The security and recent technology of quantum key distribution

Front. Phys. ›› 2006, Vol. 1 ›› Issue (3) : 251 -255.

PDF (76KB)
Front. Phys. ›› 2006, Vol. 1 ›› Issue (3) : 251 -255. DOI: 10.1007/s11467-006-0023-y

The security and recent technology of quantum key distribution

Author information +
History +
PDF (76KB)

Abstract

In principle, quantum key distribution (QKD) can be used to make unconditionally secure private communication. However, the security of the existing real system for QKD needs to be carefully examined. Actually, the existing experiments based on weak coherent states are not secure under photon-number-splitting attack. Fortunately, the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.

Keywords

QKD, security, BB84 method, decoy-state method, photon-number-splitting attack

Cite this article

Download citation ▾
null. The security and recent technology of quantum key distribution. Front. Phys., 2006, 1(3): 251-255 DOI:10.1007/s11467-006-0023-y

登录浏览全文

4963

注册一个新账户 忘记密码

References

AI Summary AI Mindmap
PDF (76KB)

979

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/