Practical Decoy State for Quantum Key Distribution

@article{Ma2005PracticalDS,
  title={Practical Decoy State for Quantum Key Distribution},
  author={X. Ma and Bing Qi and Y. Zhao and Hoi-Kwong Lo},
  journal={Physical Review A},
  year={2005},
  volume={72},
  pages={012326}
}
  • X. MaB. Qi H. Lo
  • Published 1 March 2005
  • Computer Science
  • Physical Review A
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states---the vacuum and a weak decoy state---asymptotically approaches… 

Figures and Tables from this paper

Study on passive decoy-state protocols for quantum key distribution

This paper analyzes the passive decoy-state protocol with different light sources, including the lastest passive state Protocol with weak coherent state (WCS) and the simple passive state protocol (AYKI) with heralded single photon source (HSPS).

Decoy-state quantum key distribution with two-way classical postprocessing

Two data postprocessing schemes for the decoy-state method using two-way classical communications with decoy states are developed and it is concluded that decoys-state QKD with two- way classical postprocessing is of practical interest.

Quantum key distribution with distinguishable decoy states

An analytical formula is obtained to estimate the yield and error rate of single-photon pulses when the signal and decoy states are distinguishable, which reduces the secure key rate below that of a perfect decoy-state protocol.

Practical non-orthogonal decoy state quantum key distribution with heralded single photon source

Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical

New protocols for non-orthogonal quantum key distribution

Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded

Finite-key analysis for the 1-decoy state QKD protocol

Interestingly, for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2- decoy protocol.

An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate.

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

The first experiments on decoy state QKD are reported, thus bridging the gap between theory and experiment, and shows explicitly the power and feasibility of decoy method, and brings it to the real-life.

Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key*

Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this

Improve the efficiency of a practical quantum key distribution system

The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present two
...

References

SHOWING 1-10 OF 27 REFERENCES

Security of Quantum Key Distribution with Realistic Devices

A practical way to perform the decoy state method is proposed, which mainly follows the idea of Lo's decoys state and can improve the key generation rate from quadratic of transmission efficiency O(eta2) to O (eta).

Decoy state quantum key distribution.

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Enhancing practical security of quantum key distribution with a few decoy states

Rigorous security statements are developed in the case of finite statistics with only a few decoy states, and the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology are presented.

Beating the photon-number-splitting attack in practical quantum cryptography.

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of

Quantum key distribution with high loss: toward global secure communication.

  • W. Hwang
  • Computer Science, Physics
    Physical review letters
  • 2003
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security

A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84.

Security of quantum key distribution with imperfect devices

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof

Simple proof of security of the BB84 quantum key distribution protocol

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be

Quantum key distribution over 122 km of standard telecom fiber

We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, we

Security against individual attacks for realistic quantum key distribution

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.