2010
DOI: 10.1103/physreva.82.052318
|View full text |Cite
|
Sign up to set email alerts
|

Counterfactual quantum key distribution with high efficiency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
47
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(47 citation statements)
references
References 22 publications
0
47
0
Order By: Relevance
“…Though counterfactual quantum cryptography may not be so useful for long-distance communication, it is interesting conceptually [104,105]. Schemes to improve the efficiency of counterfactual quantum key distribution protocols [106,107], security analysis of such schemes under various attacks such as intercept-resend and counterfactual attacks [108][109][110], experimental realisation using different set-ups [25,111,112], direct communication protocols [113] and counterfactual generation and distribution of entanglement [114] have contributed towards better understanding of applying counterfactuality. The basic idea of the direct communication protocol is to ensure counterfactual transfer of information using the chained beamsplitter approach mentioned earlier.…”
Section: Counterfactual Quantum Cryptographymentioning
confidence: 99%
“…Though counterfactual quantum cryptography may not be so useful for long-distance communication, it is interesting conceptually [104,105]. Schemes to improve the efficiency of counterfactual quantum key distribution protocols [106,107], security analysis of such schemes under various attacks such as intercept-resend and counterfactual attacks [108][109][110], experimental realisation using different set-ups [25,111,112], direct communication protocols [113] and counterfactual generation and distribution of entanglement [114] have contributed towards better understanding of applying counterfactuality. The basic idea of the direct communication protocol is to ensure counterfactual transfer of information using the chained beamsplitter approach mentioned earlier.…”
Section: Counterfactual Quantum Cryptographymentioning
confidence: 99%
“…In 2009, Noh proposed a QKD protocol [ 27 ] inspired by the counterfactual phenomena in quantum world [ 28 ] and the counterfactual computation [ 29 ]. The next year, Sun et al proposed a high efficiency version of counterfactual QKD utilizing more beam splitters [ 30 ]. The same year, Yin et al proved the security of Noh’s protocol strictly [ 31 ].…”
Section: Introductionmentioning
confidence: 99%
“…Since the proposal of the counterfactual key distribution protocol Noh-2009 (N09) [8], there has been an upsurge of interest in this area, leading to contributions devoted to improving its efficiency [9,10], to security considerations under various attacks [11][12][13], to modified communication schemes [14,15], applications [16][17][18] and experimental proposals or realizations [19].…”
Section: Introductionmentioning
confidence: 99%