The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states

We put forward a new scheme for implementing the measurement-device-independent quantum key distribution (QKD) with weak coherent source, while using only two different intensities. In the new scheme, we insert a beam splitter and a local detector at both Alice’s and Bob’s side, and then all the triggering and non-triggering signals could be employed to process parameter estimations, resulting in very precise estimations for the two-single-photon contributions. Besides, we compare its behavior with two other often used methods, i.e., the conventional standard three-intensity decoy-state measurement-device-independent QKD and the passive measurement-device-independent QKD. Through numerical simulations, we demonstrate that our new approach can exhibit outstanding characteristics not only in the secure transmission distance, but also in the final key generation rate.

[1]  Hoi-Kwong Lo,et al.  Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.

[2]  R. Penty,et al.  Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.

[3]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[4]  T. Moroder,et al.  Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.

[5]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[6]  Qiaoyan Wen,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2012 .

[7]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[8]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[9]  Jian Wang,et al.  Publisher's Note: Measurement-Device-Independent Quantum Key Distribution over 200 km [Phys. Rev. Lett. 113, 190501 (2014)] , 2015 .

[10]  Jian-Wei Pan,et al.  Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.

[11]  G. Guo,et al.  Experimental demonstration of quantum key distribution without monitoring of the signal disturbance , 2015, 1505.07884.

[12]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[13]  N. Lutkenhaus,et al.  Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.

[14]  A. Karlsson,et al.  Improved practical decoy state method in quantum key distribution with parametric down-conversion source , 2007 .

[15]  H. Lo,et al.  Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.

[16]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[17]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[18]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[19]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[20]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[21]  Qin Wang,et al.  Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.

[22]  Xiang‐Bin Wang,et al.  Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100% , 2014 .

[23]  Zheng-Fu Han,et al.  Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source , 2014, Quantum Information Processing.

[24]  Dong Liu,et al.  Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.

[25]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[26]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[27]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[28]  Qin Wang,et al.  Simulating of the measurement-device independent quantum key distribution with phase randomized general sources , 2014, Scientific Reports.

[29]  P. A. Hiskett,et al.  Experimental decoy state quantum key distribution , 2007, 2007 Quantum Electronics and Laser Science Conference.

[30]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[31]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[32]  Shuang Wang,et al.  Experimental demonstration of a quantum key distribution without signal disturbance monitoring , 2015, Nature Photonics.