High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

  title={High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States},
  author={Li Jing-Bo and Fang Xi-ming},
  journal={Chinese Physics Letters},
The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal state is still an open question. We present a simple formula to analyse the problem. We also give a simple method to derive the bounds of the necessary counting rates and quantum bit error rates for BB84 and SARG04; the latter was previously proposed by Scarani et al. [Phys. Rev. Lett. 92 (2004… 


Photon-number-resolving decoy-state quantum key distribution
It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.
Beating the photon-number-splitting attack in practical quantum cryptography.
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of
Decoy state quantum key distribution.
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Practical Decoy State for Quantum Key Distribution
It is suggested that, even for long-distance QKD, the two-decoy-state protocol can be implemented with only a few hours of experimental data, and the decoy state quantum key distribution is highly practical.
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Physics
    Physical review letters
  • 2003
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack
Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via
Quantum Cryptography with Entangled QuNits
This work proposes an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space and shows that the security of the scheme increases with the dimension N.
Nonorthogonal decoy-state Quantum Key Distribution
In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and
Quantum cryptography with coherent states.
  • Huttner, Imoto, Gisin, Mor
  • Computer Science, Physics
    Physical review. A, Atomic, molecular, and optical physics
  • 1995
This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.
Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations
We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing