Repositorio UVigo

Asymmetric twin-field quantum key distribution

Investigo Repository

Asymmetric twin-field quantum key distribution

Grasselli, Federico; Navarrete Rodriguez, Alvaro; Curty Alonso, Marcos
 
DATE : 2019-11-14
UNIVERSAL IDENTIFIER : http://hdl.handle.net/11093/2146
UNESCO SUBJECT : 12 Matemáticas ; 22 Física ; 2210.23 Teoría Cuántica ; 3325 Tecnología de las Telecomunicaciones
DOCUMENT TYPE : article

ABSTRACT :

Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-distance QKD implementations, since its secret key rate can overcome the repeaterless bound by means of a simple interferometric measurement. Many variants of the original protocol have been recently proven to be secure. Here, we focus on the TF-QKD type protocol proposed by Curty et al (2019 NPJ Quantum Inf. 5 64), which can provide a high secret key rate and whose practical feasibility has been demonstrated in various recent experiments. The security of this protocol relies on the estimation of certain detection probabilities (yields) through the decoy-state technique. Analytical bounds on the relevant yields have been recently derived assuming that both parties use the same set of decoy intensities, thus providing sub-optimal key rates in asymmetric-loss scenarios. Here we derive new analytical bounds when the parties use either two, three or four independent decoy intensity settings each. With the new bounds we optimize the protocol's performance in asymmetric-loss scenarios and ... [+]
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-distance QKD implementations, since its secret key rate can overcome the repeaterless bound by means of a simple interferometric measurement. Many variants of the original protocol have been recently proven to be secure. Here, we focus on the TF-QKD type protocol proposed by Curty et al (2019 NPJ Quantum Inf. 5 64), which can provide a high secret key rate and whose practical feasibility has been demonstrated in various recent experiments. The security of this protocol relies on the estimation of certain detection probabilities (yields) through the decoy-state technique. Analytical bounds on the relevant yields have been recently derived assuming that both parties use the same set of decoy intensities, thus providing sub-optimal key rates in asymmetric-loss scenarios. Here we derive new analytical bounds when the parties use either two, three or four independent decoy intensity settings each. With the new bounds we optimize the protocol's performance in asymmetric-loss scenarios and show that the protocol is robust against uncorrelated intensity fluctuations affecting the parties' lasers. [-]

Show full item record



Files in this item

Attribution 3.0 Unported (CC BY 3.0) Except where otherwise noted, this item's license is described as Attribution 3.0 Unported (CC BY 3.0)
2013 Universidade de Vigo, Todos los derechos reservados
Calidad So9001