2021
DOI: 10.3390/e23091103
|View full text |Cite
|
Sign up to set email alerts
|

Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources

Abstract: Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD. However, the device imperfections may compromise its practical implementations. The goal of this paper is to make it robust against the state preparation flaws (SPFs) and side channels at the light source. We adopt the sending or not-sending (SNS) TF-QKD protocol to accommodate the SPFs and multiple optical modes in the emitted states.… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Particularly, the sending-or-not-sending (SNS) TF-QKD [ 12 ], as an efficient protocol, can tolerate large misalignment errors even up to in the single-photon interference. In fact, the SNS TF-QKD protocol has made significant progress in theory [ 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 ]. In addition, several experiments on the SNS protocol have also been performed so far [ 26 , 27 , 28 , 29 , 30 , 31 ].…”
Section: Introductionmentioning
confidence: 99%
“…Particularly, the sending-or-not-sending (SNS) TF-QKD [ 12 ], as an efficient protocol, can tolerate large misalignment errors even up to in the single-photon interference. In fact, the SNS TF-QKD protocol has made significant progress in theory [ 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 ]. In addition, several experiments on the SNS protocol have also been performed so far [ 26 , 27 , 28 , 29 , 30 , 31 ].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, QKD has made tremendous progress, which includes the realization of longdistance fiber communication systems [1][2][3][4][5][6][7][8][9][10][11] and the deployment of QKD networks. [12][13][14][15] Although the theoretical assumptions of QKD are impeccable, the actual devices have potential security loopholes, [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34] which seriously threaten the security of QKD.…”
Section: Introductionmentioning
confidence: 99%
“…For the THAs, when Eve injects strong light into Alice and Bob, information leakage can be detected by observing back-reflected light. For both the PMDs and THAs, the state may not be a qubit, the generalized LT (GLT) protocol can solve this problem, [24,25] but the GLT protocol is more complex and requires a lot of calculations. The existing security analysis assumes that the state is independent and identically distributed.…”
Section: Introductionmentioning
confidence: 99%
“…In 1984, Bennett and Brassard [ 2 ] amalgamated the principles of quantum mechanics with classical cryptography, thus presenting the pioneering quantum cryptography protocol. Subsequently, a multitude of quantum cryptography protocols have been put forward, which encompass quantum secret sharing (QSS) [ 3 , 4 ], quantum key distribution (QKD) [ 2 , 5 , 6 , 7 , 8 , 9 , 10 ], quantum private query (QPQ) [ 11 , 12 ], quantum-secure direct communication (QSDC) [ 13 , 14 ], and various others.…”
Section: Introductionmentioning
confidence: 99%