Experimental long-distance decoy-state quantum key distribution based on polarization encoding.
Cheng-Zhi Peng,Cheng-Zhi Peng,Jun Zhang,Dong Yang,Weibo Gao,Huai-Xin Ma,Hao Yin,Heping Zeng,Tao Yang,Xiang-Bin Wang,Jian-Wei Pan,Jian-Wei Pan,Jian-Wei Pan +12 more
Reads0
Chats0
TLDR
The decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102 km is demonstrated and can really offer the unconditionally secure final keys.Abstract:
We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102 km. Further, we simplify the experimental setup and use only one detector to implement the one-way decoy-state QKD over 75 km, with the advantage to overcome the security loopholes due to the efficiency mismatch of detectors. Our experimental implementation can really offer the unconditionally secure final keys. We use 3 different intensities of 0, 0.2, and 0.6 for the light sources in our experiment. In order to eliminate the influences of polarization mode dispersion in the long-distance single-mode optical fiber, an automatic polarization compensation system is utilized to implement the active compensation.read more
Citations
More filters
Journal ArticleDOI
The security of practical quantum key distribution
Valerio Scarani,Helle Bechmann-Pasquinucci,Nicolas J. Cerf,Miloslav Dušek,Norbert Lütkenhaus,Momtchil Peev +5 more
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Journal ArticleDOI
Multiphoton entanglement and interferometry
Jian-Wei Pan,Zeng-Bing Chen,Chao-Yang Lu,Harald Weinfurter,Anton Zeilinger,Marek Zukowski,Marek Zukowski +6 more
TL;DR: A review of the progress in photonic quantum information processing can be found in this article, where the emphasis is given to the creation of photonic entanglement of various forms, tests of the completeness of quantum mechanics (in particular, violations of local realism), quantum information protocols for quantum communication, and quantum computation with linear optics.
Journal ArticleDOI
Secure quantum key distribution
TL;DR: An overview is given of the state-of-the-art research into secure communication based on quantum cryptography, together with its assumptions, strengths and weaknesses.
Journal ArticleDOI
Advances in quantum cryptography
Stefano Pirandola,Ulrik L. Andersen,Leonardo Banchi,Mario Berta,Darius Bunandar,Roger Colbeck,Dirk Englund,Tobias Gehring,Cosmo Lupo,Carlo Ottaviani,Jason Pereira,Mohsen Razavi,Jesni Shamsul Shaari,Marco Tomamichel,Vladyslav C. Usenko,Giuseppe Vallone,Paolo Villoresi,Petros Wallden +17 more
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Journal ArticleDOI
Secure quantum key distribution with realistic devices
TL;DR: This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
References
More filters
Journal ArticleDOI
Quantum Cryptography
TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Journal ArticleDOI
Simple proof of security of the BB84 quantum key distribution protocol
Peter W. Shor,John Preskill +1 more
TL;DR: It is proved that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure, and a key distribution protocol based on entanglement purification is given, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol.
Journal ArticleDOI
Decoy State Quantum Key Distribution
TL;DR: The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Journal ArticleDOI
Quantum key distribution with high loss: toward global secure communication.
TL;DR: A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Journal ArticleDOI
Beating the photon-number-splitting attack in practical quantum cryptography.
TL;DR: An efficient method is proposed to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action.