Physics – Quantum Physics
Scientific paper
2005-09-13
Physics
Quantum Physics
17 pages
Scientific paper
We present a review on the historic development of the decoy state method, including the background, principles, methods, results and development. We also clarify some delicate concepts. Given an imperfect source and a very lossy channel, the photon-number-splitting (PNS) attack can make the quantum key distribution (QKD) in practice totally insecure. Given the result of ILM-GLLP, one knows how to distill the secure final key if he knows the fraction of tagged bits. The purpose of decoy state method is to do a tight verification of the the fraction of tagged bits. The main idea of decoy-state method is changing the intensities of source light and one can verify the fraction of tagged bits of certain intensity by watching the the counting rates of pulses of different intensities. Since the counting rates are small quantities, the effect of statistical fluctuation is very important. It has been shown that 3-state decoy-state method in practice can work even with the fluctuations and other errors.
No associations
LandOfFree
A review on the decoy-state method for practical quantum key distribution does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A review on the decoy-state method for practical quantum key distribution, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A review on the decoy-state method for practical quantum key distribution will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-704095