Experimental quantum key distribution with decoy states

Y Zhao, B Qi, X Ma, HK Lo, L Qian - Physical review letters, 2006 - APS
To increase dramatically the distance and the secure key generation rate of quantum key
distribution (QKD), the idea of quantum decoys—signals of different intensities—has recently …

Practical decoy state for quantum key distribution

X Ma, B Qi, Y Zhao, HK Lo - Physical Review A—Atomic, Molecular, and …, 2005 - APS
Decoy states have recently been proposed as a useful method for substantially improving
the performance of quantum key distribution (QKD). Here, we present a general theory of the …

Quantum key distribution with distinguishable decoy states

A Huang, SH Sun, Z Liu, V Makarov - Physical Review A, 2018 - APS
The decoy-state protocol has been considered to be one of the most important methods to
protect the security of quantum key distribution (QKD) with a weak coherent source. Here we …

Experimental Long-Distance Decoy-State Quantum Key Distribution Based<? format?> on Polarization Encoding

CZ Peng, J Zhang, D Yang, WB Gao, HX Ma, H Yin… - Physical review …, 2007 - APS
We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum
communication in polarization space over 102 km. Further, we simplify the experimental …

Making the decoy-state measurement-device-independent quantum key distribution practically useful

YH Zhou, ZW Yu, XB Wang - Physical Review A, 2016 - APS
The relatively low key rate seems to be the major barrier to its practical use for the decoy-
state measurement-device-independent quantum key distribution (MDI-QKD). We present a …

Practical decoy-state method in quantum key distribution with a heralded single-photon source

Q Wang, XB Wang, GC Guo - Physical Review A—Atomic, Molecular, and …, 2007 - APS
We propose a practical decoy-state method with heralded single-photon source for quantum
key distribution (QKD). In the protocol, three intensities are used and one can estimate the …

Decoy state quantum key distribution

HK Lo, X Ma, K Chen - Physical review letters, 2005 - APS
There has been much interest in quantum key distribution. Experimentally, quantum key
distribution over 150 km of commercial Telecom fibers has been successfully performed …

Source attack of decoy-state quantum key distribution using phase information

YL Tang, HL Yin, X Ma, CHF Fung, Y Liu, HL Yong… - Physical Review A …, 2013 - APS
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve
information-theoretically secure key generation. This field is now approaching the stage of …

Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources

Q Wang, XB Wang - Physical Review A—Atomic, Molecular, and Optical …, 2013 - APS
We study decoy-state measurement-device-independent quantum key distribution using
heralded single-photon sources. This has the advantage that the observed error rate in the X …

Practical aspects of measurement-device-independent quantum key distribution

F Xu, M Curty, B Qi, HK Lo - New Journal of Physics, 2013 - iopscience.iop.org
A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD),
removes all attacks from the detection system, the most vulnerable part in QKD …