Resource state structure for controlled quantum key distribution
نویسندگان
چکیده
منابع مشابه
Decoy state quantum key distribution.
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most...
متن کاملDecoy State Quantum Key Distribution
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditional...
متن کاملPractical decoy state for quantum key distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution QKD . Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol ...
متن کاملLimited Resource Semi-Quantum Key Distribution
A semi-quantum key distribution (SQKD) protocol allows a quantum user and a limited “classical” user to establish a shared secret key secure against an allpowerful adversary. In this work, we present a new SQKD protocol where the quantum user is also limited in her measurement capabilities. We describe the protocol, prove its security, and show its noise tolerance is as high as “fully quantum” ...
متن کاملPassive Decoy State Quantum Key Distribution
The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The European Physical Journal D
سال: 2020
ISSN: 1434-6060,1434-6079
DOI: 10.1140/epjd/e2020-100488-8