Differential-phase-shift quantum key distribution with segmented pulse trains
Abstract
We present a modified scheme of differential-phase-shift (DPS) quantum key distribution (QKD) for improving its performance. A transmitter sends a weak coherent pulse train segmented with vacant pulses. Then, a receiver can find eavesdropping by monitoring the photon detection rate at particular time slots. Simulations show that the proposed scheme is robust against a sequential attack and a general individual attack.
- Authors:
-
- Osaka University, Osaka 565-0871 (Japan)
- Publication Date:
- OSTI Identifier:
- 21550068
- Resource Type:
- Journal Article
- Journal Name:
- Physical Review. A
- Additional Journal Information:
- Journal Volume: 83; Journal Issue: 6; Other Information: DOI: 10.1103/PhysRevA.83.062318; (c) 2011 American Institute of Physics; Journal ID: ISSN 1050-2947
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 71 CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS; DETECTION; DISTRIBUTION; PHASE SHIFT; PHOTONS; PULSES; QUANTUM CRYPTOGRAPHY; QUANTUM INFORMATION; SIMULATION; BOSONS; CRYPTOGRAPHY; ELEMENTARY PARTICLES; INFORMATION; MASSLESS PARTICLES
Citation Formats
Kawahara, Hiroki, and Inoue, Kyo. Differential-phase-shift quantum key distribution with segmented pulse trains. United States: N. p., 2011.
Web. doi:10.1103/PHYSREVA.83.062318.
Kawahara, Hiroki, & Inoue, Kyo. Differential-phase-shift quantum key distribution with segmented pulse trains. United States. https://doi.org/10.1103/PHYSREVA.83.062318
Kawahara, Hiroki, and Inoue, Kyo. 2011.
"Differential-phase-shift quantum key distribution with segmented pulse trains". United States. https://doi.org/10.1103/PHYSREVA.83.062318.
@article{osti_21550068,
title = {Differential-phase-shift quantum key distribution with segmented pulse trains},
author = {Kawahara, Hiroki and Inoue, Kyo},
abstractNote = {We present a modified scheme of differential-phase-shift (DPS) quantum key distribution (QKD) for improving its performance. A transmitter sends a weak coherent pulse train segmented with vacant pulses. Then, a receiver can find eavesdropping by monitoring the photon detection rate at particular time slots. Simulations show that the proposed scheme is robust against a sequential attack and a general individual attack.},
doi = {10.1103/PHYSREVA.83.062318},
url = {https://www.osti.gov/biblio/21550068},
journal = {Physical Review. A},
issn = {1050-2947},
number = 6,
volume = 83,
place = {United States},
year = {Wed Jun 15 00:00:00 EDT 2011},
month = {Wed Jun 15 00:00:00 EDT 2011}
}
Other availability
Save to My Library
You must Sign In or Create an Account in order to save documents to your library.