File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Decoy state quantum key distribution

TitleDecoy state quantum key distribution
Authors
Issue Date2005
Citation
Physical Review Letters, 2005, v. 94, n. 23, article no. 230504 How to Cite?
AbstractThere has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds-enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature. © 2005 The American Physical Society.
Persistent Identifierhttp://hdl.handle.net/10722/285895
ISSN
2021 Impact Factor: 9.185
2020 SCImago Journal Rankings: 3.688
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorLo, Hoi Kwong-
dc.contributor.authorMa, Xiongfeng-
dc.contributor.authorChen, Kai-
dc.date.accessioned2020-08-18T04:56:55Z-
dc.date.available2020-08-18T04:56:55Z-
dc.date.issued2005-
dc.identifier.citationPhysical Review Letters, 2005, v. 94, n. 23, article no. 230504-
dc.identifier.issn0031-9007-
dc.identifier.urihttp://hdl.handle.net/10722/285895-
dc.description.abstractThere has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds-enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature. © 2005 The American Physical Society.-
dc.languageeng-
dc.relation.ispartofPhysical Review Letters-
dc.titleDecoy state quantum key distribution-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1103/PhysRevLett.94.230504-
dc.identifier.scopuseid_2-s2.0-27744479495-
dc.identifier.volume94-
dc.identifier.issue23-
dc.identifier.spagearticle no. 230504-
dc.identifier.epagearticle no. 230504-
dc.identifier.eissn1079-7114-
dc.identifier.isiWOS:000229858100008-
dc.identifier.issnl0031-9007-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats