The security of decoy state protocol in the partial photon number splitting attack

6Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

The decoy state protocol was proposed to overcome the primitive photon number splitting attack. When using a better strategy, the attacker can ensure that the ratio of the overall gain of the signal state pulse against the decoy state pulse changes very little, even to keep the overall gain of the signal state pulses equal to that obtained without attacker. In this paper we first give a model of the partial photon number splitting attack which contains the original one, and then find that the decoy state protocol still works effectively under the partial photon number splitting attack. © 2013 The Author(s).

Cite

CITATION STYLE

APA

Liu, D., Wang, S., Yin, Z. Q., Chen, W., & Han, Z. F. (2013). The security of decoy state protocol in the partial photon number splitting attack. Chinese Science Bulletin, 58(31), 3859–3862. https://doi.org/10.1007/s11434-013-6037-2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free