Quantum key distribution with high loss: toward global secure communication.

  title={Quantum key distribution with high loss: toward global secure communication.},
  author={Won Young Hwang},
  journal={Physical review letters},
  volume={91 5},
  • W. Hwang
  • Published 24 November 2002
  • Computer Science, Medicine, Physics
  • Physical review letters
We propose a decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multiphoton pulses (decoy pulses). Then they check the loss of the decoy pulses. If the loss of the decoy pulses is abnormally less than that of signal pulses, the whole protocol is aborted. Otherwise, to continue the protocol, they estimate the loss of… 
Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source
The method of decoy-state quantum key distribution requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here the authors propose a simple protocol
Time-shift quantum key distribution with decoy states
A protocol for quantum key distribution—a technology allowing two distant parties to create an unconditionally secure cryptographic key is suggested, using laser pulses weakened to the single-photon level of duration T.
Quantum key distribution with multiphoton pulses: an advantage
In this article we present proof-of-concept implementation of quantum key distribution protocol based on BB84 with imperfect devices. We show that using coincidence measurements to monitor
Decoy-pulse protocol for frequency-coded quantum key distribution
We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security
Decoy pulse quantum key distribution for practical purposes
The random bits from the secure keys are found to pass stringent statistical tests and the decoy pulse protocol employed uses two weak pulses (signal and decoy) and one vacuum pulse.
In the BB84 protocol with a perfect single photon source, the key rate decreases linearly with the transmission η of the channel. If we simply replace this source with a weak coherent-state pulse,
Security of the decoy state method for quantum key distribution
The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.
Photon-number-resolving decoy-state quantum key distribution
In this paper, a photon-number-resolving decoy-state quantum key distribution (QKD) scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused
Nonorthogonal decoy-state Quantum Key Distribution
In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and
An enhanced proposal on decoy-state measurement device-independent quantum key distribution
By employing pulses involving three-intensity, a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources is proposed that can approach very closely the asymptotic case of using an infinite number of decoy-states and exhibits excellent behavior in both the secure transmission distance and the final key generation rate.