# Experimental quantum key distribution with decoy states.

@article{Zhao2006ExperimentalQK, title={Experimental quantum key distribution with decoy states.}, author={Yi Zhao and Bing Qi and Xiongfeng Ma and Hoi-Kwong Lo and Li Qian}, journal={Physical review letters}, year={2006}, volume={96 7}, pages={ 070502 } }

To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication…

## 270 Citations

### Experimental Decoy State Quantum Key Distribution Over 120 km Fibre

- Physics, Computer Science
- 2008

This work demonstrates the two-intensity decoy QKD with a one-way Faraday-Michelson phase modulation system, which is free of channel disturbance and keeps an interference fringe visibility (99%) long period, over a 120km single mode optical fibre in telecom (1550 nm) wavelength.

### Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.

- Physics, Computer SciencePhysical review letters
- 2008

A one-way Bennett-Brassard 1984 protocol with a four states and one-detector phase-coding scheme, immune to recently proposed time-shift attacks, photon-number splitting attacks, and can also be proven to be secure against Trojan horse attacks and any other standard individual or coherent attacks.

### Practical long-distance quantum key distribution system using decoy levels

- Physics
- 2009

Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from…

### An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

- PhysicsScientific reports
- 2015

This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate.

### Implementation of SARG04 decoy state quantum key distribution

- Computer Science, Physics2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
- 2011

By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance.

### Decoy-state quantum key distribution with two-way classical postprocessing

- Computer Science
- 2006

Two data postprocessing schemes for the decoy-state method using two-way classical communications with decoy states are developed and it is concluded that decoys-state QKD with two- way classical postprocessing is of practical interest.

### Decoy-state quantum key distribution with polarized photons over 200 km.

- PhysicsOptics express
- 2010

A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock.

### Free-Space Decoy-State Quantum Key Distribution

- Computer ScienceOFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference
- 2008

Decoy state analysis ensured the security of the attenuated pulse scheme for a link efficiency of about 35 dB and resulted in key rates of 231 bit/s, clearly demonstrating the feasibility of free space links to satellites enabling global secure key exchange.

### Security of Decoy-State Quantum Key Distribution with Correlated Intensity Fluctuations

- Computer SciencePhysical Review Applied
- 2022

This work improves this security proof technique by combining it with a tight estimation of the relevant parameters that determine the secret key rate, and provides a key rate very similar to the ideal scenario, which highlights the importance of an accurate experimental characterization of the correlations.

### Improve the efficiency of a practical quantum key distribution system

- PhysicsSPIE Optical Engineering + Applications
- 2007

The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present two…

## References

SHOWING 1-10 OF 49 REFERENCES

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Security of Quantum Key Distribution with Realistic Devices

- Computer Science
- 2005

A practical way to perform the decoy state method is proposed, which mainly follows the idea of Lo's decoys state and can improve the key generation rate from quadratic of transmission efficiency O(eta2) to O (eta).

### Enhancing practical security of quantum key distribution with a few decoy states

- Physics, Computer Science
- 2005

Rigorous security statements are developed in the case of finite statistics with only a few decoy states, and the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology are presented.

### Practical Decoy State for Quantum Key Distribution

- Computer Science
- 2005

It is suggested that, even for long-distance QKD, the two-decoy-state protocol can be implemented with only a few hours of experimental data, and the decoy state quantum key distribution is highly practical.

### Quantum key distribution with high loss: toward global secure communication.

- Computer Science, PhysicsPhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

### Proof of security of quantum key distribution with two-way classical communications

- Computer ScienceIEEE Trans. Inf. Theory
- 2003

This investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.

### Effect of finite detector efficiencies on the security evaluation of quantum key distribution

- Physics
- 2004

Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can…

### Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack

- Physics
- 2005

A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light,…

### Experimental quantum cryptography

- Computer ScienceJournal of Cryptology
- 2004

An apparatus and protocol designed to implement quantum key distribution is described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.

### Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…