Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
From MaRDI portal
Publication:418502
DOI10.1016/J.PHYSLETA.2010.08.040zbMATH Open1238.81085arXiv1009.3562OpenAlexW1988881294MaRDI QIDQ418502FDOQ418502
Authors: J. S. Shaari, Iskandar Bahari
Publication date: 29 May 2012
Published in: Physics Letters. A (Search for Journal in Brave)
Abstract: We review the study on a two way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.
Full work available at URL: https://arxiv.org/abs/1009.3562
Recommendations
- Quantum key distribution using a two-way quantum channel
- Weak + Vacuum and one decoy states with two way quantum key distribution protocol
- Checking noise correlations for safer two-way quantum key distribution
- Nonorthogonal unitaries in two-way quantum key distribution
- Proof of security of quantum key distribution with two-way classical communications
Cryptography (94A60) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
Cited In (3)
This page was built for publication: Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q418502)