Acta Optica Sinica, Volume. 37, Issue 6, 627001(2017)

Quantum Key Distribution Protocols Based on Asymmetric Channels of Odd Coherent Sources

Kang Danna* and He Yefeng
Author Affiliations
  • [in Chinese]
  • show less
    References(25)

    [1] [1] Huang B H, Chen Y H, Wu Q C, et al. Fast generating Greenberger-Horne-Zeilinger state via iterative interaction pictures[J]. Laser Physics Letters, 2016, 13(10): 105202.

    [2] [2] Chen Y H, Huang B H, Song J, et al. Transitionless-based shortcuts for the fast and robust generation of W states[J]. Optics Communications, 2016, 380: 140-147.

    [3] [3] Chen Y H, Xia Y, Chen Q Q, et al. Fast and noise-resistant implementation of quantum phase gates and creation of quantum entangled states[J]. Physical Review A, 2014, 91(1): 012325.

    [4] [4] Lu P M, Xia Y, Song J. Efficient W polarization state distribution over an arbitrary collective-noise channel with cross-Kerr nonlinearity[J]. Optics Communications, 2011, 284(24): 5866-5870.

    [5] [5] Wang Zhongjie, Ruan Fei, Fang Xu. Teleportation for atomic state based on disentanglement-free state[J]. Acta Optica Sinica, 2015, 35(3): 0327001.

    [6] [6] Sun S H, Liang L M. Experimental demonstration of an active phase randomization and monitor module for quantum key distribution[J]. Applied Physics Letters, 2012, 101(7): 071107.

    [7] [7] Bennett C H, Brassard G. An update on quantum cryptography[C]. Advances in Cryptology, Proceedings of CRYPTO, 1984: 475-480.

    [8] [8] Liu Youming, Wang Chao, Huang Duan, et al. Study of synchronous technology in high-speed continuous variable quantum key distribution system[J]. Acta Optica Sinica, 2015, 35(1): 0106006.

    [9] [9] Peres A. Quantum cryptography with orthogonal states[J]. Physical Review Letters, 1996, 77(15): 3264-3264.

    [10] [10] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Physical Review Letters, 1992, 68(68): 3121-3124.

    [11] [11] Brassard G, Lutkenhaus N, Mor T, et al. Limitations on practical quantum cryptography[J]. Physical Review Letters, 2000, 85(6): 1330-1333.

    [12] [12] Zhao Y, Fung C H F, Qi B, et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems[J]. Physical Review A, 2008, 78: 042333.

    [13] [13] Lydersen L, Skaar J, Makarov V. Tailored bright illumination attack on distributed-phase-reference protocols[J]. Journal of Modern Optics, 2010, 58(8): 680-685.

    [14] [14] Makarov V, Skaar J. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols[J]. Quantum Information & Computation, 2007, 8(6): 622-635.

    [15] [15] Makarov V, Hjelme D R. Faked states attack on quantum cryptosystems[J]. Journal of Modern Optics, 2005, 52(5): 691-705.

    [16] [16] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution[J]. Physical Review Letters, 2012, 108(13): 130503.

    [17] [17] Wu Chengfeng, Du Yanan, Wang Jindong, et al. Analysis on performance optimization in measurement-device-independent quantum key distribution using weak coherent states[J]. Acta Physica Sinica, 2016, 65(10): 100302.

    [18] [18] Yan Long, Sun Hao, Zhao Shengmei. Study on decoyed measurement device independent quantum key distribution protocol using orbital angular momentum[J]. Journal of Signal Processing, 2014, 11: 1275-1278.

    [19] [19] Braunstein S L, Pirandola S. Side-channel-free quantum key distribution[J]. Physical Review Letters, 2012, 108(13): 130502.

    [20] [20] Sasaki M, Suzuki S. Multimode theory of measurement-induced non-Gaussian operation on wideband squeezed light: Analytical formula[J]. Physical Review A, 2006, 73(4): 043807.

    [21] [21] Wenger J, Brouri R T, Grangier P. Non-Gaussian statistics from individual pulses of squeezed light[J]. Physical Review Letters, 2004, 92: 153601.

    [22] [22] Dong Chen, Zhao Shanghong, Zhang Ning, et al. Measurement-device-independent quantum key distribution with odd coherent state[J]. Acta Physica Sinica, 2014, 63(20): 200304.

    [23] [23] Sun S H, Gao M, Li C Y, et al. Practical decoy-state measurement-device-independent quantum key distribution[J]. Physical Review A, 2013, 87(5): 052329.

    [24] [24] Ma X F, Razavi M, Panayi C. Alternative schemes for measurement-device-independent quantum key distribution[J]. Physical Review A, 2012, 86(6): 062319.

    [25] [25] Dong Chen, Zhao Shanghong, Zhao Weihu, et al. Analysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency[J]. Acta Physica Sinica, 2014, 63(3): 030302.

    Tools

    Get Citation

    Copy Citation Text

    Kang Danna, He Yefeng. Quantum Key Distribution Protocols Based on Asymmetric Channels of Odd Coherent Sources[J]. Acta Optica Sinica, 2017, 37(6): 627001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Quantum Optics

    Received: Nov. 25, 2016

    Accepted: --

    Published Online: Jun. 8, 2017

    The Author Email: Danna Kang (katherine_luck@sina.com)

    DOI:10.3788/aos201737.0627001

    Topics