Alternative schemes for measurement-device-independent quantum key distribution

被引:221
作者
Ma, Xiongfeng [1 ,2 ,3 ]
Razavi, Mohsen [3 ]
机构
[1] Tsinghua Univ, Ctr Quantum Informat, Inst Interdisciplinary Informat Sci, Beijing 100084, Peoples R China
[2] Univ Toronto, Dept Phys, Ctr Quantum Informat & Quantum Control, Toronto, ON, Canada
[3] Univ Leeds, Sch Elect & Elect Engn, Leeds, W Yorkshire, England
来源
PHYSICAL REVIEW A | 2012年 / 86卷 / 06期
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
UNCONDITIONAL SECURITY; CRYPTOGRAPHY; PROOF; COMMUNICATION; ATTACK;
D O I
10.1103/PhysRevA.86.062319
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Practical schemes for measurement-device-independent quantum key distribution using phase and path or time encoding are presented. In addition to immunity to existing loopholes in detection systems, our setup employs simple encoding and decoding modules without relying on polarization maintenance or optical switches. Moreover, by employing a modified sifting technique to handle the dead-time limitations in single-photon detectors, our scheme can be run with only two single-photon detectors. With a phase-post-selection technique, a decoy-state variant of our scheme is also proposed, whose key generation rate scales linearly with the channel transmittance.
引用
收藏
页数:12
相关论文
共 70 条
[1]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]   From Bell's theorem to secure quantum key distribution [J].
Acin, Antonio ;
Gisin, Nicolas ;
Masanes, Lluis .
PHYSICAL REVIEW LETTERS, 2006, 97 (12)
[3]   Quantum key distribution over probabilistic quantum repeaters [J].
Amirloo, Jeyran ;
Razavi, Mohsen ;
Majedi, A. Hamed .
PHYSICAL REVIEW A, 2010, 82 (03)
[4]   Squashing models for optical measurements in quantum communication [J].
Beaudry, Normand J. ;
Moroder, Tobias ;
Lutkenhaus, Norbert .
PHYSICAL REVIEW LETTERS, 2008, 101 (09)
[5]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[6]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[7]   Quantum cryptographic network based on quantum memories [J].
Biham, E ;
Huttner, B ;
Mor, T .
PHYSICAL REVIEW A, 1996, 54 (04) :2651-2658
[8]   DISCUSSION OF EXPERIMENTAL PROOF FOR THE PARADOX OF EINSTEIN, ROSEN, AND PODOLSKY [J].
BOHM, D ;
AHARONOV, Y .
PHYSICAL REVIEW, 1957, 108 (04) :1070-1076
[9]   One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering [J].
Branciard, Cyril ;
Cavalcanti, Eric G. ;
Walborn, Stephen P. ;
Scarani, Valerio ;
Wiseman, Howard M. .
PHYSICAL REVIEW A, 2012, 85 (01)
[10]  
Brassard G., 1993, ADV CRYPTOLOGY EUROC