2022
DOI: 10.1016/j.scib.2022.10.010
|View full text |Cite
|
Sign up to set email alerts
|

Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
47
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 86 publications
(47 citation statements)
references
References 65 publications
0
47
0
Order By: Relevance
“…However, the appearance of Shor’s algorithm [ 7 ] and Grover’s algorithm [ 8 ] threatened the security of classical cryptography protocols based on difficult mathematical problems. To cope with this problem, people considered using the principles of quantum mechanics in cryptography protocols, which led to the birth of various interesting research fields, such as quantum key distribution (QKD) [ 9 , 10 , 11 , 12 ], quantum secret sharing (QSS) [ 13 , 14 ] and, the area of research in which this article is based, secure multi-party quantum computation (SMQC). Of these, the QKD field has made many notable advances.…”
Section: Introductionmentioning
confidence: 99%
“…However, the appearance of Shor’s algorithm [ 7 ] and Grover’s algorithm [ 8 ] threatened the security of classical cryptography protocols based on difficult mathematical problems. To cope with this problem, people considered using the principles of quantum mechanics in cryptography protocols, which led to the birth of various interesting research fields, such as quantum key distribution (QKD) [ 9 , 10 , 11 , 12 ], quantum secret sharing (QSS) [ 13 , 14 ] and, the area of research in which this article is based, secure multi-party quantum computation (SMQC). Of these, the QKD field has made many notable advances.…”
Section: Introductionmentioning
confidence: 99%
“…To date, almost all quantum communication protocols such as QKD [44][45][46][47][48][49][50][51][52][53][54], QSS [55,56] and quantum conference key agreement [55,57] aim at generating quantum keys with perfect secrecy and correctness. Thereafter, these keys are then used to finish the corresponding cryptographic tasks such as private communication, secret sharing and group encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, users in a MDI-QKD network can share expensive detectors, and the topology of MDI-QKD is naturally suitable for deployment in star-type networks. Additionally, side-channel-secure QKD has recently been experimentally realized, which is not only MDI but also immune to potential source imperfections [35,36]. However, the key rates of most forms of QKD are fundamentally bounded by the secret key capacity of repeaterless QKD [37][38][39][40] due to photon loss in the channel.…”
Section: Introductionmentioning
confidence: 99%