Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography

Xiang-Bin Wang
Phys. Rev. Lett. 94, 230503 – Published 16 June 2005

Abstract

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve’s action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups.

  • Received 14 October 2004

DOI:https://doi.org/10.1103/PhysRevLett.94.230503

©2005 American Physical Society

Authors & Affiliations

Xiang-Bin Wang*

  • IMAI Quantum Computation and Information Project, ERATO, JST, Daini Hongo White Bldg. 201, 5-28-3, Hongo, Bunkyo, Tokyo 133-0033, Japan

  • *Email address: wang@qci.jst.go.jp; wang_xiangbin@hotmail.com

See Also

Decoy State Quantum Key Distribution

Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen
Phys. Rev. Lett. 94, 230504 (2005)

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 94, Iss. 23 — 17 June 2005

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review Letters

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×