Decoy state quantum key distribution

2.1kCitations
Citations of this article
563Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds-enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature. © 2005 The American Physical Society.

Cite

CITATION STYLE

APA

Lo, H. K., Ma, X., & Chen, K. (2005). Decoy state quantum key distribution. Physical Review Letters, 94(23). https://doi.org/10.1103/PhysRevLett.94.230504

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free