2014
DOI: 10.1103/physrevlett.113.190501
|View full text |Cite
|
Sign up to set email alerts
|

Measurement-Device-Independent Quantum Key Distribution over 200 km

Abstract: Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1  bit/s. Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
150
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 252 publications
(154 citation statements)
references
References 42 publications
2
150
2
Order By: Relevance
“…Further experiments, accounting for long-distance, high-loss field tests as well as high-visibility interference with an optically seeded laser, have also been reported [21][22][23][24]. Nevertheless, these are all limited to point-to-point configurations.…”
Section: Introductionmentioning
confidence: 98%
“…Further experiments, accounting for long-distance, high-loss field tests as well as high-visibility interference with an optically seeded laser, have also been reported [21][22][23][24]. Nevertheless, these are all limited to point-to-point configurations.…”
Section: Introductionmentioning
confidence: 98%
“…The MDIQKD protocol has been demonstrated over 200 km [26,27,28,29] and in field test [30]. While the MDIQKD protocol enjoys the advantage of being secure against any detection loopholes, the RRDPS protocol is able to tolerate higher error rate.…”
Section: Db/kmmentioning
confidence: 99%
“…Examples of such schemes are distribution of entangled photon pairs to end users, where local measurements are performed, 9 or conversely, where photons are sent by two users to be projected into a Bell state by an intermediate quantum node. [10][11][12] Photonic quantum repeaters 13 and relays 8 use both of these effects to teleport entangled or single qubits, respectively, in a manner that can be chained to create a fully quantum network for which theoretically proven quantum security can be preserved.…”
Section: Introductionmentioning
confidence: 99%