1. Long distance decoy state quantum key distribution in optical fiber
- Author
-
Rosenberg, Danna, Harrington, Jim W., Rice, Patrick R., Hiskett, Philip A., Peterson, Charles G., Hughes, Richard J., Lita, Adriana E., Nam, Sae Woo, and Nordholt, Jane E.
- Subjects
Quantum Physics - Abstract
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber., Comment: 4 pages, 3 figures
- Published
- 2006
- Full Text
- View/download PDF