Practical Decoy State for Quantum Key Distribution

@article{Ma2005PracticalDS,
  title={Practical Decoy State for Quantum Key Distribution},
  author={X. Ma and Bing Qi and Y. Zhao and Hoi-Kwong Lo},
  journal={Physical Review A},
  year={2005},
  volume={72},
  pages={012326}
}
  • X. Ma, B. Qi, +1 author H. Lo
  • Published 1 March 2005
  • Physics
  • Physical Review A
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states---the vacuum and a weak decoy state---asymptotically approaches… Expand

Figures and Tables from this paper

Study on passive decoy-state protocols for quantum key distribution
TLDR
This paper analyzes the passive decoy-state protocol with different light sources, including the lastest passive state Protocol with weak coherent state (WCS) and the simple passive state protocol (AYKI) with heralded single photon source (HSPS). Expand
Decoy-state quantum key distribution with two-way classical postprocessing
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously,Expand
Quantum key distribution with distinguishable decoy states
The decoy-state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test twoExpand
Practical non-orthogonal decoy state quantum key distribution with heralded single photon source
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practicalExpand
New protocols for non-orthogonal quantum key distribution
Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heraldedExpand
Finite-key analysis for the 1-decoy state QKD protocol
TLDR
Interestingly, for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2- decoy protocol. Expand
An improved scheme on decoy-state method for measurement-device-independent quantum key distribution
TLDR
This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate. Expand
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
TLDR
The first experiments on decoy state QKD are reported, thus bridging the gap between theory and experiment, and shows explicitly the power and feasibility of decoy method, and brings it to the real-life. Expand
Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key*
Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In thisExpand
Improve the efficiency of a practical quantum key distribution system
The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present twoExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 36 REFERENCES
Security of Quantum Key Distribution with Realistic Devices
We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correctionExpand
Decoy state quantum key distribution.
TLDR
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature. Expand
Enhancing practical security of quantum key distribution with a few decoy states
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by anExpand
Beating the photon-number-splitting attack in practical quantum cryptography.
  • X. Wang
  • Physics, Medicine
  • Physical review letters
  • 2005
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type ofExpand
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
  • Physical review letters
  • 2003
TLDR
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses). Expand
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
TLDR
A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84. Expand
Security of quantum key distribution with imperfect devices
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proofExpand
Simple proof of security of the BB84 quantum key distribution protocol
  • Shor, Preskill
  • Computer Science, Medicine
  • Physical review letters
  • 2000
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can beExpand
Quantum key distribution over 122 km of standard telecom fiber
We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, weExpand
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84Expand
...
1
2
3
4
...