2020
DOI: 10.1103/physreva.102.032604
|View full text |Cite
|
Sign up to set email alerts
|

Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 23 publications
0
15
0
2
Order By: Relevance
“…Besides, γ A 1 F 1 F 2 B 2 can be obtained by rearranging the elements in γ A 1 B 2 F 1 F 2 shown in Equation (18). Therefore, the key rate over a fast-fading channel can be determined using Equation (9).…”
Section: The Secret Key Rate Of Conventional Detector Model Against F...mentioning
confidence: 99%
See 1 more Smart Citation
“…Besides, γ A 1 F 1 F 2 B 2 can be obtained by rearranging the elements in γ A 1 B 2 F 1 F 2 shown in Equation (18). Therefore, the key rate over a fast-fading channel can be determined using Equation (9).…”
Section: The Secret Key Rate Of Conventional Detector Model Against F...mentioning
confidence: 99%
“…Due to development over the last three decades, QKD can be divided into discrete-variable QKD based on single photon detection, and continuous-variable QKD (CV-QKD) based on coherent detection [4][5][6][7]. Due to the simpler detection method, CV-QKD has higher compatibility with the existing optical communication systems [8], and the transmission distance achieved recently can support the requirement in metropolitan distances [9,10], which facilitates the large-scale application of QKD [11][12][13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…In the asymptotic case mentioned above, the secure analysis is performed with the premise that the length of the data is infinite, which is impossible in practice. Therefore, considering the finite-size effect in security analysis is necessary for practical implementations [38][39][40]. In the finite-size regime, we need to estimate the unknown parameters, including the channel transmittance and channel noise.…”
Section: Finite-size Regimementioning
confidence: 99%
“…Quantum key distribution (QKD), which allows two legal parties, Alice and Bob, to share a set of secret key, may be manipulated by an eavesdropper, called Eve [1][2][3][4][5]. Currently, discrete-variable (DV) QKD has been developed, but it still faces challenges regarding the source preparation, the detection cost, and the secret key rate [6,7]. Continuousvariable (CV) QKD is another approach to actualizing QKD [8][9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%