Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/7/Independent_attacks_in_imperfect_settings-_a_case_for_two-way_quantum_key_distribution_scheme.pdf |
id |
iium-10384 |
---|---|
recordtype |
eprints |
spelling |
iium-103842012-02-15T08:41:21Z http://irep.iium.edu.my/10384/ Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme Shamsul Shaari, Jesni Bahari, Iskandar QC Physics We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols. Elsevier 2010-09-13 Article PeerReviewed application/pdf en http://irep.iium.edu.my/10384/7/Independent_attacks_in_imperfect_settings-_a_case_for_two-way_quantum_key_distribution_scheme.pdf Shamsul Shaari, Jesni and Bahari, Iskandar (2010) Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme. Physics Letters A, 374 (41). pp. 4205-4211. ISSN 0375-9601 http://www.sciencedirect.com/science/article/pii/S0375960110010352 10.1016/j.physleta.2010.08.040 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QC Physics |
spellingShingle |
QC Physics Shamsul Shaari, Jesni Bahari, Iskandar Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme |
description |
We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols. |
format |
Article |
author |
Shamsul Shaari, Jesni Bahari, Iskandar |
author_facet |
Shamsul Shaari, Jesni Bahari, Iskandar |
author_sort |
Shamsul Shaari, Jesni |
title |
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme |
title_short |
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme |
title_full |
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme |
title_fullStr |
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme |
title_full_unstemmed |
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme |
title_sort |
independent attacks in imperfect settings: a case for two-way quantum key distribution scheme |
publisher |
Elsevier |
publishDate |
2010 |
url |
http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/ http://irep.iium.edu.my/10384/7/Independent_attacks_in_imperfect_settings-_a_case_for_two-way_quantum_key_distribution_scheme.pdf |
first_indexed |
2023-09-18T20:19:50Z |
last_indexed |
2023-09-18T20:19:50Z |
_version_ |
1777408032522633216 |