It has been shown that secure key distribution is possible even with a Poissonian light source and threshold detectors.
I will review the outline of decoy state method for finite length data, and examine issues for implementation.
Careful characterization of the apparatus is necessary to realize efficient key generation.