Asymmetric twin-field quantum key distribution

@article{Grasselli2019AsymmetricTQ,
  title={Asymmetric twin-field quantum key distribution},
  author={Federico Grasselli and {\'A}lvaro Navarrete and Marcos Curty},
  journal={New Journal of Physics},
  year={2019}
}
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-distance QKD implementations, since its secret key rate can overcome the repeaterless bound by means of a simple interferometric measurement. Many variants of the original protocol have been recently proven to be secure. Here, we focus on the TF-QKD type protocol proposed by Curty et al [preprint arXiv:1807.07667], which can provide a high secret key rate and whose practical feasibility has been… Expand

Figures from this paper

Simple method for asymmetric twin-field quantum key distribution
Twin-Field quantum key distribution (TF-QKD) can beat the linear bound of repeaterless QKD systems. After the proposal of the original protocol, multiple papers have extended the protocol to proveExpand
Conference key agreement with single-photon interference
TLDR
This work generalizes the main idea of the TF-QKD protocol to the multipartite scenario, by devising a conference key agreement (CKA) where the users simultaneously distill a secret conference key through single-photon interference, and employs for the first time a W-class state as its entanglement resource. Expand
Finite-key analysis of asymmetric phase-matching quantum key distribution with unstable sources
TLDR
The effects of asymmetric channels on the PM-QKD protocol are discussed; to reach a much better performance and achieve a higher key rate, the intensity must be optimized to compensate for channel asymmetry. Expand
Recent Advances on Quantum Key Distribution Overcoming the Linear Secret Key Capacity Bound
TLDR
An up-to-date survey on recent developments in quantum key distribution, including the security proofs of phase-matching QKD and other TF-QKD type protocols, the theoretical examinations of these protocols under realistic conditions, and the recent experimental demonstrations are presented. Expand
Improving long-distance distribution of entangled coherent state with the method of twin-field quantum key distribution.
TLDR
This work provides the application of TFQKD method toward continuous variable entanglement distribution and it is believed that its application to other quantum information processing protocols are worth investigation in the near future. Expand
Differential Phase Shift Quantum Secret Sharing Using a Twin Field with Asymmetric Source Intensities
TLDR
This work presents a differential phase shift quantum secret sharing protocol with asymmetric source intensities and gives the security proof of the protocol against individual attacks and can provide a high key rate even when the difference is quite large and has great robustness against finite-key effects. Expand
Adaptive Techniques in Practical Quantum Key Distribution
TLDR
Adapt techniques with innovative protocol and algorithm design, as well as novel techniques such as machine learning, are developed to address some of these key challenges, including atmospheric turbulence in channels for free-space QKD, asymmetric losses in channel for QKKD network, and efficient parameter optimization in real time. Expand
Finite-key analysis for quantum conference key agreement with asymmetric channels
  • Zhao Li, Xiao-Yu Cao, +4 authors Zeng-Bing Chen
  • Computer Science, Physics
  • ArXiv
  • 2021
TLDR
This paper considers a tripartite QCKA protocol utilizing the idea of sending-or-not-sending twin-field scheme and proposes a high-efficiency QCKA over asymmetric channels by removing the symmetry parameters condition and provides a composable finite-key analysis with rigorous security proof against general attacks. Expand
Sending-or-not-sending twin-field protocol for quantum key distribution with asymmetric source parameters
The sending-or-not-sending (SNS) protocol of the twin-field quantum key distribution (TFQKD) can tolerant large misalignment error and its key rate can exceed the bound of repeaterless QKD. But theExpand
A quantum leap in security
One-photon and two-photon interferences have recently led researchers to develop new classes of quantum cryptographic protocols.
...
1
2
...

References

SHOWING 1-10 OF 50 REFERENCES
Practical decoy-state method for twin-field quantum key distribution
TLDR
Simulations show that two decoy intensity settings are enough to beat the point-to-point private capacity of the channel, and that the use of four decoys is already basically optimal, in the sense that it almost reproduces the ideal scenario of infinite decoys. Expand
Simple security proof of twin-field type quantum key distribution protocol
TLDR
It is demonstrated that the secure key rate of this protocol has a square-root improvement over the point-to-point private capacity, as conjectured by the original TF QKD. Expand
Twin-Field Quantum Key Distribution without Phase Postselection
TLDR
Counterintuitively, it is found that in TF-QKD, beating the rate-loss limit is still possible even if phase randomization and post-selection in the coding mode are both removed, which means the final secure key rate $R=O(\sqrt{\eta})$. Expand
Asymmetric sending or not sending twin-field quantum key distribution in practice
Quantum key distribution (QKD) offers a secret way to share keys between legitimate users which is guaranteed by the law of quantum mechanics. Most recently, the limitation of transmission distanceExpand
Twin-field quantum key distribution with large misalignment error
Based on the novel idea of twin-field quantum key distribution [TF-QKD; Lucamarini et al., Nature (London) 557, 400 (2018)], we present a protocol named the ``sending or not sending TF-QKD''Expand
Phase-Matching Quantum Key Distribution
TLDR
A practical version of the scheme without phase locking is devised, which makes the proposed scheme feasible with the current technology and means that quantum key distribution can enjoy both sides of the world---practicality and security. Expand
Simple security analysis of phase-matching measurement-device-independent quantum key distribution
Variations of phase-matching measurement-device-independent quantum key distribution (PM-MDI QKD) protocols have been investigated before, but it was recently discovered that this type of protocolExpand
Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution.
TLDR
The estimated secure key rate from the experimental TFQKD data at the high loss region surpasses the repeaterless bound of QKD with current technology. Expand
Experimental quantum key distribution beyond the repeaterless secret key capacity
TLDR
The key rate overcomes the repeaterless secret key capacity bound limit at channel losses of 85 dB, corresponding to 530 km of ultralow-loss optical fibre, and represents a major step in promoting quantum communications as a dependable resource in today's world. Expand
Overcoming the rate–distance limit of quantum key distribution without quantum repeaters
TLDR
This work introduces an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station, enabling a form of quantum key distribution that can exceed the secret-key capacity without using quantum repeaters and that has security independent of the measuring devices. Expand
...
1
2
3
4
5
...