Experimental three-state measurement-device-independent quantum key distribution with uncharacterized sources.

Measurement-device-independent quantum key distribution (MDI-QKD) removes all detector side-channel attacks and guarantees a promising way for remote secret keys sharing. Several proof-of-principal experiments have been demonstrated to show its security and practicality. However, these practical implementations demand mostly, for example, perfect state preparation or completely characterized sources to ensure security, which are difficult to realize with prior art. Here, we investigate a three-state MDI-QKD using uncharacterized sources, with the simple requirement that the encoding state is bidimensional, which eliminates security threats from both the source flaws and detection loopholes. As a demonstration, a proof-of-principal experiment over 170 km transmission distance based on Faraday-Michelson interferometers is achieved, representing, to the best of our knowledge, the longest transmission distance recorded under the same security level.

[1]  Shuang Wang,et al.  Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.

[2]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[3]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[4]  Hoi-Kwong Lo,et al.  Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.

[5]  Xiongfeng Ma,et al.  Secure quantum key distribution with realistic devices , 2020 .

[6]  Hui Liu,et al.  Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.

[7]  Qin Wang,et al.  Practical Phase-Modulation Stabilization in Quantum Key Distribution via Machine Learning , 2019, Physical Review Applied.

[8]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[9]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[10]  R. Penty,et al.  Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.

[11]  Shuang Wang,et al.  Experimental measurement-device-independent quantum key distribution with uncharacterized encoding. , 2016, Optics letters.

[12]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[13]  Guang-Can Guo,et al.  Improved Decoy-State Measurement-Device-Independent Quantum Key Distribution With Imperfect Source Encoding , 2019, IEEE Photonics Journal.

[14]  Zach DeVito,et al.  Opt , 2017 .

[15]  Hong-Yi Su,et al.  Improved measurement-device-independent quantum key distribution with uncharacterized qubits , 2017, 1706.02927.

[16]  Ilgaitis Prūsis,et al.  Nature of Photon , 2019 .

[17]  D. Trotter,et al.  Metropolitan quantum key distribution with silicon photonics , 2017, 1708.00434.

[18]  Bing Zhu,et al.  Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin , 2004, quant-ph/0412023.

[19]  G. Guo,et al.  Faraday-Michelson system for quantum cryptography. , 2005, Optics letters.

[20]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[21]  H. Lo,et al.  Experimental measurement-device-independent quantum key distribution with imperfect sources , 2015, 1508.03562.

[22]  Wei Chen,et al.  Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources , 2014, 1407.1924.

[23]  Qin Wang,et al.  The statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sources , 2016, Quantum Inf. Process..

[24]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[25]  Wei Chen,et al.  Decoy-state measurement-device-independent quantum key distribution with mismatched-basis statistics , 2015 .

[26]  Travis S. Humble,et al.  Quantum supremacy using a programmable superconducting processor , 2019, Nature.

[27]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[28]  Wei Chen,et al.  Measurement-device-independent quantum key distribution with uncharacterized qubit sources , 2013 .

[29]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[30]  Y.-H. Zhou,et al.  Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.