Show simple item record

dc.contributor.authorGrasselli, Federico
dc.contributor.authorCurty Alonso, Marcos 
dc.date.accessioned2022-03-08T11:58:11Z
dc.date.available2022-03-08T11:58:11Z
dc.date.issued2019-07-01
dc.identifier.citationNew Journal of Physics, 21, 073001 (2019)spa
dc.identifier.issn13672630
dc.identifier.urihttp://hdl.handle.net/11093/3202
dc.description.abstractTwin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type protocols have confirmed that the secret key rate of these schemes scales essentially as the square root of the transmittance of the channel. Here, we focus on the TF-QKD protocol introduced by Curty et al, whose secret key rate is nearly an order of magnitude higher than previous solutions. Its security relies on the estimation of the detection probabilities associated to various photon-number states through the decoy-state method. We derive analytical bounds on these quantities assuming that each party uses either two, three or four decoy intensity settings, and we investigate the protocol's performance in this scenario. Our simulations show that two decoy intensity settings are enough to beat the point-to-point private capacity of the channel, and that the use of four decoys is already basically optimal, in the sense that it almost reproduces the ideal scenario of infinite decoys. We also observe that the protocol seems to be quite robust against intensity fluctuations of the optical pulses prepared by the parties.spa
dc.description.sponsorshipAgencia Estatal de Investigación | Ref. TEC2017-88243-Rspa
dc.language.isoengen
dc.publisherNew Journal of Physicsspa
dc.relationinfo:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2013-2016/TEC2017-88243-R/ES/SEGURIDAD DE LAS IMPLEMENTACIONES DE SISTEMAS CUANTICOS DE DISTRIBUCION DE CLAVE CON SUPOSICIONES LAXAS
dc.rightsAttribution 3.0 Unported
dc.rights.urihttps://creativecommons.org/licenses/by/3.0/
dc.titlePractical decoy-state method for twin-field quantum key distributionspa
dc.typearticlespa
dc.rights.accessRightsopenAccessspa
dc.relation.projectIDinfo:eu-repo/grantAgreement/EU/H2020/675662spa
dc.identifier.doi10.1088/1367-2630/ab2b00
dc.identifier.editorhttps://iopscience.iop.org/article/10.1088/1367-2630/ab2b00spa
dc.publisher.departamentoTeoría do sinal e comunicaciónsspa
dc.publisher.grupoinvestigacionAntenas, Radar e Comunicacións Ópticasspa
dc.subject.unesco3311.04 Dispositivos Electroópticosspa
dc.subject.unesco2209.10 láseresspa
dc.subject.unesco2212.11 Fotonesspa
dc.date.updated2022-03-08T07:37:43Z
dc.computerCitationpub_title=New Journal of Physics|volume=21|journal_number=|start_pag=073001|end_pag=spa


Files in this item

[PDF]

    Show simple item record

    Attribution 3.0 Unported
    Except where otherwise noted, this item's license is described as Attribution 3.0 Unported