The security and recent technology of quantum key distribution |
| |
Authors: | Wang Xiang-bin Ying Hao Ma Huai-xing Peng Cheng-zhi Yang Tao and Pan Jian-wei |
| |
Institution: | (1) Department of Physics, Tsinghua University, Beijing, 100084, China;(2) China Electronic System Engineering Company, Beijing, 100039, China;(3) Hefei National Laboratory for Physical Sciences at Microscale, University of Science and Technology of China, Hefei, 230026, China |
| |
Abstract: | In principle, quantum key distribution (QKD) can be used to make unconditionally secure private communication. However, the
security of the existing real system for QKD needs to be carefully examined. Actually, the existing experiments based on weak
coherent states are not secure under photon-number-splitting attack. Fortunately, the decoy-state method and the entanglement-distribution
method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology. |
| |
Keywords: | QKD security BB84 method decoy-state method photon-number-splitting attack |
本文献已被 万方数据 SpringerLink 等数据库收录! |
|