메뉴 건너뛰기




Volumn 15, Issue 13, 2007, Pages 8465-8471

Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security

Author keywords

[No Author keywords available]

Indexed keywords

DISTANCE MEASUREMENT; QUANTUM THEORY; VACUUM APPLICATIONS;

EID: 34250864335     PISSN: None     EISSN: 10944087     Source Type: Journal    
DOI: 10.1364/OE.15.008465     Document Type: Article
Times cited : (33)

References (18)
  • 5
    • 2942611260 scopus 로고    scopus 로고
    • Quantum key distribution over 122km of standard telecom fiber
    • C. Gobby, Z. L. Yuan and A. J. Shields, "Quantum key distribution over 122km of standard telecom fiber," Appl. Phys. Lett. 84, 3762-3764 (2004).
    • (2004) Appl. Phys. Lett , vol.84 , pp. 3762-3764
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 6
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon pulse-number-splitting attack in practical quantum cryptography
    • Phys. Rev. Lett, 230503-1-4
    • X.-B. Wang, "Beating the photon pulse-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett. 94, 230503-1-4 (2005)
    • (2005) , vol.94
    • Wang, X.-B.1
  • 7
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • Phys. Rev. Lett, 230504-1-4
    • and H.-K. Lo, X. Ma and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett. 94, 230504-1-4 (2005).
    • (2005) , vol.94
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 9
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • Phys. Rev. Lett, 057901-1-4
    • W.-Y. Hwang, "Quantum key distribution with high loss: toward global secure communication," Phys. Rev. Lett. 91, 057901-1-4 (2003).
    • (2003) , vol.91
    • Hwang, W.-Y.1
  • 10
  • 11
    • 33344454530 scopus 로고    scopus 로고
    • Experimental quantum key distribution with decoy states
    • Phys. Rev. Lett, 070502-1-4
    • Y. Zhao, B. Qi, X. Ma, H.-K. Lo and L.Qian, "Experimental quantum key distribution with decoy states," Phys. Rev. Lett. 96, 070502-1-4 (2006).
    • (2006) , vol.96
    • Zhao, Y.1    Qi, B.2    Ma, X.3    Lo, H.-K.4    Qian, L.5
  • 13
    • 11144327171 scopus 로고    scopus 로고
    • Unconditionally secure quantum key distribution over 50 km of standard telecom fiber
    • Electron. Lett
    • C. Gobby, Z. L. Yuan and A. J. Shields, Elec. Lett. "Unconditionally secure quantum key distribution over 50 km of standard telecom fiber," Electron. Lett. 40, 1603-1605 (2004).
    • (2004) , vol.40 , pp. 1603-1605
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 14
    • 27144453296 scopus 로고    scopus 로고
    • Practical decoy state for quantum key distribution
    • Phys. Rev. A, 012306-1-15
    • X. Ma, B. Qi, Y. Zhao and H.-K. Lo, "Practical decoy state for quantum key distribution," Phys. Rev. A 72, 012306-1-15 (2005).
    • (2005) , vol.72
    • Ma, X.1    Qi, B.2    Zhao, Y.3    Lo, H.-K.4
  • 15
    • 33846356424 scopus 로고    scopus 로고
    • C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-Xin. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang and J.-W. Pan, Experimental long-distance decoy-state quantum key distribution based on polarization encoding, Phys. Rev. Lett. 98, 010505-1-4 (2007).
    • C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-Xin. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang and J.-W. Pan, "Experimental long-distance decoy-state quantum key distribution based on polarization encoding," Phys. Rev. Lett. 98, 010505-1-4 (2007).
  • 17
    • 0032049044 scopus 로고    scopus 로고
    • Performance of InGaAs/InP avalanche photodiodes as gated-mode photon counters
    • G. Ribordy, J. D. Gautier, H. Zbinden, and N. Gisin, "Performance of InGaAs/InP avalanche photodiodes as gated-mode photon counters," Appl. Opt. 37, 2272 (1998).
    • (1998) Appl. Opt , vol.37 , pp. 2272
    • Ribordy, G.1    Gautier, J.D.2    Zbinden, H.3    Gisin, N.4
  • 18
    • 34250842798 scopus 로고    scopus 로고
    • Upper bounds of eavesdropper's performances in finite-length code with decoy method
    • quantph/0702250
    • M. Hayashi, "Upper bounds of eavesdropper's performances in finite-length code with decoy method," quantph/0702250 (2007).
    • (2007)
    • Hayashi, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.