Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Simple method for asymmetric twin-field quantum key distribution
by
Wang, Wenyuan
, Lo, Hoi-Kwong
in
asymmetric channels
/ Channels
/ Geographical locations
/ Physics
/ Quantum cryptography
/ quantum key distribution
/ quantum network
/ twin field quantum key distribution (TF-QKD)
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Simple method for asymmetric twin-field quantum key distribution
by
Wang, Wenyuan
, Lo, Hoi-Kwong
in
asymmetric channels
/ Channels
/ Geographical locations
/ Physics
/ Quantum cryptography
/ quantum key distribution
/ quantum network
/ twin field quantum key distribution (TF-QKD)
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Simple method for asymmetric twin-field quantum key distribution
Journal Article
Simple method for asymmetric twin-field quantum key distribution
2020
Request Book From Autostore
and Choose the Collection Method
Overview
Twin-field quantum key distribution (TF-QKD) can beat the linear bound of repeaterless QKD systems. After the proposal of the original protocol, multiple papers have extended the protocol to prove its security. However, these works are limited to the case where the two channels have equal amount of loss (i.e. are symmetric). In a practical network setting, it is very likely that the channels are asymmetric due to e.g. geographical locations. In this paper we extend the 'simple TF-QKD' protocol to the scenario with asymmetric channels. We show that by simply adjusting the two signal states of the two users (and not the decoy states) they can effectively compensate for channel asymmetry and consistently obtain an order of magnitude higher key rate than previous symmetric protocol. It also can provide 2-3 times higher key rate than the strategy of deliberately adding fibre to the shorter channel until channels have equal loss (and is more convenient as users only need to optimize their laser intensities and do not need to physically modify the channels). We also perform simulation for a practical case with three decoy states and finite data size, and show that our method works well and has a clear advantage over prior art methods with realistic parameters.
Publisher
IOP Publishing
This website uses cookies to ensure you get the best experience on our website.