Measurement-Device-Independent Quantum Key Distribution Protocols for Heralded Pair Coherent State

2017 ◽  
Vol 54 (12) ◽  
pp. 122703
Author(s):  
朱卓丹 Zhu Zhuodan ◽  
张茜 Zhang Xi ◽  
赵尚弘 Zhao Shanghong ◽  
苏力华 Su Lihua ◽  
王星宇 Wang Xingyu
2020 ◽  
Vol 40 (24) ◽  
pp. 2427001
Author(s):  
何业锋 He Yefeng ◽  
赵艳坤 Zhao Yankun ◽  
李春雨 Li Chunyu ◽  
郭佳瑞 Guo Jiarui

Laser Physics ◽  
2016 ◽  
Vol 26 (6) ◽  
pp. 065203
Author(s):  
Xiang Wang ◽  
Yang Wang ◽  
Rui-Ke Chen ◽  
Chun Zhou ◽  
Hong-Wei Li ◽  
...  

2014 ◽  
Vol 63 (20) ◽  
pp. 200304
Author(s):  
Dong Chen ◽  
Zhao Shang-Hong ◽  
Zhang Ning ◽  
Dong Yi ◽  
Zhao Wei-Hu ◽  
...  

2021 ◽  
pp. 2150195
Author(s):  
Yefeng He ◽  
Wenping Ma

In order to eliminate the influence of the channel noise, two new measurement-device-independent quantum key distribution (MDI-QKD) protocols are proposed with logical quantum states. They can resist collective-dephasing noise and collective-rotation noise, respectively. This paper produces logical quantum states by adding the auxiliary light sources, the CNOT operations and the Hadamard transforms in the system model. The main light sources and auxiliary light sources are flexible and easily implemented, since they can be weak coherent state (WCS) sources, heralded single-photon sources (HSPSs) or heralded pair coherent state (HPCS) sources. To generate one key bit, the new MDI-QKD protocols only need one logical qubit with two particles so that they have high qubit efficiency. Moreover, the new protocols also use partial Bell-state measurement (BSM) which is very easily implemented with existing technologies.


2014 ◽  
Vol 39 (4) ◽  
pp. 880 ◽  
Author(s):  
Mo Li ◽  
Chun-Mei Zhang ◽  
Zhen-Qiang Yin ◽  
Wei Chen ◽  
Shuang Wang ◽  
...  

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


Sign in / Sign up

Export Citation Format

Share Document