Long distance decoy state quantum key distribution in optical fiber

  • 27 July 2006
Abstract
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photo-detectors, we have implemented the first finite statistics version of a decoy state protocol in a one-way QKD system, enabling the creation of secure keys immune to both photon-number-splitting attacks and Trojan horse attacks over 107 km of optical fiber.

This publication has 0 references indexed in Scilit: