scholarly journals Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method

2018 ◽  
Vol 26 (10) ◽  
pp. 13289 ◽  
Author(s):  
Chen-Chen Mao ◽  
Xing-Yu Zhou ◽  
Jian-Rong Zhu ◽  
Chun-Hui Zhang ◽  
Chun-Mei Zhang ◽  
...  
2014 ◽  
Vol 90 (4) ◽  
Author(s):  
Yu-Zhu Shan ◽  
Shi-Hai Sun ◽  
Xiang-Chun Ma ◽  
Mu-Sheng Jiang ◽  
Yan-Li Zhou ◽  
...  

2019 ◽  
Vol 17 (01) ◽  
pp. 1950005
Author(s):  
Peng Zhang ◽  
Rong-Zhen Jiao

The performance of measurement-device-independent quantum key distribution (MDI-QKD) with different numbers of decoy-state are compared. The statistical fluctuation due to the finite length of data is considered based on the standard statistical analysis. The simulation results show that two-decoy-state method is a nearly optimal estimation in the asymptotic case. In the condition of considering statistical fluctuations, the finite length of raw key will slightly decrease the secret key rate. In all simulation cases, the key rate is maximized by optimizing the intensities of the signals. Our numerical simulation may provide valuable theoretical reference for the practical MDI-QKD experiments.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


Sign in / Sign up

Export Citation Format

Share Document