Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber
Abstract
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultralow-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.
- Publication:
-
Physical Review Letters
- Pub Date:
- January 2007
- DOI:
- arXiv:
- arXiv:quant-ph/0607186
- Bibcode:
- 2007PhRvL..98a0503R
- Keywords:
-
- 03.67.Dd;
- 03.67.Hk;
- 42.79.Sz;
- 85.25.Oj;
- Quantum cryptography;
- Quantum communication;
- Optical communication systems multiplexers and demultiplexers;
- Superconducting optical X-ray and gamma-ray detectors;
- Quantum Physics
- E-Print:
- 4 pages, 3 figures