The authors report here a complete experimental realization of one-way decoy pulse quantum key distribution, demonstrating an unconditionally secure key rate of for a fiber length. This is two orders of magnitudes higher than the value that can be obtained with a nondecoy system. They also introduce a simple test for detecting the photon number splitting attack and highlight that it is essential for the security of the technique to fully characterize the source and detectors used.
REFERENCES
1.
C. H.
Bennett
and G.
Brassard
, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing
, Bangalore, India
(IEEE, New York, 1984
), pp. 175
–179
.2.
N.
Gisin
, G.
Ribordy
, W.
Tittel
, and H.
Zbinden
, Rev. Mod. Phys.
74
, 145
(2002
).3.
M.
Dusěk
, N.
Lütkenhaus
, and M.
Hendrych
, in Progress in Optics
, edited by E.
Wolf
(Elsevier
, New York
, 2006
), Vol. 49
. Also available at e-print quant-ph/0601207.4.
5.
P. W.
Shor
and J.
Preskill
, Phys. Rev. Lett.
85
, 441
(2000
).6.
P. D.
Townsend
, J. G.
Rarity
, and P. R.
Tapster
, Electron. Lett.
29
, 634
(1993
).7.
C.
Gobby
, Z. L.
Yuan
, and A. J.
Shields
, Appl. Phys. Lett.
84
, 3762
(2004
).8.
G.
Brassard
, N.
Lütkenhaus
, T.
Mor
, and B. C.
Sanders
, Phys. Rev. Lett.
85
, 1330
(2000
).9.
W. Y.
Hwang
, Phys. Rev. Lett.
91
, 050791
(2003
).10.
H. K.
Lo
, X.
Ma
, and K.
Chen
, Phys. Rev. Lett.
94
, 230504
(2005
);H. K.
Lo
, Proceedings of 2004 IEEE International Symposium on Information Technology
, New York
, 2004
, p. 137
.11.
X. B.
Wang
, Phys. Rev. Lett.
94
, 230503
(2005
).12.
X.
Ma
, B.
Qi
, Y.
Zhao
, and H.-K.
Lo
, Phys. Rev. A
72
, 012306
(2005
).13.
Y.
Zhao
, B.
Qi
, X.
Ma
, H.-K.
Lo
, and L.
Qian
, Phys. Rev. Lett.
96
, 070502
(2006
);e-print quant-ph/0601168.
14.
15.
D.
Gottesman
, H.-K.
Lo
, N.
Lütkenhaus
, and J.
Preskill
, Quantum Inf. Comput.
4
, 325
(2004
).16.
Z. L.
Yuan
and A. J.
Shields
, Opt. Express
13
, 660
(2005
).17.
G.
Ribordy
, J. D.
Gautier
, H.
Zbinden
, and N.
Gisin
, Appl. Opt.
37
, 2272
(1998
).18.
G.
Brassard
and L.
Salvail
, Lect. Notes Comput. Sci.
765
, 410
(1994
).19.
C. H.
Bennett
, G.
Brassard
, C.
Crépeau
, and U. M.
Mauer
, IEEE Trans. Inf. Theory
41
, 1915
(1995
).20.
C.
Gobby
, Z. L.
Yuan
, and A. J.
Shields
, Electron. Lett.
40
, 1603
(2004
).21.
C. Z.
Peng
, J.
Zhang
, D.
Yang
, W. B.
Gao
, H. X.
Ma
, H.
Yin
, H. P.
Zeng
, T.
Yang
, X. B.
Wang
, and J. W.
Pan
, e-print quant-ph/0607129.22.
D.
Rosenberg
, J. W.
Harrington
, P. R.
Rice
, P. A.
Hiskett
, C. G.
Peterson
, R. J.
Hughes
, J. E.
Nordholt
, A. E.
Lita
, and S. W.
Nam
, e-print quant-ph/0607186.© 2007 American Institute of Physics.
2007
American Institute of Physics
You do not currently have access to this content.