Abstract
In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a weak coherent pulse to a third party stationed between them. The key bits are generated by interference between these pulses, with the results communicated to Alice and Bob. We consider optimized strategies for eavesdropping on the communication built upon state discrimination and quantum non-demolition measurements. We find that the best strategy comprises a two-step process but that even this does not compromise the security of the protocol.
© 2019 Optical Society of America
Full Article |
PDF Article
More Like This
Cited By
You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.
Contact your librarian or system administrator
or
Login to access Optica Member Subscription
Figures (3)
You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.
Contact your librarian or system administrator
or
Login to access Optica Member Subscription
Tables (1)
You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.
Contact your librarian or system administrator
or
Login to access Optica Member Subscription
Equations (20)
You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.
Contact your librarian or system administrator
or
Login to access Optica Member Subscription