首页 | 本学科首页   官方微博 | 高级检索  
     检索      


The security and recent technology of quantum key distribution
Authors:Wang Xiang-bin  Ying Hao  Ma Huai-xing  Peng Cheng-zhi  Yang Tao and Pan Jian-wei
Institution:(1) Department of Physics, Tsinghua University, Beijing, 100084, China;(2) China Electronic System Engineering Company, Beijing, 100039, China;(3) Hefei National Laboratory for Physical Sciences at Microscale, University of Science and Technology of China, Hefei, 230026, China
Abstract:In principle, quantum key distribution (QKD) can be used to make unconditionally secure private communication. However, the security of the existing real system for QKD needs to be carefully examined. Actually, the existing experiments based on weak coherent states are not secure under photon-number-splitting attack. Fortunately, the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.
Keywords:QKD  security  BB84 method  decoy-state method  photon-number-splitting attack
本文献已被 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号