2014
DOI: 10.1038/nature13303
|View full text |Cite
|
Sign up to set email alerts
|

Practical quantum key distribution protocol without monitoring signal disturbance

Abstract: Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

5
364
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 315 publications
(371 citation statements)
references
References 27 publications
5
364
0
2
Order By: Relevance
“…Intuitively, Eve seems to have some control over the generation of index i, though it was shown by a virtual measurement scheme proposed in Ref. [10] that her control is in fact rather limited. Therefore, it is possible to ignore the signal disturbance and analyze errors, namely the privacy amplification, based only on the outcomes of Alice and Bob.…”
Section: Methods a Rrdps-qkd Protocolmentioning
confidence: 99%
See 4 more Smart Citations
“…Intuitively, Eve seems to have some control over the generation of index i, though it was shown by a virtual measurement scheme proposed in Ref. [10] that her control is in fact rather limited. Therefore, it is possible to ignore the signal disturbance and analyze errors, namely the privacy amplification, based only on the outcomes of Alice and Bob.…”
Section: Methods a Rrdps-qkd Protocolmentioning
confidence: 99%
“…In standard calculations, it holds that H ER = h(e b ) and H PA = h(e ph ), where h(x) is the Shannon entropy h(x) = −x log 2 x − (1 − x) log 2 (1 − x), e b and e ph are the bit error rate and phase error rate. In our computations, we inspect specifically the key rate per pulse, with its formula written as [10] …”
Section: Key Ratementioning
confidence: 99%
See 3 more Smart Citations