Experimental quantum key distribution with decoy states.

To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. We also show that with the same experimental parameters, not even a single bit of secure key can be extracted with a non-decoy-state protocol. Compared to building single photon sources, decoy state QKD is a much simpler method for increasing the distance and key generation rate of unconditionally secure QKD.

[1]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[2]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[3]  Tor Helleseth,et al.  Advances in cryptology, EUROCRYPT '93 : Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993 : proceedings , 1994 .

[4]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[5]  J. Preskill,et al.  Phase randomization improves the security of quantum key distribution , 2005, quant-ph/0504209.

[6]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[7]  Kyo Inoue,et al.  Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack , 2005 .

[8]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[9]  Norbert Lütkenhaus,et al.  Effect of finite detector efficiencies on the security evaluation of quantum key distribution , 2004 .

[10]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[11]  Xiongfeng Ma Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.

[12]  J. M. Ettinger,et al.  Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.

[13]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[14]  A. Shields,et al.  Continuous operation of a one-way quantum key distribution system over installed telecom fibre. , 2005, Optics express.

[15]  Norbert Goertz,et al.  Proceedings IEEE International Symposium on Information Theory (ISIT) , 2008 .

[16]  David Deutsch,et al.  Erratum: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels [Phys. Rev. Lett. 77, 2818 (1996)] , 1998 .

[17]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[18]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[19]  Artur Ekert,et al.  Information Gain in Quantum Eavesdropping , 1994 .

[20]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[21]  A. D. Boozer,et al.  Deterministic Generation of Single Photons from One Atom Trapped in a Cavity , 2004, Science.

[22]  Herbert Walther,et al.  Continuous generation of single photons with controlled waveform in an ion-trap cavity system , 2004, Nature.

[23]  N. Gisin,et al.  Quantum key distribution over 67 km with a plug , 2002 .

[24]  Michael Pepper,et al.  Electrically Driven Single-Photon Source , 2001, Science.

[25]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[26]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[27]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[28]  Xiang-Bin Wang A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .

[29]  Andrew G. Glen,et al.  APPL , 2001 .

[30]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[31]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[32]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[33]  Michael Priestley,et al.  Proceedings of IEEE Professional Communication Society International Professional Communication Conference and Proceedings of the 18th Annual ACM International Conference on Computer Documentation: Technology & Teamwork, Cambridge, Massachusetts, USA, September 24-27, 2000 , 2000, SIGDOC.