• Chinese Journal of Quantum Electronics
  • Vol. 40, Issue 5, 712 (2023)
HU Qianqian1,2, FENG Bao1,2, YAN Longchuan3, ZHAO Xiaohong4..., CHEN Zhiyu3, LI Wenting5 and LI Wei5,*|Show fewer author(s)
Author Affiliations
  • 1NARI Group Co., Ltd. (State Grid Electric Power Research Institute Co., Ltd.), Nanjing 210000, China
  • 2NRGD Quantum Technology Co., Ltd., Nanjing 210000, China
  • 3State Grid Information Communication Technology Co., Ltd, Beijing 100000, China
  • 4Electric Power Research Institute of State Grid Fujian Electric Power Co., Ltd., Jinan 250000, China
  • 5Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • show less
    DOI: 10.3969/j.issn.1007-5461.2023.05.010 Cite this Article
    Qianqian HU, Bao FENG, Longchuan YAN, Xiaohong ZHAO, Zhiyu CHEN, Wenting LI, Wei LI. Phase-matching quantum key distribution with light source monitoring[J]. Chinese Journal of Quantum Electronics, 2023, 40(5): 712 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[J]. Theoretical Computer Science, 560, 7-11(2014).

    [2] Ekert A K. Quantum cryptography based on Bell's theorem[J]. Physical Review Letters, 67, 661-663(1991).

    [3] Mayers D. Unconditional security in quantum cryptography[J]. Journal of the ACM, 48, 351-406(2001).

    [4] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 283, 2050-2056(1999).

    [5] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 85, 441-444(2000).

    [6] Bennett C H, Bessette F, Brassard G et al. Experimental quantum cryptography[J]. Journal of Cryptology, 5, 3-28(1992).

    [7] Liao S K, Cai W Q, Liu W Y et al. Satellite-to-ground quantum key distribution[J]. Nature, 549, 43-47(2017).

    [8] Wang L, Zhao S M, Gong L Y et al. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum[J]. Chinese Physics B, 24, 120307(2015).

    [9] Guan J Y, Cao Z, Liu Y et al. Experimental passive round-robin differential phase-shift quantum key distribution[J]. Physical Review Letters, 114, 180502(2015).

    [10] Wang S, Yin Z Q, Chen W et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring[J]. Nature Photonics, 9, 832-836(2015).

    [11] Pirandola S, Laurenza R, Ottaviani C et al. Fundamental limits of repeaterless quantum communications[J]. Nature Communications, 8, 15043(2017).

    [12] Lucamarini M, Yuan Z L, Dynes J F et al. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters[J]. Nature, 557, 400-403(2018).

    [13] Chen G, Wang L, Li W et al. Multiple-pulse phase-matching quantum key distribution[J]. Quantum Information Processing, 19, 416(2020).

    [14] Tamaki K, Lo H K, Wang W Y et al. Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound[OL], 05511(2018). https: //arxiv.org/abs/1805.05511

    [15] Wang S, He D Y, Yin Z Q et al. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system[J]. Physical Review X, 9, 021046(2019).

    [16] Grasselli F, Curty M. Practical decoy-state method for twin-field quantum key distribution[J]. New Journal of Physics, 21, 073001(2019).

    [17] Wang X B, Yu Z W, Hu X L. Twin-field quantum key distribution with large misalignment error[J]. Physical Review A, 98, 062323(2018).

    [18] Ma X F, Zeng P, Zhou H Y. Phase-matching quantum key distribution[J]. Physical Review X, 8, 031043(2018).

    [19] Cui C H, Yin Z Q, Wang R et al. Twin-field quantum key distribution without phase post selection[J]. Physical Review Applied, 11, 034053(2019).

    [20] Wang X B. Decoy-state quantum key distribution with large random errors of light intensity[J]. Physical Review A, 75, 052301(2007).

    [21] Wang G, Li Z Y, Qiao Y C et al. Light source monitoring in quantum key distribution with single-photon detector at room temperature[J]. IEEE Journal of Quantum Electronics, 54, 1-10(2018).

    [22] Qiao Y C, Wang G, Li Z Y et al. Monitoring an untrusted light source with single-photon detectors in measurement-device-independent quantum key distribution[J]. Physical Review A, 99, 052302(2019).

    [23] Qiao Y C, Chen Z Y, Zhang Y C et al. Sending-or-not-sending twin-field quantum key distribution with light source monitoring[J]. Entropy, 22, 36(2020).

    [24] Lo H K, Ma X F, Chen K. Decoy state quantum key distribution[J]. Physical Review Letters, 94, 230504(2005).

    [25] Zeng P, Wu W J, Ma X F. Symmetry-protected privacy: Beating the rate-distance linear bound over a noisy channel[J]. Physical Review Applied, 13, 064013(2020).

    Qianqian HU, Bao FENG, Longchuan YAN, Xiaohong ZHAO, Zhiyu CHEN, Wenting LI, Wei LI. Phase-matching quantum key distribution with light source monitoring[J]. Chinese Journal of Quantum Electronics, 2023, 40(5): 712
    Download Citation