ar X iv : q ua nt - p h / 04 11 00 4 v 4 1 2 M ay 2 00 5 Decoy State Quantum Key Distribution
نویسنده
چکیده
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds— enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.
منابع مشابه
ar X iv : q ua nt - p h / 04 11 17 2 v 1 2 3 N ov 2 00 4 Information and Entropy in Quantum Theory
متن کامل
ar X iv : q ua nt - p h / 04 05 11 6 v 1 2 0 M ay 2 00 4 Complementarity of Entanglement and Interference
A complementarity relation is shown between the visibility of interference and bipartite entanglement in a two qubit interferometric system when the parameters of the quantum operation change for a given input state. The entanglement measure is a decreasing function of the visibility of interference. The implications for quantum computation are briefly discussed.
متن کاملar X iv : q ua nt - p h / 04 05 01 1 v 1 3 M ay 2 00 4 Decoherence alias Loschmidt echo of the environment
T. Gorin, T. Prosen, T. H. Seligman, 4 and W. T. Strunz Theoretische Quantendynamik, Albert-Ludwigs-Universität, Hermann-Herder-Str. 3, 79104 Freiburg, Germany Physics Department, Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia Centro Internacional de Ciencias, C.P. 62131 Cuernavaca, Morelos Mexico Centro de Ciencias F́ısicas, University of ...
متن کاملar X iv : q ua nt - p h / 06 11 04 4 v 1 3 N ov 2 00 6 Quantum key distribution with “ dual detectors ”
To improve the performance of a quantum key distribution (QKD) system, high speed, low dark count single photon detectors (or low noise homodyne detectors) are required. However, in practice, a fast detector usually is noisy. Here, we propose a “dual detectors” method to improve the performance of a practical QKD system with realistic detectors: the legitimate receiver randomly uses either a fa...
متن کاملar X iv : q ua nt - p h / 06 08 19 7 v 2 1 4 M ay 2 00 7 MATRIX PRODUCT STATE REPRESENTATIONS
This work gives a detailed investigation of matrix product state (MPS) representations for pure multipartite quantum states. We determine the freedom in representations with and without translation symmetry, derive respective canonical forms and provide efficient methods for obtaining them. Results on frustration free Hamiltonians and the generation of MPS are extended, and the use of the MPS-r...
متن کامل