# Photon-number-resolving decoy-state quantum key distribution

@article{Cai2006PhotonnumberresolvingDQ, title={Photon-number-resolving decoy-state quantum key distribution}, author={Qing-yu Cai and Yong-gang Tan}, journal={Physical Review A}, year={2006}, volume={73}, pages={032305} }

In this paper, a photon-number-resolving decoy-state quantum key distribution (QKD) scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused by multiphoton pulses is given, which seems inherent as long as weak coherent sources and high lossy channel are used. This implies that our scheme is optimal in long-distance QKD with weak coherent sources. We show that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric…

## 29 Citations

High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

- Physics
- 2006

The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal…

New estimates of single photon parameters for satellite-based QKD

- Physics
- 2009

A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. It can give us different lower and upper bounds…

A universal coherent source for quantum key distribution

- Mathematics
- 2009

We propose a concept of universal coherent source for quantum key distribution. The weak coherent pulse (WCP) and heralded single photon source (HSPS) are the most common photon sources for…

Practical SARG04 quantum key distribution

- Computer Science
- 2012

The numerical simulation has shown that the fiber based QKD and free spaceQKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04.

Fast quantum key distribution with decoy number states

- Physics
- 2008

We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a…

Decoy State Quantum Key Distribution with Odd Coherent State

- Physics
- 2008

We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum…

Passive decoy state SARG04 quantum-key-distribution with practical photon-number resolving detectors

- Physics
- 2010

SARG04 protocol has its advantages in defending photon number splitting attack, benefited from two-photon pulses part. In this paper, we present a passive decoy state SARG04 scheme combining with…

Fluctuation Analysis of Decoy State QKD with Finite Data-Set Size

- Physics
- 2010

Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84 QKD with coherent light pulses. The number of data-set size in practical QKD protocol is always…

The quick single-photon detector with many avalanche photo-diodes for quantum key distribution

- Physics, EngineeringSPIE/COS Photonics Asia
- 2008

It is the closest technology to practice in the quantum communication at present to apply single-photon scheme to implement the quantum key distribution (QKD), and may achieve the absolute security…

Implementation of SARG04 decoy state quantum key distribution

- Computer Science2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
- 2011

By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance.

## References

SHOWING 1-10 OF 25 REFERENCES

Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, MedicinePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

Quantum key distribution with high loss: toward global secure communication.

- Computer Science, MedicinePhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

- Physics
- 2002

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via…

Effect of finite detector efficiencies on the security evaluation of quantum key distribution

- Physics
- 2004

Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can…

Enhancing practical security of quantum key distribution with a few decoy states

- Physics, Mathematics
- 2005

Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an…

Decoy state quantum key distribution.

- Computer Science, MedicinePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Practical Decoy State for Quantum Key Distribution

- Physics
- 2005

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state…

Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography

- Physics
- 2005

In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was…

High-efficiency photon-number detection for quantum information processing

- Physics, Mathematics
- 2003

The visible light photon counter (VLPC) features high quantum efficiency (QE) and low pulse height dispersion. These properties make it ideal for efficient photon-number state detection. The ability…

Limitations on practical quantum cryptography

- Computer Science, MedicinePhysical review letters
- 2000

It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.