PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
Multi-photon quantum key distribution (QKD) protocols can use non-ideal photon emitters and yet stay secure. As a result, they are advantageous over other single photon prepare and measure QKD schemes. However, their effectiveness has not yet been evaluated in different network topologies. In this paper, we compare the achievable key rates and transmission distances of the three-stage multi-photon QKD protocol to the commonly implemented decoy state and E91 protocols in different network topologies. We also describe the security implications of each protocol especially in relation to a photon number splitting attack against multi-photon sources. Our simulations offer insights into the strengths and weaknesses of each protocol and various trade-offs when using these QKD protocols in different network topologies.
Joseph Burr,Abhishek Parakh, andMahadevan Subramaniam
"Evaluating different topologies for multi-photon quantum key distribution", Proc. SPIE 12093, Quantum Information Science, Sensing, and Computation XIV, 1209309 (30 May 2022); https://doi.org/10.1117/12.2620057
ACCESS THE FULL ARTICLE
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
The alert did not successfully save. Please try again later.
Joseph Burr, Abhishek Parakh, Mahadevan Subramaniam, "Evaluating different topologies for multi-photon quantum key distribution," Proc. SPIE 12093, Quantum Information Science, Sensing, and Computation XIV, 1209309 (30 May 2022); https://doi.org/10.1117/12.2620057