2012
DOI: 10.1103/physreva.86.062319
|View full text |Cite
|
Sign up to set email alerts
|

Alternative schemes for measurement-device-independent quantum key distribution

Abstract: Practical schemes for measurement-device-independent quantum key distribution using phase and path or time encoding are presented. In addition to immunity to existing loopholes in detection systems, our setup employs simple encoding and decoding modules without relying on polarization maintenance or optical switches. Moreover, by employing a modified sifting technique to handle the dead-time limitations in single-photon detectors, our scheme can be run with only two singlephoton detectors. With a phase-postsel… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

3
185
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
10

Relationship

3
7

Authors

Journals

citations
Cited by 223 publications
(188 citation statements)
references
References 68 publications
3
185
0
Order By: Relevance
“…With decoy-state optimization, the laser-pulse probabilities of the vacuum state, weak decoy state, and signal state are 16%, 58%, and 26%, and their intensities are modulated by AM1 into 0, ν ¼ 0.1, and μ ¼ 0.33, respectively. Each user employs the time-bin phase-encoding scheme [29], in which only the raw data in the Z basis are used for final key generation, and those in the X basis are used for phase-error estimation. The signal state is encoded in the Z basis.…”
Section: B Theoretical Optimizationmentioning
confidence: 99%
“…With decoy-state optimization, the laser-pulse probabilities of the vacuum state, weak decoy state, and signal state are 16%, 58%, and 26%, and their intensities are modulated by AM1 into 0, ν ¼ 0.1, and μ ¼ 0.33, respectively. Each user employs the time-bin phase-encoding scheme [29], in which only the raw data in the Z basis are used for final key generation, and those in the X basis are used for phase-error estimation. The signal state is encoded in the Z basis.…”
Section: B Theoretical Optimizationmentioning
confidence: 99%
“…Finally, we need to maintain polarization across the channel, which can be challenging over long distances. This condition can be alleviated by using an equivalent phase-encoding scheme [29].…”
Section: -5mentioning
confidence: 99%
“…The MDI-QKD protocol [23][24][25] was first proposed to defend detector side channels. Then many methods were introduced to improve the secret key rate and transmission distance of the protocol, such as using different kinds of sources [26][27][28], explicitly utilizing the decoy states to dramatically increase the secret key rates [29,30], enhancing the practical security by tight finite-size analysis [31][32][33], etc.…”
Section: Introductionmentioning
confidence: 99%