Quantum key distribution with high loss: toward global secure communication.

@article{Hwang2003QuantumKD,
  title={Quantum key distribution with high loss: toward global secure communication.},
  author={Won Young Hwang},
  journal={Physical review letters},
  year={2003},
  volume={91 5},
  pages={
          057901
        }
}
  • W. Hwang
  • Published 24 November 2002
  • Computer Science, Medicine, Physics
  • Physical review letters
We propose a decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multiphoton pulses (decoy pulses). Then they check the loss of the decoy pulses. If the loss of the decoy pulses is abnormally less than that of signal pulses, the whole protocol is aborted. Otherwise, to continue the protocol, they estimate the loss of… Expand
Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source
The method of decoy-state quantum key distribution requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here the authors propose a simple protocolExpand
Time-shift quantum key distribution with decoy states
TLDR
A protocol for quantum key distribution—a technology allowing two distant parties to create an unconditionally secure cryptographic key is suggested, using laser pulses weakened to the single-photon level of duration T. Expand
Decoy-pulse protocol for frequency-coded quantum key distribution
We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in securityExpand
Decoy pulse quantum key distribution for practical purposes
TLDR
The random bits from the secure keys are found to pass stringent statistical tests and the decoy pulse protocol employed uses two weak pulses (signal and decoy) and one vacuum pulse. Expand
SECURITY OF QUANTUM KEY DISTRIBUTION WITH STRONG PHASE-REFERENCE PULSE
In the BB84 protocol with a perfect single photon source, the key rate decreases linearly with the transmission η of the channel. If we simply replace this source with a weak coherent-state pulse,Expand
Security of the decoy state method for quantum key distribution
TLDR
The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. Expand
Photon-number-resolving decoy-state quantum key distribution
In this paper, a photon-number-resolving decoy-state quantum key distribution (QKD) scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts causedExpand
Nonorthogonal decoy-state Quantum Key Distribution
In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses andExpand
An enhanced proposal on decoy-state measurement device-independent quantum key distribution
TLDR
By employing pulses involving three-intensity, a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources is proposed that can approach very closely the asymptotic case of using an infinite number of decoy-states and exhibits excellent behavior in both the secure transmission distance and the final key generation rate. Expand
Experimental quantum key distribution with decoy states.
TLDR
By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. Expand
...
1
2
3
4
5
...