2013
DOI: 10.1088/1367-2630/15/11/113007
|View full text |Cite
|
Sign up to set email alerts
|

Practical aspects of measurement-device-independent quantum key distribution

Abstract: A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD), removes all attacks from the detection system, the most vulnerable part in QKD implementations. In this paper, we present an analysis for practical aspects of MDI-QKD. To evaluate its performance, we study various error sources by developing a general system model. We find that MDI-QKD is highly practical and thus can be easily implemented with standard optical devices. Moreover, we present a simple analytical method with only… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
165
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 151 publications
(166 citation statements)
references
References 59 publications
1
165
0
Order By: Relevance
“…Moreover, we use a rather generic channel model that includes an intrinsic error rate that simulates the misalignment and instability of the optical system. This is done by placing a unitary rotation in both input arms of the 50:50 beam splitter, and another unitary rotation in one of its output arms 48 . In addition, we fix the security bound to E ¼ 10 À 10 .…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, we use a rather generic channel model that includes an intrinsic error rate that simulates the misalignment and instability of the optical system. This is done by placing a unitary rotation in both input arms of the 50:50 beam splitter, and another unitary rotation in one of its output arms 48 . In addition, we fix the security bound to E ¼ 10 À 10 .…”
Section: Discussionmentioning
confidence: 99%
“…emitted by Alice (l = i) and Bob (l = j), which are used to estimate the coincidence counts at Charlie's detectors [11,12]. The random variable τ in Eq.…”
Section: G Theoretical Estimation Of the Visibilitymentioning
confidence: 99%
“…Due to their high sensitivity and complex design, detectors are the most frequently attacked components. Recently it was shown that two-photon interference [11] from independent light sources can be exploited to avoid the use of detectors at the two ends of the communication channel [12,13]. This new form of detection-safe quantum cryptography, called Measurement-Device-Independent Quantum Key Distribution (MDI-QKD), has been experimentally demonstrated [13][14][15][16][17][18], but with modest delivered key rates.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…We perform a numerical simulation to optimize the performance [28]: average photon numbers are chosen to be µ = 0.3 for the signal state, ν = 0.1 and ω = 0.01 for the two decoy states [29]; the ratio of numbers of pulses sent out with intensities µ, ν, and ω is set to be 4 : 9 : 7. Active phase randomization is implemented to defend against attacks on the imperfect weak coherent sources.…”
mentioning
confidence: 99%