ﻻ يوجد ملخص باللغة العربية
In the distribution of quantum states over a long distance, not only are quantum states corrupted by interactions with an environment but also a measurement setting should be re-aligned such that detection events can be ensured for the resulting states. In this work, we present measurement-protected quantum key distribution where a measurement is protected against the interactions quantum states experience during the transmission, without the verification of a channel. As a result, a receiver does not have to revise the measurement that has been prepared in a noiseless scenario since it would remain ever optimal. The measurement protection is achieved by applications of local unitary transformations before and after the transmission, that leads to a supermap transforming an arbitrary channel to a depolarization one. An experimental demonstration is presented with the polarization encoding on photonic qubits. It is shown that the security bounds for prepare-and-measure protocols can be improved, for instance, errors up to 20.7% can be tolerated in the Bennett-Brassard 1984 protocol.
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side. However, the protocol still keeps the strict assumptions on the source side that the four
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side-channel loopholes and has shown excellent performance in long-distance secret keys sharing. Conventional security proofs, however, require additional as
Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of the quantum Internet. Considering extensive QKD implementations of trusted node networks,
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduc
A new scheme of Quantum Key Distribution is proposed using three entangled particles in a GHZ state. Alice holds a 3-particle source and sends two particles to Bob, keeping one with herself. Bob uses one particle to generate a secure key, and the oth