|
related topics |
{key, protocol, security} |
{photon, photons, single} |
{information, entropy, channel} |
{alice, bob, state} |
{level, atom, field} |
{spin, pulse, spins} |
{let, theorem, proof} |
{bell, inequality, local} |
|
Enhancing practical security of quantum key distribution with a few
decoy states
Jim W. Harrington, J. Mark Ettinger, Richard J. Hughes, Jane E. Nordholt
abstract: Quantum key distribution establishes a secret string of bits between two
distant parties. Of concern in weak laser pulse schemes is the especially
strong photon number splitting attack by an eavesdropper, but the decoy state
method can detect this attack with current technology, yielding a high rate of
secret bits. In this Letter, we develop rigorous security statements in the
case of finite statistics with only a few decoy states, and we present the
results of simulations of an experimental setup of a decoy state protocol that
can be simply realized with current technology.
- oai_identifier:
- oai:arXiv.org:quant-ph/0503002
- categories:
- quant-ph
- comments:
- 4 pages, 5 figures, RevTex 4
- arxiv_id:
- quant-ph/0503002
- report_no:
- LA-UR-05-1156
- created:
- 2005-03-01
Full article ▸
|
|
related documents |
0211153v5 |
0503192v4 |
0111073v2 |
0310168v2 |
0410215v2 |
0107130v1 |
0505108v1 |
0403036v5 |
9911043v5 |
0205060v3 |
9810067v3 |
0703099v5 |
0409099v2 |
0611145v1 |
0603234v1 |
0511163v2 |
0610096v2 |
0504150v2 |
0509211v1 |
0403133v2 |
0601091v2 |
0605002v1 |
0503050v1 |
0612075v1 |
0609005v1 |
|