ﻻ يوجد ملخص باللغة العربية
Reference-Frame-Independent quantum key distribution (RFI-QKD) is known to be robust against slowly varying reference frames. However, other QKD protocols such as BB84 can also provide secrete keys if the speed of the relative motion of the reference frames is slow enough. While there has been a few studies to quantify the speed of the relative motion of the reference frames in RFI- QKD, it is not yet clear if RFI-QKD provides better performance than other QKD protocols under this condition. Here, we analyze and compare the security of RFI-QKD and BB84 protocol in the presence of the relative motion of the reference frames. In order to compare their security in real world implementation, we also consider the QKD protocols with decoy state method. Our analysis shows that RFI-QKD provides more robustness than BB84 protocol against the relative motion of the reference frames.
Reference-frame-independent quantum key distribution (RFI QKD) protocol can reduce the requirement on the alignment of reference frames in practical systems. However, comparing with the Bennett-Brassard (BB84) QKD protocol, the main drawback of RFI Q
Quantum key distribution (QKD) is moving from research laboratories towards applications. As computing becomes more mobile, cashless as well as cardless payment solutions are introduced, and a need arises for incorporating QKD in a mobile device. Han
The recently proposed phase-matching quantum key distribution offers means to overcome the linear key rate-transmittance bound. Since the key information is encoded onto the phases of coherent states, the misalignment between the two remote reference
Rapidly and randomly drifted reference frames will shorten the link distance and decrease the secure key rate of realistic quantum key distribution (QKD) systems. However, an actively or inappropriately implemented calibration scheme will increase co
Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is a novel protocol which eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides. However, its perf