Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Decoy state

Known as: Decoy state protocol, Decoy states 
Decoy state quantum key distribution (QKD) protocol is the most widely implemented QKD scheme. Practical QKD systems use multi-photon sources, in… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Author(s): Canas, G; Vera, N; Carine, J; Gonzalez, P; Cardenas, J; Connolly, PWR; Przysiezna, A; Gomez, ES; Figueroa, M; Vallone… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2016
Highly Cited
2016
The relatively low key rate seems to be the major barrier to its practical use for the decoy state measurement device independent… Expand
  • figure 2
  • figure 1
  • table I
  • figure 3
  • figure 4
Is this relevant?
2016
2016
In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field tests… Expand
  • table I
  • table II
  • figure 1
  • figure 2
  • table III
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We study the measurement device independent quantum key distribution (MDIQKD) in practice with limited resource, when there are… Expand
Is this relevant?
2013
2013
We study the decoy-state measurement-device-independent quantum key distribution using heralded single-photon sources. This has… Expand
  • figure 1
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional 'Plug… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We show the unconditional security of decoy-state method quantum cryptography with whatever intensity error pattern provided that… Expand
  • table I
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We propose an efficient decoy-state protocol for practical quantum key distribution using coherent states. The protocol uses four… Expand
  • table I
  • table II
Is this relevant?