# Experimental quantum key distribution with decoy states.

@article{Zhao2006ExperimentalQK, title={Experimental quantum key distribution with decoy states.}, author={Yi Zhao and Bing Qi and Xiongfeng Ma and Hoi-Kwong Lo and Li Qian}, journal={Physical review letters}, year={2006}, volume={96 7}, pages={ 070502 } }

To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication…

## 269 Citations

Experimental Decoy State Quantum Key Distribution Over 120 km Fibre

- Physics
- 2008

Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure, has become attractive recently. However, in many QKD systems, disturbances of…

Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.

- Computer Science, MedicinePhysical review letters
- 2008

A one-way Bennett-Brassard 1984 protocol with a four states and one-detector phase-coding scheme, immune to recently proposed time-shift attacks, photon-number splitting attacks, and can also be proven to be secure against Trojan horse attacks and any other standard individual or coherent attacks.

Practical long-distance quantum key distribution system using decoy levels

- Physics
- 2009

Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from…

An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

- Computer Science, MedicineScientific reports
- 2015

This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate.

Implementation of SARG04 decoy state quantum key distribution

- Computer Science2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
- 2011

By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance.

Decoy-state quantum key distribution with two-way classical postprocessing

- Physics
- 2006

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously,…

Decoy-state quantum key distribution with polarized photons over 200 km.

- Physics, MedicineOptics express
- 2010

A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock.

Free-Space Decoy-State Quantum Key Distribution

- PhysicsOFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference
- 2008

Quantum cryptography, the only method which can provide quantifiable security of a distributed key, became the first application of quantum information methods. Complementary to fiber based systems,…

Improve the efficiency of a practical quantum key distribution system

- Physics, EngineeringSPIE Optical Engineering + Applications
- 2007

The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present two…

Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

- Computer Science, MedicinePhysical review letters
- 2014

This work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

## References

SHOWING 1-10 OF 62 REFERENCES

Decoy state quantum key distribution.

- Computer Science, MedicinePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Security of Quantum Key Distribution with Realistic Devices

- Mathematics, Physics
- 2005

We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correction…

Enhancing practical security of quantum key distribution with a few decoy states

- Physics, Mathematics
- 2005

Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an…

Practical Decoy State for Quantum Key Distribution

- Physics
- 2005

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state…

Quantum key distribution with high loss: toward global secure communication.

- Computer Science, MedicinePhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

Proof of security of quantum key distribution with two-way classical communications

- Computer Science, PhysicsIEEE Trans. Inf. Theory
- 2003

This investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.

Effect of finite detector efficiencies on the security evaluation of quantum key distribution

- Physics
- 2004

Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can…

Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack

- Physics
- 2005

A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light,…

Experimental Quantum Cryptography

- Mathematics, Computer ScienceEUROCRYPT
- 1990

Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.

Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, MedicinePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…