2020
DOI: 10.1103/physrevapplied.13.064013
|View full text |Cite
|
Sign up to set email alerts
|

Symmetry-Protected Privacy: Beating the Rate-Distance Linear Bound Over a Noisy Channel

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
65
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 45 publications
(68 citation statements)
references
References 32 publications
3
65
0
Order By: Relevance
“…The security analysis of asymptotic case is considered, so there are no statistical fluctuations. The analysis method of the phase error rate that we use comes from [ 39 ], which is an important new viewpoint of QKD security, establishing the relationship between the symmetric encoding and privacy with the standard phase-error-correction approach [ 40 ], and we summarize briefly as follows.…”
Section: The Protocol Of Pm-qkdmentioning
confidence: 99%
See 3 more Smart Citations
“…The security analysis of asymptotic case is considered, so there are no statistical fluctuations. The analysis method of the phase error rate that we use comes from [ 39 ], which is an important new viewpoint of QKD security, establishing the relationship between the symmetric encoding and privacy with the standard phase-error-correction approach [ 40 ], and we summarize briefly as follows.…”
Section: The Protocol Of Pm-qkdmentioning
confidence: 99%
“…If the joint state is a pure of even or odd state, the symmetric encoding PM-QKD protocol is perfectly private, the phase error rate , if the joint state is a mixture of even and odd state, , the phase error rate , the effective detection ratios of odd and even components of signal state are estimated by [ 39 ] where is the total gain of mixture signal state . and are the yield of odd signal state and even signal state , respectively.…”
Section: The Protocol Of Pm-qkdmentioning
confidence: 99%
See 2 more Smart Citations
“…The key rate at different transmission distances for PM-QKD is shown as the blue solid line in Figure 2, which scales to √ . PLOB bound [16] Single repeater bound [56] Decoy-state BB84 [60] Decoy-state MDI-QKD [61] PM-QKD [74] NPP-TF-QKD [29] SNS-TF-QKD [73] Figure 2. Simulation of key rates for various protocols.…”
Section: Proving Its Securitymentioning
confidence: 99%