# Nonorthogonal decoy-state Quantum Key Distribution

@article{Li2005NonorthogonalDQ, title={Nonorthogonal decoy-state Quantum Key Distribution}, author={Jing-Bo Li and X. Fang}, journal={arXiv: Quantum Physics}, year={2005} }

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission…

## 8 Citations

Decoy states and two way quantum key distribution schemes

- Computer Science, Physics
- 2011

This work derives relevant lower bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states in a basic two way quantum key distribution scheme to extend its distance.

High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

- Physics
- 2006

The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal…

Practical SARG04 quantum key distribution

- Computer Science
- 2012

The numerical simulation has shown that the fiber based QKD and free spaceQKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04.

New protocols for non-orthogonal quantum key distribution

- Physics
- 2013

Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded…

A Quantum Communication Protocol Transferring Unknown Photons Using Path-Polarization Hybrid Entanglement

- Physics
- 2013

We propose a protocol for transferring photons of unknown states to a distant location using path-polarization hybrid entanglement. Our protocol uses a polarizing beam splitter (PBS), a beam splitter…

IMPLEMENTING ENTANGLEMENT SWAPPING WITH A THERMAL CAVITY

- Physics
- 2007

We proposed a scheme to implement the entanglement swapping based on cavity QED. Using this scheme, we can obtain the entanglement swapping with the success probability of 100% for a two atoms system…

Security of quantum-key-distribution protocol by using the post-selection technique

- Computer Science
- 2021

This work applies the post-selection technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol, proving that the bounds for optimal attack are close to the bound for collective attack for many signals.

Experimental free-space quantum secure direct communication and its security analysis

- Computer Science, Physics
- 2020

The results show that quantum secure direct communication is feasible in free space and the security is analyzed under the scenario that Eve performs collective attack and photon number splitting collective attack.

## References

SHOWING 1-10 OF 15 REFERENCES

Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, MedicinePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

Quantum key distribution with high loss: toward global secure communication.

- Computer Science, MedicinePhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

Decoy state quantum key distribution.

- Computer Science, MedicinePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Limitations on practical quantum cryptography

- Computer Science, MedicinePhysical review letters
- 2000

It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.

Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

- Physics
- 2002

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via…

Quantum key distribution over 122 km of standard telecom fiber

- Physics
- 2004

We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, we…

Quantum Cryptography with Entangled QuNits

- Physics
- 2005

We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space. In our protocol, we adopt asymmetric measurement…

Quantum cryptography with coherent states.

- Physics, MedicinePhysical review. A, Atomic, molecular, and optical physics
- 1995

This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.

Security against individual attacks for realistic quantum key distribution

- Physics
- 2000

I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84…

Increasing the Efficiencies of Random-Choice-Based Quantum Communication Protocols with Delayed Measurement

- Computer Science
- 2004

Delayed measurement is proposed to be used to increase the efficiency of protocols of quantum key distribution and quantum secret sharing that uses a random choice of measuring-basis.