FIG 4 - uploaded by Hongyi Zhou
Content may be subject to copyright.
(a) Schematic diagram of Protocol I. (b) Equivalent view of Protocol I, where the X-basis measurement on A or B is realized by a Hadamard gate followed by the Z-basis measurement. 

(a) Schematic diagram of Protocol I. (b) Equivalent view of Protocol I, where the X-basis measurement on A or B is realized by a Hadamard gate followed by the Z-basis measurement. 

Source publication
Preprint
Full-text available
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information carrier can be easily lost in the channel. For all the current implementations, the key rate is b...

Contexts in source publication

Context 1
... first introduce an entanglement-based PM-QKD protocol, called Protocol I, as shown in Fig. ...
Context 2
... First consider the case when ρ is a Fock state, |k C , defined in Eq. (A1). After passing through the BS, as shown in Fig. 4, the state on modes A and B ...
Context 3
... shown in Fig. 4(b), the X-basis measurement on A or B is realized by a Hadamard gate followed by the Z-basis measurement. Denote the state after local Hadamard gates as ...
Context 4
... first introduce an entanglement-based PM-QKD protocol, called Protocol I, as shown in Fig. ...
Context 5
... First consider the case when ρ is a Fock state |k C , defined in Eq. (A1). After passing through the BS, as shown in Fig. 4, the state on modes A and B ...
Context 6
... shown in Fig. 4(b), the X-basis measurement on A or B is realized by a Hadamard gate followed by the Z-basis measurement. Denote the state after local Hadamard gates as |Ψ In other words, the X-error rate e X k can be under- stood as the error rate by performing the Z-basis mea- surement on the state of |Ψ ...

Similar publications

Article
Full-text available
We study the classical and quantum oscillator in the context of a non-additive (deformed) displacement operator , associated with a position-dependent effective mass, by means of the supersymmetric formalism. From the supersymmetric partner Hamiltonians and the shape invariance technique we obtain the eigenstates and the eigenvalues along with the...
Article
Full-text available
We present an experimental demonstration of the feasibility of the first 20 + Mb/s Gaussian modulated coherent state continuous variable quantum key distribution system with a locally generated local oscillator at the receiver (LLO-CVQKD). To increase the signal repetition rate, and hence the potential secure key rate, we equip our system with high...
Preprint
Full-text available
Continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD) is immune to imperfect detection devices, which can eliminate all kinds of attacks on practical detectors. Here we first propose a CV-MDI QKD scheme using unidimensional modulation (UD) in general phase-sensitive channels. The UD CV-MDI QKD protocol is impl...
Article
Full-text available
We propose a new non-classical state via the photon-added coherent state based on a beam splitter with a zero-photon detector. An interesting finding is that new state and photon-added coherent state have similar expressions, but the amplitude and normalization coefficient of new state have been changed by the transmittance of beam splitter. The re...
Article
Full-text available
We construct quantum coherence resource theories in symmetrized Fock space (QCRTF), thereby providing an information-theoretic framework that connects analyses of quantum coherence in discrete-variable (DV) and continuous variable (CV) bosonic systems. Unlike traditional quantum coherence resource theories, QCRTF can be made independent of the sing...