Photon-number-resolving decoy-state quantum key distribution

@article{Cai2006PhotonnumberresolvingDQ,
  title={Photon-number-resolving decoy-state quantum key distribution},
  author={Qing-yu Cai and Yong-gang Tan},
  journal={Physical Review A},
  year={2006},
  volume={73},
  pages={032305}
}
In this paper, a photon-number-resolving decoy-state quantum key distribution (QKD) scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused by multiphoton pulses is given, which seems inherent as long as weak coherent sources and high lossy channel are used. This implies that our scheme is optimal in long-distance QKD with weak coherent sources. We show that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric… 
High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States
The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal
New estimates of single photon parameters for satellite-based QKD
A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. It can give us different lower and upper bounds
A universal coherent source for quantum key distribution
We propose a concept of universal coherent source for quantum key distribution. The weak coherent pulse (WCP) and heralded single photon source (HSPS) are the most common photon sources for
Practical SARG04 quantum key distribution
TLDR
The numerical simulation has shown that the fiber based QKD and free spaceQKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04.
Fast quantum key distribution with decoy number states
We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a
Decoy State Quantum Key Distribution with Odd Coherent State
We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum
Passive decoy state SARG04 quantum-key-distribution with practical photon-number resolving detectors
SARG04 protocol has its advantages in defending photon number splitting attack, benefited from two-photon pulses part. In this paper, we present a passive decoy state SARG04 scheme combining with
Fluctuation Analysis of Decoy State QKD with Finite Data-Set Size
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84 QKD with coherent light pulses. The number of data-set size in practical QKD protocol is always
The quick single-photon detector with many avalanche photo-diodes for quantum key distribution
It is the closest technology to practice in the quantum communication at present to apply single-photon scheme to implement the quantum key distribution (QKD), and may achieve the absolute security
Implementation of SARG04 decoy state quantum key distribution
  • Sellami Ali, O. Mahmoud
  • Computer Science
    2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
  • 2011
TLDR
By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance.
...
1
2
3
...

References

SHOWING 1-10 OF 25 REFERENCES
Beating the photon-number-splitting attack in practical quantum cryptography.
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
    Physical review letters
  • 2003
TLDR
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack
Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via
Effect of finite detector efficiencies on the security evaluation of quantum key distribution
Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can
Enhancing practical security of quantum key distribution with a few decoy states
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an
Decoy state quantum key distribution.
TLDR
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Practical Decoy State for Quantum Key Distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state
Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography
In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was
High-efficiency photon-number detection for quantum information processing
The visible light photon counter (VLPC) features high quantum efficiency (QE) and low pulse height dispersion. These properties make it ideal for efficient photon-number state detection. The ability
Limitations on practical quantum cryptography
TLDR
It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.
...
1
2
3
...