Evaluating different topologies for multi-photon quantum key distribution

Joseph Burr, Abhishek Parakh, Mahadevan Subramaniam

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Multi-photon quantum key distribution (QKD) protocols can use non-ideal photon emitters and yet stay secure. As a result, they are advantageous over other single photon prepare and measure QKD schemes. However, their effectiveness has not yet been evaluated in different network topologies. In this paper, we compare the achievable key rates and transmission distances of the three-stage multi-photon QKD protocol to the commonly implemented decoy state and E91 protocols in different network topologies. We also describe the security implications of each protocol especially in relation to a photon number splitting attack against multi-photon sources. Our simulations offer insights into the strengths and weaknesses of each protocol and various trade-offs when using these QKD protocols in different network topologies.

Original languageEnglish (US)
Title of host publicationQuantum Information Science, Sensing, and Computation XIV
EditorsEric Donkor, Michael Hayduk, Michael R. Frey, Samuel J. Lomonaco, John M. Myers
PublisherSPIE
ISBN (Electronic)9781510650626
DOIs
StatePublished - 2022
EventQuantum Information Science, Sensing, and Computation XIV 2022 - Virtual, Online
Duration: Jun 6 2022Jun 12 2022

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
Volume12093
ISSN (Print)0277-786X
ISSN (Electronic)1996-756X

Conference

ConferenceQuantum Information Science, Sensing, and Computation XIV 2022
CityVirtual, Online
Period6/6/226/12/22

Keywords

  • Quantum internet
  • Quantum key distribution
  • Quantum repeater
  • Topology
  • multi-photon QKD

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Evaluating different topologies for multi-photon quantum key distribution'. Together they form a unique fingerprint.

Cite this