Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Numerical security analysis of the three-state quantum key distribution protocol with realistic devices

Not Accessible

Your library or personal account may give you access

Abstract

Quantum key distribution (QKD) is a secure communication method that utilizes the principles of quantum mechanics to establish secret keys. The central task in the study of QKD is to prove security in the presence of an eavesdropper with unlimited computational power. In this work, we successfully solve a long-standing open question of the security analysis for the three-state QKD protocol with realistic devices, i.e., the weak coherent-state source. We prove the existence of the squashing model for the measurement settings in the three-state protocol. This enables the reduction of measurement dimensionality, allowing for key rate computations using the numerical approach. We conduct numerical simulations to evaluate the key rate performance. The simulation results show that we achieve a communication distance of up to 200 km.

© 2023 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Zero-photon catalysis based eight-state discrete modulated measurement-device-independent continuous-variable quantum key distribution

Muhammad Bilal Khan, Muhammad Waseem, Muhammad Irfan, Asad Mehmood, and Shahid Qamar
J. Opt. Soc. Am. B 40(4) 763-772 (2023)

Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources

Yang Wang, Wan-Su Bao, Chun Zhou, Mu-Sheng Jiang, and Hong-Wei Li
J. Opt. Soc. Am. B 36(3) B83-B91 (2019)

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (5)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (3)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (68)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.