Continuous-variable source-device-independent quantum key distribution against general attacks
Abstract The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions a...
Main Authors: | Yichen Zhang, Ziyang Chen, Christian Weedbrook, Song Yu, Hong Guo |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Publishing Group
2020-04-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-020-63024-5 |
Similar Items
-
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
by: Yichen Zhang, et al.
Published: (2015-06-01) -
Feasible attack on detector-device-independent quantum key distribution
by: Kejin Wei, et al.
Published: (2017-03-01) -
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions
by: Luyu Huang, et al.
Published: (2019-11-01) -
Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
by: Yaxi Pan, et al.
Published: (2020-11-01) -
Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution
by: Ziyang Chen, et al.
Published: (2019-07-01)