Mixed basis quantum key distribution with linear optics
نویسندگان
چکیده
منابع مشابه
Mixed basis quantum key distribution with linear optics
Two-qubit quantum codes have been suggested to obtain better efficiency and higher loss tolerance in quantum key distribution. Here, we propose a two-qubit quantum key distribution protocol based on a mixed basis consisting of two Bell states and two states from the computational basis. All states can be generated from a single entangled photon pair resource by using local operations on only on...
متن کاملQuantum Key Distribution with Continuous Variables in Optics
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of quantum limited, CW light beams carry the key information. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of the security and efficiency of the scheme.
متن کاملQuantum Key Distribution Using Three Basis States
This note presents a method of public key distribution using quantum communication of n photons that simultaneously provides a high probability that the bits have not been tampered. It is a three-state variant of the quantum method of Bennett and Brassard (BB) where the detector also has three states. It provides superior performance (in terms of the number of usable key bits) for n < 18m, wher...
متن کاملQuantum Computation with Linear Optics
We present a constructive method to translate small quantum circuits into their optical analogues, using linear components of present-day quantum optics technology only. These optical circuits perform precisely the computation that the quantum circuits are designed for, and can thus be used to test the performance of quantum algorithms. The method relies on the representation of several quantum...
متن کاملDecoy-state quantum key distribution with biased basis choice
We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation res...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Optics Express
سال: 2017
ISSN: 1094-4087
DOI: 10.1364/oe.25.023545