Decoy state quantum key distribution.

@article{Lo2005DecoySQ,
  title={Decoy state quantum key distribution.},
  author={Hoi-Kwong Lo and Xiongfeng Ma and Kai Chen},
  journal={Physical review letters},
  year={2005},
  volume={94 23},
  pages={
          230504
        }
}
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states… 

Figures from this paper

Security Bounds for Efficient Decoy-State Quantum Key Distribution
TLDR
The protocol is reviewed and a map by Ahrens is exploited to rigorously upper bound the hypergeometric distribution resulting from a general eavesdropping, which is only marginally smaller than its predecessor in all cases of practical interest.
Hacking on decoy-state quantum key distribution system with partial phase randomization
TLDR
It is shown that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states, and the eavesdropper is able to steal all the key information without discovered by the users.
Experimental quantum key distribution with decoy states.
TLDR
By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber.
The security of practical quantum key distribution
TLDR
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Experimental quantum key distribution with uncharacterized sources and projective measurements.
TLDR
This work reports an experimental decoy-state QKD demonstration with uncharacterized encoding sources, which only requires that the encoding states are two-dimensional and the measurement operation of the receiver is loosened to be projective measurements.
Experimental quantum key distribution with source flaws
TLDR
An experiment is performed that for the first time shows secure QKKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework.
Decoy quantum key distribution: Modeling and application
TLDR
An overview of decoy quantum key distribution is provided, which primarily focuses on the model of implementing decoy idea, which mainly includes decoy devices at the source side and the detector side.
Free-Space Decoy-State Quantum Key Distribution
TLDR
Decoy state analysis ensured the security of the attenuated pulse scheme for a link efficiency of about 35 dB and resulted in key rates of 231 bit/s, clearly demonstrating the feasibility of free space links to satellites enabling global secure key exchange.
The security and recent technology of quantum key distribution
TLDR
The decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.
Deterministic MDI QKD with two secret bits per shared entangled pair
TLDR
A new quantum key Distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks is proposed.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 40 REFERENCES
Security of Quantum Key Distribution with Realistic Devices
TLDR
A practical way to perform the decoy state method is proposed, which mainly follows the idea of Lo's decoys state and can improve the key generation rate from quadratic of transmission efficiency O(eta2) to O (eta).
Practical Decoy State for Quantum Key Distribution
TLDR
It is suggested that, even for long-distance QKD, the two-decoy-state protocol can be implemented with only a few hours of experimental data, and the decoy state quantum key distribution is highly practical.
Advances in Cryptology — EUROCRYPT ’93
  • T. Helleseth
  • Computer Science
    Lecture Notes in Computer Science
  • 2001
TLDR
An explicit relation between authentication codes and codes correcting independent errors is shown, which gives rise to several upper bounds on A-codes and how to construct A- codes starting from error correcting codes.
Advances in Cryptology
TLDR
The undecidable word problem for groups and semlgroups is investigated as a basis for a public-key cryptosystem, and the type of cryptos System shown is randomized, with infinitely many ciphertexts corresponding t o each plaintext.
Quantum Computation and Quantum Information
TLDR
This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.
In This Issue
  • W. Harrison
  • Computer Science
    Software Quality Journal
  • 2004
We have a particular focus in this issue on measurement. Piattini, Calero and Genero propose some complexity metrics tailored for relational database systems in “Table Oriented Metrics for Relational
"J."
however (for it was the literal soul of the life of the Redeemer, John xv. io), is the peculiar token of fellowship with the Redeemer. That love to God (what is meant here is not God’s love to men)
APPL
TLDR
A prototype probability package named APPL (A Probability Programming Language) is presented that can be used to manipulate random variables and examples illustrate its use.
Quantum Inf
  • Comput. 4, 325
  • 2004
A
  • J. Shields, Appl. Phys. Lett. 84, 3762
  • 2004
...
1
2
3
4
...