# Practical Decoy State for Quantum Key Distribution

@article{Ma2005PracticalDS, title={Practical Decoy State for Quantum Key Distribution}, author={X. Ma and Bing Qi and Y. Zhao and Hoi-Kwong Lo}, journal={Physical Review A}, year={2005}, volume={72}, pages={012326} }

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states---the vacuum and a weak decoy state---asymptotically approaches… Expand

#### 650 Citations

Study on passive decoy-state protocols for quantum key distribution

- Computer Science
- 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)
- 2010

This paper analyzes the passive decoy-state protocol with different light sources, including the lastest passive state Protocol with weak coherent state (WCS) and the simple passive state protocol (AYKI) with heralded single photon source (HSPS). Expand

Decoy-state quantum key distribution with two-way classical postprocessing

- Physics
- 2006

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously,… Expand

Quantum key distribution with distinguishable decoy states

- Physics
- Physical Review A
- 2018

The decoy-state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two… Expand

Practical non-orthogonal decoy state quantum key distribution with heralded single photon source

- Physics
- 2008

Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical… Expand

New protocols for non-orthogonal quantum key distribution

- Physics
- 2013

Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded… Expand

Finite-key analysis for the 1-decoy state QKD protocol

- Computer Science, Physics
- 2018

Interestingly, for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2- decoy protocol. Expand

An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

- Computer Science, Medicine
- Scientific reports
- 2015

This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate. Expand

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

- Computer Science, Physics
- 2006 IEEE International Symposium on Information Theory
- 2006

The first experiments on decoy state QKD are reported, thus bridging the gap between theory and experiment, and shows explicitly the power and feasibility of decoy method, and brings it to the real-life. Expand

Passive decoy-state quantum key distribution for the weak coherent photon source with finite-length key*

- Physics
- 2016

Passive decoy-state quantum key distribution systems, proven to be more desirable than active ones in some scenarios, also have the problem of device imperfections like finite-length keys. In this… Expand

Improve the efficiency of a practical quantum key distribution system

- Physics, Engineering
- SPIE Optical Engineering + Applications
- 2007

The performance of a practical quantum key distribution (QKD) system is often limited by the multi-photon state emission of its source and the dark counts of its detectors. Here, we present two… Expand

#### References

SHOWING 1-10 OF 36 REFERENCES

Security of Quantum Key Distribution with Realistic Devices

- Mathematics, Physics
- 2005

We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correction… Expand

Decoy state quantum key distribution.

- Computer Science, Medicine
- Physical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature. Expand

Enhancing practical security of quantum key distribution with a few decoy states

- Physics, Mathematics
- 2005

Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an… Expand

Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Medicine
- Physical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of… Expand

Quantum key distribution with high loss: toward global secure communication.

- Computer Science, Medicine
- Physical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses). Expand

Efficient Quantum Key Distribution Scheme
and a Proof of Its Unconditional Security

- Mathematics, Physics
- Journal of Cryptology
- 2004

A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84. Expand

Security of quantum key distribution with imperfect devices

- Computer Science, Mathematics
- International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof… Expand

Simple proof of security of the BB84 quantum key distribution protocol

- Computer Science, Medicine
- Physical review letters
- 2000

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be… Expand

Quantum key distribution over 122 km of standard telecom fiber

- Physics
- 2004

We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, we… Expand

Security against individual attacks for realistic quantum key distribution

- Physics
- 2000

I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84… Expand