File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Decoy state quantum key distribution

TitleDecoy state quantum key distribution
Authors
Issue Date2005
Citation
International Journal of Quantum Information, 2005, v. 3, n. SUPPL. 1, p. 143 How to Cite?
AbstractQuantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication" , Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", http://arxiv.org/abs/quant-ph/0411004. We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states - A vacuum and a weak decoy state - Asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution", http://www.arxiv.org/abs/quant-ph/0503005. We also have done the first experimental demonstrat ion of decoy state quantum key distribution, over 15km of Telecom fibers. This part of work is published in "Experimental Decoy State Quantum Key Distribution Over 15km", http://www.arvix.org/abs/quant-ph/0503192. © World Scientific Publishing Company.
Persistent Identifierhttp://hdl.handle.net/10722/285903
ISSN
2023 Impact Factor: 0.7
2023 SCImago Journal Rankings: 0.250
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:57Z-
dc.date.available2020-08-18T04:56:57Z-
dc.date.issued2005-
dc.identifier.citationInternational Journal of Quantum Information, 2005, v. 3, n. SUPPL. 1, p. 143-
dc.identifier.issn0219-7499-
dc.identifier.urihttp://hdl.handle.net/10722/285903-
dc.description.abstractQuantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication" , Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", http://arxiv.org/abs/quant-ph/0411004. We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states - A vacuum and a weak decoy state - Asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution", http://www.arxiv.org/abs/quant-ph/0503005. We also have done the first experimental demonstrat ion of decoy state quantum key distribution, over 15km of Telecom fibers. This part of work is published in "Experimental Decoy State Quantum Key Distribution Over 15km", http://www.arvix.org/abs/quant-ph/0503192. © World Scientific Publishing Company.-
dc.languageeng-
dc.relation.ispartofInternational Journal of Quantum Information-
dc.titleDecoy state quantum key distribution-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1142/S0219749905001328-
dc.identifier.scopuseid_2-s2.0-33746307261-
dc.identifier.volume3-
dc.identifier.issueSUPPL. 1-
dc.identifier.spage143-
dc.identifier.epage143-
dc.identifier.isiWOS:000233298800014-
dc.identifier.issnl0219-7499-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats