March 22, 2023, 1:10 a.m. | Shan-Feng Shao, Xiao-Yu Cao, Yuan-Mei Xie, Jie Gu, Wen-Bo Liu, Yao Fu, Hua-Lei Yin, Zeng-Bing Chen

cs.CR updates on arXiv.org arxiv.org

Quantum key distribution provides a promising solution for sharing secure
keys between two distant parties with unconditional security. Nevertheless,
quantum key distribution is still severely threatened by the imperfections of
devices. In particular, the classical pulse correlation threatens security when
sending decoy states. To address this problem and simplify experimental
requirements, we propose a phase-matching quantum key distribution protocol
without intensity modulation. Instead of using decoy states, we propose a novel
method to estimate the theoretical upper bound on the …

address correlation decoy devices distribution key keys problem protocol pulse quantum quantum key distribution requirements secure keys security sharing simplify solution states

Enterprise Threat Intel Analyst

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

IT Security Engineer III

@ Mitsubishi Heavy Industries | Houston, TX, US, 77046

Cyber Intelligence Vice President, Threat Intelligence

@ JPMorgan Chase & Co. | Singapore, Singapore

Assistant Manager, Digital Forensics

@ Interpath Advisory | Manchester, England, United Kingdom

Tier 3 - Forensic Analyst, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

Incident Response, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States