Loading…
Quantum key distribution using sequential weak values
We propose a new secure key distribution method that utilizes the properties of the sequential weak values of a quantum observable to prevent eavesdropping. Unlike all previous protocols, the security of this QKD protocol does not rely on the no-cloning theorem or on the spatial nonlocality of entan...
Saved in:
Published in: | Quantum Studies : Mathematics and Foundations 2014-09, Vol.1 (1-2), p.79-96 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | We propose a new secure key distribution method that utilizes the properties of the sequential weak values of a quantum observable to prevent eavesdropping. Unlike all previous protocols, the security of this QKD protocol does not rely on the no-cloning theorem or on the spatial nonlocality of entangled states. The robustness of the protocol to detector dark counts and optical losses is investigated and is found to compare favorably with BB84. While this new protocol has the drawback of a very low secure key generation rate, that the rate is non-zero is a significant result due to the lack of any obvious use of the usual resources of quantum information. |
---|---|
ISSN: | 2196-5609 2196-5617 |
DOI: | 10.1007/s40509-014-0003-9 |