The statistical fluctuation analysis for the measurement-device-independent quantum key distribution with heralded single-photon sources

In this paper, we carry out statistical fluctuation analysis for the new proposed measurement-device-independent quantum key distribution with heralded single-photon sources and further compare its performance with the mostly often used light sources, i.e., the weak coherent source. Due to a significantly lower probability for events with two photons present on the same side of the beam splitter in former than in latter, it gives drastically reduced quantum bit error rate in the X basis and can thus show splendid behavior in real-life implementations even when taking statistical fluctuations into account.

[1]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[2]  S. Mori,et al.  On the distribution of 1550-nm photon pairs efficiently generated using a periodically poled lithium niobate waveguide , 2005, quant-ph/0509186.

[3]  A. Karlsson,et al.  Performance enhancement of a decoy-state quantum key distribution using a conditionally prepared down-conversion source in the Poisson distribution , 2007 .

[4]  Tao Zhang,et al.  Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.

[5]  Hoi-Kwong Lo,et al.  Long distance measurement-device-independent quantum key distribution with entangled photon sources , 2013, 1306.5814.

[6]  Xiang‐Bin Wang,et al.  Three-intensity decoy state method for device independent quantum key distribution , 2013, 1309.5886.

[7]  Xiang‐Bin Wang,et al.  Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.

[8]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[9]  Qin Wang,et al.  Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.

[10]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[11]  Y.-H. Zhou,et al.  Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.

[12]  Shanghong Zhao,et al.  Analysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency , 2014, Quantum Inf. Process..

[13]  Feihu Xu,et al.  Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.

[14]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[15]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[16]  Feng Zhu,et al.  A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light , 2015, Quantum Inf. Process..

[17]  Wei Chen,et al.  Decoy-state measurement-device-independent quantum key distribution with mismatched-basis statistics , 2015 .

[18]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[19]  A. Karlsson,et al.  Improved practical decoy state method in quantum key distribution with parametric down-conversion source , 2007 .

[20]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[21]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[22]  H. Lo,et al.  Practical decoy state for quantum key distribution (15 pages) , 2005 .

[23]  T. Kobayashi,et al.  Quantum key distribution with a heralded single photon source , 2007, International Quantum Electronics Conference, 2005..

[24]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[25]  Qin Wang,et al.  Simulating of the measurement-device independent quantum key distribution with phase randomized general sources , 2014, Scientific Reports.

[26]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[27]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[28]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[29]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[30]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[31]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[32]  N. Lutkenhaus,et al.  Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.

[33]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.