2010
DOI: 10.1007/s11128-010-0213-y
|View full text |Cite
|
Sign up to set email alerts
|

Quantum key distribution via tripartite coherent states

Abstract: We propose a quantum key distribution protocol using Greenberger Horne Zeilinger tripartite coherent states. The sender and the receiver share similar key by exchanging the correlation coherent states, without basis reconciliation. This allows the protocol to have a transmission efficiency of 100% in a perfect quantum channel. The security of the protocol is ensured by tripartite coherent states correlation and homodyne detection, which allows to detect any eavesdropping easily.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(25 citation statements)
references
References 39 publications
0
25
0
Order By: Relevance
“…While this is sufficient, it does not seem necessary to use Bell states. In fact in QKD and random number generation, as mentioned previously, other types of states can also be used [27,28,[47][48][49] and so it is interesting to examine if this is also the case for verification. Here, interestingly, we show that under reasonable assumptions about the verification protocol, the entangled states must be unitarily equivalent to Bell states.…”
Section: Verification From Partially Entangled Statesmentioning
confidence: 99%
“…While this is sufficient, it does not seem necessary to use Bell states. In fact in QKD and random number generation, as mentioned previously, other types of states can also be used [27,28,[47][48][49] and so it is interesting to examine if this is also the case for verification. Here, interestingly, we show that under reasonable assumptions about the verification protocol, the entangled states must be unitarily equivalent to Bell states.…”
Section: Verification From Partially Entangled Statesmentioning
confidence: 99%
“…It is worth noting that, at q −→ 1, C q i(jk) −→ C i(jk) , where C q i(jk) represents the concurrence for the deformed tripartite state, and C i(jk) [24] is the concurrence for the usual (nondeformed) tripartite state.…”
Section: Deformed Bosonic Coherent State and Concurrencementioning
confidence: 99%
“…However, a while ago and in some cases it may even be possible to measure exactly this rate limit to define exactly this quantity due to the detector imperfection and the environment effect. Moreover, a recent quantum protocol is presented in [24], where a new scheme is proposed for sharing a quantum key based on tripartite coherent states.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This advantage makes that quantum cryptography can be used to distribute secret key so that the key has the property of perfect secrecy. Now, although quantum cryptography is best known for its applications in key distribution protocols [6,7], quantum techniques can also assist in the achievement of quantum authentication protocols [8,9,[10][11][12]. In this paper, we mainly focus on the study of quantum authentication protocols.…”
Section: Introductionmentioning
confidence: 99%