Experimental passive decoy-state quantum key distribution

By employing low dark count up-conversion single photon detectors, we have experimentally demonstrated the passive decoy-state method over a 50-km-long optical fiber and have obtained a key rate of about 100 bit/s.

[1]  R. H. Brown,et al.  A Test of a New Type of Stellar Interferometer on Sirius , 1956, Nature.

[2]  Yurke,et al.  Obtainment of thermal noise from a pure quantum state. , 1987, Physical review. A, General physics.

[3]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[4]  J. Rarity,et al.  Photon statistics of pulsed parametric light , 1998 .

[5]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[6]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[7]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[8]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[9]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[10]  V. Scarani,et al.  Two independent photon pairs versus four-photon entangled states in parametric down conversion , 2003, quant-ph/0310167.

[11]  Hoi-Kwong Lo Quantum key distribution with vacua or dim pulses as decoy states , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[12]  H. Lo,et al.  Practical decoy state for quantum key distribution (15 pages) , 2005 .

[13]  Xiongfeng Ma Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.

[14]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[15]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[16]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[17]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[18]  Li Qian,et al.  Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber , 2006, 2006 IEEE International Symposium on Information Theory.

[19]  Passive decoy state quantum key distribution: Closing the gap to perfect sources , 2006, quant-ph/0609195.

[20]  C. Silberhorn,et al.  Quantum key distribution with passive decoy state selection , 2007 .

[21]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[22]  James F. Dynes,et al.  Unconditionally secure one-way quantum key distribution using decoy pulses , 2007, QELS 2007.

[23]  M. Fejer,et al.  Correlated photon-pair generation in reverse-proton-exchange PPLN waveguides with integrated mode demultiplexer at 10 GHz clock. , 2007, Optics express.

[24]  Jian-Wei Pan,et al.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.

[25]  John Preskill,et al.  Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..

[26]  C. G. Peterson,et al.  Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.

[27]  H. Weinfurter,et al.  Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.

[28]  Xiongfeng Ma,et al.  QUANTUM CRYPTOGRAPHY: FROM THEORY TO PRACTICE , 2007, quant-ph/0702202.

[29]  Tao Zhang,et al.  Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.

[30]  H. Lo,et al.  Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.

[31]  Xiongfeng Ma Quantum cryptography: theory and practice , 2008 .

[32]  David Elkouss,et al.  Efficient reconciliation protocol for discrete-variable quantum key distribution , 2009, 2009 IEEE International Symposium on Information Theory.

[33]  T. Moroder,et al.  Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.

[34]  Jian Wang,et al.  Decoy-state quantum key distribution with polarized photons over 200 km. , 2009, Optics express.

[35]  Jian-Wei Pan,et al.  Decoy-state quantum key distribution with polarized photons over 200 km. , 2010, Optics express.

[36]  T. Moroder,et al.  Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.

[37]  G. Guo,et al.  Practical non-Poissonian light source for passive decoy state quantum key distribution. , 2010, Optics letters.

[38]  N. Lutkenhaus,et al.  Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals , 2010, 1009.3830.

[39]  Xiang‐Bin Wang,et al.  Reexamination of the decoy-state quantum key distribution with an unstable source , 2010 .

[40]  Chun-Yan Li,et al.  Partially random phase attack to the practical two-way quantum-key-distribution system , 2012, 1305.5985.

[41]  Chun-Yan Li,et al.  Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .

[42]  张阳,et al.  Experimental demonstration of passive decoy state quantum key distribution , 2012 .

[43]  Guo Guangcan,et al.  Experimental demonstration of passive decoy state quantum key distribution , 2012 .

[44]  Jian-Wei Pan,et al.  Source attack of decoy-state quantum key distribution using phase information , 2013, 1304.2541.

[45]  L. Zhang,et al.  Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.

[46]  M. Fejer,et al.  Ultralow noise up-conversion detector and spectrometer for the telecom band. , 2013, Optics express.

[47]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[48]  Yang Wang,et al.  Passive decoy-state quantum key distribution using weak coherent pulses with intensity fluctuations , 2013, 1312.7383.

[49]  M. Fejer,et al.  Experimental passive decoy-state quantum key distribution , 2014, CLEO 2014.