2022
DOI: 10.1103/physreva.105.012603
|View full text |Cite
|
Sign up to set email alerts
|

Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 29 publications
1
7
0
Order By: Relevance
“…For quantitative assessment of the PNS attack, a comparison is made between the theoretically calculated system error by considering the statistical estimate of the system parameters and the experimentally determined total error in communication. A parameter 𝓀 is defined for the purpose and is evaluated using the equation (33). It is ultimately used to determine the fractional error in communication and, in turn, the rate of failure.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For quantitative assessment of the PNS attack, a comparison is made between the theoretically calculated system error by considering the statistical estimate of the system parameters and the experimentally determined total error in communication. A parameter 𝓀 is defined for the purpose and is evaluated using the equation (33). It is ultimately used to determine the fractional error in communication and, in turn, the rate of failure.…”
Section: Resultsmentioning
confidence: 99%
“…Another important aspect as pointed out in [33] is that all the practical QKD protocols, even decoy state protocol, when realized with attenuated laser pulses, always assume Poisson distribution for the number of photons present in each pulse. It is not guaranteed that the emission from practical laser sources may always meet the criterion.…”
Section: Resultsmentioning
confidence: 99%
“…However, the standard BB84 protocol [ 8 ] is not practical since it is not feasible to generate strings of truly perfect single photons efficiently [ 20 ]. The decoy-state method [ 14 , 21 , 22 , 23 ] was proposed to use a few different photon intensities to perform almost as well as a single photon. Different configurations [ 24 , 25 ] of decoy states and the length of keys [ 26 ] would also affect the secret key rates.…”
Section: Preliminariesmentioning
confidence: 99%
“…This at the price of increasing the fabrication cost and the complexity of the process. A possible solution is suggested by a recent work [ 7 ] that demonstrates decoy state QKD using arbitrary photon statistics. Such an option opens the way to the employment of non-laser sources in silicon chips, such as the SOI LED photon source based on Er-O complexes presented in this work.…”
Section: Introductionmentioning
confidence: 99%