In this work, we apply the advantage distillation method to improve the performance of a practical twin-field quantum key distribution system under collective attack. Compared with the previous analysis result given by Maeda, Sasaki and Koashi [Nature Communication 10, 3140 (2019)], the maximal transmission distance obtained by our analysis method will be increased from 420 km to 470 km. By increasing the loss-independent misalignment error to 12%, the previous analysis method can not overcome the rate-distance bound. However, our analysis method can still overcome the rate-distance bound when the misalignment error is 16%. More surprisingly, we prove that twin-field quantum key distribution can generate positive secure key even if the misa...
Device-independent quantum key distribution (DIQKD) is information-theoretically secure against adve...
The recently proposed twin-field quantum key distribution (TF-QKD) effectively overcomes the key cap...
Quantum mechanics allows distribution of intrinsically secure encryption keys by optical means. Twin...
Quantum key distribution (QKD) offers a reliable solution to communication problems that require lon...
In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a wea...
Quantum key distribution (QKD) offers a reliable solution to communication problems that require lon...
Twin-field (TF) quantum key distribution (QKD) can overcome fundamental secret-key-rate bounds on po...
Quantum key distribution (QKD) allows two remote parties to share information-theoretically secure k...
Twin-field (TF) quantum key distribution (QKD) was conjectured to beat the private capacity of a poi...
The sending-or-not-sending (SNS) protocol is one of the most major variants of the twin-field (TF) q...
With the help of quantum key distribution (QKD), two distant peers are able to share information-the...
There have been several recent advancements in the field of long-distance point-to-point twin-field ...
Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ...
Currently most progresses on quantum secret sharing suffer from rate-distance bound, and thus the ke...
The linear constraint of secret key rate capacity is overcome by the tiwn-field quantum key distribu...
Device-independent quantum key distribution (DIQKD) is information-theoretically secure against adve...
The recently proposed twin-field quantum key distribution (TF-QKD) effectively overcomes the key cap...
Quantum mechanics allows distribution of intrinsically secure encryption keys by optical means. Twin...
Quantum key distribution (QKD) offers a reliable solution to communication problems that require lon...
In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a wea...
Quantum key distribution (QKD) offers a reliable solution to communication problems that require lon...
Twin-field (TF) quantum key distribution (QKD) can overcome fundamental secret-key-rate bounds on po...
Quantum key distribution (QKD) allows two remote parties to share information-theoretically secure k...
Twin-field (TF) quantum key distribution (QKD) was conjectured to beat the private capacity of a poi...
The sending-or-not-sending (SNS) protocol is one of the most major variants of the twin-field (TF) q...
With the help of quantum key distribution (QKD), two distant peers are able to share information-the...
There have been several recent advancements in the field of long-distance point-to-point twin-field ...
Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ...
Currently most progresses on quantum secret sharing suffer from rate-distance bound, and thus the ke...
The linear constraint of secret key rate capacity is overcome by the tiwn-field quantum key distribu...
Device-independent quantum key distribution (DIQKD) is information-theoretically secure against adve...
The recently proposed twin-field quantum key distribution (TF-QKD) effectively overcomes the key cap...
Quantum mechanics allows distribution of intrinsically secure encryption keys by optical means. Twin...