Long-distance decoy-state quantum key distribution in optical fiber

The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultralow-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first versio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Physical review letters 2007-01, Vol.98 (1), p.010503-010503, Article 010503
Hauptverfasser: Rosenberg, Danna, Harrington, Jim W, Rice, Patrick R, Hiskett, Philip A, Peterson, Charles G, Hughes, Richard J, Lita, Adriana E, Nam, Sae Woo, Nordholt, Jane E
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultralow-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.
ISSN:0031-9007
1079-7114
DOI:10.1103/PhysRevLett.98.010503