Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Boosting the performance of loss-tolerant measurement-device-independent quantum key distribution

Not Accessible

Your library or personal account may give you access

Abstract

Measurement-device-independent quantum key distribution can remove all possible detector side channels, and is robust against state preparation flaws when further combined with the loss-tolerant method. However, the secure key rate in this scenario is relatively low, thus hindering its practical application. Here, we first present a four-intensity decoy-state protocol where the signal intensity is modulated only in Z basis for key generation while the decoy intensities are modulated in both Z and X bases for parameter estimation. Moreover, we adopt collective constraint and joint-study strategy in statistical fluctuation analysis. We have also experimentally demonstrated this protocol and the result indicates high performance and good security for practical applications.

© 2023 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Asynchronous measurement-device-independent quantum key distribution with hybrid source

Jun-Lin Bai, Yuan-Mei Xie, Yao Fu, Hua-Lei Yin, and Zeng-Bing Chen
Opt. Lett. 48(13) 3551-3554 (2023)

Experimental measurement-device-independent quantum key distribution with uncharacterized encoding

Chao Wang, Shuang Wang, Zhen-Qiang Yin, Wei Chen, Hong-Wei Li, Chun-Mei Zhang, Yu-Yang Ding, Guang-Can Guo, and Zheng-Fu Han
Opt. Lett. 41(23) 5596-5599 (2016)

Experimental measurement-device-independent quantum key distribution with the double-scanning method

Yi-Peng Chen, Jing-Yang Liu, Ming-Shuo Sun, Xing-Xu Zhou, Chun-Hui Zhang, Jian Li, and Qin Wang
Opt. Lett. 46(15) 3729-3732 (2021)

Supplementary Material (1)

NameDescription
Supplement 1       Supplementary material?

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (4)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (2)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (1)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.