2008
DOI: 10.1016/j.optcom.2008.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Improving the total efficiency of quantum key distribution by comparing Bell states

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 28 publications
0
16
0
Order By: Relevance
“…The early entanglement-based QKDs protocols depend on the use of alternative measurements, where Alice and Bob use several measurement bases and alternate between them randomly, to make the protocols secure against any eavesdropper attack such as Ekert protocol [4]. This approach has been used in several entanglement-swapping-based QKD, see the correlation Equation ( 8), as well as in [11], [12], [13], [14]. There are two main drawbacks of the use of alternative measurements.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The early entanglement-based QKDs protocols depend on the use of alternative measurements, where Alice and Bob use several measurement bases and alternate between them randomly, to make the protocols secure against any eavesdropper attack such as Ekert protocol [4]. This approach has been used in several entanglement-swapping-based QKD, see the correlation Equation ( 8), as well as in [11], [12], [13], [14]. There are two main drawbacks of the use of alternative measurements.…”
Section: Related Workmentioning
confidence: 99%
“…First of all, only a small portion of transmitted/measured quantum states is used to generate the key while the others are for eavesdropper interference detection, which reduces the key-bit rate. Secondly, a quantum memory is required to store the quantum states sequences until Alice(Bob) tells the other party on the grouped qubits indices and on what basis the measurement should be performed, which makes such solutions impractical for limited resources devices [13], [12], [11]. The advantage of such solutions is that these protocols can differentiate between bit-errorrate (related to device malfunction of state incoherence) and quantum-bit-error (related to Eve interference).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, the coding rate reaches unity. The QKD protocol in Reference [ 34 ] exhibits a total efficiency of the communication to come up to 100%, but it does not define an error correction algorithm.…”
Section: Communication Modelmentioning
confidence: 99%
“…In 1999, Shimizu and Imoto [15] proposed the first DSQC protocol, and another DSQC protocol based on single photon two-qubit states was presented by Beige et al in 2002. [16] Thereafter, many advanced DSQC protocols have been already introduced, [17−34] including the protocols using the entangled states, [21][22][25][26][29][30][31][32]34] such as EPR pairs, GHZ states, W states, cluster states and so on, and the proto-cols employing the rearrangement technique of the particle order, [22][23][24][27][28]33] etc.…”
Section: Introductionmentioning
confidence: 99%