Fast quantum key distribution with decoy number states

  title={Fast quantum key distribution with decoy number states},
  author={Daryl Achilles and Ekaterina Rogacheva and Alexei S. Trifonov},
  journal={Journal of Modern Optics},
  pages={361 - 373}
We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a channel with different transmittivity. We then describe two QKD schemes that utilize this method, one of which overcomes the upper limit on the key generation rate imposed by the dead time of detectors when using a heralded source of photons. 
2 Citations
An Arbitrated Quantum Signature Scheme Based on W States
An arbitrated quantum signature scheme with W states with stronger robustness than the GHZ states in the loss of the quantum bits is proposed and its security against forgery and disavowal is discussed.
Q3Sat: quantum communications uplink to a 3U CubeSat—feasibility & design
It is demonstrated how to leverage the latest advancements in nano-satellite body-pointing to show that the 4 kg CubeSat can generate a quantum-secure key, which has so far only been shown by a much larger 600 kg satellite mission.


Enhancing practical security of quantum key distribution with a few decoy states
Rigorous security statements are developed in the case of finite statistics with only a few decoy states, and the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology are presented.
Quantum key distribution with passive decoy state selection
We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and
Beating the photon-number-splitting attack in practical quantum cryptography.
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack
Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via
Entangled state quantum cryptography: eavesdropping on the ekert protocol
Using polarization-entangled photons from spontaneous parametric down-conversion, Ekert's quantum cryptography protocol is implemented, and a procedure to increase her detectability is discussed.
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Physics
    Physical review letters
  • 2003
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Decoy state quantum key distribution.
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Photon-number-resolving decoy-state quantum key distribution
It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.
Security against individual attacks for realistic quantum key distribution
A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.
Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses
Abstract The technological possibilities of a realistic eavesdropper are discussed. Two eavesdropping strategies taking advantage of multiphoton pulses in faint laser QKD are presented. We conclude