2014
DOI: 10.1007/s40509-014-0003-9
|View full text |Cite
|
Sign up to set email alerts
|

Quantum key distribution using sequential weak values

Abstract: We propose a new secure key distribution method that utilizes the properties of the sequential weak values of a quantum observable to prevent eavesdropping. Unlike all previous protocols, the security of this QKD protocol does not rely on the no-cloning theorem or on the spatial nonlocality of entangled states. The robustness of the protocol to detector dark counts and optical losses is investigated and is found to compare favorably with BB84. While this new protocol has the drawback of a very low secure key g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…Including an additional linear transformation in the scheme we can generalized it to the case of two states chosen from two different mutually unbiased bases. This scheme might be suitable for quantum cryptography, and indeed, very recently a method based on sequential weak measurements was suggested for secure key distribution [33].…”
Section: Ii2 Distinguishing Between Two Nonorthogonal Vectorsmentioning
confidence: 99%
“…Including an additional linear transformation in the scheme we can generalized it to the case of two states chosen from two different mutually unbiased bases. This scheme might be suitable for quantum cryptography, and indeed, very recently a method based on sequential weak measurements was suggested for secure key distribution [33].…”
Section: Ii2 Distinguishing Between Two Nonorthogonal Vectorsmentioning
confidence: 99%