# Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source

@article{Wang2007SimplePF, title={Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source}, author={Xiang‐Bin Wang and Cheng-Zhi Peng and Jian-Wei Pan}, journal={Applied Physics Letters}, year={2007}, volume={90}, pages={031110} }

The method of decoy-state quantum key distribution requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here the authors propose a simple protocol which is secure and efficient even there are errors in intensity control. In their protocol, decoy pulses and signal pulses are generated from the same father pulses with a two-value attenuation. Given the upper bound of fluctuation of the father pulses, their protocol is secure provided that the…

## 31 Citations

Decoy-state quantum key distribution using homodyne detection

- Physics
- 2009

In this paper, we propose to use the decoy-state technique to improve the security of the quantum key distribution QKD systems based on homodyne detection against the photon number splitting attack.…

Decoy State Quantum Key Distribution with Odd Coherent State

- Physics
- 2008

We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum…

Decoy-state quantum key distribution with polarized photons over 200 km.

- Physics, MedicineOptics express
- 2010

A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock.

Asymmetric twin-field quantum key distribution

- Physics, Computer ScienceNew Journal of Physics
- 2019

This work derives new analytical bounds when the parties use either three or four independent decoy intensity settings each, thus providing sub-optimal key rates in asymmetric-loss scenarios and shows that the protocol is robust against uncorrelated intensity fluctuations affecting the parties' lasers.

Unconditional Security of Sending or Not Sending Twin-Field Quantum Key Distribution with Finite Pulses

- Computer Science, PhysicsPhysical Review Applied
- 2019

It is shown by numerical simulation that the Sending-or-Not-Sending protocol with typical finite number of pulses in practice can produce unconditional secure final key under general attack, including all coherent attacks.

Modeling decoy state Quantum Key Distribution systems

- Engineering
- 2015

Quantum Key Distribution (QKD) is an innovative technology which exploits the laws of quantum physics to generate and distribute shared secret key for use in cryptographic devices. Quantum Key…

General theory for decoy-state quantum key distribution with an arbitrary number of intensities

- Physics
- 2007

We develop a general theory for quantum key distribution (QKD) in both the forward error correction and the reverse error correction cases when the QKD system is equipped with phase-randomized…

Quantum key distribution against Trojan horse attacks

- Physics
- 2007

Realistic experimental apparatus of quantum cryptography are imperfect, which may be utilized by a potential eavesdropper to eavesdrop on the communication. We show that quantum communication may be…

Recent developments in quantum key distribution: Theory and practice

- Computer Science, Physics
- 2007

This paper compares various recent protocols and provides guidelines as to which components propose best advances when being improved, and considers how experimental faults are accounted for using effective parameters.

## References

SHOWING 1-10 OF 23 REFERENCES

Quantum key distribution with high loss: toward global secure communication.

- Computer Science, MedicinePhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

Experimental quantum key distribution with decoy states.

- Computer Science, PhysicsPhysical review letters
- 2006

By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber.

Long-distance decoy-state quantum key distribution in optical fiber.

- Physics, MedicinePhysical review letters
- 2007

Using ultralow-noise, high-efficiency transition-edge sensor photodetectors, this work has implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks.

Decoy state quantum key distribution.

- Computer Science, MedicinePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, MedicinePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse.

- Physics, MedicinePhysical review letters
- 2004

We prove the unconditional security of a quantum key distribution protocol in which bit values are encoded in the phase of a weak coherent-state pulse relative to a strong reference pulse. In…

Experimental long-distance decoy-state quantum key distribution based on polarization encoding.

- Physics, MedicinePhysical review letters
- 2007

The decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102 km is demonstrated and can really offer the unconditionally secure final keys.

Quantum cryptography with coherent states.

- Physics, MedicinePhysical review. A, Atomic, molecular, and optical physics
- 1995

This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.

Security of quantum key distribution with imperfect devices

- Computer Science, MathematicsInternational Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof…

Security against individual attacks for realistic quantum key distribution

- Physics
- 2000

I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84…