File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment

TitleNumerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
Authors
Issue Date14-Nov-2022
PublisherAmerican Physical Society
Citation
Physical Review Research, 2022, v. 4, n. 4 How to Cite?
Abstract

In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protocols what is called "fine-grained statistics,"which is a variation of existing QKD protocols that makes use of originally discarded data to get a better key rate. We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis, similar to reference-frame-independent QKD, but without the need for encoding physically in an additional rotation-invariant basis. Such an analysis can easily be applied to existing systems, or even data already recorded in previous experiments, to gain a significantly higher key rate when considerable misalignment is present, extending the maximum distance for BB84 and MDI-QKD and reducing the need for manual alignment in an experiment.


Persistent Identifierhttp://hdl.handle.net/10722/347677
ISSN
2023 Impact Factor: 3.5
2023 SCImago Journal Rankings: 1.689

 

DC FieldValueLanguage
dc.contributor.authorWang, Wenyuan-
dc.contributor.authorLütkenhaus, Norbert-
dc.date.accessioned2024-09-27T00:30:17Z-
dc.date.available2024-09-27T00:30:17Z-
dc.date.issued2022-11-14-
dc.identifier.citationPhysical Review Research, 2022, v. 4, n. 4-
dc.identifier.issn2643-1564-
dc.identifier.urihttp://hdl.handle.net/10722/347677-
dc.description.abstract<p>In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protocols what is called "fine-grained statistics,"which is a variation of existing QKD protocols that makes use of originally discarded data to get a better key rate. We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis, similar to reference-frame-independent QKD, but without the need for encoding physically in an additional rotation-invariant basis. Such an analysis can easily be applied to existing systems, or even data already recorded in previous experiments, to gain a significantly higher key rate when considerable misalignment is present, extending the maximum distance for BB84 and MDI-QKD and reducing the need for manual alignment in an experiment.</p>-
dc.languageeng-
dc.publisherAmerican Physical Society-
dc.relation.ispartofPhysical Review Research-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.titleNumerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment-
dc.typeArticle-
dc.identifier.doi10.1103/PhysRevResearch.4.043097-
dc.identifier.scopuseid_2-s2.0-85141926462-
dc.identifier.volume4-
dc.identifier.issue4-
dc.identifier.eissn2643-1564-
dc.identifier.issnl2643-1564-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats