Experimental quantum key distribution with decoy states.

@article{Zhao2006ExperimentalQK,
  title={Experimental quantum key distribution with decoy states.},
  author={Yi Zhao and Bing Qi and Xiongfeng Ma and Hoi-Kwong Lo and Li Qian},
  journal={Physical review letters},
  year={2006},
  volume={96 7},
  pages={
          070502
        }
}
  • Yi Zhao, B. Qi, +2 authors L. Qian
  • Published 24 March 2005
  • Computer Science, Physics, Medicine
  • Physical review letters
To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication… Expand

Figures, Tables, and Topics from this paper

Experimental Decoy State Quantum Key Distribution Over 120 km Fibre
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure, has become attractive recently. However, in many QKD systems, disturbances ofExpand
Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.
TLDR
A one-way Bennett-Brassard 1984 protocol with a four states and one-detector phase-coding scheme, immune to recently proposed time-shift attacks, photon-number splitting attacks, and can also be proven to be secure against Trojan horse attacks and any other standard individual or coherent attacks. Expand
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD fromExpand
An improved scheme on decoy-state method for measurement-device-independent quantum key distribution
TLDR
This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate. Expand
Implementation of SARG04 decoy state quantum key distribution
  • Sellami Ali, O. Mahmoud
  • Computer Science
  • 2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
  • 2011
TLDR
By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance. Expand
Decoy-state quantum key distribution with two-way classical postprocessing
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously,Expand
Decoy-state quantum key distribution with polarized photons over 200 km.
TLDR
A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock. Expand
Free-Space Decoy-State Quantum Key Distribution
Quantum cryptography, the only method which can provide quantifiable security of a distributed key, became the first application of quantum information methods. Complementary to fiber based systems,Expand
Improve the efficiency of a practical quantum key distribution system
The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present twoExpand
Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.
TLDR
This work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 62 REFERENCES
Decoy state quantum key distribution.
TLDR
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature. Expand
Security of Quantum Key Distribution with Realistic Devices
We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correctionExpand
Enhancing practical security of quantum key distribution with a few decoy states
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by anExpand
Practical Decoy State for Quantum Key Distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy stateExpand
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
  • Physical review letters
  • 2003
TLDR
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses). Expand
Proof of security of quantum key distribution with two-way classical communications
TLDR
This investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols. Expand
Effect of finite detector efficiencies on the security evaluation of quantum key distribution
Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that canExpand
Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack
A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light,Expand
Experimental Quantum Cryptography
TLDR
Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power. Expand
Beating the photon-number-splitting attack in practical quantum cryptography.
  • X. Wang
  • Physics, Medicine
  • Physical review letters
  • 2005
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type ofExpand
...
1
2
3
4
5
...