2016
DOI: 10.1103/physreva.93.042308
|View full text |Cite
|
Sign up to set email alerts
|

Experimental measurement-device-independent quantum key distribution with imperfect sources

Abstract: Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks, is the most promising solution to the security issues in practical quantum key distribution systems. Though several experimental demonstrations of MDI-QKD have been reported, they all make one crucial but not yet verified assumption, that is there are no flaws in state preparation. Such an assumption is unrealistic and security loopholes remain in the source. Here we present, to our knowledg… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

3
66
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 88 publications
(70 citation statements)
references
References 96 publications
3
66
1
Order By: Relevance
“…To achieve this goal, it is necessary to establish a comprehensive list of assumptions on the sources, and verify them one by one. In a recent experimental demonstration, 140 the loss-tolerant protocol is applied to a MDI-QKD setting. Such an experiment thus addresses source and detector flaws at the same time.…”
Section: Mdi-qkdmentioning
confidence: 99%
“…To achieve this goal, it is necessary to establish a comprehensive list of assumptions on the sources, and verify them one by one. In a recent experimental demonstration, 140 the loss-tolerant protocol is applied to a MDI-QKD setting. Such an experiment thus addresses source and detector flaws at the same time.…”
Section: Mdi-qkdmentioning
confidence: 99%
“…This demands an appreciable final key generation in a time scale of seconds. However, prior MDIQKD experiments show that, if statistical fluctuations are taken into consideration, one would need an ample data size to reach a considerable final key rate [12][13][14][15][16][17][18][19][20][21][22][23] . In particular, the number of total pulses at each side N t is assumed to be 10 12 or even larger 25 , which, for a 75 MHz system 15 , would take more than 4 hours to accumulate enough data.…”
mentioning
confidence: 99%
“…In 2004, Gottesman et al proposed the GLLP theory to calculate the secure key generation rate of QKD system with imperfect devices [40]. This method has been adopted in most practical QKD systems [9,[41][42][43][44][45][46][47][48][49][50][51]. Therefore, we use the GLLP theory to model the key generation module.…”
Section: Key Generation Modulementioning
confidence: 99%