Practical Long‐Distance Measurement‐Device‐Independent Quantum Key Distribution By Four‐Intensity Protocol

2021 ◽  
pp. 2100069
Author(s):  
Xiao‐Long Hu ◽  
Cong Jiang ◽  
Zong‐Wen Yu ◽  
Xiang‐Bin Wang
2020 ◽  
Vol 125 (26) ◽  
Author(s):  
Yuan Cao ◽  
Yu-Huai Li ◽  
Kui-Xing Yang ◽  
Yang-Fan Jiang ◽  
Shuang-Lin Li ◽  
...  

2020 ◽  
Vol 2 (3) ◽  
Author(s):  
Kieran N. Wilkinson ◽  
Panagiotis Papanastasiou ◽  
Carlo Ottaviani ◽  
Tobias Gehring ◽  
Stefano Pirandola

Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1010
Author(s):  
Guoqi Huang ◽  
Qin Dong ◽  
Wei Cui ◽  
Rongzhen Jiao

Measurement-device-independent quantum key distribution (MDI-QKD) protocol has high practical value. Satellite-based links are useful to build long-distance quantum communication network. The model of satellite-based links for MDI-QKD was proposed but it lacks practicality. This work further analyzes the performance of it. First, MDI-QKD and satellite-based links model are introduced. Then considering the operation of the satellite the performance of their combination is studied under different weather conditions. The results may provide important references for combination of optical-fiber-based links on the ground and satellite-based links in space, which is helpful for large-scale quantum communication network.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


Sign in / Sign up

Export Citation Format

Share Document