Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber
Top Cited Papers
- 5 January 2007
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 98 (1) , 010503
- https://doi.org/10.1103/physrevlett.98.010503
Abstract
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultralow-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.Keywords
All Related Versions
This publication has 18 references indexed in Scilit:
- Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization EncodingPhysical Review Letters, 2007
- Long-distance quantum key distribution in optical fibreNew Journal of Physics, 2006
- Trojan-horse attacks on quantum-key-distribution systemsPhysical Review A, 2006
- Practical decoy state for quantum key distributionPhysical Review A, 2005
- Noise-free high-efficiency photon-number-resolving detectorsPhysical Review A, 2005
- Decoy State Quantum Key DistributionPhysical Review Letters, 2005
- Beating the Photon-Number-Splitting Attack in Practical Quantum CryptographyPhysical Review Letters, 2005
- Unconditionally secure quantum key distribution over 50 km of standard telecom fibreElectronics Letters, 2004
- Security against individual attacks for realistic quantum key distributionPhysical Review A, 2000
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995