Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Practical High-Dimensional Quantum Key Distribution with Decoy States

Not Accessible

Your library or personal account may give you access

Abstract

We propose a high-dimensional quantum key distribution protocol secure against photon-number splitting attack by employing only one or two decoy states. Decoy states dramatically increase the protocol’s secure distance.

© 2015 Optical Society of America

PDF Article
More Like This
Experimental decoy state quantum key distribution

D. Rosenberg, J. W. Harrington, P. R. Rice, P. A. Hiskett, C. G. Peterson, R. J. Hughes, A. E. Lita, S. Nam, and J. E. Nordholt
QML1 Quantum Electronics and Laser Science Conference (CLEO:FS) 2007

Quantum Key Distribution With Time Coding And Decoy States

D. I. Pustakhod, D. B. Horoshko, V. N. Chizhevsky, and S. Ya. Kilin
ED_P6 European Quantum Electronics Conference (EQEC) 2009

Experimental Passive Decoy-state Quantum Key Distribution

Qi-Chao Sun, Wei-Long Wang, Yang Liu, Fei Zhou, Jason S. Pelc, M. M. Fejer, Cheng-Zhi Peng, Xian-Feng Chen, Xiong-Feng Ma, Qiang Zhang, and Jian-Wei Pan
JTh2A.121 CLEO: Applications and Technology (CLEO:A&T) 2014

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.