scholarly journals Reply to 'Discrete and continuous variables for measurement-device-independent quantum cryptography'

2015 ◽  
Vol 9 (12) ◽  
pp. 773-775 ◽  
Author(s):  
Stefano Pirandola ◽  
Carlo Ottaviani ◽  
Gaetana Spedalieri ◽  
Christian Weedbrook ◽  
Samuel L. Braunstein ◽  
...  
2015 ◽  
Vol 9 (12) ◽  
pp. 772-773 ◽  
Author(s):  
Feihu Xu ◽  
Marcos Curty ◽  
Bing Qi ◽  
Li Qian ◽  
Hoi-Kwong Lo

SPIE Newsroom ◽  
2015 ◽  
Author(s):  
Ulrik L. Andersen ◽  
Tobias Gehring ◽  
Christian S. Jacobsen ◽  
Stefano Pirandola

2020 ◽  
Vol 238 ◽  
pp. 09002
Author(s):  
Jesús Liñares-Beiras ◽  
Xesús Prieto-Blanco ◽  
Daniel Balado ◽  
Gabriel M. Carral

We present an autocompensating quantum cryptography technique for Measurement-Device-Independent quantum cryptography devices with different kind of optical fiber modes. We center our study on collinear spatial modes in few-mode optical fibers by using both fiber and micro-optical components. We also indicate how the obtained results can be easily extended to polarization modes in monomode optical fibers and spatial codirectional modes in multicore optical fibers.


2015 ◽  
Vol 9 (6) ◽  
pp. 397-402 ◽  
Author(s):  
Stefano Pirandola ◽  
Carlo Ottaviani ◽  
Gaetana Spedalieri ◽  
Christian Weedbrook ◽  
Samuel L. Braunstein ◽  
...  

2015 ◽  
Vol 21 (3) ◽  
pp. 148-158 ◽  
Author(s):  
Feihu Xu ◽  
Marcos Curty ◽  
Bing Qi ◽  
Hoi-Kwong Lo

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


Sign in / Sign up

Export Citation Format

Share Document