Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme

We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.

Bibliographic Details
Main Authors: Shamsul Shaari, Jesni, Bahari, Iskandar
Format: Article
Language:English
Published: Elsevier 2010
Subjects:
Online Access:http://irep.iium.edu.my/10384/
http://irep.iium.edu.my/10384/
http://irep.iium.edu.my/10384/
http://irep.iium.edu.my/10384/7/Independent_attacks_in_imperfect_settings-_a_case_for_two-way_quantum_key_distribution_scheme.pdf
Description
Summary:We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.