Long-distance decoy-state quantum key distribution in optical fiber

D Rosenberg, JW Harrington, PR Rice, PA Hiskett… - Physical review …, 2007 - APS
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

Measurement-device-independent quantum key distribution over a 404 km optical fiber

HL Yin, TY Chen, ZW Yu, H Liu, LX You, YH Zhou… - Physical review …, 2016 - APS
Measurement-device-independent quantum key distribution (MDIQKD) with the decoy-state
method negates security threats of both the imperfect single-photon source and detection …

Long-distance quantum key distribution in optical fibre

PA Hiskett, D Rosenberg, CG Peterson… - New Journal of …, 2006 - iopscience.iop.org
Use of low-noise detectors can both increase the secret bit rate of long-distance quantum
key distribution (QKD) and dramatically extend the length of a fibre optic link over which …

Unconditionally secure one-way quantum key distribution using decoy pulses

ZL Yuan, AW Sharpe, AJ Shields - Applied physics letters, 2007 - pubs.aip.org
The authors report here a complete experimental realization of one-way decoy pulse
quantum key distribution, demonstrating an unconditionally secure key rate of 5.51 kbits∕ s …

Experimental quantum key distribution with decoy states

Y Zhao, B Qi, X Ma, HK Lo, L Qian - Physical review letters, 2006 - APS
To increase dramatically the distance and the secure key generation rate of quantum key
distribution (QKD), the idea of quantum decoys—signals of different intensities—has recently …

Real-World Two-Photon Interference and Proof-of-Principle<? format?> Quantum Key Distribution Immune to Detector Attacks

A Rubenok, JA Slater, P Chan, I Lucio-Martinez… - Physical review …, 2013 - APS
Several vulnerabilities of single-photon detectors have recently been exploited to
compromise the security of quantum-key-distribution (QKD) systems. In this Letter, we report …

Experimental Long-Distance Decoy-State Quantum Key Distribution Based<? format?> on Polarization Encoding

CZ Peng, J Zhang, D Yang, WB Gao, HX Ma, H Yin… - Physical review …, 2007 - APS
We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum
communication in polarization space over 102 km. Further, we simplify the experimental …

Provably secure and practical quantum key distribution over 307 km of optical fibre

B Korzh, CCW Lim, R Houlmann, N Gisin, MJ Li… - Nature …, 2015 - nature.com
Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably
secure keys via a potentially insecure quantum channel. Since then, QKD has attracted …

Coexistence of high-bit-rate quantum key distribution and data on optical fiber

KA Patel, JF Dynes, I Choi, AW Sharpe, AR Dixon… - Physical Review X, 2012 - APS
Quantum key distribution (QKD) uniquely allows the distribution of cryptographic keys with
security verified by quantum mechanical limits. Both protocol execution and subsequent …

Practical quantum key distribution protocol without monitoring signal disturbance

T Sasaki, Y Yamamoto, M Koashi - Nature, 2014 - nature.com
Abstract Quantum cryptography,,,,,,, exploits the fundamental laws of quantum mechanics to
provide a secure way to exchange private information. Such an exchange requires a …