The security and recent technology of quantum key distribution
WANG Xiang-bin1, PENG Cheng-zhi1, YING Hao2, PAN Jian-wei2, MA Huai-xing3, YANG Tao3
Author information+
1.Department of Physics, Tsinghua University, Beijing 100084, China; 2.Hefei National Laboratory for Physical Sciences at Microscale, University of Science and Technology of China, Hefei 230026, China; 3.China Electronic System Engineering Company, Beijing 100039, China;
Show less
History+
Published
05 Sep 2006
Issue Date
05 Sep 2006
Abstract
In principle, quantum key distribution (QKD) can be used to make unconditionally secure private communication. However, the security of the existing real system for QKD needs to be carefully examined. Actually, the existing experiments based on weak coherent states are not secure under photon-number-splitting attack. Fortunately, the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.
WANG Xiang-bin, PENG Cheng-zhi, YING Hao, PAN Jian-wei, MA Huai-xing, YANG Tao.
The security and recent technology of quantum key distribution. Front. Phys., 2006, 1(3): 251‒255 https://doi.org/10.1007/s11467-006-0023-y
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
This is a preview of subscription content, contact us for subscripton.
AI Summary 中Eng×
Note: Please note that the content below is AI-generated. Frontiers Journals website shall not be held liable for any consequences associated with the use of this content.