Cargando…
Sending-or-not-sending twin-field quantum key distribution in practice
Recently, the twin field quantum key distribution (TF-QKD) protocols have been investigated extensively. In particular, an efficient protocol for TF-QKD with sending or not sending the coherent state has been given in. Here in this paper, we present results of practical sending-or-not-sending (SNS)...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6395628/ https://www.ncbi.nlm.nih.gov/pubmed/30816159 http://dx.doi.org/10.1038/s41598-019-39225-y |
_version_ | 1783399112492711936 |
---|---|
author | Yu, Zong-Wen Hu, Xiao-Long Jiang, Cong Xu, Hai Wang, Xiang-Bin |
author_facet | Yu, Zong-Wen Hu, Xiao-Long Jiang, Cong Xu, Hai Wang, Xiang-Bin |
author_sort | Yu, Zong-Wen |
collection | PubMed |
description | Recently, the twin field quantum key distribution (TF-QKD) protocols have been investigated extensively. In particular, an efficient protocol for TF-QKD with sending or not sending the coherent state has been given in. Here in this paper, we present results of practical sending-or-not-sending (SNS) twin field quantum key distribution. In real-life implementations, we need consider the following three requirements, a few different intensities rather than infinite number of different intensities, a phase slice of appropriate size rather than infinitely small size and the statistical fluctuations. We first show the decoy-state method with only a few different intensities and a phase slice of appropriate size. We then give a statistical fluctuation analysis for the decoy-state method. Numerical simulation shows that, the performance of our method is comparable to the asymptotic case for which the key size is large enough. Our method can beat the PLOB bound on secret key capacity. Our results show that practical implementations of the SNS quantum key distribution can be both secure and efficient. |
format | Online Article Text |
id | pubmed-6395628 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-63956282019-03-04 Sending-or-not-sending twin-field quantum key distribution in practice Yu, Zong-Wen Hu, Xiao-Long Jiang, Cong Xu, Hai Wang, Xiang-Bin Sci Rep Article Recently, the twin field quantum key distribution (TF-QKD) protocols have been investigated extensively. In particular, an efficient protocol for TF-QKD with sending or not sending the coherent state has been given in. Here in this paper, we present results of practical sending-or-not-sending (SNS) twin field quantum key distribution. In real-life implementations, we need consider the following three requirements, a few different intensities rather than infinite number of different intensities, a phase slice of appropriate size rather than infinitely small size and the statistical fluctuations. We first show the decoy-state method with only a few different intensities and a phase slice of appropriate size. We then give a statistical fluctuation analysis for the decoy-state method. Numerical simulation shows that, the performance of our method is comparable to the asymptotic case for which the key size is large enough. Our method can beat the PLOB bound on secret key capacity. Our results show that practical implementations of the SNS quantum key distribution can be both secure and efficient. Nature Publishing Group UK 2019-02-28 /pmc/articles/PMC6395628/ /pubmed/30816159 http://dx.doi.org/10.1038/s41598-019-39225-y Text en © The Author(s) 2019 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Yu, Zong-Wen Hu, Xiao-Long Jiang, Cong Xu, Hai Wang, Xiang-Bin Sending-or-not-sending twin-field quantum key distribution in practice |
title | Sending-or-not-sending twin-field quantum key distribution in practice |
title_full | Sending-or-not-sending twin-field quantum key distribution in practice |
title_fullStr | Sending-or-not-sending twin-field quantum key distribution in practice |
title_full_unstemmed | Sending-or-not-sending twin-field quantum key distribution in practice |
title_short | Sending-or-not-sending twin-field quantum key distribution in practice |
title_sort | sending-or-not-sending twin-field quantum key distribution in practice |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6395628/ https://www.ncbi.nlm.nih.gov/pubmed/30816159 http://dx.doi.org/10.1038/s41598-019-39225-y |
work_keys_str_mv | AT yuzongwen sendingornotsendingtwinfieldquantumkeydistributioninpractice AT huxiaolong sendingornotsendingtwinfieldquantumkeydistributioninpractice AT jiangcong sendingornotsendingtwinfieldquantumkeydistributioninpractice AT xuhai sendingornotsendingtwinfieldquantumkeydistributioninpractice AT wangxiangbin sendingornotsendingtwinfieldquantumkeydistributioninpractice |