2015
DOI: 10.3390/e17052723
|View full text |Cite
|
Sign up to set email alerts
|

Finite Key Size Analysis of Two-Way Quantum Cryptography

Abstract: Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. Here, we overview a security proof for two-way quantum key distribution protocols, against the most general eavesdropping attack, that utilize an entropic uncertainty relation. Then, by resorting to the "sm… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…In particular, entangled photon two-way protocols based on two [ 4 ] (also called a ping-pong (pp) protocol) and four ( Ψ ∓ , Φ ∓ ) [ 6 ] Bell states, on the one hand and a single photon deterministic Lucamarini-Mancini (LM05) protocol, on the other [ 1 , 19 ]. Several varieties, modifications, and generalisations of the latter protocol are given in [ 11 , 12 , 24 , 27 ]. Two varieties were implemented in [ 7 ] and [ 14 ].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, entangled photon two-way protocols based on two [ 4 ] (also called a ping-pong (pp) protocol) and four ( Ψ ∓ , Φ ∓ ) [ 6 ] Bell states, on the one hand and a single photon deterministic Lucamarini-Mancini (LM05) protocol, on the other [ 1 , 19 ]. Several varieties, modifications, and generalisations of the latter protocol are given in [ 11 , 12 , 24 , 27 ]. Two varieties were implemented in [ 7 ] and [ 14 ].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, entangled photon two-way protocols based on two [ 7 ] (also called a ping-pong (pp) protocol) and four ( ) [ 8 ] Bell states, on the one hand and a single photon deterministic Lucamarini–Mancini (LM05) protocol, on the other [ 9 , 10 ]. Several varieties, modifications, and generalisations of the latter protocol are given in [ 11 , 12 , 13 , 14 ]. Two varieties were implemented in [ 15 , 16 ].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, entangled photon twoway protocols based on two [7] (also called a ping-pong (pp) protocol) and four (Ψ ∓ , Φ ∓ ) [8] Bell states, on the one hand and a single photon deterministic Lucamarini-Mancini (LM05) protocol, on the other [9,10]. Several varieties, modifications, and generalisations of the latter protocol are given in [11][12][13][14]. Two varieties were implemented in [15] and [16].…”
Section: Introductionmentioning
confidence: 99%