the receiver is loosened to be projective measurements.

Experimental quantum key distribution with source flaws

- Computer Science
- 2015

An experiment is performed that for the first time shows secure QKKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework.

Decoy quantum key distribution: Modeling and application

- Computer Science2010 2nd International Conference on Future Computer and Communication
- 2010

An overview of decoy quantum key distribution is provided, which primarily focuses on the model of implementing decoy idea, which mainly includes decoy devices at the source side and the detector side.

Free-Space Decoy-State Quantum Key Distribution

- Computer ScienceOFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference
- 2008

Decoy state analysis ensured the security of the attenuated pulse scheme for a link efficiency of about 35 dB and resulted in key rates of 231 bit/s, clearly demonstrating the feasibility of free space links to satellites enabling global secure key exchange.

The security and recent technology of quantum key distribution

- Computer Science, Physics
- 2006

The decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.

Deterministic MDI QKD with two secret bits per shared entangled pair

- Computer ScienceQuantum Inf. Process.
- 2018

A new quantum key Distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks is proposed.

## References

SHOWING 1-10 OF 40 REFERENCES

Security of Quantum Key Distribution with Realistic Devices

- Computer Science
- 2005

A practical way to perform the decoy state method is proposed, which mainly follows the idea of Lo's decoys state and can improve the key generation rate from quadratic of transmission efficiency O(eta2) to O (eta).

Practical Decoy State for Quantum Key Distribution

- Computer Science
- 2005

It is suggested that, even for long-distance QKD, the two-decoy-state protocol can be implemented with only a few hours of experimental data, and the decoy state quantum key distribution is highly practical.

Advances in Cryptology — EUROCRYPT ’93

- Computer ScienceLecture Notes in Computer Science
- 2001

An explicit relation between authentication codes and codes correcting independent errors is shown, which gives rise to several upper bounds on A-codes and how to construct A- codes starting from error correcting codes.

Advances in Cryptology

- Computer Science, MathematicsLecture Notes in Computer Science
- 2000

The undecidable word problem for groups and semlgroups is investigated as a basis for a public-key cryptosystem, and the type of cryptos System shown is randomized, with infinitely many ciphertexts corresponding t o each plaintext.

Quantum Computation and Quantum Information

- Physics, Computer Science
- 2000

This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.

In This Issue

- Computer ScienceSoftware Quality Journal
- 2004

We have a particular focus in this issue on measurement. Piattini, Calero and Genero propose some complexity metrics tailored for relational database systems in “Table Oriented Metrics for Relational…

"J."

- Philosophy
- 1890

however (for it was the literal soul of the life of the Redeemer, John xv. io), is the peculiar token of fellowship with the Redeemer. That love to God (what is meant here is not God’s love to men)…

APPL

- Computer Science
- 2001

A prototype probability package named APPL (A Probability Programming Language) is presented that can be used to manipulate random variables and examples illustrate its use.

Quantum Inf

- Comput. 4, 325
- 2004

A

- J. Shields, Appl. Phys. Lett. 84, 3762
- 2004