# High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

@article{JingBo2006HighEQ, title={High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States}, author={Li Jing-Bo and Fang Xi-ming}, journal={Chinese Physics Letters}, year={2006}, volume={23}, pages={1375-1378} }

The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal state is still an open question. We present a simple formula to analyse the problem. We also give a simple method to derive the bounds of the necessary counting rates and quantum bit error rates for BB84 and SARG04; the latter was previously proposed by Scarani et al. [Phys. Rev. Lett. 92 (2004…

## References

SHOWING 1-10 OF 20 REFERENCES

Photon-number-resolving decoy-state quantum key distribution

- Physics, Computer Science
- 2006

It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.

Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Practical Decoy State for Quantum Key Distribution

- Computer Science
- 2005

It is suggested that, even for long-distance QKD, the two-decoy-state protocol can be implemented with only a few hours of experimental data, and the decoy state quantum key distribution is highly practical.

Quantum key distribution with high loss: toward global secure communication.

- Computer Science, PhysicsPhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

- Physics
- 2002

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via…

Quantum Cryptography with Entangled QuNits

- Computer Science, Physics
- 2005

This work proposes an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space and shows that the security of the scheme increases with the dimension N.

Nonorthogonal decoy-state Quantum Key Distribution

- Physics
- 2005

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and…

Quantum cryptography with coherent states.

- Computer Science, PhysicsPhysical review. A, Atomic, molecular, and optical physics
- 1995

This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.

Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations

- Computer Science
- 2005

We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing…