2021
DOI: 10.1103/prxquantum.2.040334
|View full text |Cite
|
Sign up to set email alerts
|

Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable Quantum key Distribution with High Excess Noise Tolerance

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 70 publications
(26 citation statements)
references
References 67 publications
0
26
0
Order By: Relevance
“…In the experiment, we utilize four-intensity decoy-state quantum key distribution to generate the secret keys for the QDS processes in our QBA protocol [52]. We note that networks using any quantum key distribution protocols [53][54][55][56][57][58] can serve as the basis for our QBA scheme. There are five independent users, A, B, C, D and E. The secret keys of different pairwise users are pre-generated in the laboratory via a fibre spool.…”
Section: Experimental Implementationmentioning
confidence: 99%
“…In the experiment, we utilize four-intensity decoy-state quantum key distribution to generate the secret keys for the QDS processes in our QBA protocol [52]. We note that networks using any quantum key distribution protocols [53][54][55][56][57][58] can serve as the basis for our QBA scheme. There are five independent users, A, B, C, D and E. The secret keys of different pairwise users are pre-generated in the laboratory via a fibre spool.…”
Section: Experimental Implementationmentioning
confidence: 99%
“…Quantum key distribution (QKD) allows two remote parties, commonly known as Alice and Bob, to share a secure encryption key by exchanging qubits encoded into a single photon [1][2][3] . Since the first QKD protocol was proposed in 1984 [4] , QKD has been successfully demonstrated in many systems and protocols , the more famous of which are the decoy state protocol [14] , measurement-device-independent (MDI) QKD [15][16][17][18] , continuous variable (CV) QKD [19][20][21] , and two-field (TF) QKD [22][23][24][25] . In order to ensure secure communication with many different parties, various QKD networks have been proposed [26][27][28][29][30][31][32][33][34][35] .…”
Section: Introductionmentioning
confidence: 99%
“…Its security is provided by the laws of quantum physics. The existing QKD models are mainly divided into two groups: discrete-variable (DV) schemes 1 ā€“ 9 and continuous-variable (CV) schemes 10 ā€“ 12 . Detailed reviews on these two types of QKD are given in Refs.…”
Section: Introductionmentioning
confidence: 99%