Decoy State Quantum Key Distribution
Top Cited Papers
- 16 June 2005
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 94 (23) , 230504
- https://doi.org/10.1103/physrevlett.94.230504
Abstract
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds—enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.Keywords
All Related Versions
This publication has 15 references indexed in Scilit:
- Beating the Photon-Number-Splitting Attack in Practical Quantum CryptographyPhysical Review Letters, 2005
- Unconditional Security of Coherent-State Quantum Key Distribution with a Strong Phase-Reference PulsePhysical Review Letters, 2004
- Single-photon Interference over 150 km Transmission Using Silica-based Integrated-optic Interferometers for Quantum CryptographyJapanese Journal of Applied Physics, 2004
- Entanglement as a Precondition for Secure Quantum Key DistributionPhysical Review Letters, 2004
- Quantum key distribution over 122 km of standard telecom fiberApplied Physics Letters, 2004
- Quantum Key Distribution with High Loss: Toward Global Secure CommunicationPhysical Review Letters, 2003
- Unconditional security in quantum cryptographyJournal of the ACM, 2001
- Simple Proof of Security of the BB84 Quantum Key Distribution ProtocolPhysical Review Letters, 2000
- Unconditional Security of Quantum Key Distribution over Arbitrarily Long DistancesScience, 1999
- Erratum: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels [Phys. Rev. Lett. 77, 2818 (1996)]Physical Review Letters, 1998