scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Quantum key distribution with high loss: toward global secure communication.

01 Aug 2003-Physical Review Letters (American Physical Society)-Vol. 91, Iss: 5, pp 057901
TL;DR: A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Abstract: We propose a decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multiphoton pulses (decoy pulses). Then they check the loss of the decoy pulses. If the loss of the decoy pulses is abnormally less than that of signal pulses, the whole protocol is aborted. Otherwise, to continue the protocol, they estimate the loss of signal multiphoton pulses based on that of decoy pulses. This estimation can be done with an assumption that the two losses have similar values. We justify that assumption.
Citations
More filters
Journal ArticleDOI
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Abstract: Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete-variable, continuous-variable, and distributed-phase-reference protocols).

2,926 citations


Cites background or methods from "Quantum key distribution with high ..."

  • ...The first proposal using one- and two-photon signals (Hwang, 2003) was rapidly modified to the more realistic implementation in which Alice modulates the intensity of the laser (Lo, Ma and Chen, 2005; Wang, 2005)....

    [...]

  • ...Another significant improvement can be made by an easy change of hardware: by varying the quantum state along the protocol (decoy states), one can perform a more complete test of the quantum channel (Hwang, 2003)....

    [...]

  • ...To use different intensities in order to detect PNS attacks is the idea behind the decoy states method (Hwang, 2003; Lo, Ma and Chen, 2005; Wang, 2005)....

    [...]

Journal ArticleDOI
TL;DR: The current state of research and future directions in quantum key distribution and quantum networks are reviewed in this paper, with a special emphasis on quantum key distributions and quantum key sharing in quantum networks.
Abstract: Quantum communication, and indeed quantum information in general, has changed the way we think about quantum physics In 1984 and 1991, the first protocol for quantum cryptography and the first application of quantum non-locality, respectively, attracted a diverse field of researchers in theoretical and experimental physics, mathematics and computer science Since then we have seen a fundamental shift in how we understand information when it is encoded in quantum systems We review the current state of research and future directions in this new field of science with special emphasis on quantum key distribution and quantum networks

1,420 citations

Journal ArticleDOI
TL;DR: The current status of single-photon-source and single-Photon-detector technologies operating at wavelengths from the ultraviolet to the infrared are reviewed and applications of these technologies to quantum communication are discussed.
Abstract: We review the current status of single-photon-source and single-photon-detector technologies operating at wavelengths from the ultraviolet to the infrared. We discuss applications of these technologies to quantum communication, a field currently driving much of the development of single-photon sources and detectors.

1,280 citations

Journal ArticleDOI
TL;DR: A review of the progress in photonic quantum information processing can be found in this article, where the emphasis is given to the creation of photonic entanglement of various forms, tests of the completeness of quantum mechanics (in particular, violations of local realism), quantum information protocols for quantum communication, and quantum computation with linear optics.
Abstract: Multiphoton interference reveals strictly nonclassical phenomena. Its applications range from fundamental tests of quantum mechanics to photonic quantum information processing, where a significant fraction of key experiments achieved so far comes from multiphoton state manipulation. The progress, both theoretical and experimental, of this rapidly advancing research is reviewed. The emphasis is given to the creation of photonic entanglement of various forms, tests of the completeness of quantum mechanics (in particular, violations of local realism), quantum information protocols for quantum communication (e.g., quantum teleportation, entanglement purification, and quantum repeater), and quantum computation with linear optics. The scope of the review is limited to ``few-photon'' phenomena involving measurements of discrete observables.

1,156 citations

Journal ArticleDOI
TL;DR: The fundamental rate-loss tradeoff affecting any protocol of quantum key distribution is determined, which sets the limits of point-to-point quantum communications and provides precise and general benchmarks for quantum repeaters.
Abstract: Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed ‘teleportation stretching’, we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters.

1,116 citations


Cites background or methods from "Quantum key distribution with high ..."

  • ...In the BB84 protocol, with weak coherent pulses and decoy states [52], Alice randomly changes the intensity μ of the pulses, and reveals publicly their values during the final classical communication....

    [...]

  • ...Under these assumptions, we consider the ideal BB84 protocol with single photon sources [50], the BB84 with weak coherent pulses and decoy states [51, 52], and DV-MDI-QKD [53, 54]....

    [...]