2008
DOI: 10.1080/09500340701441293
|View full text |Cite
|
Sign up to set email alerts
|

Fast quantum key distribution with decoy number states

Abstract: We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a channel with different transmittivity. We then describe two QKD schemes that utilize this method, one of which overcomes the upper limit on the key generation rate imposed by the dead time of detectors when using a heralded source of photons.Comment: 15 pages, 6 figures; Accepted to J. Mod. Op

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 46 publications
0
2
0
Order By: Relevance
“…Luckily, there are publications [3,[15][16][17][18] where a more correct point of view is present. BBM92 protocol is immune against photon number splitting and even allows the source of entanglement to be under full Eve's control.…”
Section: Protocol Securitymentioning
confidence: 99%
“…Luckily, there are publications [3,[15][16][17][18] where a more correct point of view is present. BBM92 protocol is immune against photon number splitting and even allows the source of entanglement to be under full Eve's control.…”
Section: Protocol Securitymentioning
confidence: 99%
“…[9]. For a more detailed analysis, we refer the reader to [35] and [36]. f The recent development of replacing HPS street lights with LEDs positively affects noise counts because the LED spectrum is marginal in NIR and IR.…”
Section: Availability Of Data and Materialsmentioning
confidence: 99%