# Unconditionally secure one-way quantum key distribution using decoy pulses

@article{Dynes2007UnconditionallySO, title={Unconditionally secure one-way quantum key distribution using decoy pulses}, author={James F. Dynes and Z. L. Yuan and A. W. Sharpe and Andrew J. Shields}, journal={2007 Quantum Electronics and Laser Science Conference}, year={2007}, pages={1-2} }

Experimental one-way decoy quantum key distribution (QKD) is reported as a function of distance up to 25.3km. The high key rates obtained exceed one order of magnitude more than QKD performed without decoy pulse exchange.

## 102 Citations

### Decoy pulse quantum key distribution for practical purposes

- Computer Science
- 2008

The random bits from the secure keys are found to pass stringent statistical tests and the decoy pulse protocol employed uses two weak pulses (signal and decoy) and one vacuum pulse.

### Implementation of SARG04 decoy state quantum key distribution

- Computer Science, Physics2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
- 2011

By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKKD system withoutDecoy state in terms of key generation rate and distance.

### Decoy-state quantum key distribution with both source errors and statistical fluctuations

- PhysicsQuantum Inf. Process.
- 2017

Results show that full parameter optimization in biased decoy-state QKD with phase-randomized sources can significantly improve not only the secure transmission distance but also the final key generation rate.

### Experimental quantum key distribution with active phase randomization

- PhysicsQELS 2007
- 2006

The authors present the first experimental demonstration of QKD with reliable active phase randomization, using a polarization-insensitive phase modulator added to a commercial phase-codingQKD system to randomize the global phase of each bit.

### Passive decoy state quantum key distribution with coherent light

- Physics2010 Conference on Optical Fiber Communication (OFC/NFOEC), collocated National Fiber Optic Engineers Conference
- 2010

We propose a simple method for passive preparation of decoy states in quantum key distribution with coherent light. It involves linear optics together with a photo-detector. The performance is…

### Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security.

- PhysicsOptics express
- 2007

This work demonstrates an experimental one-way decoy pulse quantum key distribution running continuously for 60 hours over a fiber distance of 20km and obtains the highest rate reported using this decoy protocol over this fiber distance and duration.

### Security of decoy-state quantum key distribution with imperfect phase randomization

- Computer Science
- 2022

This work provides a security proof for decoy-state QKD with correlated phases that provides key rates close to the ideal scenario and paves the way towards high-performance QkD with practical laser sources.

### Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols

- Computer Science
- 2010

The numerical simulation has shown that the fiber based QKD and free space QKKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04.

### Large scale quantum key distribution: challenges and solutions [Invited].

- PhysicsOptics express
- 2018

A brief review on the experimental efforts towards the goal of global quantum key distribution, including the security of practical QKD with imperfect devices,QKD metropolitan and backbone networks over optical fiber and satellite-based QKKD over free space.

### Continuous operation of high bit rate quantum key distribution

- Physics
- 2010

We demonstrate a quantum key distribution with a secure bit rate exceeding 1 Mbit/s over 50 km fiber averaged over a continuous 36 h period. Continuous operation of high bit rates is achieved using…

## References

SHOWING 1-10 OF 19 REFERENCES

### Unconditionally secure quantum key distribution over 50 km of standard telecom fibre

- Computer Science, Physics
- 2004

A weak pulse quantum key distribution system is presented, which is secure against all individual attacks, including photon number splitting, and the maximum secure bit rate as a function of the fibre length is demonstrated.

### Experimental quantum key distribution with decoy states.

- Computer Science, PhysicsPhysical review letters
- 2006

By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber.

### Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Continuous operation of a one-way quantum key distribution system over installed telecom fibre.

- PhysicsOptics express
- 2005

A robust, compact and automated quantum key distribution system, based upon a one-way Mach-Zender interferometer, which is actively compensated for temporal drifts in the photon phase and polarization is demonstrated, suggesting that actively compensated QKD systems are suitable for practical applications.

### Quantum key distribution over 122 km of standard telecom fiber

- Physics
- 2004

We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, we…

### Security of quantum key distribution with imperfect devices

- Computer ScienceInternational Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof…

### Security aspects of practical quantum cryptography

- Computer ScienceConference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)
- 2000

This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.

### Simple proof of security of the BB84 quantum key distribution protocol

- Computer SciencePhysical review letters
- 2000

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be…

### Unconditional security in quantum cryptography

- Computer ScienceJACM
- 2001

Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.