Making the decoy-state measurement-device-independent quantum key distribution practically useful

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decoy state measurement-device-independent quantum key distribution based on the Clauser-Horne-Shimony-Holt inequality

Chun-Mei Zhang, Mo Li, Hong-Wei Li, Zhen-Qiang Yin, Dong Wang, Jing-Zheng Huang, Yun-Guang Han, Man-Li Xu, Wei Chen, Shuang Wang, Patcharapong Treeviriyanupab, Guang-Can Guo, Zheng-Fu Han 1 Key Laboratory of Quantum Information, CAS, and Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei 230026, China State Key Laboratory ...

متن کامل

An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and...

متن کامل

Experimental measurement-device-independent quantum key distribution.

Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-dev...

متن کامل

Decoy state quantum key distribution.

There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most...

متن کامل

Decoy State Quantum Key Distribution

Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditional...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2016

ISSN: 2469-9926,2469-9934

DOI: 10.1103/physreva.93.042324