2019
DOI: 10.1103/physrevx.9.021046
|View full text |Cite
|
Sign up to set email alerts
|

Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System

Abstract: With the help of quantum key distribution (QKD), two distant peers are able to share information-theoretically secure key bits. Increasing key rate is ultimately significant for the applications of QKD in lossy channel. However, it has proved that there is a fundamental rate-distance limit, named linear bound, which limits the performance of all existing repeaterless protocols and realizations. Surprisingly, a recently proposed protocol, called twinfield (TF) QKD can beat linear bound with no need of quantum r… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
113
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 188 publications
(114 citation statements)
references
References 33 publications
1
113
0
Order By: Relevance
“…is the Shannon entropy, Figure 1. In Alice and Bob's side, The laser-modules can prepare initial phase locked weak coherent pulses with the help of the phaselocking module belongs to Charlie [16]. The phase-modulators(PM) are apply to encode key bits in code mode and randomize the phase of WCPs in decoy mode.…”
Section: Protocol Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…is the Shannon entropy, Figure 1. In Alice and Bob's side, The laser-modules can prepare initial phase locked weak coherent pulses with the help of the phaselocking module belongs to Charlie [16]. The phase-modulators(PM) are apply to encode key bits in code mode and randomize the phase of WCPs in decoy mode.…”
Section: Protocol Definitionmentioning
confidence: 99%
“…phase-matching QKD [10], sending-or-not-sending QKD [11] and no phase post-selection TF-QKD(NPP-TFQKD) [12][13][14], are simpler. Indeed, both the sendingor-not-sending QKD and NPP-TFQKD have been scuccessfully demonstrated [15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Since a rigorous security proof is not provided in the original proposal, several papers have improved the protocol and provided security proof [6][7][8][9][10]. Also, recently there have been multiple reports of TF-QKD demonstrated experimentally [11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…They devised an MDI-QKD type protocol-called twin-field QKD (TF-QKD)-in which the untrusted central node performs a single-photon interference measurement on the two incoming pulses, causing the key rate to scale with the square-root of the channel transmittance by using simple optical devices. Since the original proposal, several variants of the TF-QKD protocol were proven to be secure [18][19][20][21][22][23] and some of them were experimentally implemented [24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%