2013
DOI: 10.1364/oe.21.024550
|View full text |Cite
|
Sign up to set email alerts
|

Efficient decoy-state quantum key distribution with quantified security

Abstract: We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

6
193
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 179 publications
(199 citation statements)
references
References 50 publications
(106 reference statements)
6
193
0
Order By: Relevance
“…
Security in quantum cryptography [1, 2] is continuously challenged by inventive attacks [3][4][5][6][7] targeting the real components of a cryptographic setup, and duly restored by new countermeasures [8][9][10] to foil them. Due to their high sensitivity and complex design, detectors are the most frequently attacked components.
…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…
Security in quantum cryptography [1, 2] is continuously challenged by inventive attacks [3][4][5][6][7] targeting the real components of a cryptographic setup, and duly restored by new countermeasures [8][9][10] to foil them. Due to their high sensitivity and complex design, detectors are the most frequently attacked components.
…”
mentioning
confidence: 99%
“…Therefore the vast majority of the attacks performed so far have targeted Bob's single photon detectors [3][4][5][6][7]. 13] is a recent form of Quantum Cryptography conceived to remove the problem of detector vulnerability.…”
mentioning
confidence: 99%
“…These values are obtained through real-time data-processing, including error correction and privacy amplification, on a sifted block size of 1×10 8 bits. The block size is sufficiently large to achieve 85% of the asymptotic secure key rate [26]. Each data block is collected over a session time of about 36 seconds with a sifted bit rate of ~2.7 Mb/s.…”
Section: Resultsmentioning
confidence: 99%
“…We use a QKD system operating with a clock rate of 1 GHz and using the T12 decoy-state protocol [26]. The photons are detected with InGaAs avalanche photodiodes operating in Geiger mode and with self-differencing [27] electronics.…”
Section: Qkd/data Spatial Multiplexing Setupmentioning
confidence: 99%
“…Similar to the QBER effects, afterpulses increase gains of the decoy1 and decoy2 pulses, especially decoy2, more than half of its gain comes from afterpulses. Finally, an average secure key rate of 306k bits/s is achieved with a failure probability of 10 −10 [24].…”
mentioning
confidence: 99%