2019
DOI: 10.1063/1.5125700
|View full text |Cite|
|
Sign up to set email alerts
|

Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution

Abstract: We propose and demonstrate a novel protocol for reference frame independent quantum key distribution using six states for Alice and four states for Bob. We show that this protocol can generate a secure key for any possible phase of the entangled state, as long as the variation is small compared to the measurement run, despite the reduced four state measurement in Bob's polarization state analyzer. We perform a proof-of-principle experiment using polarization entangled photon pairs. Despite a rotational phase, … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

4
5

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 29 publications
(35 reference statements)
0
12
0
Order By: Relevance
“…In the first example, we apply our method to the entanglement-based BB84 protocol with an ideal entangled photon source. In the second example, we provide a finite key analysis of six-state four-state protocol [27]. We use both these two examples to demonstrate the effectiveness of our method, compare performances of two algorithms and compare two versions of the EAT (smoothed min-entropy versus sandwiched Rényi entropy).…”
Section: Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first example, we apply our method to the entanglement-based BB84 protocol with an ideal entangled photon source. In the second example, we provide a finite key analysis of six-state four-state protocol [27]. We use both these two examples to demonstrate the effectiveness of our method, compare performances of two algorithms and compare two versions of the EAT (smoothed min-entropy versus sandwiched Rényi entropy).…”
Section: Examplesmentioning
confidence: 99%
“…We then apply our method to several examples. The first example is a simple qubit-based BB84 protocol and the second example is the entanglement-based six-state four-state protocol [27]. We use these two examples to demonstrate behaviors of our algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Beacons can be used to provide alignment information, e.g a linearly polarised laser allows the receiver to compensate for any relative rotation around the line of sight direction. If the change in alignment is slow, reference frame independent protocols can be used to eliminate the need for such alignment steps [283,284]. In CV QKD protocols, the reference frame (local oscillator phase) can be transferred in the form of a strong reference pulse that is transmitted along with the quantum signal (e.g.…”
Section: Timing and Synchronisationmentioning
confidence: 99%
“…We also make some variation on the classical DL04 protocol via introducing σ y basis checking measurement when carrying out the security checking phase while more general checking mode could be considered like having been shown in Ref. [31]. That is, in the modified protocol, DL04-6-state protocol, more information can be obtained from the check phase used to bound the adversary's knowledge of the state shared by Alice and Bob.…”
Section: Applications To Specific Examplesmentioning
confidence: 99%