• Laser & Optoelectronics Progress
  • Vol. 58, Issue 7, 0727004 (2021)
Youdong Sun, Yongxin Xing, and Tianyi Wang*
Author Affiliations
  • College of Big Data and Information Engineering, Guizhou University, Guiyang , Guizhou 550025, China
  • show less
    DOI: 10.3788/LOP202158.0727004 Cite this Article Set citation alerts
    Youdong Sun, Yongxin Xing, Tianyi Wang. Security Analysis of Three-State Continuous Variable Quantum Key Distribution Protocol Based on Discrete Modulation[J]. Laser & Optoelectronics Progress, 2021, 58(7): 0727004 Copy Citation Text show less
    Phase space diagram of three-state protocol
    Fig. 1. Phase space diagram of three-state protocol
    Schematic of entangled clone attack
    Fig. 2. Schematic of entangled clone attack
    Security key rates of three-state protocol and four-state protocol under different excess noises
    Fig. 3. Security key rates of three-state protocol and four-state protocol under different excess noises
    Performance comparison of three-state protocols under different modulation variances
    Fig. 4. Performance comparison of three-state protocols under different modulation variances
    Security key rate of three-state protocol versus modulation variance under different excess noises
    Fig. 5. Security key rate of three-state protocol versus modulation variance under different excess noises
    Result=0,=ϕA=0,ϕB=-π/6ϕA=0,ϕB=-5π/6=,==,==,==,==,==,=
    x0α-αα-α0-α0α
    A101001
    Table 1. Alice’s bit encoding in three-state protocol
    Youdong Sun, Yongxin Xing, Tianyi Wang. Security Analysis of Three-State Continuous Variable Quantum Key Distribution Protocol Based on Discrete Modulation[J]. Laser & Optoelectronics Progress, 2021, 58(7): 0727004
    Download Citation