# Practical Quantum Key Distribution with Non-Phase-Randomized Coherent States

@article{Liu2019PracticalQK, title={Practical Quantum Key Distribution with Non-Phase-Randomized Coherent States}, author={Li Liu and Yukun Wang and Emilien Lavie and Chao Wang and Arno Ricou and Fen-Zhuo Guo and Charles Ci Wen Lim}, journal={Physical Review Applied}, year={2019} }

Quantum key distribution (QKD) based on coherent states is well known for its implementation simplicity, but it suffers from loss-dependent attacks based on optimal unambiguous state discrimination. Crucially, previous research has suggested that coherent-state QKD is limited to short distances, typically below 100 km assuming standard optical fiber loss and system parameters. In this work, we propose a six-coherent-state phase-encoding QKD protocol that is able to tolerate the total loss of up…

## 6 Citations

### Loss-tolerant quantum key distribution with mixed signal states

- Computer Science
- 2020

This work provides an extension of the loss-tolerant protocol to MDI QKD protocols that employ mixed signal states and finds that the mixed states can be interpreted as providing Alice and Bob with a virtual shield system they can employ to reduce Eve's knowledge of the secret key.

### Quantum key distribution with any two independent and identically distributed states

- Computer Science
- 2020

A security proof of a QKD protocol where the usage of any light source is allowed as long as it emits two independent and identically distributed (i.i.d.) states, which substantially simplifies the requirements on light sources.

### Optimizing Decoy‐State Protocols for Practical Quantum Key Distribution Systems

- Computer ScienceAdvanced Quantum Technologies
- 2021

This work compares the key‐rate performance of 38 decoy‐state protocols using the particle swarm optimization (PSO) algorithm and forms a guideline for practical QKD systems, where the optimal decoy-state protocols are found with the change of five system parameters.

### Indirect Measurement for Optimal Quantum Communication Enhanced by Binary Non-standard Coherent States

- PhysicsJournal of the Optical Society of America B
- 2022

It is well known that the Helstrom bound can be improved by generalizing the form of a coherent state. Thus, designing a quantum measurement achieving the improved Helstrom bound is important for…

### Binary Communication with Gazeau–Klauder Coherent States

- PhysicsEntropy
- 2020

It is shown that using an alphabet consisting of coherent Gazeau–Klauder states related to a Kerr-type nonlinear oscillator instead of standard Perelomov coherent states results in lowering of the Helstrom bound for error probability in binary communication.

### Currents in a Quantum Nanoring Controlled by Non-Classical Electromagnetic Field

- PhysicsEntropy
- 2021

It is shown that in an absence of decoherence and under certain conditions fermion–fermion interaction is necessary for a ring–field entanglement to occur.

## References

SHOWING 1-10 OF 57 REFERENCES

### Source attack of decoy-state quantum key distribution using phase information

- Computer Science
- 2013

This work proposes and demonstrates an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states, and concludes that implementing phase randomization is essential to the security of decoy-state QkD systems under current security analyses.

### Discrete-phase-randomized coherent state source and its application in quantum key distribution

- Computer Science
- 2014

This work provides a rigorous security proof of QKD with discrete-phase-randomized coherent state sources and shows that the performance of the discrete- phase randomization case is close to its continuous counterpart with only a small number of discrete phases.

### Experimental quantum key distribution with source flaws

- Computer Science
- 2014

An experiment is performed that for the first time shows secure QKKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework.

### Loss-tolerant quantum cryptography with imperfect sources

- Computer Science
- 2014

This work suggests that the state preparation process in QKD can be significantly less precise than initially thought, and proposes a novel and general approach that makes QKKD loss-tolerant to state preparation flaws.

### Measurement-device-independent quantum key distribution.

- PhysicsPhysical review letters
- 2012

The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD.

### Partially random phase attack to the practical two-way quantum-key-distribution system

- Computer Science, Mathematics
- 2012

The analysis shows that Eve can break the security of a two-way QKD system by using the proposed partially random phase attack, even if an active phase randomization is adopted by Alice.

### Effect of source tampering in the security of quantum cryptography

- Computer Science
- 2015

This paper shows a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate phase randomization, without leaving a trace afterwards.

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Experimental demonstration of an active phase randomization and monitor module for quantum key distribution

- Physics
- 2012

A stable and monitored active phase randomization scheme for the one-way and two-way QKD system is proposed and demonstrated in experiments, which gives an easy way for Alice to monitor the degree of randomization in experiments.

### Differential-phase-shift quantum-key-distribution protocol with a small number of random delays

- Computer Science, Mathematics
- 2017

The small-number-random DPS (SNRDPS) protocol is an intermediate protocol between the original DPS protocol and the RRDPS protocol, and it increases the variety of the DPS-type protocols with quantified security.