Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optimized attacks on twin-field quantum key distribution

Not Accessible

Your library or personal account may give you access

Abstract

In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a weak coherent pulse to a third party stationed between them. The key bits are generated by interference between these pulses, with the results communicated to Alice and Bob. We consider optimized strategies for eavesdropping on the communication built upon state discrimination and quantum non-demolition measurements. We find that the best strategy comprises a two-step process but that even this does not compromise the security of the protocol.

© 2019 Optical Society of America

Full Article  |  PDF Article
More Like This
Detecting correlated errors in twin-field quantum key distribution

B. Panchumarthi, A. Stephens, and M. Beck
J. Opt. Soc. Am. B 40(2) 279-283 (2023)

One-sided device-independent quantum key distribution for two independent parties

Jun Xin, Xiao-Ming Lu, Xingmin Li, and Guolong Li
Opt. Express 28(8) 11439-11450 (2020)

High-efficiency quantum key distribution without key sifting

Ping Liu, Shaobo Gao, Chunyan Li, and Qi Guo
J. Opt. Soc. Am. B 35(10) 2608-2611 (2018)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (3)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (20)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.