2017
DOI: 10.1103/physreva.96.062335
|View full text |Cite
|
Sign up to set email alerts
|

Experimentally feasible protocol for semiquantum key distribution

Abstract: Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as "QKD with classical Bob" and "QKD with classical Alice" (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with current technology. Here we suggest a new protocol, "Classical Alice with a controllable mirror", that can be experimentall… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
85
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(86 citation statements)
references
References 14 publications
0
85
0
1
Order By: Relevance
“…The first protocol to achieve this is the so-called mirror protocol and it was the first SQKD protocol designed with practical implementation issues in mind [168]. To describe the protocol, we require the use of the Fock basis, where, briefly, we write |i, j to mean a state consisting of i photons in the |0 state and j photons in the |1 state (physically, these may be polarization, time-bin, spatial encoding, or some other encoding as needed by the protocol).…”
Section: Practical Semi-quantummentioning
confidence: 99%
“…The first protocol to achieve this is the so-called mirror protocol and it was the first SQKD protocol designed with practical implementation issues in mind [168]. To describe the protocol, we require the use of the Fock basis, where, briefly, we write |i, j to mean a state consisting of i photons in the |0 state and j photons in the |1 state (physically, these may be polarization, time-bin, spatial encoding, or some other encoding as needed by the protocol).…”
Section: Practical Semi-quantummentioning
confidence: 99%
“…There is a striking improvement in key-rate in the dependent case (especially for MODE-3). Two instances of BB84-XY [2] is most comparable to our protocol in MODE-2; similarly, BB84-XYZ [2] is most comparable to MODE-3.…”
mentioning
confidence: 48%
“…The issues of Measure and Resend discussed above (namely, photon tagging and the multi-photoncounting attack as described) only apply to those protocols implementing the theoretical version of the Measure and Resend operation (consisting of a measurement and recreation of the qubit). Some newer SQKD protocols, in particular the "mirror" protocol introduced in [2], seek to mitigate these attacks by not requiring B to ever destructively measure and then prepare a fresh photon (while still maintaining a mathematical equivalence to the semiquantum model). The techniques used in [2] may be applicable to other semi-quantum protocols, including, perhaps, the one we describe in this work, making semi-quantum a practical possibility.…”
Section: B Practicality Of Semi-quantum Key Distributionmentioning
confidence: 99%
See 2 more Smart Citations