Abstract
The decoy state protocol was proposed to overcome the primitive photon number splitting attack. When using a better strategy, the attacker can ensure that the ratio of the overall gain of the signal state pulse against the decoy state pulse changes very little, even to keep the overall gain of the signal state pulses equal to that obtained without attacker. In this paper we first give a model of the partial photon number splitting attack which contains the original one, and then find that the decoy state protocol still works effectively under the partial photon number splitting attack.
Article PDF
Avoid common mistakes on your manuscript.
References
Huttner B, Imoto N, Gisin N, et al. Quantum cryptography with coherent states. Phys Rev A, 1995, 51: 1863–1869
Lutkenhaus N. Security against individual attacks for realistic quantum key distribution. Phys Rev A, 2000, 61: 052304
Brassard G, Lutkenhaus N, Mor T, et al. Limitations on practical quantum cryptography. Phys Rev Lett, 2000, 85: 1330–1333
Hwang H K. Quantum key distribution with high loss: Toward global secure communication. Phys Rev Lett, 2003, 91: 057901
Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys Rev Lett, 2005, 94: 230503
Lo H K, Ma X F, Chen K. Decoy state quantum key distribution. Phys Rev Lett, 2005, 94: 230504
Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices. Quant Inform Comput, 2004, 5: 325–360
Ma X F, Qi B, Zhao Y, et al. Practical decoy state for quantum key distribution. Phys Rev A, 2005, 72: 012326
Yin Z Q, Han Z F, Chen W, et al. Experimental decoy state quantum key distribution over 120 km fiber. Chin Phys Lett, 2008, 25: 3547
Wang S, Zhang S L, Li H W, et al. Decoy-state theory for the heralded single-photon source with intensity fluctuations. Phys Rev A, 2009, 79: 062309
Xu F X, Chen W, Wang S, et al. Field experiment on a robust hierarchical metropolitan quantum cryptography network. Chin Sci Bull, 2009, 54: 2991–2997
Hu J Z, Wang X B. Reexamination of the decoy-state quantum key distribution with an unstable source. Phys Rev A, 2010, 82: 012331
Wang S, Chen W, Yin Z Q, et al. Field test of wavelength-saving quantum key distribution network. Opt Lett, 2010, 35: 2454–2456
Liu D, Yin Z Q, Wang S, et al. Estimation of key rate after setting dead time. Chin Phys B, 2012, 21: 060202
Zhang L J, Wang Y G, Yin Z Q, et al. Real-time compensation of phase drift for phase-encoded quantum key distribution systems. Chin Sci Bull, 2011, 56: 2305–2311
Lutkenhaus N, Jahma M. Quantum key distribution with realistic states: Photon-number statistics in the photon-number splitting attack. New J Phys, 2002, 4: 44
Chen H, Huang Y S, Liu Y M. Security analysis of decoy-state quantum key distribution system (in Chinese). Infor Sec Commu Pri, 2011, 8: 56–58
Gobby C, Yuan Z L, Shields A J. Quantum key distribution over 122 km of standard telecom fiber. Appl Phys Lett, 2004, 84: 3762–3764
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is published with open access at Springerlink.com
Rights and permissions
This article is published under an open access license. Please check the 'Copyright Information' section either on this page or in the PDF for details of this license and what re-use is permitted. If your intended use exceeds what is permitted by the license or if you are unable to locate the licence and re-use information, please contact the Rights and Permissions team.
About this article
Cite this article
Liu, D., Wang, S., Yin, Z. et al. The security of decoy state protocol in the partial photon number splitting attack. Chin. Sci. Bull. 58, 3859–3862 (2013). https://doi.org/10.1007/s11434-013-6037-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11434-013-6037-2