Experimental comparison between one-decoy and two-decoy implementations of the Bennett-Brassard 1984 quantum cryptography protocol

Youn-Chang Jeong, Yong-Su Kim, and Yoon-Ho Kim
Phys. Rev. A 93, 012322 – Published 14 January 2016

Abstract

The decoy-state method allows the use of weak coherent pulses in quantum cryptography, and to date, various strategies for the decoy state have been proposed. Here, we experimentally compare the secret key generation rates between the one-decoy and two-decoy implementations of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol through a 3.1-km optical fiber at 780 nm. Once the parameters of the experimental setup are optimized for the maximal secret key generation rate for each implementation, it is found that the two-decoy implementation outperforms the one-decoy implementation.

  • Figure
  • Figure
  • Figure
  • Figure
  • Received 4 June 2015

DOI:https://doi.org/10.1103/PhysRevA.93.012322

©2016 American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & Technology

Authors & Affiliations

Youn-Chang Jeong1,*, Yong-Su Kim1,2, and Yoon-Ho Kim1,†

  • 1Department of Physics, Pohang University of Science and Technology, Pohang, 790-784, Korea
  • 2Center for Quantum Information, Korea Institute of Science and Technology, Seoul, 136-791, Korea

  • *w31400@gmail.com
  • yoonho72@gmail.com

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 93, Iss. 1 — January 2016

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×