Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography
Top Cited Papers
- 16 June 2005
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 94 (23) , 230503
- https://doi.org/10.1103/physrevlett.94.230503
Abstract
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve’s action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups.Keywords
All Related Versions
This publication has 19 references indexed in Scilit:
- Decoy State Quantum Key DistributionPhysical Review Letters, 2005
- Unconditional Security of Coherent-State Quantum Key Distribution with a Strong Phase-Reference PulsePhysical Review Letters, 2004
- Quantum key distribution over 122 km of standard telecom fiberApplied Physics Letters, 2004
- Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacksPhysical Review A, 2004
- Single-photon interference experiment over 100 km for quantum cryptography system using balanced gated-mode photon detectorElectronics Letters, 2003
- Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attackNew Journal of Physics, 2002
- Unconditional Security of Quantum Key Distribution over Arbitrarily Long DistancesScience, 1999
- Quantum cryptography with coherent statesPhysical Review A, 1995
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991