2022
DOI: 10.1103/prxquantum.3.020315
|View full text |Cite
|
Sign up to set email alerts
|

Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 162 publications
(67 citation statements)
references
References 91 publications
0
66
0
1
Order By: Relevance
“…Note added to proof. After we submitted our work for reviewing, we became aware of a relevant work by Xie et al 59…”
Section: Methodsmentioning
confidence: 99%
“…Note added to proof. After we submitted our work for reviewing, we became aware of a relevant work by Xie et al 59…”
Section: Methodsmentioning
confidence: 99%
“…We propose a system that uses an adaptive technique in Appendix B , while we need to investigate the specific performance in our scheme. At the same time, we will consider using asynchronous time multiplexing technology [ 34 , 35 ], which idea is based on adaptive techniques, to further improve our scheme through enhancing the secure key rate under multi-user scenarios.…”
Section: Secure Key Ratementioning
confidence: 99%
“…In the experiment, we utilize four-intensity decoy-state quantum key distribution to generate the secret keys for the QDS processes in our QBA protocol [52]. We note that networks using any quantum key distribution protocols [53][54][55][56][57][58] can serve as the basis for our QBA scheme. There are five independent users, A, B, C, D and E. The secret keys of different pairwise users are pre-generated in the laboratory via a fibre spool.…”
Section: Experimental Implementationmentioning
confidence: 99%