Secure quantum key distribution with decoy-BB84 protocol

Date/Time: 27th May 2009 / 15:00-16:00 - ()

Speaker: Dr. A. Tomita (Nano Electronics Res. Labs., NEC)

It has been shown that secure key distribution is possible even with a Poissonian light source and threshold detectors. I will review the outline of decoy state method for finite length data, and examine issues for implementation. Careful characterization of the apparatus is necessary to realize efficient key generation.