Experimental quantum-key distribution with an untrusted source

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Passive scheme analysis for resolving an untrusted source problem in quantum key distribution

As a practical method, the passive scheme has been used to analyze the security of an untrusted source in quantum key distribution. In the passive scheme, one can utilize average-photon-number (APN) monitor, photon-number-distribution (PND) monitor and photon-number analyzer (PNA) to achieve the unconditional security with using BB84 protocol or decoy-state protocol. In this paper, the ClopperP...

متن کامل

Security analysis of an untrusted source for quantum key distribution: passive approach

We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input...

متن کامل

Secure quantum key distribution with an uncharacterized source.

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis independent, a condition that is automatically satisfied if the source is suitably designed. The proof is based on the observation that, to an adversary, the key extraction process is equivalent to a measurement in the sigma(x) basis performed on a pure ...

متن کامل

The Security of SARG04 Protocol in Plug and Play Quantum Key Distribution system with an Untrusted Source

The SARG04 protocol is one of the most frequently used protocol in commercial plug-and-play quantum key distribution (QKD) system, where an eavesdropper can completely control or change the photon number statistics of the QKD source. To ensure the security of SARG04 protocol in plug-and-play QKD system with an unknown and untrusted source, the bounds of a few statistical parameters of the sourc...

متن کامل

Experimental quantum key distribution with decoy states.

To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Optics Letters

سال: 2008

ISSN: 0146-9592,1539-4794

DOI: 10.1364/ol.33.002077