Nonorthogonal decoy-state Quantum Key Distribution

  title={Nonorthogonal decoy-state Quantum Key Distribution},
  author={Jing-Bo Li and X. Fang},
  journal={arXiv: Quantum Physics},
In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission… 
8 Citations
Decoy states and two way quantum key distribution schemes
This work derives relevant lower bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states in a basic two way quantum key distribution scheme to extend its distance.
High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States
The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal
Practical SARG04 quantum key distribution
The numerical simulation has shown that the fiber based QKD and free spaceQKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04.
New protocols for non-orthogonal quantum key distribution
Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded
A Quantum Communication Protocol Transferring Unknown Photons Using Path-Polarization Hybrid Entanglement
We propose a protocol for transferring photons of unknown states to a distant location using path-polarization hybrid entanglement. Our protocol uses a polarizing beam splitter (PBS), a beam splitter
We proposed a scheme to implement the entanglement swapping based on cavity QED. Using this scheme, we can obtain the entanglement swapping with the success probability of 100% for a two atoms system
Security of quantum-key-distribution protocol by using the post-selection technique
This work applies the post-selection technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol, proving that the bounds for optimal attack are close to the bound for collective attack for many signals.
Experimental free-space quantum secure direct communication and its security analysis
The results show that quantum secure direct communication is feasible in free space and the security is analyzed under the scenario that Eve performs collective attack and photon number splitting collective attack.


Beating the photon-number-splitting attack in practical quantum cryptography.
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
    Physical review letters
  • 2003
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Decoy state quantum key distribution.
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Limitations on practical quantum cryptography
It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack
Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via
Quantum key distribution over 122 km of standard telecom fiber
We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, we
Quantum Cryptography with Entangled QuNits
We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space. In our protocol, we adopt asymmetric measurement
Quantum cryptography with coherent states.
  • Huttner, Imoto, Gisin, Mor
  • Physics, Medicine
    Physical review. A, Atomic, molecular, and optical physics
  • 1995
This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84
Increasing the Efficiencies of Random-Choice-Based Quantum Communication Protocols with Delayed Measurement
Delayed measurement is proposed to be used to increase the efficiency of protocols of quantum key distribution and quantum secret sharing that uses a random choice of measuring-basis.