2020
DOI: 10.1038/s42005-020-00415-0
|View full text |Cite
|
Sign up to set email alerts
|

Optimized protocol for twin-field quantum key distribution

Abstract: Twin-field quantum key distribution (TF-QKD) and its variant protocols are highly attractive due to the advantage of overcoming the rate-loss limit for secret key rates of point-to-point QKD protocols. For variations of TF-QKD, the key point to ensure security is switching randomly between a code mode and a test mode. Among all TF-QKD protocols, their code modes are very different, e.g. modulating continuous phases, modulating only two opposite phases, and sending or not sending signal pulses. Here we show tha… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 31 publications
0
18
0
Order By: Relevance
“…Essentially, this is the approach of Ref. [23]. However, note that if Alice and Bob use continuous phase-randomization, the probability that they select exactly the same phase θ is zero, and the resulting protocol is not implementable in practice.…”
Section: Estimation Of E Phsamementioning
confidence: 99%
See 3 more Smart Citations
“…Essentially, this is the approach of Ref. [23]. However, note that if Alice and Bob use continuous phase-randomization, the probability that they select exactly the same phase θ is zero, and the resulting protocol is not implementable in practice.…”
Section: Estimation Of E Phsamementioning
confidence: 99%
“…Here, we use the same test-mode phase-postselection idea as in Ref. [23], but we employ discrete phase randomization, which results in a protocol that is actually implementable. In this case, Eq.…”
Section: Estimation Of E Phsamementioning
confidence: 99%
See 2 more Smart Citations
“…An earlier security analysis of discrete phase randomization appears in the decoy state Bennet-Brassard-1984 (BB84) in Reference [ 33 ], which points out, when the number of discrete phase values is larger, that the performance of discrete phase randomization is close to that of continuous phase randomization, and the number is said to be ten [ 33 ]. Similar security analysis methods are used for several other protocols, the measurement-device-independent (MDI) QKD in Reference [ 34 ], the NPP-TF-QKD in References [ 35 , 36 ], the SNS-TF-QKD in Reference [ 37 ], the PM-QKD in Reference [ 38 ]. Therein, Reference [ 38 ] uses a different security poof method with Reference [ 8 ], and there is no in-depth formula derivation in the decoy state PM-QKD with discrete phase randomization.…”
Section: Introductionmentioning
confidence: 99%