Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.
Saved in:
Main Authors: | Shamsul Shaari, Jesni, Bahari, Iskandar |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/10384/7/Independent_attacks_in_imperfect_settings-_a_case_for_two-way_quantum_key_distribution_scheme.pdf http://irep.iium.edu.my/10384/ http://www.sciencedirect.com/science/article/pii/S0375960110010352 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011) -
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014) -
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012) -
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016) -
Checking noise correlations for safer two-way quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2014)