2020
DOI: 10.1103/physrevapplied.14.014051
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 67 publications
(42 citation statements)
references
References 27 publications
0
37
0
Order By: Relevance
“…Besides potential increases in noise tolerance, highdimensional systems afford other advantages, namely that greater communication efficiency is possible per signal (meaning potentially more bits may be sent per signal due to the increased dimension). Such systems are experimentally feasible also through, for example, time-bin encoding [42], [43], or space division multiplexing [44] just to list some examples. Finally, some protocols, such as the so-called "round-robin" protocol [38] actually allow users to bound Eve's information based only on the dimension instead of the observed noise.…”
Section: Transactions On Ieeementioning
confidence: 99%
“…Besides potential increases in noise tolerance, highdimensional systems afford other advantages, namely that greater communication efficiency is possible per signal (meaning potentially more bits may be sent per signal due to the increased dimension). Such systems are experimentally feasible also through, for example, time-bin encoding [42], [43], or space division multiplexing [44] just to list some examples. Finally, some protocols, such as the so-called "round-robin" protocol [38] actually allow users to bound Eve's information based only on the dimension instead of the observed noise.…”
Section: Transactions On Ieeementioning
confidence: 99%
“…In order to increase the signal to noise ratio, that is, the contrast with respect to the background of the photons emitted in CW, it is often necessary to set up a cascade of two intensity modulators, with a consequent doubling of the carving signals, which need to be perfectly synchronized to enable their tandem operation. [82,83] The use of mode-locked lasers would therefore simplify the source [84,85] but still this implementation would suffer of the second drawback, that is, the phase coherence between the train of pulses. As explained in Section 1, phase randomization is central for the secure implementation of the WCP BB84 protocol.…”
Section: Phase Randomized Pulse Sources For Qrngs and Qkdmentioning
confidence: 99%
“…The equation for the secret key length is [34]: The secret key length is defined as the number of secret key bits that are created in a privacy amplification block of length n Z . The terms D Z 0 and D Z 1 are the lower bounds for the vacuum and single-photons events in the Z basis, respectively; the function H(•) is the high dimensional entropy; the term φ Z represents the upper bound on the phase error in the Z basis; λ EC is the number of discarded bits during the error correction procedure, and the terms sec and cor are the secrecy and correctness parameters.…”
Section: Quantum Protocolmentioning
confidence: 99%