2016
DOI: 10.1103/physreva.93.042324
|View full text |Cite
|
Sign up to set email alerts
|

Making the decoy-state measurement-device-independent quantum key distribution practically useful

Abstract: The relatively low key rate seems to be the major barrier to its practical use for the decoy state measurement device independent quantum key distribution (MDIQKD). We present a 4-intensity protocol for the decoy-state MDIQKD that hugely raises the key rate, especially in the case the total data size is not large. Also, calculation shows that our method makes it possible for secure private communication with fresh keys generated from MDIQKD with a delay time of only a few seconds.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
194
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 254 publications
(196 citation statements)
references
References 75 publications
0
194
0
2
Order By: Relevance
“…In addition, recently we notice some novel work individually done by Xu et al [45] and Wang et al [46]. The finite data size effects are analyzed and full parameter optimization are applied, they both dramatically improve the key generation rate of MDI-QKD with a few decoy-states, making the MDI-QKD practically useful.…”
Section: Numerical Simulationsmentioning
confidence: 98%
“…In addition, recently we notice some novel work individually done by Xu et al [45] and Wang et al [46]. The finite data size effects are analyzed and full parameter optimization are applied, they both dramatically improve the key generation rate of MDI-QKD with a few decoy-states, making the MDI-QKD practically useful.…”
Section: Numerical Simulationsmentioning
confidence: 98%
“…Because of the statistical fluctuations, the observables (gains) we obtain in the Z basis might deviate from their respective expected values, which will lie within a certain 'confidence interval' around the observed values. Here we will perform a standard error analysis, similar to that in [15,22,25], which is meant to be a straightforward estimation of the performance of TF-QKD under asymmetry and with practical data size, but not as a rigorous proof for composable security.…”
Section: A2 Finite-size Effectsmentioning
confidence: 99%
“…Based on the theory of quantum physics, quantum key distribution (QKD) [1] provides a way of generating information-theoretic secure keys between two distant parties Alice and Bob, even in the presence of a malicious eavesdropper Eve. Since the first Bennett-Brassard-1984 (BB84) protocol was proposed in 1984, a series of works have been made to improve the practical performance of QKD systems [2][3][4][5][6][7][8][9][10][11][12][13][14]. Generally, in most of these systems, the complicated and real-time operation of calibrating reference frames is indispensable to assure the regular running of practical QKD systems [4,[11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%