OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 15, Iss. 13 — Jun. 25, 2007
  • pp: 8465–8471

Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security

J. F. Dynes, Z. L. Yuan, A. W. Sharpe, and A. J. Shields  »View Author Affiliations

Optics Express, Vol. 15, Issue 13, pp. 8465-8471 (2007)

View Full Text Article

Enhanced HTML    Acrobat PDF (645 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



Experimental one-way decoy pulse quantum key distribution running continuously for 60 hours is demonstrated over a fiber distance of 20km. We employ a decoy protocol which involves one weak decoy pulse and a vacuum pulse. The obtained secret key rate is on average over 10kbps. This is the highest rate reported using this decoy protocol over this fiber distance and duration.

© 2007 Optical Society of America

OCIS Codes
(060.4510) Fiber optics and optical communications : Optical communications
(270.0270) Quantum optics : Quantum optics
(270.5290) Quantum optics : Photon statistics

ToC Category:
Quantum Optics

Original Manuscript: May 4, 2007
Revised Manuscript: June 15, 2007
Manuscript Accepted: June 18, 2007
Published: June 22, 2007

J. F. Dynes, Z. L. Yuan, A. W. Sharpe, and A. J. Shields, "Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security," Opt. Express 15, 8465-8471 (2007)

Sort:  Year  |  Journal  |  Reset  


  1. N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys. 74, 145-195 (2002). [CrossRef]
  2. C. H. Bennett and G. Brassard, "Quantum cryptography: public key distribution and coin tossing," in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, (IEEE, New York, 1984), pp. 175179.
  3. C. H. Bennett, F. Bessette, G. Brassard, L. Savail and J. Smolin, "Experimental quantum cryptography," J. Cryptol. 53-28 (1992).
  4. D. Stucki, N. Gisin, O. Guinnard, G. Ribordy and H. Zbinden, "Quantum key distribution over 67km with a plug & play system," New J. Phys. 4 41.1-41.8 (2002). [CrossRef]
  5. C. Gobby, Z. L. Yuan and A. J. Shields, "Quantum key distribution over 122km of standard telecom fiber," Appl. Phys. Lett. 84, 3762-3764 (2004). [CrossRef]
  6. X.-B. Wang, "Beating the photon pulse-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett. 94, 230503-1-4 (2005) and H.-K. Lo, X. Ma and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett. 94, 230504-1-4 (2005). [CrossRef] [PubMed]
  7. G. Brassard, N. L¨utkenhaus, T. Mor and B. C. Sanders, "Limits on practical quantum cryptography," Phys. Rev. Lett. 85, 1330-1333 (2000). [CrossRef] [PubMed]
  8. W.-Y. Hwang, "Quantum key distribution with high loss: toward global secure communication," Phys. Rev. Lett. 91, 057901-1-4 (2003). [CrossRef] [PubMed]
  9. D. Gottesman, H.-K. Lo, N. Lutkenhaus and J. Preskill, "Security of quantum key distribution with imperfect devices," Quant. Inf. Comp. 5, 325-360 (2004).
  10. Y. Zhao, B. Qi, X. Ma, H.-K. Lo and L. Qian, "Experimental quantum key distribution with decoy states," Phys. Rev. Lett. 96, 070502-1-4 (2006). [CrossRef] [PubMed]
  11. Z. L. Yuan, A. W. Sharpe and A. J. Shields, "Unconditionally secure one-way quantum key distribution using decoy pulses," Appl. Phys. Lett. 90, 011118-1-3 (2007). [CrossRef]
  12. C. Gobby, Z. L. Yuan and A. J. Shields, Elec. Lett. "Unconditionally secure quantum key distribution over 50 km of standard telecom fiber," Electron. Lett. 40, 1603-1605 (2004). [CrossRef]
  13. X. Ma, B. Qi, Y. Zhao and H.-K. Lo, "Practical decoy state for quantum key distribution," Phys. Rev. A 72, 012306-1-15 (2005). [CrossRef]
  14. C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-Xin. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang and J.-W. Pan, "Experimental long-distance decoy-state quantum key distribution based on polarization encoding," Phys. Rev. Lett. 98, 010505-1-4 (2007). [CrossRef] [PubMed]
  15. D. Rosenberg, J. W. Harrington, P. R. Rice, P. A. Hiskett, C. G. Peterson, R. J. Hughes, A. E. Lita, S-W. Nam and J. E. Nordholt, "Long-distance decoy-State quantum key distribution in optical fiber," Phys. Rev. Lett. 98, 010505-1-4 (2007). [CrossRef]
  16. G. Ribordy, J. D. Gautier, H. Zbinden, and N. Gisin, "Performance of InGaAs/InP avalanche photodiodes as gated-mode photon counters," Appl. Opt. 37, 2272 (1998). [CrossRef]
  17. M. Hayashi, "Upper bounds of eavesdropper’s performances in finite-length code with decoy method," quantph/ 0702250 (2007).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1. Fig. 2. Fig. 3.
Fig. 4.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited