Secure quantum key distribution with decoy-BB84 protocol
Date/Time: 27th May 2009 / 15:00-16:00 - ()
Speaker: Dr. A. Tomita (Nano Electronics Res. Labs., NEC)
It has been shown that secure key distribution is possible even with a Poissonian light source and threshold detectors.
I will review the outline of decoy state method for finite length data, and examine issues for implementation.
Careful characterization of the apparatus is necessary to realize efficient key generation.