scholarly journals Resource-Efficient Measurement-Device-Independent Entanglement Witness

2016 ◽  
Vol 116 (19) ◽  
Author(s):  
E. Verbanis ◽  
A. Martin ◽  
D. Rosset ◽  
C. C. W. Lim ◽  
R. T. Thew ◽  
...  
2020 ◽  
Vol 29 (8) ◽  
pp. 080301
Author(s):  
Zhi-Jin Ke ◽  
Yi-Tao Wang ◽  
Shang Yu ◽  
Wei Liu ◽  
Yu Meng ◽  
...  

2014 ◽  
Vol 112 (14) ◽  
Author(s):  
Ping Xu ◽  
Xiao Yuan ◽  
Luo-Kan Chen ◽  
He Lu ◽  
Xing-Can Yao ◽  
...  

Author(s):  
Nayana Das ◽  
Goutam Paul

Quantum dialogue is a process of two-way secure and simultaneous communication using a single channel. Recently, a Measurement Device Independent Quantum Dialogue (MDI-QD) protocol has been proposed [A. Maitra, Measurement device independent quantum dialogue,Quantum Inf. Process. 16(12) (2017) 305]. To make the protocol secure against information leakage, the authors have discarded almost half of the qubits remaining after the error estimation phase. In this paper, we propose two modified versions of the MDI-QD protocol such that the number of discarded qubits is reduced to almost one-fourth of the remaining qubits after the error estimation phase. We use almost half of their discarded qubits along with their used qubits to make our protocol more efficient in qubits count. We show that both of our protocols are secure under the same adversarial model given in MDI-QD protocol.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


Sign in / Sign up

Export Citation Format

Share Document