2019
DOI: 10.1088/0256-307x/36/10/100302
|View full text |Cite
|
Sign up to set email alerts
|

Four-State Modulation in Middle of a Quantum Channel for Continuous-Variable Quantum Key Distribution Protocol with Noiseless Linear Amplifier*

Abstract: We characterize a modified continuous-variable quantum key distribution (CV-QKD) protocol with four states in the middle of a quantum channel. In this protocol, two noiseless linear amplifiers (NLAs) are inserted before each detector of the two parts, Alice and Bob, with the purpose of increasing the secret key rate and the maximum transmission distance. We present the performance analysis of the new four-state CV-QKD protocol over a Gaussian lossy and noisy channel. The simulation results show that the NLAs w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 31 publications
(38 reference statements)
0
1
0
Order By: Relevance
“…[1] Since the first QKD protocol was proposed in 1984, [2] it has been widely concerned theories and experiment. [3][4][5][6][7][8][9][10][11][12][13] However, in applications, the unsatisfactory equipment may lead to some vulnerabilities that can be attacked, [14,15] mainly in the light source at the transmitter and detector at the receiver. As a countermeasure, the decoy-state protocol [16,17] settle the security issue of photon number splitting (PNS), and measurement device independent (MDI) QKD protocol is immune to all attacks against the vulnerabilities of detectors.…”
Section: Introductionmentioning
confidence: 99%
“…[1] Since the first QKD protocol was proposed in 1984, [2] it has been widely concerned theories and experiment. [3][4][5][6][7][8][9][10][11][12][13] However, in applications, the unsatisfactory equipment may lead to some vulnerabilities that can be attacked, [14,15] mainly in the light source at the transmitter and detector at the receiver. As a countermeasure, the decoy-state protocol [16,17] settle the security issue of photon number splitting (PNS), and measurement device independent (MDI) QKD protocol is immune to all attacks against the vulnerabilities of detectors.…”
Section: Introductionmentioning
confidence: 99%