Round-Robin Differential Phase-Shift Quantum Key Distribution with Twisted Photons

Round-Robin Differential Phase-Shift Quantum Key Distribution with Twisted Photons

Frédéric Bouchard Department of Physics, University of Ottawa, Advanced Research Complex, 25 Templeton Street, Ottawa ON Canada, K1N 6N5    Alicia Sit Department of Physics, University of Ottawa, Advanced Research Complex, 25 Templeton Street, Ottawa ON Canada, K1N 6N5    Khabat Heshami National Research Council of Canada, 100 Sussex Drive, Ottawa ON Canada, K1A 0R6    Robert Fickler Department of Physics, University of Ottawa, Advanced Research Complex, 25 Templeton Street, Ottawa ON Canada, K1N 6N5    Ebrahim Karimi Department of Physics, University of Ottawa, Advanced Research Complex, 25 Templeton Street, Ottawa ON Canada, K1N 6N5 Department of Physics, Institute for Advanced Studies in Basic Sciences, 45137-66731 Zanjan, Iran.

Quantum key distribution (QKD) offers the possibility for two individuals to communicate a securely encrypted message. From the time of its inception in 1984 by Bennett and Brassard, QKD has been the result of intense research. One technical challenge is the monitoring of signal disturbance in a QKD system to bound the information leakage towards an unwanted eavesdropper. Recently, the round-robin differential phase-shift (RRDPS) protocol, which encodes bits of information in a high-dimensional state space, was proposed to solve this exact problem. Since its introduction, many realizations of the RRDPS protocol were demonstrated using trains of coherent pulses. Here, we propose and experimentally demonstrate an implementation of the RRDPS protocol using the photonic orbital angular momentum degree of freedom. In particular, we show that Alice’s generation stage and Bob’s detection stage can each be reduced to a single phase element, greatly simplifying its implementation. Our scheme offers a practical demonstration of the RRDPS protocol which will suppress the need for monitoring signal disturbance in free-space channels.

The early protocols of QKD, such as the BB84 protocol and others bennett:84 (); ekert:91 (); bennett:92 (); gisin:02 (), demonstrated the power of quantum cryptography using simple and elegant schemes. However, it has become increasingly evident that their implementations lead to unforeseen challenges and technical difficulties scarani:09 (). This motivates more practical protocols that are designed towards specific implementations, and also provides theoretical tools for a complete security analysis of a QKD system. In general, this leads to less elegant and more complicated schemes. An important example of such a scheme aimed towards practicality is the plug-and-play setup muller:97 (). A major limiting factor in QKD implementations is the photon source. Many practical implementations rely on weak coherent states, which have a non-zero probability of generating multi-photon events. Surprisingly, a slight modification of the BB84 protocol in the announcements (SARG04) scarani:04 () leads to an improvement against photon-number-splitting (PNS) attacks brassard:00 (). A further improvement may be achieved by using the decoy states protocol hwang:03 (). An example of a protocol that incorporates these different strategies is the coherent one way (COW) protocol stucki:05 (), which can operate at high speeds, and can be integrated into existing fibre networks.

Another major challenge in any QKD system is the treatment of noise in the quantum channel. To ensure security, it is necessary to assume the worst case scenario: noises are the result of an adversary, referred to as Eve, eavesdropping on the channel. The authorized partners, Alice and Bob, may use error correction protocols to remove any errors in their shared key. Any information leakage to Eve may be subsequently removed using privacy amplficiation bennett:95 (). However, in the presence of large environmental noises, users must abandon their link if the errors are above a given threshold imposed by the security of the QKD protocol. A promising avenue to increasing error tolerability in noisy environments is the use of high-dimensional systems, known as qudits, rather than qubits bechmann:00a (); bechmann:00b (); cerf:02 (). Additionally, high-dimensional QKD protocols are shown to transmit more information per carrier. A natural extension of the BB84 protocol leads to a secret key rate, in the infinite-sized-key limit, of , where is the dimension, is the QBER and is the -dimensional Shannon entropy.

Figure 1: Experimental setup: The original RRDPS scheme using the phase of time-bins to encode information (depicted in the back) consisting of multiple interferometers for generation with a phase modulator (PM), and another interferometer with a variable delay (VD) for detection. By encoding using OAM instead, we can reduce the setups to be two phase holograms, displayed on spatial light modulators (SLMs), one for generation and one for detection of the states. An example of Alice’s generation phase element for a state with , i.e. is shown on her SLM-A. The intensity distribution of the generated state is shown in the channel, followed by Bob’s measurement phase element (SLM-B) with a shift of and a detected OAM value of for a relative phase of 0.

Another class of high-dimensional QKD protocols are the distributed-phase-reference (DPR) schemes which, unlike the high-dimensional BB84 protocol, encode only one bit of information per carrier. This reduction in transmitted information comes with the benefit of increased error tolerance. The original differential phase shift (DPS) protocol inoue:02 () employs superpositions of high-dimensional states where the information is encoded in the relative phase of the qudits. In the differential phase Chau15 protocol chau:15 (); chau:17 (), the information is encoded in the relative phase of a “qubit-like” high-dimensional state wang:17 (). The Chau15 protocol has the particular advantage of tolerating error rates of up to 50 %. It is also possible to achieve a DPR scheme where more than one bit of information is transmitted bacco:16 (). Recently, a QKD scheme has been proposed in which the amount of information leakage is bounded by Alice’s state preparation stage and Bob’s measurement unit, and therefore eliminates the requirement for monitoring the signal disturbance sasaki:14 (). This scheme, known as round-robin differential phase-shift (RRDPS) QKD, is based on encoding a random bit sequence of length in the phase of a coherent -dimensional superposition state. After transmission through a quantum channel accessible to Eve, Bob randomly selects the setting of his interferometric measurement to record one classical bit from a phase difference measurement between two modes of the -dimensional input state. In this Letter, we propose and experimentally demonstrate an implementation of RRDPS QKD based on the transverse mode of photons, in particular using the orbital angular momentum (OAM) degree of freedom. Our proposed scheme simplifies the experimental setup for generation and detection with the ability to flexibly implement different dimensions, which we demonstrate for to 8, along with 16, 32 and 64.

The original proposal for implementation of the RRDPS QKD is based on state preparation in an -pulse train single-photon state, and phase difference measurement using a switchable delayed interferometer with variable delays, see Fig. 1. Several experimental demonstrations of RRDPS QKD have used this encoding with passive guan:15 () or active variable delays takesue:15 (); wang:15 (); li:16 () using time-bin state dimensions of and . The secret key rate, in the infinite-sized-key limit, is given by  sasaki:14 () and was recently improved to  Yin:18 (), where . Although these experiments highlight the described benefits in terms of error thresholds, they also demonstrate the expected challenges in implementing Bob’s measurement unit that requires switchable delays and active stabilization of delayed interferometers. Given the practical implications of this scheme, it is desirable to explore encoding in other degrees of freedom of photons in search of simplified implementations. Here, we investigate encoding on the OAM degree of freedom.

Photons carrying OAM are characterized by a exp() phase factor allen:92 (), where is an integer and is the transverse azimuthal angle, giving rise to intertwined helical wavefronts and a null of intensity along the propogation axis. The OAM of photons provides an unbounded Hilbert space erhard:17 (), limited in practice by the numerical aperture of the system. OAM has provided a simplified way of realizing high-dimensional protocols. Only a single phase element is required for generation — typically a hologram displayed on a programmable spatial light modulator (SLM) heckenberg:92 (); forbes:16 (). For detection, a second SLM and single mode fibre (SMF) mair:01 (); qassim:14 () or OAM sorter berkhout:10 (); larocque:17 () can be implemented to efficiently filter the different modes. High-dimensional QKD protocols using OAM have been successfully demonstrated in the laboratory mafu:13 (); mirhosseini:15 (), studied and realized in realistic free-space conditions vallone:14 (); krenn:15 (); sit:17 (), and recently implemented in an underwater quantum channel bouchard:18 (). Using these encryption techniques with OAM, we adapt previous RRDPS QKD schemes, which use many interferometers, to consist of two phase elements — one for state generation by Alice, and one for state measurement by Bob, shown in Fig. 1. In the original DPS proposal, Alice’s generation is done by sending a single photon into an interferometer consisting of arms. However, for practical considerations, a sequence of intensity modulators, phase modulators and attenuator accomplishes the desired generation stage of Alice using weak coherent pulses. It is Bob’s detection stage that presents the main technical challenges. Though using OAM modes of light is not as scalable as time-bins, their generation and detection techniques do not require active stabilization.

Figure 2: Experimental Results: Measured probability-of-detection matrices for RRDPS QKD scheme with OAM for dimensions to . The rows consist of the states, , that Alice generates. The columns are the measurements, , that Bob performs to determine the relative phase between two of the OAM states. Here, we are showing the results for when the two states are in-phase, i.e. relative phase of 0. The inset graph compares the quantum bit error rate (QBER) with increasing dimension between the theoretical original sasaki:14 () and improved RRDPS Yin:18 () error thresholds and our experimentally measured QBER.

Let us start with the preparation stage: Alice prepares an input state by encoding a random bit sequence of length in the phases of different OAM states of a single photon,


where , are the OAM eigenstates that represent a single photon carrying units of OAM, analogous to the photon’s time bin in the pulse train of the original RRDPS protocol, where is the reduced Planck constant. For even and odd, we respectively consider and . Alice can generate this state with a single computer-generated hologram displayed on her SLM. One of the main advantage of using OAM states of photons is the inherent stability and interference visibility of superposition states. Superpositions of OAM states simply correspond to another transverse spatial mode of light, which in practice preserve the same stability as OAM modes. In spite of the fact that free-space propagation may alter the OAM superposition state due to Gouy phases born:13 (), this effect is straightforward to control and compensate for. As one considers larger values of , the stability of the OAM state does not degrade as it might be in the case of an interferometric configuration. However, the scalability is limited by the numerical aperture of the system.

Alice’s photon is sent through the quantum channel and received at Bob’s detection setup. In order to extract one qubit of information, following the original protocol, Bob sends the state into an interferometer and shifts one arm by a randomly chosen amount . For time-bins encoding, the shift corresponds to delaying each pulse in the train by , where is the time between pulses. This shift-type interferometer may be achieved with OAM by inserting a phase element in one arm of a balanced interferometer. The phase element is given by , where this has the effect of shifting the OAM value analogously, i.e. . However, such configuration does not take full advantage of the OAM scheme. It can be seen that an interferometer with a phase shift element in one arm and no phase element in the other arm is equivalent to a single phase element given by , where the relative phase () determines the “output port” of the interferometer. The last step in the RRDPS detection scheme is the time-resolved detection of the interfered pulse train. This is equivalent to any OAM detection scheme such as mode filtering mair:01 () or OAM sorting berkhout:10 (). Mode filtering is achieved using a phase element given by , which corresponds to a projection onto the state , followed by coupling into a SMF. A further simplification is done by combining the “measurement” phase element with the “shifting-interferometer” phase element, resulting in a phase of . This can be seen as a projection onto the state , labelled by the random shift of and a projection onto the state with OAM value of , i.e. . Our simplified detection configuration corresponds to a filter-based scheme, resulting in a lower detection efficiency. However, by replacing the phase-flattening component with a sorter-type measurement device, the pre-sifting detection efficiency can reach unity.

In the event of detecting a click from displaying or , Bob records a 0 or 1, respectively. In order for Alice to have a shared corresponding bit, Bob publicly announces the random indices and . Alice obtains her sifted key bit by computing , where corresponds to summation modulo 2. Moreover, Alice and Bob only keep the outcomes where with a sifting efficiency of 1/2, as in the case of BB84.

Based on the proposed simplified scheme above, we perform a proof-of-principle experimental realization of the RRDPS protocol using OAM encoded on heralded single photons. We pump a 3 mm -barium borate type I nonlinear crystal with a quasi-continuous wave UV laser at 355 nm to produce single photon pairs (signal and idler) at 710 nm via spontaneous parametric down-conversion. The photons are spatially filtered to the fundamental Gaussian mode by coupling them to SMF with a measured single photon heralding coincidence rate of 40 kHz within a coincidence window of 5 ns. Alice prepares the signal photon into an equally weighted superposition of OAM states with a phase-only SLM, SLM-A, where a string of bits is encoded in the phase (0 or ) of each OAM state. She subsequently distributes the photon to Bob through one meter of free-space in the laboratory. We note that when considering all possible bit sequences, the second half of the corresponding states are identical to the first half with an additional global phase of . Hence, Alice randomly chooses one state out of the set of possible superposition states, , with distinct bit sequences. Bob projects the received state, using his own SLM (SLM-B) and SMF, onto a particular superposition of two OAM states from a choice of possibilities, i.e. . The idler photon is used to herald the presence of the signal photon for a coincidence event after Bob’s measurement.

Figure 3: Secret key rates: Calculated secret key rates (circles), , for dimensions to 8, 16, 32 and 64 from the experimentally measured QBERs with respect to the improved theoretical bounds (solid curves). As the dimension increases, the number of transmitted bits per sifted photon increases until we are limited by the numerical aperture of our system for higher dimensions.

The experiment is performed, under identical laboratory conditions, for values of ranging from 3 to 8, 16, 32, and 64; the results for 3 to 8 are shown in Fig. 2. The measured probability-of-detection matrices shown represent the likelihood that Bob detects a click following the projection of the incoming photon’s state onto . Figure 2 also shows the experimentally extracted QBER with respect to dimension (). Both the original sasaki:14 () and improved Yin:18 () theoretical QBER thresholds of the RRDPS protocol security analyses are also shown along with the experimental QBER. For small dimensions, i.e. to 5, the QBER exceeds the original error thresholds. In particular, for the case of , the original protocol cannot generate secret key bits. However, the improved theoretical bounds show that secure communication would still be feasible in all measured dimensions. Interestingly, above , the experimental QBERs are lower than the original thresholds, which appears to increase faster than our systematic errors do with dimension. The associated secret key rates, , calculated from the improved RRDPS protocol, are given in Fig. 3 along with the theoretical secret key rates. Values of , , , , , , , , and where obtaining experimentally for the QBER. The corresponding secret key rates are , , , , , , , , and bits per sifted photon, respectively.

For the cases of , 32, and 64, in the interest of time, a subset of 1500 randomly selected generation and measurement settings is considered out of the possibilities. Interestingly, it is for the case of that the largest secret key rate is achieved. We see an increase error rate (decrease in secret key rate) for higher dimensions most likely due to the limiting numerical aperture of our system. One potential way to circumvent this issue would be to extend our scheme to include radial modes karimi:14b (); karimi:14c () to make use of the full transverse spatial structure, i.e. optimize the best number of modes to fill the numerical aperture.

Finally, another advantage of our proposed scheme is the versatility of the experimental configuration. In the first place, the phase elements may be achieved using various techniques according to practical considerations, e.g. liquid crystal devices marrucci:06 (); heckenberg:92 (), digital micro-mirror devices mirhosseini:13b (), refractive elements beijersbergen:94 (), metasurfaces yu:11 (); karimi:14 (); bouchard:14 (), etc. More importantly, the experimental configuration of our proposed scheme is compatible with many other prepare-and-measure high-dimensional QKD protocols such as BB84 bennett:84 (), mutually unbiased bases (MUB)-based protocols durt:10 (); mafu:13 (), Singapore englert:04b (), DPS inoue:02 (), and Chau15 chau:15 (); chau:17 (). For fluctuating environmental conditions, Alice and Bob may adapt by selecting the most favourable QKD protocol. Hence, a single experimental configuration compatible with many protocols exhibit the versatility of QKD schemes based on OAM encoding bouchard:18b (). The RRDPS scheme is one such example where the difficulty of monitoring signal disturbance is removed and may lead to improved performances in noisy environments. It will be important to see how this scheme performs in real-world conditions, in particular where there is atmospheric turbulence.

Acknowledgments All authors would like to thank Duncan England for fruitful discussions. F.B. acknowledges the financial support of the Vanier graduate scholarship of the NSERC. R.F. acknowledges the financial support of the Banting postdoctoral fellowship of the NSERC. This work was supported by Canada Research Chairs (CRC); Canada Foundation for Innovation (CFI); Canada First Research Excellence Fund (CFREF); Natural Sciences and Engineering Research Council of Canada (NSERC).


  • (1) C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, New York, 1984), pp.175-179.
  • (2) A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
  • (3) C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).
  • (4) N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, Rev. Mod. Phys. 74, 145 (2002).
  • (5) V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus and M. Peev, Rev. Mod. Phys. 81, 1301 (2009).
  • (6) A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden and N. Gisin, Appl. Phys. Lett. 70, 793–795 (1997).
  • (7) V. Scarani, A. Acin, G. Ribordy and N. Gisin, Phys. Rev. Lett. 92, 057901 (2004).
  • (8) G. Brassard, N. Lütkenhaus, T. Mor and B. C. Sanders, Phys. Rev. Lett. 85, 1330 (2000).
  • (9) W.-Y. Hwang, Phys. Rev. Lett. 91, 057901 (2003).
  • (10) D. Stucki, N. Brunner, N. Gisin, V. Scarani and H. Zbinden, Appl. Phys. Lett. 87, 194108 (2005).
  • (11) C. H. Bennett, G. Brassard, C. Crépeau and U. M. Maurer, IEEE T. Inform. Theory 41, 1915–1923 (1995).
  • (12) H. Bechmann-Pasquinucci and A. Peres, Phys. Rev. Lett. 85, 3313 (2000).
  • (13) H. Bechmann-Pasquinucci and W. Tittel, Phys. Rev. A 61, 062308 (2000).
  • (14) N. J. Cerf, M. Bourennane, A. Karlsson and N. Gisin, Phys. Rev. Lett. 88, 127902 (2002).
  • (15) K. Inoue, E. Waks and Y. Yamamoto, Phys. Rev. Lett. 89, 037902 (2002).
  • (16) H. F. Chau, Phys. Rev. A 92, 062324 (2015).
  • (17) H. F. Chau, Q. Wang and C. Wong, Phys. Rev. A 95, 022311 (2017).
  • (18) S. Wang, Z.-Q. Yin, H. F. Chau, W. Chen, C. Wang, G.-C. Guo and Z.-F. Han, eprint arXiv:1707.00387.
  • (19) D. Bacco, J. B. Christensen, M. A. U. Castaneda, Y. Ding, S. Forchhammer, K. Rottwitt and L. K. Oxenløwe, Sci. Rep. 6, 36756 (2016).
  • (20) T. Sasaki, Y. Yamamoto and M. Koashi, Nature 509, 475 (2014).
  • (21) J.-Y. Guan, Z. Cao, Y. Liu, G.-L. Shen-Tu, J. S. Pelc, M. M. Fejer, C.-Z. Peng, X. Ma, Q. Zhang and J.-W. Pan, Phys. Rev. Lett. 114, 180502 (2015).
  • (22) H. Takesue, T. Sasaki, K. Tamaki and M. Koashi, Nat. Photonics 9, 827 (2015).
  • (23) S. Wang, Z.-Q. Yin, W. Chen, D.-Y. He, X.-T. Song, H.-W. Li, L.-J. Zhang, Z. Zhou, G.-C. Guo and Z.-F. Han, Nat. Phys. 9, 832 (2015).
  • (24) Y.-H. Li, Y. Cao, H. Dai, J. Lin, Z. Zhang, W. Chen, Y. Xu, J.-Y. Guan, S.-K. Liao, J. Yin, Q. Zhang, X. Ma, C.-Z. Peng and J.-W. Pan, Phys. Rev. A 93, 030302 (2016).
  • (25) Z.-Q. Yin, S. Wang, W. Chen, Y.-G. Han, R. Wang, G.-C. Guo and Z.-Fu Han, Nat. Commun. 9, 457 (2018).
  • (26) L. Allen, M. W. Beijersbergen, R. Spreeuw and J. Woerdman, Phys. Rev. A 45, 8185 (1992).
  • (27) M. Erhard, R. Fickler, M. Krenn and A. Zeilinger, Light: Sci. & App. (2018).
  • (28) N. Heckenberg, R. McDuff, C. Smith and A. White, Opt. Lett. 17, 221–223 (1992).
  • (29) A. Forbes, A. Dudley and M. McLaren, Advances in Optics and Photonics 8, 200–227 (2016).
  • (30) A. Mair, A. Vaziri, G. Weihs and A. Zeilinger, Nature 412, 313–316 (2001).
  • (31) H. Qassim, F. M. Miatto, J. P. Torres, M. J. Padgett, E. Karimi and R. W. Boyd, J. Opt. Soc. Am. B 31, A20–A23 (2014).
  • (32) G. C. Berkhout, M. P. Lavery, J. Courtial, M. W. Beijersbergen and M. J. Padgett, Phys. Rev. Lett. 105, 153601 (2010).
  • (33) H. Larocque, J. Gagnon-Bischoff, D. Mortimer, Y. Zhang, F. Bouchard, J. Upham, V. Grillo, R. W. Boyd and E. Karimi, Optics Express 25, 19832–19843 (2017).
  • (34) M. Mafu,A. Dudley, S. Goyal, D. Giovannini, M. McLaren, M. J Padgett, T. Konrad, F. Petruccione, N. Lütkenhaus, A. Forbes, Phys. Rev. A 88, 032305 (2013).
  • (35) M. Mirhosseini, O. S. Magaña-Loaiza, M. N. O’Sullivan, B. Rodenburg, M. Malik, M. P. J. Lavery, M. J. Padgett, D. J. Gauthier, R. W. Boyd, New J. Phys. 17, 033033 (2015).
  • (36) G. Vallone, V. D’Ambrosio, A. Sponselli, S. Slussarenko, L. Marrucci, F. Sciarrino and P. Villoresi, Phys. Rev. Lett. 113, 060503 (2014).
  • (37) M. Krenn, J. Handsteiner, M. Fink, R. Fickler and A. Zeilinger, PNAS 112, 14197–14201 (2015).
  • (38) A. Sit, F. Bouchard, R. Fickler, J. Gagnon-Bischoff, H. Larocque, K. Heshami, D. Elser, C. Peuntinger, K. Günthner, B. Heim, C. Marquardt, G. Leuchs, R. W. Boyd and E. Karimi, Optica 4, 1006–1010 (2017).
  • (39) F. Bouchard, A. Sit, F. Hufnagel, A. Abbas, Y. Zhang, K. Heshami, R. Fickler, C. Marquardt, G. Leuchs, R. W. Boyd and E. Karimi, eprint arXiv:1801.10299.
  • (40) M. Born and E. Wolf, (Elsevier, 2013).
  • (41) E. Karimi, D. Giovannini, E. Bolduc, N. Bent, F. M. Miatto, M. J. Padgett and R. W. Boyd, Physical Review A 89, 013829 (2014).
  • (42) E. Karimi, R. W. Boyd, P. de la Hoz, H. de Guise, J. Řeháček Z. Hradil, A. Aiello, G. Leuchs and L. L. Sànchez-Soto, Physical review A 89, 063813 (2014).
  • (43) L. Marrucci, C. Manzo and D. Paparo, Phys. Rev. Lett. 96, 163905 (2006).
  • (44) M. Mirhosseini, O. S Magana-Loaiza, C. Chen, B. Rodenburg, M. Malik, R. W. Boyd, Opt. Express 21, 30196–30203 (2013).
  • (45) M. Beijersbergen, R. Coerwinkel, M. Kristensen and J. Woerdman, Opt. Commun. 112, 321–327 (1994).
  • (46) N. Yu, P. Genevet, M. A. Kats, F. Aieta, J.-P. Tetienne, F. Capasso and Z. Gaburro, Science 334, 333–337 (2011).
  • (47) E. Karimi, S. A. Schulz, I. D. Leon, H. Qassim, J. Upham, R. W. Boyd, Light: Sci. & App. 3, e167 (2014).
  • (48) F. Bouchard, I. D. Leon, S. A. Schulz, J. Upham, E. Karimi, R. W. Boyd, Appl. Phys. Lett. 105, 101905 (2014).
  • (49) T. Durt, B.-G. Englert, I. Bengtsson and K. Życzkowski, Int. J. Quantum Inf. 8, 535–640 (2010).
  • (50) B.-G. Englert, D. Kaszlikowski, H. K. Ng, W. K. Chua, J. Řeháček, J. Anders, eprint arXiv:0412075.
  • (51) F. Bouchard, K. Heshami, D. England, R. Fickler, R. W. Boyd, B.-G. Englert, L. L. Sánchez-Soto, E. Karimi, eprint arXiv:1802.05773.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
Add comment
Loading ...
This is a comment super asjknd jkasnjk adsnkj
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test description