2018
DOI: 10.1103/physreva.98.052336
|View full text |Cite
|
Sign up to set email alerts
|

Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
36
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(37 citation statements)
references
References 33 publications
1
36
0
Order By: Relevance
“…We chose this specific block size as it corresponds to the overall detection events in the computational basis over a period of 30 seconds, meaning that the acquisition time of our block is exactly 30 seconds. Note that the secret key rate per core shown in Figure 4 a) is obtained only from each core raw key through finite key analysis [34,35,37], meaning that error correction and privacy amplification effects are taken into account but not actually implemented and that the obtained key rates also consider fluctuations given by the finite statistics. These rates show an average of 2.86 Mbit s −1 ± 4.37 kbit s −1 leading to a total multiplexed rate of 105.7 Mbit s −1 .…”
Section: Resultsmentioning
confidence: 99%
“…We chose this specific block size as it corresponds to the overall detection events in the computational basis over a period of 30 seconds, meaning that the acquisition time of our block is exactly 30 seconds. Note that the secret key rate per core shown in Figure 4 a) is obtained only from each core raw key through finite key analysis [34,35,37], meaning that error correction and privacy amplification effects are taken into account but not actually implemented and that the obtained key rates also consider fluctuations given by the finite statistics. These rates show an average of 2.86 Mbit s −1 ± 4.37 kbit s −1 leading to a total multiplexed rate of 105.7 Mbit s −1 .…”
Section: Resultsmentioning
confidence: 99%
“…In Fig. 4 we present the in-field performances of our QKD scheme in terms of quantum bit error rate (QBER) achieved in both measurement bases and final secret key rate (SKR) evaluated with a finite-key analysis [24]. We started testing states exchange with the fiber completely dark, i.e.…”
Section: Resultsmentioning
confidence: 99%
“…Laser Q: continuous wave laser at 1560.61 nm; Laser C: continuous wave laser at 1536.61 nm; IM: intensity modulator; PM: phase modulator; BS: beam splitter; VOA: variable optical attenuator; DWDM: dense wavelength division multiplexing filter; DLI: delay-line interferemoter; SPAD: single-photon avalanche detector; APD: avalanche photodiode. In the green square we reported the three quantum states prepared by Alice and propagated through the channel (WCPs) are prepared instead of single photons, a very efficient one-decoy state scheme can be implemented in order to detect photon number splitting attacks [24][25][26]. The SKR length ( ) per privacy amplification block is given by the following formula:…”
Section: Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…The error correction was performed with a Cascade algorithm [20], with an efficiency of 1.05. The compression factor was calculated over a privacy amplification block of 8 • 10 6 bits and taking into account finitekey effects [21].…”
mentioning
confidence: 99%