2013
DOI: 10.1103/physreva.88.062302
|View full text |Cite
|
Sign up to set email alerts
|

Security of two-way quantum key distribution

Abstract: Quantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channel have been proposed as an alternative route to the same goal, with the potential advantage of outperforming one-way protocols. Here we provide a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper. We utilize an entropic uncerta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
129
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 83 publications
(131 citation statements)
references
References 40 publications
2
129
0
Order By: Relevance
“…It is however more resource demanding as it requires the use of a quantum memory on Bob's side. Our description of SDC here follows closely that of [5]. Very simply, the SDC protocol sees Bob sending half a Bell pair to Alice (while storing the other half in a quantum memory) for her to encode by virtue of a randomly chosen unitary transformation from the set containing the identity operator and the three Pauli operators, {I, σ x , σ y , σ z }.…”
Section: Two-way Protocolsmentioning
confidence: 99%
See 4 more Smart Citations
“…It is however more resource demanding as it requires the use of a quantum memory on Bob's side. Our description of SDC here follows closely that of [5]. Very simply, the SDC protocol sees Bob sending half a Bell pair to Alice (while storing the other half in a quantum memory) for her to encode by virtue of a randomly chosen unitary transformation from the set containing the identity operator and the three Pauli operators, {I, σ x , σ y , σ z }.…”
Section: Two-way Protocolsmentioning
confidence: 99%
“…In the original LM05 protocol, apart from p X = p Z , only two unitary transformations were considered, namely the passive I and iσ y . In [5], a generalization was made to include another two unitary transformation, namely the σ x and σ z , and the possibility of having different probabilities p X and p Z . In this protocol, upon executing her unitary transformation, Alice would resubmit the qubit to Bob who would measure in the same basis he prepared in.…”
Section: Two-way Protocolsmentioning
confidence: 99%
See 3 more Smart Citations