2011
DOI: 10.1134/s1054660x11070267
|View full text |Cite
|
Sign up to set email alerts
|

Experimental demonstration of counterfactual quantum key distribution

Abstract: Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 96.4%. As a result, we obtained secure keys against the noise-induced attack (eg. the vacuum attac… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
31
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(31 citation statements)
references
References 30 publications
0
31
0
Order By: Relevance
“…In 2013, Ma et al 137 increased the fiber distance up to 50 km for single-qubit QSS, and circular QSS was also demonstrated in fiber. 138 Counterfactual quantum cryptography was proposed in 2009 29 and experimentally demonstrated by Ren et al 139 and Liu et al 140 CONCLUSIONS AND OUTLOOKS III-V SPADs are the most practical tools for ultra-weak light detection in the near-infrared. In the past decades, both the academic and industrial communities have made great efforts to achieve performance improvements of SPADs.…”
Section: Quantum Communication Applicationsmentioning
confidence: 99%
“…In 2013, Ma et al 137 increased the fiber distance up to 50 km for single-qubit QSS, and circular QSS was also demonstrated in fiber. 138 Counterfactual quantum cryptography was proposed in 2009 29 and experimentally demonstrated by Ren et al 139 and Liu et al 140 CONCLUSIONS AND OUTLOOKS III-V SPADs are the most practical tools for ultra-weak light detection in the near-infrared. In the past decades, both the academic and industrial communities have made great efforts to achieve performance improvements of SPADs.…”
Section: Quantum Communication Applicationsmentioning
confidence: 99%
“…Then, a security proof against interceptresend attacks in a realistic situation was provided [3], and the experimental realizations of the N09 protocol have been proposed in succession [4][5][6]. A more recent research shows that the N09 protocol is vulnerable to a new Trojan horse attack owing to the unsatisfactory precision of the filters [7].…”
Section: Introductionmentioning
confidence: 99%
“…[5,6,15,17,18] It was later shown [19] that the distribution process of secret keys in QKD protocols can be realised with counterfactual phenomena, without the secret key particles ever traveling between the communicating parties. Such schemes have been experimentally realised [20][21][22], and their security advantages over other QKD protocols have been studied [23][24][25]. Whilst the secret key is generated counterfactually, the classical public channel communication of these schemes requires particle transfer.…”
Section: Introductionmentioning
confidence: 99%