Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.
| Main Authors: | Shamsul Shaari, Jesni, Bahari, Iskandar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/7/Independent_attacks_in_imperfect_settings-_a_case_for_two-way_quantum_key_distribution_scheme.pdf |
Similar Items
-
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011) -
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014) -
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016) -
Device-independent quantum key distribution using single-photon entanglement
by: Kamaruddin, Suhaili, et al.
Published: (2015) -
Checking noise correlations for safer two-way quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2014)