2016
DOI: 10.1103/physreva.93.022330
|View full text |Cite
|
Sign up to set email alerts
|

Detector-decoy quantum key distribution without monitoring signal disturbance

Abstract: The round-robin differential phase-shift quantum key distribution protocol provides a secure way to exchange private information without monitoring conventional disturbances and still maintains a high tolerance of noise, making it desirable for practical implementations of quantum key distribution. However, photon number resolving detectors are required to ensure that the detected signals are single photons in the original protocol. Here, we adopt the detector-decoy method and give the bounds to the fraction o… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 32 publications
0
18
0
Order By: Relevance
“…where , is the channel transmittance, and D is the distance of optical fibre. For the RRDPS protocol, the Y n and can be given by 61 62 63 …”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…where , is the channel transmittance, and D is the distance of optical fibre. For the RRDPS protocol, the Y n and can be given by 61 62 63 …”
Section: Methodsmentioning
confidence: 99%
“…Finally, we perform a numerical simulation to study the performance of six-state SARG04 with weak coherent states in an infinite decoy states setting. Also, we compare the performance of six-state SARG04 and other prepare-and-measure QKD protocols, i.e., BB84 1 43 , four-state SARG04 48 52 , and round-robin differential phase-shift (RRDPS) QKD protocols 61 62 63 in the same situation.…”
mentioning
confidence: 99%
“…Here, we assume that the interference measurement and location measurement can discriminate the detection signal exactly coming from a single photon. It is the similar assumption in the round-robin differential phase-shift quantum key distribution [7] and can be solved by using the detector-decoy method [8]. Charlie announces a successful detection when one and only one photon is clicked both in Fig.…”
Section: Security Analysismentioning
confidence: 99%
“…Quantum internet holds numerous advantages over the classical internet in distributing, sharing and processing information [1,2]. Quantum internet consists of quantum networks for quantum computing and quantum communication, with quantum computing offering high calculation speeds [3,4] and quantum communication providing robust security [5][6][7][8]. In the realm of quantum communication, besides quantum key distribution which has been well developed on the way to practical applications recently [9][10][11][12][13][14], quantum secret sharing (QSS) is another cryptographic primitive used for multiparty quantum communication in quantum internet.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, many proof-of-principle experimental demonstrations of the RRDPS protocols have been presented [10,11,12,13]. There are also several theoretical follow-ups that considered source flaws in the RRDPS protocol [14] and its extensions to other QKD scenarios [15,16].…”
Section: Introductionmentioning
confidence: 99%