Abstract
After years of analysis, security issues still remain in theory and practice of traditional quantum key distribution. A modified method offers alternate analysis paths and fewer hacking points. We consider entangled sources in this method.
© 2011 Optical Society of America
PDF ArticleMore Like This
Normand Beaudry, Agnes Ferenczi, Varun Narasimhachar, Tobias Moroder, Xiongfeng Ma, Marco Piani, and Norbert Lütkenhaus
OTuC3 Optical Fiber Communication Conference (OFC) 2010
Nathan Walk, Timothy C. Ralph, Tony Downes, Thomas Symul, and Ping Koy Lam
QMF4 International Conference on Quantum Information (QIM) 2011
Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011