Experimental quantum key distribution with decoy states.

@article{Zhao2006ExperimentalQK,
  title={Experimental quantum key distribution with decoy states.},
  author={Yi Zhao and Bing Qi and Xiongfeng Ma and Hoi-Kwong Lo and Li Qian},
  journal={Physical review letters},
  year={2006},
  volume={96 7},
  pages={
          070502
        }
}
  • Yi Zhao, B. Qi, +2 authors L. Qian
  • Published 24 March 2005
  • Computer Science, Physics, Medicine
  • Physical review letters
To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication… 

Figures, Tables, and Topics from this paper

Experimental Decoy State Quantum Key Distribution Over 120 km Fibre
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure, has become attractive recently. However, in many QKD systems, disturbances of
Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.
TLDR
A one-way Bennett-Brassard 1984 protocol with a four states and one-detector phase-coding scheme, immune to recently proposed time-shift attacks, photon-number splitting attacks, and can also be proven to be secure against Trojan horse attacks and any other standard individual or coherent attacks.
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from
An improved scheme on decoy-state method for measurement-device-independent quantum key distribution
TLDR
This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate.
Implementation of SARG04 decoy state quantum key distribution
  • Sellami Ali, O. Mahmoud
  • Computer Science
    2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
  • 2011
TLDR
By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance.
Decoy-state quantum key distribution with two-way classical postprocessing
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously,
Decoy-state quantum key distribution with polarized photons over 200 km.
TLDR
A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock.
Free-Space Decoy-State Quantum Key Distribution
Quantum cryptography, the only method which can provide quantifiable security of a distributed key, became the first application of quantum information methods. Complementary to fiber based systems,
Improve the efficiency of a practical quantum key distribution system
The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present two
Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.
TLDR
This work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 62 REFERENCES
Decoy state quantum key distribution.
TLDR
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Security of Quantum Key Distribution with Realistic Devices
We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correction
Enhancing practical security of quantum key distribution with a few decoy states
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an
Practical Decoy State for Quantum Key Distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
    Physical review letters
  • 2003
TLDR
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Proof of security of quantum key distribution with two-way classical communications
TLDR
This investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.
Effect of finite detector efficiencies on the security evaluation of quantum key distribution
Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can
Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack
A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light,
Experimental Quantum Cryptography
TLDR
Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.
Beating the photon-number-splitting attack in practical quantum cryptography.
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of
...
1
2
3
4
5
...