2019
DOI: 10.1088/1367-2630/ab5a97
|View full text |Cite
|
Sign up to set email alerts
|

Practical issues of twin-field quantum key distribution

Abstract: Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications. However, there are still some gaps between theory and practice in these protocols. Concretely, a finite-key size analysis is still missing, and the intensity fluctuations are not taken into account. To address the finite-key size effect, we first give the key rate of NPP-TFQKD against colle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 51 publications
0
21
0
Order By: Relevance
“…By taking the upper and lower bounds of , we can tightly bound the detection yields and errors, and improve the key rate calculations. [35] 3.3.4.4. Optimizing Decoys: The security proofs of TF-QKD usually assume the use of infinite number of decoys.…”
Section: Misalignmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…By taking the upper and lower bounds of , we can tightly bound the detection yields and errors, and improve the key rate calculations. [35] 3.3.4.4. Optimizing Decoys: The security proofs of TF-QKD usually assume the use of infinite number of decoys.…”
Section: Misalignmentsmentioning
confidence: 99%
“…[26][27][28][29][30][31] Also, to accelerate the application of TF-QKD, numerous works have investigated its feasibility in practical conditions such as finite key analysis, asymmetric transmission distances, and so on. [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48] Furthermore, efforts have been made in developing new experimental techniques to realize TF-QKD. [49][50][51][52][53][54][55] This article serves to survey recent developments in QKD overcoming the linear secret key capacity bound.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum key distribution (QKD) [1][2][3][4][5][6][7][8][9][10] can provide secure private communication between two remote parties, Alice and Bob. In the recent years, the efficiency and security of QKD in practice have been extensively studied, for example very recently the important idea named twin-field (TF) QKD [11], and its variants [12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…The very recently proposed TF QKD [11], together with its variants [12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27], changes the key rate into square root scale of the channel transmittance. The protocol can overcome the linear scaling of QKD…”
Section: Introductionmentioning
confidence: 99%
“…According to whether or not to perform phase post-selection in the test mode, we introduce two protocols. To prove their security, we establish a universal framework against collective attacks, which can be extended to robust against coherent attacks 23 with the technique in ref. 24 .…”
mentioning
confidence: 99%