0503002v1

related topics
{key, protocol, security}
{photon, photons, single}
{information, entropy, channel}
{alice, bob, state}
{level, atom, field}
{spin, pulse, spins}
{let, theorem, proof}
{bell, inequality, local}

Enhancing practical security of quantum key distribution with a few decoy states

Jim W. Harrington, J. Mark Ettinger, Richard J. Hughes, Jane E. Nordholt

abstract: Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite statistics with only a few decoy states, and we present the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology.

oai_identifier:
oai:arXiv.org:quant-ph/0503002
categories:
quant-ph
comments:
4 pages, 5 figures, RevTex 4
arxiv_id:
quant-ph/0503002
report_no:
LA-UR-05-1156
created:
2005-03-01

Full article ▸

related documents
0211153v5
0503192v4
0111073v2
0310168v2
0410215v2
0107130v1
0505108v1
0403036v5
9911043v5
0205060v3
9810067v3
0703099v5
0409099v2
0611145v1
0603234v1
0511163v2
0610096v2
0504150v2
0509211v1
0403133v2
0601091v2
0605002v1
0503050v1
0612075v1
0609005v1