pith. machine review for the scientific record. sign in

arxiv: 1405.3761 · v3 · submitted 2014-05-15 · 🪐 quant-ph

Recognition: unknown

Experimental Passive Decoy-State Quantum Key Distribution

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords decoy-statepassivemethodphotonquantumdecoydistributionpractical
0
0 comments X
read the original abstract

The decoy-state method is widely used in practical quantum key distribution systems to replace ideal single photon sources with realistic light sources by varying intensities. Instead of active modulation, the passive decoy-state method employs built-in decoy states in a parametric down-conversion photon source, which can decrease the side channel information leakage in decoy state preparation and hence increase the security. By employing low dark count up-conversion single photon detectors, we have experimentally demonstrated the passive decoy-state method over a 50-km-long optical fiber and have obtained a key rate of about 100 bit/s. Our result suggests that the passive decoy-state source is a practical candidate for future quantum communication implementation.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.