“…[1] Since the first QKD protocol was proposed in 1984, [2] it has been widely concerned theories and experiment. [3][4][5][6][7][8][9][10][11][12][13] However, in applications, the unsatisfactory equipment may lead to some vulnerabilities that can be attacked, [14,15] mainly in the light source at the transmitter and detector at the receiver. As a countermeasure, the decoy-state protocol [16,17] settle the security issue of photon number splitting (PNS), and measurement device independent (MDI) QKD protocol is immune to all attacks against the vulnerabilities of detectors.…”