• Chinese Journal of Quantum Electronics
  • Vol. 27, Issue 5, 565 (2010)
Yuan-yuan ZHOU*, Xiao-qiang LI, and Xue-jun ZHOU
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    ZHOU Yuan-yuan, LI Xiao-qiang, ZHOU Xue-jun. BB84-decoy-state quantum key distribution with a heralded single photon source[J]. Chinese Journal of Quantum Electronics, 2010, 27(5): 565 Copy Citation Text show less
    References

    [1] Bennett C H , Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. International Conference on Computers, Systems and Signal Processing, India, 1984: 175-179.

    [2] Wang Xiangbin. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Phys. Rev. Lett., 2005, 94: 230503.

    [3] Hwang W Y. Quantum key distribution with high loss: toward global secure communication [J]. Phys. Rev. Lett., 2003, 91: 057901.

    [6] Lo H K, Ma Xiongfeng, Chen Kai. Decoy state quantum key distribution [J]. Phys. Rev. Lett., 2005, 94: 230504.

    [7] Wang Xiangbin. Decoy-state protocol for quantum cryptography with four different intensities of coherent light [J]. Phys. Rev. A, 2005, 72: 012322.

    [8] Ma Xiongfeng, Fung C H F, Dupuis F, et al. Decoy-state quantum key distribution with two-way classical postprocessing [J]. Phys. Rev. A, 2006, 74: 032330.

    [9] Wang Xiangbin, Peng Chengzhi, Zhang Jun, et al. General theory of decoy-state quantum cryptography with source errors [J]. Phys. Rev. A, 2008, 77: 042311.

    [10] Tsurumaru T. Exact minimum and maximum of yield with a finite number of decoy light intensities [J]. Phys. Rev. A, 2008, 77: 022319.

    [11] Schmitt-Manderbach T, Weier H, Fürst M, et al. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km [J]. Phys. Rev. Lett., 2007, 98: 010504.

    [12] Ma Xiongfeng, Lo H K. Quantum key distribution with triggering parametric down-conversion sources [J]. New Journal of Physics, 2008, 10: 073018.

    [13] Wang Qin, Wang Xiangbin, Guo Guangcan. Practical decoy-state method in quantum key distribution with a heralded single-photon source [J]. Phys. Rev. A, 2007, 75: 012312.

    [14] Wang Qin, Wang Xiangbin, Bjrk G, et al. Improved practical decoy state method in quantum key distribution with parametric down-conversion source [J]. Europhysics Lett., 2007, 79(4): 40001.

    [15] Wang Qin, Chen Wei, Xavier G, et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source [J]. Phys. Rev. Lett., 2008, 100: 090501.

    [16] Mauerer W, Silberhorn C. Quantum key distribution with passive decoy state selection [J]. Phys. Rev. A, 2007, 75: 050305.

    [17] Adachi Y, Yamamoto T, Koashi M, et al. Simple and efficient quantum key distribution with parametric down-conversion [J]. Phys. Rev. Lett., 2007, 99: 180503.

    [18] Zhang Shengli, Zou Xubo, Li Ke, et al. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source [J]. Phys. Rev. A, 2007, 76: 044304.

    [19] Mi Jinglong, Wang Faqiang, Lin Qinqun, et al. Practical non-orthogonal decoy state quantum key distribution with heralded single photon source [J]. Chin. Phys. B, 2008, 17(04): 1178-1183.

    [21] Gottesman D, Lo H K, Lütkenhaus N, et al. Security of quantum key distribution with imperfect devices [J]. Quant. Inf. Comp., 2004, 4: 325-360.

    [22] Wang Xiangbin. Quantum key distribution with 4 intensities of coherent light [J]. Phys. Rev. A, 2005, 72: 012322.

    ZHOU Yuan-yuan, LI Xiao-qiang, ZHOU Xue-jun. BB84-decoy-state quantum key distribution with a heralded single photon source[J]. Chinese Journal of Quantum Electronics, 2010, 27(5): 565
    Download Citation