Quantum key distribution with high loss: toward global secure communication.
Citations
2,926 citations
Cites background or methods from "Quantum key distribution with high ..."
...The first proposal using one- and two-photon signals (Hwang, 2003) was rapidly modified to the more realistic implementation in which Alice modulates the intensity of the laser (Lo, Ma and Chen, 2005; Wang, 2005)....
[...]
...Another significant improvement can be made by an easy change of hardware: by varying the quantum state along the protocol (decoy states), one can perform a more complete test of the quantum channel (Hwang, 2003)....
[...]
...To use different intensities in order to detect PNS attacks is the idea behind the decoy states method (Hwang, 2003; Lo, Ma and Chen, 2005; Wang, 2005)....
[...]
1,420 citations
1,280 citations
1,156 citations
1,116 citations
Cites background or methods from "Quantum key distribution with high ..."
...In the BB84 protocol, with weak coherent pulses and decoy states [52], Alice randomly changes the intensity μ of the pulses, and reveals publicly their values during the final classical communication....
[...]
...Under these assumptions, we consider the ideal BB84 protocol with single photon sources [50], the BB84 with weak coherent pulses and decoy states [51, 52], and DV-MDI-QKD [53, 54]....
[...]