2021
DOI: 10.1002/qute.202000131
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Decoy‐State Protocols for Practical Quantum Key Distribution Systems

Abstract: The decoy-state protocol enables quantum key distribution (QKD) systems to achieve high performance without using the single-photon source. In the dozen years since the decoy-state protocol has been proposed, a series of advances in scheme design, finite-size analysis, system modelling, and parameter estimation has developed. Unfortunately, most advances are based on different starting points and lack a synthesis to figure out the optimal protocol of decoy-state method. Here, the advances in decoy-state method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 90 publications
(105 reference statements)
0
8
0
Order By: Relevance
“…To further improve the efficiency, the symmetric-blind protocol was proposed by introducing symmetry in operations of two parties and consideration on unsuccessful decoding results [22]. Though f could also be calculated by Equation (6), this protocol used a quite different approach to obtain the desired efficiency f desire , that is, only shortened or punctured bits were used. For each code among the code set, the number of shortened or punctured bits was calculated as follows.…”
Section: Blind Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…To further improve the efficiency, the symmetric-blind protocol was proposed by introducing symmetry in operations of two parties and consideration on unsuccessful decoding results [22]. Though f could also be calculated by Equation (6), this protocol used a quite different approach to obtain the desired efficiency f desire , that is, only shortened or punctured bits were used. For each code among the code set, the number of shortened or punctured bits was calculated as follows.…”
Section: Blind Protocolsmentioning
confidence: 99%
“…Then, some syndrome bits of these syndromes are used to initialize the punctured bits of the frames in L 2 , and the others are transmitted together with the syndromes of L 2 to Bob. Let T represent the set of punctured bits in L 2 that are initialized by the syndrome bits from L 1 (e.g., T = {x 3,1 , x 3,u , x 3,v , x 3,v+1 } in Figure 2), the efficiency of our protocol can be calculated according to Equation (6) as…”
Section: Bob Alicementioning
confidence: 99%
See 1 more Smart Citation
“…IM2 and an electronic variable optical attenuator (EVOA) of Alice and Bob modulate the intensity of pulses for decoy-state technology [60][61][62][63][64]. In our system, the three-intensity decoy-state method is used and these three intensities are denoted by µ, ν, ω, respectively.…”
Section: Experimental Systemmentioning
confidence: 99%
“…Entanglement is a critical concept employed in a variety of applications, including quantum teleportation (QT) [1][2][3], quantum secret sharing (QSS) [4][5][6], quantum key distribution (QKD) [7][8][9][10], and quantum information theory [11,12].…”
Section: Introductionmentioning
confidence: 99%