Long distance decoy state quantum key distribution in optical fiber

Danna Rosenberg,Jim W. Harrington,Patrick R. Rice,Philip A. Hiskett,Charles G. Peterson,Richard J. Hughes,Adriana E. Lita,Sae Woo Nam,Jane E. Nordholt
DOI: https://doi.org/10.1103/PhysRevLett.98.010503
2007-05-03
Abstract:The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.
Quantum Physics
What problem does this paper attempt to address?