# Fast quantum key distribution with decoy number states

@article{Achilles2008FastQK, title={Fast quantum key distribution with decoy number states}, author={Daryl Achilles and Ekaterina Rogacheva and Alexei S. Trifonov}, journal={Journal of Modern Optics}, year={2008}, volume={55}, pages={361 - 373} }

We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a channel with different transmittivity. We then describe two QKD schemes that utilize this method, one of which overcomes the upper limit on the key generation rate imposed by the dead time of detectors when using a heralded source of photons.

## 2 Citations

An Arbitrated Quantum Signature Scheme Based on W States

- Computer Science, Mathematics
- 2016

An arbitrated quantum signature scheme with W states with stronger robustness than the GHZ states in the loss of the quantum bits is proposed and its security against forgery and disavowal is discussed.

Q3Sat: quantum communications uplink to a 3U CubeSat—feasibility & design

- Physics
- 2018

It is demonstrated how to leverage the latest advancements in nano-satellite body-pointing to show that the 4 kg CubeSat can generate a quantum-secure key, which has so far only been shown by a much larger 600 kg satellite mission.

## References

SHOWING 1-10 OF 49 REFERENCES

Enhancing practical security of quantum key distribution with a few decoy states

- Physics, Computer Science
- 2005

Rigorous security statements are developed in the case of finite statistics with only a few decoy states, and the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology are presented.

Quantum key distribution with passive decoy state selection

- Physics, Computer Science
- 2007

We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and…

Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

- Physics
- 2002

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via…

Entangled state quantum cryptography: eavesdropping on the ekert protocol

- Physics, Computer SciencePhysical review letters
- 2000

Using polarization-entangled photons from spontaneous parametric down-conversion, Ekert's quantum cryptography protocol is implemented, and a procedure to increase her detectability is discussed.

Quantum key distribution with high loss: toward global secure communication.

- Computer Science, PhysicsPhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Photon-number-resolving decoy-state quantum key distribution

- Physics, Computer Science
- 2006

It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.

Security against individual attacks for realistic quantum key distribution

- Computer Science
- 2000

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses

- Physics
- 2001

Abstract The technological possibilities of a realistic eavesdropper are discussed. Two eavesdropping strategies taking advantage of multiphoton pulses in faint laser QKD are presented. We conclude…