We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to improve the security of the scheme and enhance its resilience to the photon-number-splitting attack. This protocol relies on the non-commutation of photon phase and number to detect an eavesdropper performing quantum non-demolition measurement on number. The potential advantages and disadvantages of this scheme are compared to the coherent decoy state protocol.

© 2012 Optical Society of America

PDF Article
More Like This
Optimal Individual Attacks against BB84

R. Garcia-Patron, F. N. C. Wong, and J. H. Shapiro
QWC6 International Conference on Quantum Information (ICQI) 2008

Complete Physical Simulation of the Entangling-probe Attack on the BB84 Protocol

Taehyun Kim, Ingo Stork genannt Wersborg, Franco N. C. Wong, and Jeffrey H. Shapiro
QML6 Quantum Electronics and Laser Science Conference (QELS) 2007

Practical High-Dimensional Quantum Key Distribution with Decoy States

Darius Bunandar, Zheshen Zhang, Jeffrey Shapiro, and Dirk R. Englund
FF1A.2 CLEO: QELS_Fundamental Science (CLEO_QELS) 2015


You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
Login to access Optica Member Subscription