2020
DOI: 10.1103/physreva.101.052318
|View full text |Cite
|
Sign up to set email alerts
|

Efficient decoy states for the reference-frame-independent measurement-device-independent quantum key distribution

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…However, we can do nothing about the stronger PNS attack, which retains the gain of signal and decoy state, such as a partial PNS attack [ 15 ], because the premise of the derivation no longer holds, and the Type II error probability of our method in this case will be poor even close to unity. For this reason, compared with the existing decoy-state method [ 29 , 30 , 31 ] to directly estimate the secure key rate, our method is not ready for practical application now; however, we provide a new direction to improve the secure key rate and efficiency.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we can do nothing about the stronger PNS attack, which retains the gain of signal and decoy state, such as a partial PNS attack [ 15 ], because the premise of the derivation no longer holds, and the Type II error probability of our method in this case will be poor even close to unity. For this reason, compared with the existing decoy-state method [ 29 , 30 , 31 ] to directly estimate the secure key rate, our method is not ready for practical application now; however, we provide a new direction to improve the secure key rate and efficiency.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…In MDI-QKD, Alice and Bob do not need to perform measurement operations, so it can be innately immune to all detection attacks. MDI-QKD combined with the decoy-state method can resist both source attacks and detection attacks; thus, decoy-state MDI-QKD [ 29 , 30 , 31 ] is one of the most promising QKD protocols, which can provide unconditional secure keys in practical applications.…”
Section: Introductionmentioning
confidence: 99%
“…[13] This protocol not only simplifies the operation of existing devices, but can also be applied to new scenarios, such as earth-to-satellite links and integrated photonic waveguides, which have recently attracted significant attention. [14][15][16][17] In a QKD system, the communication distance may increase to 100 km or more. If the signals are transmitted through separate channels in different fibres, the efficiency of the fibres will be reduced, which will lead to temporal deviation between different signals.…”
Section: Introductionmentioning
confidence: 99%