Efficient passive measurement-device-independent quantum key distribution

被引:20
作者
Zhang, Chun-Hui [1 ,2 ,3 ]
Zhang, Chun-Mei [1 ,2 ,3 ]
Wang, Qin [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Quantum Informat & Technol, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Key Lab Minist Educ, Broadband Wireless Commun & Sensor Network Techno, Nanjing 210003, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Telecommun & Networks Natl Engn Res Ctr, Nanjing 210003, Jiangsu, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
CRYPTOGRAPHY; SECURITY; PROOF;
D O I
10.1103/PhysRevA.99.052325
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
To date, only active-decoy-state methods have been adopted in current measurement-device-independent (MDI) quantum key distribution (QKD) protocols, causing security loopholes when modulating multiple light intensities with practical devices. To solve this problem, the passive-decoy-state method will be a good choice. Until today practical passive-decoy-state MDI QKD is still missing. In this paper, based on a recently discussed structure of heralded single-photon sources, we propose a passive-decoy-state MDI QKD protocol. In present work, one does not need to modulate light sources into different intensities, but utilizes the built-in local detection events to passively generate different decoy states. Furthermore, through carrying out an appropriate mathematical method, we are able to give very precise estimations for single-photon-pair contributions. As a result, our protocol can exhibit distinct advantages compared with state-of-the-art MDI QKD schemes even when the finite-key-size effect is taken into account. Therefore, our protocol seems a promising candidate to enhance both the security and performance of MDI QKD in practical implementation.
引用
收藏
页数:6
相关论文
共 38 条
  • [1] Simple and efficient quantum key distribution with parametric down-conversion
    Adachi, Yoritoshi
    Yamamoto, Takashi
    Koashi, Masato
    Imoto, Nobuyuki
    [J]. PHYSICAL REVIEW LETTERS, 2007, 99 (18)
  • [2] Bennett C. H., 1984, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, P175, DOI [10.1016/j.tcs.2011.08.039, DOI 10.1016/J.TCS.2014.05.025]
  • [3] Secure Quantum Key Distribution over 421 km of Optical Fiber
    Boaron, Alberto
    Boso, Gianluca
    Rusca, Davide
    Vulliez, Cedric
    Autebert, Claire
    Caloz, Misael
    Perrenoud, Matthieu
    Gras, Gaetan
    Bussieres, Felix
    Li, Ming-Jun
    Nolan, Daniel
    Martin, Anthony
    Zbinden, Hugo
    [J]. PHYSICAL REVIEW LETTERS, 2018, 121 (19)
  • [4] Side-Channel-Free Quantum Key Distribution
    Braunstein, Samuel L.
    Pirandola, Stefano
    [J]. PHYSICAL REVIEW LETTERS, 2012, 108 (13)
  • [5] Passive Decoy-State Quantum Key Distribution with Coherent Light
    Curty, Marcos
    Jofre, Marc
    Pruneri, Valerio
    Mitchell, Morgan W.
    [J]. ENTROPY, 2015, 17 (06) : 4064 - 4082
  • [6] Finite-key analysis for measurement-device-independent quantum key distribution
    Curty, Marcos
    Xu, Feihu
    Cui, Wei
    Lim, Charles Ci Wen
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    [J]. NATURE COMMUNICATIONS, 2014, 5
  • [7] Passive decoy-state quantum key distribution with practical light sources
    Curty, Marcos
    Ma, Xiongfeng
    Qi, Bing
    Moroder, Tobias
    [J]. PHYSICAL REVIEW A, 2010, 81 (02)
  • [8] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [9] Full-field implementation of a perfect eavesdropper on a quantum cryptography system
    Gerhardt, Ilja
    Liu, Qin
    Lamas-Linares, Anta
    Skaar, Johannes
    Kurtsiefer, Christian
    Makarov, Vadim
    [J]. NATURE COMMUNICATIONS, 2011, 2
  • [10] Reexamination of the decoy-state quantum key distribution with an unstable source
    Hu, Jia-Zhong
    Wang, Xiang-Bin
    [J]. PHYSICAL REVIEW A, 2010, 82 (01):