# Practical Decoy State for Quantum Key Distribution

@article{Ma2005PracticalDS, title={Practical Decoy State for Quantum Key Distribution}, author={X. Ma and Bing Qi and Y. Zhao and Hoi-Kwong Lo}, journal={Physical Review A}, year={2005}, volume={72}, pages={012326} }

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states---the vacuum and a weak decoy state---asymptotically approaches…

## 676 Citations

### Study on passive decoy-state protocols for quantum key distribution

- Computer Science2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)
- 2010

This paper analyzes the passive decoy-state protocol with different light sources, including the lastest passive state Protocol with weak coherent state (WCS) and the simple passive state protocol (AYKI) with heralded single photon source (HSPS).

### Decoy-state quantum key distribution with two-way classical postprocessing

- Computer Science
- 2006

Two data postprocessing schemes for the decoy-state method using two-way classical communications with decoy states are developed and it is concluded that decoys-state QKD with two- way classical postprocessing is of practical interest.

### Quantum key distribution with distinguishable decoy states

- Computer Science, PhysicsPhysical Review A
- 2018

An analytical formula is obtained to estimate the yield and error rate of single-photon pulses when the signal and decoy states are distinguishable, which reduces the secure key rate below that of a perfect decoy-state protocol.

### Practical non-orthogonal decoy state quantum key distribution with heralded single photon source

- Physics
- 2008

Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical…

### New protocols for non-orthogonal quantum key distribution

- Physics
- 2013

Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded…

### Finite-key analysis for the 1-decoy state QKD protocol

- Computer Science, Mathematics
- 2018

Interestingly, for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2- decoy protocol.

### An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

- PhysicsScientific reports
- 2015

This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate.

### Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

- Computer Science, Physics2006 IEEE International Symposium on Information Theory
- 2006

The first experiments on decoy state QKD are reported, thus bridging the gap between theory and experiment, and shows explicitly the power and feasibility of decoy method, and brings it to the real-life.

### Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key*

- Physics
- 2016

Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this…

### Improve the efficiency of a practical quantum key distribution system

- PhysicsSPIE Optical Engineering + Applications
- 2007

The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present two…

## References

SHOWING 1-10 OF 27 REFERENCES

### Security of Quantum Key Distribution with Realistic Devices

- Computer Science
- 2005

A practical way to perform the decoy state method is proposed, which mainly follows the idea of Lo's decoys state and can improve the key generation rate from quadratic of transmission efficiency O(eta2) to O (eta).

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Enhancing practical security of quantum key distribution with a few decoy states

- Physics, Computer Science
- 2005

Rigorous security statements are developed in the case of finite statistics with only a few decoy states, and the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology are presented.

### Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

### Quantum key distribution with high loss: toward global secure communication.

- Computer Science, PhysicsPhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

### Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security

- Computer ScienceJournal of Cryptology
- 2004

A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84.

### Security of quantum key distribution with imperfect devices

- Computer ScienceInternational Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof…

### Simple proof of security of the BB84 quantum key distribution protocol

- Computer SciencePhysical review letters
- 2000

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be…

### Quantum key distribution over 122 km of standard telecom fiber

- Physics
- 2004

We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, we…

### Security against individual attacks for realistic quantum key distribution

- Computer Science
- 1999

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.