Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian,“Experimental quantum key distribution with decoy states,” Phys. Rev. Lett. 96,070502 (2006).

[Crossref]
[PubMed]

A. Soujaeff, S. Takeuchi, K. Sasaki, T. Hasegawa, and M. Matsui, “Heralded single photon source at 1550 nm from pulsed parametric downconversion,” quant-ph/0611112, (2006).

M. Hayashi, “Practical evaluation of security for quantum key distribution,” Phys. Rev. A 74,022307 (2006).

[Crossref]

A. Trifonov and A. Zavriyev,“Secure communication with a heralded single-photon source,” J. Opt. B 7,S772–S777 (2005).

[Crossref]

K. Inoue and T. Honjo, “Robustness of differential-phase-shift quantum key distribution against photon-numbersplitting attack,” Phys. Rev. A 71,042305(2005).

[Crossref]

H.-K. Lo, X. Ma, and K. Chen,“Decoy state quantum key distribution,” Phys. Rev. Lett. 94,230504 (2005).

[Crossref]
[PubMed]

Ryo Okamoto, Shigeki Takeuchi, and Keiji Sasaki, “Detailed analysis of a single-photon source using gated spontaneous parametric downconversion,” J. Opt. Soc. Am. B 22,2393–2401 (2005).

[Crossref]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett. 92,0579014 (2004).

[Crossref]

Shigeki Takeuchi, Ryo Okamoto, and Keiji Sasaki,“High-yield single-photon source using gated spontaneous parametric downconversion,” Appl. Opt. 43 ,5708–5711 (2004).

[Crossref]
[PubMed]

D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,Quantum inf. comput. 4,325–360 (2004).

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74,145–195 (2002).

[Crossref]

E. Waks, A. Zeevi, and Y. Yamamoto, “Security of quantum key distribution with entangled photons against individual attacks,” Phys. Rev. A 65,052310 (2002).

[Crossref]

G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85,1330–1333 (2000).

[Crossref]
[PubMed]

H. Briegel, W. Dür, J. I. Cirac, and P. Zoller,“Quantum repeaters: the role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81,5932–5935 (1998).

[Crossref]

P. Townsend, J. G. Rarity, and P. R. Tapster, “Single photon interference in a 10 km long optical fiber interferometer,” Electron. Lett. 29,634–639 (1993a).

[Crossref]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5,3–28 (1992).

[Crossref]

C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett. 68,3121–3124 (1992).

[Crossref]
[PubMed]

H. K. Hong and L. Mandel, “Experimental realization of a localized one-photon state,” Phys. Rev. Lett. 56,58–60 (1986).

[Crossref]
[PubMed]

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett. 92,0579014 (2004).

[Crossref]

Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution with parametric down-conversion,” quant-ph/0610118, (2006).

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett. 68,3121–3124 (1992).

[Crossref]
[PubMed]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5,3–28 (1992).

[Crossref]

C.H. Bennett and G. Brassard, in proceedings of the IEEE International Conference on Computers, Systems and Signals Processing, (Institute of Electrical and Electronics Engineers, New York1984), pp.175–179.

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5,3–28 (1992).

[Crossref]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85,1330–1333 (2000).

[Crossref]
[PubMed]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5,3–28 (1992).

[Crossref]

C.H. Bennett and G. Brassard, in proceedings of the IEEE International Conference on Computers, Systems and Signals Processing, (Institute of Electrical and Electronics Engineers, New York1984), pp.175–179.

H. Briegel, W. Dür, J. I. Cirac, and P. Zoller,“Quantum repeaters: the role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81,5932–5935 (1998).

[Crossref]

H.-K. Lo, X. Ma, and K. Chen,“Decoy state quantum key distribution,” Phys. Rev. Lett. 94,230504 (2005).

[Crossref]
[PubMed]

H. Briegel, W. Dür, J. I. Cirac, and P. Zoller,“Quantum repeaters: the role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81,5932–5935 (1998).

[Crossref]

H. Briegel, W. Dür, J. I. Cirac, and P. Zoller,“Quantum repeaters: the role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81,5932–5935 (1998).

[Crossref]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett. 92,0579014 (2004).

[Crossref]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74,145–195 (2002).

[Crossref]

D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,Quantum inf. comput. 4,325–360 (2004).

A. Soujaeff, S. Takeuchi, K. Sasaki, T. Hasegawa, and M. Matsui, “Heralded single photon source at 1550 nm from pulsed parametric downconversion,” quant-ph/0611112, (2006).

M. Hayashi, “Practical evaluation of security for quantum key distribution,” Phys. Rev. A 74,022307 (2006).

[Crossref]

H. K. Hong and L. Mandel, “Experimental realization of a localized one-photon state,” Phys. Rev. Lett. 56,58–60 (1986).

[Crossref]
[PubMed]

K. Inoue and T. Honjo, “Robustness of differential-phase-shift quantum key distribution against photon-numbersplitting attack,” Phys. Rev. A 71,042305(2005).

[Crossref]

Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution with parametric down-conversion,” quant-ph/0610118, (2006).

K. Inoue and T. Honjo, “Robustness of differential-phase-shift quantum key distribution against photon-numbersplitting attack,” Phys. Rev. A 71,042305(2005).

[Crossref]

M. Koashi, “Efficient quantum key distribution with practical sources and detectors,” quant-ph/0609180, (2006).

Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution with parametric down-conversion,” quant-ph/0610118, (2006).

Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian,“Experimental quantum key distribution with decoy states,” Phys. Rev. Lett. 96,070502 (2006).

[Crossref]
[PubMed]

H.-K. Lo, X. Ma, and K. Chen,“Decoy state quantum key distribution,” Phys. Rev. Lett. 94,230504 (2005).

[Crossref]
[PubMed]

D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,Quantum inf. comput. 4,325–360 (2004).

D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,Quantum inf. comput. 4,325–360 (2004).

G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85,1330–1333 (2000).

[Crossref]
[PubMed]

Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian,“Experimental quantum key distribution with decoy states,” Phys. Rev. Lett. 96,070502 (2006).

[Crossref]
[PubMed]

H.-K. Lo, X. Ma, and K. Chen,“Decoy state quantum key distribution,” Phys. Rev. Lett. 94,230504 (2005).

[Crossref]
[PubMed]

H. K. Hong and L. Mandel, “Experimental realization of a localized one-photon state,” Phys. Rev. Lett. 56,58–60 (1986).

[Crossref]
[PubMed]

A. Soujaeff, S. Takeuchi, K. Sasaki, T. Hasegawa, and M. Matsui, “Heralded single photon source at 1550 nm from pulsed parametric downconversion,” quant-ph/0611112, (2006).

G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85,1330–1333 (2000).

[Crossref]
[PubMed]

Ryo Okamoto, Shigeki Takeuchi, and Keiji Sasaki, “Detailed analysis of a single-photon source using gated spontaneous parametric downconversion,” J. Opt. Soc. Am. B 22,2393–2401 (2005).

[Crossref]

Shigeki Takeuchi, Ryo Okamoto, and Keiji Sasaki,“High-yield single-photon source using gated spontaneous parametric downconversion,” Appl. Opt. 43 ,5708–5711 (2004).

[Crossref]
[PubMed]

D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,Quantum inf. comput. 4,325–360 (2004).

Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian,“Experimental quantum key distribution with decoy states,” Phys. Rev. Lett. 96,070502 (2006).

[Crossref]
[PubMed]

Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian,“Experimental quantum key distribution with decoy states,” Phys. Rev. Lett. 96,070502 (2006).

[Crossref]
[PubMed]

P. Townsend, J. G. Rarity, and P. R. Tapster, “Single photon interference in a 10 km long optical fiber interferometer,” Electron. Lett. 29,634–639 (1993a).

[Crossref]

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett. 92,0579014 (2004).

[Crossref]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74,145–195 (2002).

[Crossref]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5,3–28 (1992).

[Crossref]

G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85,1330–1333 (2000).

[Crossref]
[PubMed]

A. Soujaeff, S. Takeuchi, K. Sasaki, T. Hasegawa, and M. Matsui, “Heralded single photon source at 1550 nm from pulsed parametric downconversion,” quant-ph/0611112, (2006).

Ryo Okamoto, Shigeki Takeuchi, and Keiji Sasaki, “Detailed analysis of a single-photon source using gated spontaneous parametric downconversion,” J. Opt. Soc. Am. B 22,2393–2401 (2005).

[Crossref]

Shigeki Takeuchi, Ryo Okamoto, and Keiji Sasaki,“High-yield single-photon source using gated spontaneous parametric downconversion,” Appl. Opt. 43 ,5708–5711 (2004).

[Crossref]
[PubMed]

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett. 92,0579014 (2004).

[Crossref]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5,3–28 (1992).

[Crossref]

A. Soujaeff, S. Takeuchi, K. Sasaki, T. Hasegawa, and M. Matsui, “Heralded single photon source at 1550 nm from pulsed parametric downconversion,” quant-ph/0611112, (2006).

A. Soujaeff, S. Takeuchi, K. Sasaki, T. Hasegawa, and M. Matsui, “Heralded single photon source at 1550 nm from pulsed parametric downconversion,” quant-ph/0611112, (2006).

Ryo Okamoto, Shigeki Takeuchi, and Keiji Sasaki, “Detailed analysis of a single-photon source using gated spontaneous parametric downconversion,” J. Opt. Soc. Am. B 22,2393–2401 (2005).

[Crossref]

Shigeki Takeuchi, Ryo Okamoto, and Keiji Sasaki,“High-yield single-photon source using gated spontaneous parametric downconversion,” Appl. Opt. 43 ,5708–5711 (2004).

[Crossref]
[PubMed]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

P. Townsend, J. G. Rarity, and P. R. Tapster, “Single photon interference in a 10 km long optical fiber interferometer,” Electron. Lett. 29,634–639 (1993a).

[Crossref]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74,145–195 (2002).

[Crossref]

P. Townsend, J. G. Rarity, and P. R. Tapster, “Single photon interference in a 10 km long optical fiber interferometer,” Electron. Lett. 29,634–639 (1993a).

[Crossref]

A. Trifonov and A. Zavriyev,“Secure communication with a heralded single-photon source,” J. Opt. B 7,S772–S777 (2005).

[Crossref]

E. Waks, A. Zeevi, and Y. Yamamoto, “Security of quantum key distribution with entangled photons against individual attacks,” Phys. Rev. A 65,052310 (2002).

[Crossref]

Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution with parametric down-conversion,” quant-ph/0610118, (2006).

E. Waks, A. Zeevi, and Y. Yamamoto, “Security of quantum key distribution with entangled photons against individual attacks,” Phys. Rev. A 65,052310 (2002).

[Crossref]

A. Trifonov and A. Zavriyev,“Secure communication with a heralded single-photon source,” J. Opt. B 7,S772–S777 (2005).

[Crossref]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74,145–195 (2002).

[Crossref]

E. Waks, A. Zeevi, and Y. Yamamoto, “Security of quantum key distribution with entangled photons against individual attacks,” Phys. Rev. A 65,052310 (2002).

[Crossref]

Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian,“Experimental quantum key distribution with decoy states,” Phys. Rev. Lett. 96,070502 (2006).

[Crossref]
[PubMed]

H. Briegel, W. Dür, J. I. Cirac, and P. Zoller,“Quantum repeaters: the role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81,5932–5935 (1998).

[Crossref]

P. Townsend, J. G. Rarity, and P. R. Tapster, “Single photon interference in a 10 km long optical fiber interferometer,” Electron. Lett. 29,634–639 (1993a).

[Crossref]

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5,3–28 (1992).

[Crossref]

A. Trifonov and A. Zavriyev,“Secure communication with a heralded single-photon source,” J. Opt. B 7,S772–S777 (2005).

[Crossref]

S. Fasel, O. Alibart, A. Beveratos, S. Tanzilli, H. Zbinden, P. Baldi, and N. Gisin,“High-quality asynchronous heralded single-photon source at telecom wavelength,” New J. of Phys. 6,163 (2004).

[Crossref]

E. Waks, A. Zeevi, and Y. Yamamoto, “Security of quantum key distribution with entangled photons against individual attacks,” Phys. Rev. A 65,052310 (2002).

[Crossref]

K. Inoue and T. Honjo, “Robustness of differential-phase-shift quantum key distribution against photon-numbersplitting attack,” Phys. Rev. A 71,042305(2005).

[Crossref]

M. Hayashi, “Practical evaluation of security for quantum key distribution,” Phys. Rev. A 74,022307 (2006).

[Crossref]

C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett. 68,3121–3124 (1992).

[Crossref]
[PubMed]

H.-K. Lo, X. Ma, and K. Chen,“Decoy state quantum key distribution,” Phys. Rev. Lett. 94,230504 (2005).

[Crossref]
[PubMed]

Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian,“Experimental quantum key distribution with decoy states,” Phys. Rev. Lett. 96,070502 (2006).

[Crossref]
[PubMed]

G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85,1330–1333 (2000).

[Crossref]
[PubMed]

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett. 92,0579014 (2004).

[Crossref]

H. Briegel, W. Dür, J. I. Cirac, and P. Zoller,“Quantum repeaters: the role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81,5932–5935 (1998).

[Crossref]

H. K. Hong and L. Mandel, “Experimental realization of a localized one-photon state,” Phys. Rev. Lett. 56,58–60 (1986).

[Crossref]
[PubMed]

D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,Quantum inf. comput. 4,325–360 (2004).

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74,145–195 (2002).

[Crossref]

A. Soujaeff, S. Takeuchi, K. Sasaki, T. Hasegawa, and M. Matsui, “Heralded single photon source at 1550 nm from pulsed parametric downconversion,” quant-ph/0611112, (2006).

Using a model presented in reference [10, 11, 16], we estimated the average number of photon pairs μ at the crystal output to be 0.168 at the maximum pump power (195 mW), and 3 pairs event probability at the crystal ouput to be a fraction equal to 0.056 of the two pairs generation probability for this pump power.

C.H. Bennett and G. Brassard, in proceedings of the IEEE International Conference on Computers, Systems and Signals Processing, (Institute of Electrical and Electronics Engineers, New York1984), pp.175–179.

M. Koashi, “Efficient quantum key distribution with practical sources and detectors,” quant-ph/0609180, (2006).

Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution with parametric down-conversion,” quant-ph/0610118, (2006).