2019
DOI: 10.1103/physreva.99.032309
|View full text |Cite|
|
Sign up to set email alerts
|

Experimental study of four-state reference-frame-independent quantum key distribution with source flaws

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…Unlike the standard RFI-QKD, it is only necessary to prepare four encoding states instead of six encoding states for the LT-RFI-QKD. Moreover, the experimental result [24,25] demonstrates that this protocol can resist both SPF and a misaligned reference frame. However, in this protocol, there is also an unrealistic qubit assumption that the single photon signal sent by Alice is a qubit (qubit assumption), i.e., the encoded state must be in two-dimensional space.…”
Section: Introductionmentioning
confidence: 87%
“…Unlike the standard RFI-QKD, it is only necessary to prepare four encoding states instead of six encoding states for the LT-RFI-QKD. Moreover, the experimental result [24,25] demonstrates that this protocol can resist both SPF and a misaligned reference frame. However, in this protocol, there is also an unrealistic qubit assumption that the single photon signal sent by Alice is a qubit (qubit assumption), i.e., the encoded state must be in two-dimensional space.…”
Section: Introductionmentioning
confidence: 87%
“…Note that the above state require a complete characterization. In practice, they can be estimated from a set of experimental data that minimize the key rate [34,[36][37][38]. Here, we simply assume θ 1 =θ 2 which can be attributed to the rotation angle β.…”
Section: Numerical Simulationsmentioning
confidence: 99%
“…For example, all quantum states should be prepared perfectly without flaws, while this can not be satisfactorily met with practical encoding devices, which will compromise the security of practical MDI-QKD systems. Recently, in order to relax assumptions on the encoding systems, several protocols have been proposed and demonstrated experimentally [27][28][29][30][31][32][33][34][35][36][37][38]. In particular, by exploiting the rejected-data analysis, Tamaki et al [34] proposed a loss-tolerant method to incorporate state preparation flaws in two-dimensional Hilbert space, which has been generalized to MDI-QKD [37].…”
Section: Introductionmentioning
confidence: 99%
“…The blue dash lines in FIG. 4 illustrate the simulated results with N t = 10 13 [5,10,18,25]. In principle, the C value and the secure key rate reach the maximum value with θ ∈ {0, π/2, π, 3π/2} and drop to the minimum value with θ ∈ {π/4, 3π/4, 7π/4}.…”
mentioning
confidence: 95%
“…Quantum key distribution (QKD) has the potential to generate the information-theoretical-secure keys between distant users (Alice and Bob) [1][2][3]. Since the first BB84 protocol proposed [4], QKD has stepped into realistic applications from the laboratory [5][6][7][8][9][10][11]. The communication distance of QKD over different communication scenarios is significantly improved, such as 509 km with fiber link [12], 4600 km space-to-ground communication network [13], 1 km optical-relayed entanglement distribution over drones [14].…”
mentioning
confidence: 99%