pith. sign in

arxiv: quant-ph/0509084 · v3 · pith:IKHMSO2Fnew · submitted 2005-09-13 · 🪐 quant-ph

A review on the decoy-state method for practical quantum key distribution

classification 🪐 quant-ph
keywords methodbitsdecoy-statefractionstatetaggedcountingdecoy
0
0 comments X
read the original abstract

We present a review on the historic development of the decoy state method, including the background, principles, methods, results and development. We also clarify some delicate concepts. Given an imperfect source and a very lossy channel, the photon-number-splitting (PNS) attack can make the quantum key distribution (QKD) in practice totally insecure. Given the result of ILM-GLLP, one knows how to distill the secure final key if he knows the fraction of tagged bits. The purpose of decoy state method is to do a tight verification of the the fraction of tagged bits. The main idea of decoy-state method is changing the intensities of source light and one can verify the fraction of tagged bits of certain intensity by watching the the counting rates of pulses of different intensities. Since the counting rates are small quantities, the effect of statistical fluctuation is very important. It has been shown that 3-state decoy-state method in practice can work even with the fluctuations and other errors.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs

    quant-ph 2026-02 unverdicted novelty 2.0

    Overview of recent analytical and numerical advances in security proofs for QKD protocols that incorporate device imperfections to bridge theory and practice.