2008
DOI: 10.1103/physrevlett.100.090501
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Decoy-State Quantum Key Distribution with a Sub-Poissionian Heralded Single-Photon Source

Abstract: We have experimentally demonstrated a decoy-state quantum key distribution scheme (QKD) with a heralded single-photon source based on parametric down-conversion. We used a one-way Bennett-Brassard 1984 protocol with a four states and one-detector phase-coding scheme, which is immune to recently proposed time-shift attacks, photon-number splitting attacks, and can also be proven to be secure against Trojan horse attacks and any other standard individual or coherent attacks. In principle, the setup can tolerate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
62
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 131 publications
(63 citation statements)
references
References 35 publications
(25 reference statements)
1
62
0
Order By: Relevance
“…It is important for not only weak coherent pulse-based protocols, but also, for instance, parametric down-conversion-based protocols [35]. And continuous or discrete phase randomization is also crucial for the loss-tolerant protocol [24].…”
Section: Introductionmentioning
confidence: 99%
“…It is important for not only weak coherent pulse-based protocols, but also, for instance, parametric down-conversion-based protocols [35]. And continuous or discrete phase randomization is also crucial for the loss-tolerant protocol [24].…”
Section: Introductionmentioning
confidence: 99%
“…However, there always exist conflicts between the attacks B Qin Wang qinw@njupt.edu.cn 1 and anti-attacks during the development of QKD, which is mainly due to tension between ideal assumptions in the security proofs and imperfect realistic setups [6][7][8][9][10][11][12][13][14][15]. To reconcile these, different protocols and methods have been introduced, such as the decoy-state method [16][17][18][19][20][21], the device-independent quantum key distribution (DI-QKD) [22][23][24][25][26] and the measurement device-independent quantum key distribution (MDI-QKD) [27,28]. Among them, MDI-QKD seems most promising.…”
Section: Introductionmentioning
confidence: 99%
“…Then a malicious eavesdropper, Eve, who might own the most advance computational power and technology, can carry out corresponding attacks by making use of the loopholes due to imperfections [4][5][6][7][8][9][10]. In order to countermeasure the so-called photon-number-splitting (PNS) attack [4][5][6], the decoy-state method was created [11][12][13][14][15][16]. Moreover, the measurement-device-independent quantum key distribution (MDI-QKD) [17,18] has been invented to defeat the more powerful sidechannel attacks [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%