Laser & Optoelectronics Progress, Volume. 58, Issue 7, 0727004(2021)

Security Analysis of Three-State Continuous Variable Quantum Key Distribution Protocol Based on Discrete Modulation

Youdong Sun, Yongxin Xing, and Tianyi Wang*
Author Affiliations
  • College of Big Data and Information Engineering, Guizhou University, Guiyang , Guizhou 550025, China
  • show less
    Figures & Tables(6)
    Phase space diagram of three-state protocol
    Schematic of entangled clone attack
    Security key rates of three-state protocol and four-state protocol under different excess noises
    Performance comparison of three-state protocols under different modulation variances
    Security key rate of three-state protocol versus modulation variance under different excess noises
    • Table 1. Alice’s bit encoding in three-state protocol

      View table

      Table 1. Alice’s bit encoding in three-state protocol

      Result=0,=ϕA=0,ϕB=-π/6ϕA=0,ϕB=-5π/6=,==,==,==,==,==,=
      x0α-αα-α0-α0α
      A101001
    Tools

    Get Citation

    Copy Citation Text

    Youdong Sun, Yongxin Xing, Tianyi Wang. Security Analysis of Three-State Continuous Variable Quantum Key Distribution Protocol Based on Discrete Modulation[J]. Laser & Optoelectronics Progress, 2021, 58(7): 0727004

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Quantum Optics

    Received: Aug. 7, 2020

    Accepted: Sep. 23, 2020

    Published Online: Apr. 25, 2021

    The Author Email: Wang Tianyi (tywang@gzu.edu.cn)

    DOI:10.3788/LOP202158.0727004

    Topics