2014
DOI: 10.1103/physreva.90.052319
|View full text |Cite
|
Sign up to set email alerts
|

Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources

Abstract: In the postprocessing of quantum key distribution, the raw key bits from the mismatched-basis measurements, where two parties use different bases, are normally discarded. Here, we propose a postprocessing method that exploits measurement statistics from mismatched-basis cases, and prove that incorporating these statistics enables uncharacterized qubit sources to be used in the measurement-device-independent quantum key distribution protocol and the Bennett-Brassard 1984 protocol, a case which is otherwise impo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
26
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(27 citation statements)
references
References 53 publications
1
26
0
Order By: Relevance
“…Another interesting line of research would be to look at the semi-device-independent security of our protocol assuming that the dimension of the verifier's quantum challenges (states) is fixed. Several results have been obtained in this direction for measurement-device-independent QKD [35,36], to which suggest that similar conclusions could hold for our QPV protocol.…”
Section: Discussionsupporting
confidence: 64%
“…Another interesting line of research would be to look at the semi-device-independent security of our protocol assuming that the dimension of the verifier's quantum challenges (states) is fixed. Several results have been obtained in this direction for measurement-device-independent QKD [35,36], to which suggest that similar conclusions could hold for our QPV protocol.…”
Section: Discussionsupporting
confidence: 64%
“…A similar result was recovered numerically in [24] for general qubit POVMs on Alice's side, assuming that Bob also performs qubit measurements. The prepare-and-measure version of BB84 was also studied numerically in [25] at a similar level of device independence, where Alice's source prepares unknown pure qubit states and Bob performs unknown projective qubit measurements.…”
Section: Bb84 and Device Independencementioning
confidence: 99%
“…Besides, we provide a concise security analysis for both the single-photon case and the decoy-state case, using a virtual-photon qubit idea. Compared with the existing protocol [51][52][53][54][55], the security proof of our protocol is much more straightforward, and the data post-processing is easier to be applied for experimentists. Simulation with realistic experimental parameters also shows that our protocol has a promising performance, and thus can be applied to practical QKD applications.…”
Section: Arxiv:170404371v3 [Quant-ph] 17 Jan 2018mentioning
confidence: 99%
“…Furthermore, several protocols have been proposed [51][52][53][54][55] to relax the assumptions on the encoding systems. By modifying the original MDI-QKD and assuming qubit sources, Yin et al [51,52] have proved that MDI-QKD can still be secure with uncharacterized encoding systems. In [53], MDI-QKD based on the CHSH inequality (CHSH-MDI-QKD) has been investigated, in which the state is prepared in the twodimensional Hilbert space.…”
Section: Introductionmentioning
confidence: 99%