scholarly journals Provably secure and practical quantum key distribution over 307 km of optical fibre

2015 ◽  
Vol 9 (3) ◽  
pp. 163-168 ◽  
Author(s):  
Boris Korzh ◽  
Charles Ci Wen Lim ◽  
Raphael Houlmann ◽  
Nicolas Gisin ◽  
Ming Jun Li ◽  
...  
2021 ◽  
Author(s):  
Jiu-Peng Chen ◽  
Chi Zhang ◽  
Yang Liu ◽  
Cong Jiang ◽  
Wei-Jun Zhang ◽  
...  

2000 ◽  
Vol 47 (2-3) ◽  
pp. 533-547 ◽  
Author(s):  
Richard J. Hughes ◽  
George L. Morgan ◽  
C. Glen Peterson

2017 ◽  
Vol 3 (11) ◽  
pp. e1701491 ◽  
Author(s):  
Nurul T. Islam ◽  
Charles Ci Wen Lim ◽  
Clinton Cahall ◽  
Jungsang Kim ◽  
Daniel J. Gauthier

2006 ◽  
Vol 8 (9) ◽  
pp. 193-193 ◽  
Author(s):  
P A Hiskett ◽  
D Rosenberg ◽  
C G Peterson ◽  
R J Hughes ◽  
S Nam ◽  
...  

2003 ◽  
Vol 20 (5) ◽  
pp. 608-610 ◽  
Author(s):  
Gui You-Zhen ◽  
Han Zheng-Fu ◽  
Mo Xiao-Fan ◽  
Guo Guang-Can

Author(s):  
Ronald Sadlier ◽  
Travis S. Humble ◽  
Venkateswara R. Dasari ◽  
Billy E. Geerhart

2015 ◽  
Vol 111 (7/8) ◽  
Author(s):  
Sharmini Pillay ◽  
◽  
Abdul Mirza ◽  
Francesco Petruccione ◽  
◽  
...  

2000 ◽  
Vol 47 (2-3) ◽  
pp. 533-547 ◽  
Author(s):  
Richard J. Hughes ◽  
George L. Morgan ◽  
C. Glen Peterson

2007 ◽  
Vol 7 (5&6) ◽  
pp. 431-458
Author(s):  
H.-K. Lo ◽  
J. Preskill

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pulse, provided that this phase is not modulated by the source, and even if the reference pulse is bright. The proof also applies to the case where the key is encoded in the photon polarization of a weak coherent-state pulse with a known phase, but only if the phases of the four BB84 signal states are judiciously chosen. The achievable key generation rate scales quadratically with the transmission in the channel, just as for BB84 with phase-randomized weak coherent-state signals (when decoy states are not used). For the case where the phase of the reference pulse is strongly modulated by the source, we exhibit an explicit attack that allows the eavesdropper to learn every key bit in a parameter regime where a protocol using phase-randomized signals is provably secure.


Sign in / Sign up

Export Citation Format

Share Document