Online ISSN:1349-8606
Progress in Informatics  
No.8 March 2011  
Page 57-63  
 
Passive preparation of BB84 signal states with coherent light
Marcos CURTY, Xiongfeng MA, Hoi-Kwong LO and Norbert LÜTKENHAUS

LINK [1] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys., vol.74, pp.145-195, 2002.

LINK [2] V. Scarani, H. Bechmann-Pasquinucci, N. J.Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,”Rev. Mod. Phys., vol.81, pp.1301-1350, 2009.

LINK [3] G. S. Vernam, “Cipher printing telegraph systems for secret wire and radiotelegraphic communications,” J. Amer. Inst. Elec. Eng., vol.45, pp.109-115, 1926.

LINK [4] C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and cointossing,” in Proc. IEEE Int. Conference on Computers, Systems and Signal Processing,Bangalore, India, IEEE Press, New York, pp.175-179, 1984.

LINK [5] H. Inamori, N. Lütkenhaus, and D. Mayers, “Unconditional security of practical quantum key distribution,”Eur. Phys. J. D, vol.41, no.3, pp.599-627, 2007.

LINK [6] D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distributionwith imperfect devices,” Quantum Inf. Comput., vol.4, pp.325-360, 2004.

LINK [7] W.-Y. Hwang, “Quantum key distribution with high loss: toward global securecommunication,”Phys. Rev. Lett., vol.91, 057901, 2003.

LINK [8] H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,”Phys. Rev. Lett., vol.94, 230504, 2005.

LINK [9] X.-B. Wang, “Beating the photon-number-splitting attack in practical quantumcryptography,” Phys. Rev. Lett., vol.94, 230503, 2005.

LINK [10] J. G. Rarity, P. C. M. Owens, and P. R. Tapster, “Quantum random-number generation and key sharing,”J. Mod. Opt., vol.41, no.12, pp.2435-2444, 1994.

LINK [11] W. Mauerer and C. Silberhorn, “Quantum key distribution with passive decoy state selection,”Phys. Rev. A, vol.75, 050305(R), 2007.

LINK [12] Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution withparametric down-conversion,” Phys. Rev.Lett., vol.99, 180503, 2007.

LINK [13] M. Curty, T. Moroder, X. Ma, and N. Lütkenhaus,“Non-Poissonian statistics from Poissonian lightsources with application to passive decoy statequantum key distribution,” Opt. Lett., vol.34, pp.3238-3240, 2009.

LINK [14] Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto,“Boosting up quantum key distribution by learning statistics of practical single-photon sources,”New J. Phys., vol.11, 113033, 2009.

LINK [15] M. Curty, X. Ma, B. Qi, and T. Moroder, “Passive decoy-state quantum key distribution with practical light sources,”Phys. Rev. A, vol.81, 022310, 2010.

LINK [16] W. Tittel, J. Brendel, H. Zbinden, and N. Gisin,“Quantum cryptography usingentangled photons in energy-time Bell states,”Phys. Rev. Lett., vol.84, pp.4737-4740, 2000.

LINK [17] M. Curty, X. Ma, H.-K-Lo, and N. Lütkenhaus, “Passive sources for the Bennett-Brassard 1984 quantumkey distribution protocol with practical signals,” preprint arXiv:1009.3830.

LINK [18] K. Peterman, Laser Diode Modulation and Noise, Kluwer Academic Publishers, New York, 1991.ISBN: 978-0792312048.

LINK [19] M. Jofre, A. Gardelein, G. Anzolin, G. Molina-Terriza, J. P. Torres, M. W. Mitchell,and V. Pruneri, “100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm,”J. of Lightwave Tech., vol.28, no. 17, pp.2572-2578, 2010.

LINK [20] T. Moroder, M. Curty, and N. Lütkenhaus, “One-way quantum key distribution: simple upper bound on the secret key rate,”Phys. Rev. A, vol.74, 052301, 2006.

LINK [21] N. Lütkenhaus, “Estimates for practical quantum cryptography,” Phys. Rev. A, vol.59, pp.3301-3319, 1999.

LINK [22] N. J. Beaudry, T. Moroder, and N. Lütkenhaus,“Squashing models for optical measurements in quantum communication,”Phys. Rev.Lett., vol.101, 093601, 2008.

LINK [23] H.-K. Lo, H. F. C. Chau, and M. Ardehali,“Efficient quantum key distribution scheme and a proof of Its unconditional security,”J. Cryptology, vol.18, pp.133-165, 2005.