2017
DOI: 10.1364/optica.4.000163
|View full text |Cite
|
Sign up to set email alerts
|

Long-distance quantum key distribution secure against coherent attacks

Abstract: Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted. Remarkably, no assumptions have to be made on the capabilities of an eavesdropper other than that she is bounded by the laws of Nature, thus making the security of QKD "unconditional". However, unconditional security is hard to achieve in practice. For example, any experimental realisatio… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
96
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 163 publications
(98 citation statements)
references
References 68 publications
1
96
0
1
Order By: Relevance
“…Although, in general, Alice can use an arbitrary number of intensity settings to prepare her decoy states in the protocol, for simplicity and without loss of generality, in this work we shall consider, just as an example, a threeintensity decoy-state BB84 protocol with a biased basis choice [17,18], which is the most implemented solution for long-distance QKD experiments [19][20][21][22][23][24][25]. In addition, we shall assume that Alice and Bob distill a secret key only from those events where both of them select the Z basis and Alice selects the signal intensity, which typically corresponds to the largest intensity.…”
Section: Assumptions and Decoy-state Bb84 Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Although, in general, Alice can use an arbitrary number of intensity settings to prepare her decoy states in the protocol, for simplicity and without loss of generality, in this work we shall consider, just as an example, a threeintensity decoy-state BB84 protocol with a biased basis choice [17,18], which is the most implemented solution for long-distance QKD experiments [19][20][21][22][23][24][25]. In addition, we shall assume that Alice and Bob distill a secret key only from those events where both of them select the Z basis and Alice selects the signal intensity, which typically corresponds to the largest intensity.…”
Section: Assumptions and Decoy-state Bb84 Protocolmentioning
confidence: 99%
“…where N χ denotes the number of events where Alice sends a pulse in the χ basis and Bob measures it also in the χ basis, we obtain represents the conditional expected number of events where Alice selects the intensity γ j and sends Bob an n-photon pulse, and Bob's detectors click given that both Alice and Bob select the χ basis. We will denote it by  g c | n click, , j and, with this notation, equation (24) has the following form: If we consider the case where l=k, then equation (25) can be rewritten as follows:…”
Section: C1 Asymptotic Limitmentioning
confidence: 99%
“…Practically, any eavesdropper (i.e., commonly known as Eve) attempting to acquire information between Alice and Bob will disturb the quantum state of the encrypted data and thus can be detected by the bona fide users according to the noncloning theorem [8] by monitoring the disturbance in terms of quantum bit-error ratio (QBER) or excess noise. The quest for long distance and high bit-rate quantum encrypted transmission using optical fibers [9] has led researchers to investigate a range of methods [10,11]. Two standard techniques have been implemented for encrypted transmission over standard single mode fiber (SSMF), that is, DV-QKD [12,13] and CV-QKD [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…In such scheme, the spontaneous Raman scattering (SRS) noise generated by classical optical signals is the dominant impairment for quantum signals [6]. The SRS noise can be suppressed by three major techniques including simultaneous filtering in the time and frequency domains [7], increasing the spectral interval between quantum and classical signals [8], and decreasing the launched power of classical optical communication [9].…”
Section: Introductionmentioning
confidence: 99%