2019
DOI: 10.1103/physrevapplied.11.034053
|View full text |Cite
|
Sign up to set email alerts
|

Twin-Field Quantum Key Distribution without Phase Postselection

Abstract: Twin-field quantum key distribution (TF-QKD) protocol and its variants, e.g. phase-matching (PM) QKD and TF-QKD based on sending or not sending, are highly attractive since they are able to overcome the well-known rate-loss limit for QKD protocols without repeater: R = O(η) with η standing for the channel transmittance. However, all these protocols require active phase randomization and post-selection that play an essential role together in their security proof. Counterintuitively, we find that in TF-QKD, beat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

1
221
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 208 publications
(222 citation statements)
references
References 32 publications
1
221
0
Order By: Relevance
“…Surprisingly, a revolutionary protocol called twin-field quantum key distribution(TF-QKD) [8] was recently proposed to beat this bound. Inspired by the novel idea of TF-QKD, researchers proposed some variants and completed the corresponding security proofs [9][10][11][12][13][14]. From the view of experiments, these variants, i.e.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Surprisingly, a revolutionary protocol called twin-field quantum key distribution(TF-QKD) [8] was recently proposed to beat this bound. Inspired by the novel idea of TF-QKD, researchers proposed some variants and completed the corresponding security proofs [9][10][11][12][13][14]. From the view of experiments, these variants, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…From the view of experiments, these variants, i.e. phase-matching QKD [10], sending-or-not-sending QKD [11] and no phase post-selection TF-QKD(NPP-TFQKD) [12][13][14], are simpler. Indeed, both the sendingor-not-sending QKD and NPP-TFQKD have been scuccessfully demonstrated [15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…reducing the assumption on the devices) [9-14], but at the same time are also implementable with today's technology [15][16][17][18]. In this context, a protocol which recently received great attention is the Twin-Field (TF) QKD protocol originally proposed by Lucamarini et al [19], further developed to prove its security [20][21][22][23][24][25][26][27] and experimentally implemented [28][29][30][31]. Indeed, the TF-QKD protocol relies only on single-photon interference occurring in an untrusted node, making it a measurement-device-independent (MDI) QKD protocol capable of overcoming the repeaterless bounds [32,33].In a scenario where several users are required to share a common secret key, one can for instance perform bipartite QKD protocols between pairs of users and then use the secret keys established in this way to encode the final common secret key.…”
mentioning
confidence: 99%