“…However, the deviation between the theoretical assumption and the actual implementation will effect the performance and may lead to a loophole in the practical system that could be used by Eve to intercept key information without being discovered. The loopholes involve the the laser source [ 23 , 24 , 25 ], the local oscillator [ 26 , 27 ], the beam splitter (BS) [ 28 , 29 , 30 ], the basis choice [ 31 ], and the detector [ 32 , 33 , 34 , 35 , 36 , 37 ]. Nowadays, researchers have proposed the CV-MDI-QKD protocol [ 38 , 39 , 40 ], which can defend all detector side channels.…”