Unconditionally secure one-way quantum key distribution using decoy pulses

@article{Dynes2007UnconditionallySO,
  title={Unconditionally secure one-way quantum key distribution using decoy pulses},
  author={James F. Dynes and Z. L. Yuan and A. W. Sharpe and Andrew J. Shields},
  journal={2007 Quantum Electronics and Laser Science Conference},
  year={2007},
  pages={1-2}
}
Experimental one-way decoy quantum key distribution (QKD) is reported as a function of distance up to 25.3km. The high key rates obtained exceed one order of magnitude more than QKD performed without decoy pulse exchange. 

Figures from this paper

Decoy pulse quantum key distribution for practical purposes
TLDR
The random bits from the secure keys are found to pass stringent statistical tests and the decoy pulse protocol employed uses two weak pulses (signal and decoy) and one vacuum pulse. Expand
Implementation of SARG04 decoy state quantum key distribution
  • Sellami Ali, O. Mahmoud
  • Computer Science
  • 2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
  • 2011
TLDR
By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance. Expand
Decoy-state quantum key distribution with both source errors and statistical fluctuations
We show how to calculate the fraction of single-photon counts of the 3-intensity decoy-state quantum cryptography faithfully with both statistical fluctuations and source errors. Our results relyExpand
Passive decoy state quantum key distribution with coherent light
We propose a simple method for passive preparation of decoy states in quantum key distribution with coherent light. It involves linear optics together with a photo-detector. The performance isExpand
Passive decoy state quantum key distribution with coherent light
We propose a simple method for passive preparation of decoy states in quantum key distribution with coherent light. It involves linear optics together with a photo-detector. The performance isExpand
Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source
The method of decoy-state quantum key distribution requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here the authors propose a simple protocolExpand
Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols
Abstract Fiber and free-space practical decoy state quantum key distribution has been simulated for both BB84 and SARG04 protocols. The numerical simulation has shown that the fiber based QKD andExpand
Large scale quantum key distribution: challenges and solutions [Invited].
TLDR
A brief review on the experimental efforts towards the goal of global quantum key distribution, including the security of practical QKD with imperfect devices,QKD metropolitan and backbone networks over optical fiber and satellite-based QKKD over free space. Expand
Continuous operation of high bit rate quantum key distribution
We demonstrate a quantum key distribution with a secure bit rate exceeding 1 Mbit/s over 50 km fiber averaged over a continuous 36 h period. Continuous operation of high bit rates is achieved usingExpand
Experimental Decoy State Quantum Key Distribution Over 120 km Fibre
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure, has become attractive recently. However, in many QKD systems, disturbances ofExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 25 REFERENCES
Unconditionally secure quantum key distribution over 50 km of standard telecom fibre
A weak pulse quantum key distribution system is presented, which is secure against all individual attacks, including photon number splitting. By carefully controlling the weak pulse intensity theExpand
Experimental quantum key distribution with decoy states.
TLDR
By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. Expand
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
  • Physical review letters
  • 2003
TLDR
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses). Expand
Beating the photon-number-splitting attack in practical quantum cryptography.
  • X. Wang
  • Physics, Medicine
  • Physical review letters
  • 2005
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type ofExpand
Decoy state quantum key distribution.
TLDR
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature. Expand
Continuous operation of a one-way quantum key distribution system over installed telecom fibre.
TLDR
A robust, compact and automated quantum key distribution system, based upon a one-way Mach-Zender interferometer, which is actively compensated for temporal drifts in the photon phase and polarization is demonstrated, suggesting that actively compensated QKD systems are suitable for practical applications. Expand
Limitations on practical quantum cryptography
TLDR
It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength. Expand
Quantum key distribution over 122 km of standard telecom fiber
We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, weExpand
Security of quantum key distribution with imperfect devices
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proofExpand
Continuous quantum error correction by cooling
We describe an implementation of quantum error correction that operates continuously in time and requires no active interventions such as measurements or gates. The mechanism for carrying away theExpand
...
1
2
3
...