2020 IEEE International Symposium on Information Theory (ISIT) 2020
DOI: 10.1109/isit44484.2020.9174522
|View full text |Cite
|
Sign up to set email alerts
|

A Two-way QKD Protocol Outperforming One-way Protocols at Low QBER

Abstract: Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considerably higher quantum bit error rates (QBER) than one-way protocols. However, when QBER is low, only modest key rate gains have been achieved. This is one of the major obstacles for using two-way protocols. In this paper we introduce a new two-way QKD protocol which overcomes this shortcoming. Under the assumption that the eavesdropper can only perform individual symmetric quantum attacks, our protocol performs qua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…A notable example of symmetric key distribution to produce and distribute secret keys is quantum key distribution (QKD) setting [7], [14], [23], [29]. In QKD the nonorthogonal states of a quantum system provide correlated observations of randomness for end users [23].…”
Section: A Related Workmentioning
confidence: 99%
“…A notable example of symmetric key distribution to produce and distribute secret keys is quantum key distribution (QKD) setting [7], [14], [23], [29]. In QKD the nonorthogonal states of a quantum system provide correlated observations of randomness for end users [23].…”
Section: A Related Workmentioning
confidence: 99%
“…We present a key growing protocol; Alice and Bob start with some existing secret key. A similar protocol was discussed in [15] in a QKD setting. In the source model setting, the key rate analysis, and thus the privacy amplification step changes completely.…”
Section: Advantage Distillation With Secret Keys From Parity Bitsmentioning
confidence: 99%
“…Step 9 are fed to the protocol and the protocol terminates after a predetermined number of rounds, after which round M + 1 is separately treated.With M = 1 the protocol is similar to the QKD protocol of [11]. The distinct difference to the QKDprotocols [11], [15] is in Step 8, which will be addressed next.…”
Section: Correct Parity Bitmentioning
confidence: 99%
See 2 more Smart Citations