Back to Search
Start Over
Decoy State Quantum Key Distribution
- Source :
- Physical Review Letters. 94
- Publication Year :
- 2005
- Publisher :
- American Physical Society (APS), 2005.
-
Abstract
- There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.<br />Comment: Slightly shortened version. Accepted for publication in PRL
- Subjects :
- Quantum Physics
SARG04
Decoy state
Computer science
FOS: Physical sciences
General Physics and Astronomy
Nanotechnology
Eavesdropping
Quantum key distribution
Computer security
computer.software_genre
01 natural sciences
010309 optics
Quantum cryptography
0103 physical sciences
Quantum Physics (quant-ph)
010306 general physics
Quantum information science
computer
BB84
Physical law
Subjects
Details
- ISSN :
- 10797114 and 00319007
- Volume :
- 94
- Database :
- OpenAIRE
- Journal :
- Physical Review Letters
- Accession number :
- edsair.doi.dedup.....da311cac0353409d21689ae790a31db4