The authors report here a complete experimental realization of one-way decoy pulse quantum key distribution, demonstrating an unconditionally secure key rate of 5.51kbitss for a 25.3km fiber length. This is two orders of magnitudes higher than the value that can be obtained with a nondecoy system. They also introduce a simple test for detecting the photon number splitting attack and highlight that it is essential for the security of the technique to fully characterize the source and detectors used.

1.
C. H.
Bennett
and
G.
Brassard
,
Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing
,
Bangalore, India
(IEEE, New York,
1984
), pp.
175
179
.
2.
N.
Gisin
,
G.
Ribordy
,
W.
Tittel
, and
H.
Zbinden
,
Rev. Mod. Phys.
74
,
145
(
2002
).
3.
M.
Dusěk
,
N.
Lütkenhaus
, and
M.
Hendrych
, in
Progress in Optics
, edited by
E.
Wolf
(
Elsevier
,
New York
,
2006
), Vol.
49
. Also available at e-print quant-ph/0601207.
4.
D.
Mayers
,
J. ACM
48
,
351
(
2001
).
5.
P. W.
Shor
and
J.
Preskill
,
Phys. Rev. Lett.
85
,
441
(
2000
).
6.
P. D.
Townsend
,
J. G.
Rarity
, and
P. R.
Tapster
,
Electron. Lett.
29
,
634
(
1993
).
7.
C.
Gobby
,
Z. L.
Yuan
, and
A. J.
Shields
,
Appl. Phys. Lett.
84
,
3762
(
2004
).
8.
G.
Brassard
,
N.
Lütkenhaus
,
T.
Mor
, and
B. C.
Sanders
,
Phys. Rev. Lett.
85
,
1330
(
2000
).
9.
W. Y.
Hwang
,
Phys. Rev. Lett.
91
,
050791
(
2003
).
10.
H. K.
Lo
,
X.
Ma
, and
K.
Chen
,
Phys. Rev. Lett.
94
,
230504
(
2005
);
H. K.
Lo
,
Proceedings of 2004 IEEE International Symposium on Information Technology
,
New York
,
2004
, p.
137
.
11.
12.
X.
Ma
,
B.
Qi
,
Y.
Zhao
, and
H.-K.
Lo
,
Phys. Rev. A
72
,
012306
(
2005
).
13.
Y.
Zhao
,
B.
Qi
,
X.
Ma
,
H.-K.
Lo
, and
L.
Qian
,
Phys. Rev. Lett.
96
,
070502
(
2006
);
14.
H.
Inamori
,
N.
Lütkenhaus
, and
D.
Mayers
, e-print quant-ph/0107017.
15.
D.
Gottesman
,
H.-K.
Lo
,
N.
Lütkenhaus
, and
J.
Preskill
,
Quantum Inf. Comput.
4
,
325
(
2004
).
16.
Z. L.
Yuan
and
A. J.
Shields
,
Opt. Express
13
,
660
(
2005
).
17.
G.
Ribordy
,
J. D.
Gautier
,
H.
Zbinden
, and
N.
Gisin
,
Appl. Opt.
37
,
2272
(
1998
).
18.
G.
Brassard
and
L.
Salvail
,
Lect. Notes Comput. Sci.
765
,
410
(
1994
).
19.
C. H.
Bennett
,
G.
Brassard
,
C.
Crépeau
, and
U. M.
Mauer
,
IEEE Trans. Inf. Theory
41
,
1915
(
1995
).
20.
C.
Gobby
,
Z. L.
Yuan
, and
A. J.
Shields
,
Electron. Lett.
40
,
1603
(
2004
).
21.
C. Z.
Peng
,
J.
Zhang
,
D.
Yang
,
W. B.
Gao
,
H. X.
Ma
,
H.
Yin
,
H. P.
Zeng
,
T.
Yang
,
X. B.
Wang
, and
J. W.
Pan
, e-print quant-ph/0607129.
22.
D.
Rosenberg
,
J. W.
Harrington
,
P. R.
Rice
,
P. A.
Hiskett
,
C. G.
Peterson
,
R. J.
Hughes
,
J. E.
Nordholt
,
A. E.
Lita
, and
S. W.
Nam
, e-print quant-ph/0607186.
You do not currently have access to this content.