A review on the decoy-state method for practical quantum key distribution
read the original abstract
We present a review on the historic development of the decoy state method, including the background, principles, methods, results and development. We also clarify some delicate concepts. Given an imperfect source and a very lossy channel, the photon-number-splitting (PNS) attack can make the quantum key distribution (QKD) in practice totally insecure. Given the result of ILM-GLLP, one knows how to distill the secure final key if he knows the fraction of tagged bits. The purpose of decoy state method is to do a tight verification of the the fraction of tagged bits. The main idea of decoy-state method is changing the intensities of source light and one can verify the fraction of tagged bits of certain intensity by watching the the counting rates of pulses of different intensities. Since the counting rates are small quantities, the effect of statistical fluctuation is very important. It has been shown that 3-state decoy-state method in practice can work even with the fluctuations and other errors.
This paper has not been read by Pith yet.
Forward citations
Cited by 1 Pith paper
-
Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs
Overview of recent analytical and numerical advances in security proofs for QKD protocols that incorporate device imperfections to bridge theory and practice.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.