Measurement-device-independent quantum key distribution with heralded pair coherent state

Measurement-device-independent QKD (MDI-QKD) can solve security loophole problems brought by imperfections of detectors and provide enhanced practical security compared to traditional QKD. We propose an active-passive-combined decoy state MDI-QKD protocol with heralded pair coherent state (HPCS) source. By calculating the lower bound of the single-photon counting rate and the upper bound of the single-photon error rate, we present formulas of the secure key rate in our protocol. Based on the linear lossy channel model, we present calculation methods of estimating the overall gain and quantum bit error rate for HPCS source with full phase randomization. We numerically compare secure key rates for different decoy MDI-QKD protocol with different sources. The result shows that the active-passive-combined decoy state MDI-QKD protocol with HPCS source has certain superiority in the secure key rate. It can provide an important theoretical reference for practical implementations of MDI-QKD.

[1]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[2]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[3]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[4]  Guang-Can Guo,et al.  A universal coherent source for quantum key distribution , 2009 .

[5]  M. Nadeem,et al.  Position-based quantum cryptography over untrusted networks , 2014, 1403.5925.

[6]  Mu-Sheng Jiang,et al.  Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems , 2013 .

[7]  Yong-Su Kim,et al.  An experimental comparison of BB84 and SARG04 quantum key distribution protocols , 2014 .

[8]  Chun-Yan Li,et al.  Erratum: Practical decoy-state measurement-device-independent quantum key distribution [Phys. Rev. A 87, 052329 (2013)] , 2013 .

[9]  Wei Chen,et al.  Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources , 2014, 1407.1924.

[10]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[11]  Chun-Yan Li,et al.  Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.

[12]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[13]  Xiang-Bin Wang,et al.  Erratum: Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors [Phys. Rev. A 87, 012320 (2013)] , 2013 .

[14]  Qin Wang,et al.  Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.

[15]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[16]  Chun-Mei Zhang,et al.  Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .

[17]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[18]  G. Guo,et al.  Measurement-device-independent quantum key distribution with modified coherent state. , 2014, Optics letters.

[19]  Yang Wang,et al.  Finite-key analysis for one-sided device-independent quantum key distribution , 2013 .

[20]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[21]  Jian-Wei Pan,et al.  Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.

[22]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[23]  Hoi-Kwong Lo,et al.  Effect of source tampering in the security of quantum cryptography , 2015, 1508.05258.

[24]  Xiang‐Bin Wang,et al.  Three-intensity decoy state method for device independent quantum key distribution , 2013, 1309.5886.

[25]  Z-B Chen,et al.  Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions. , 2014, Optics letters.

[26]  Dong Liu,et al.  Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.

[27]  Wan-Su Bao,et al.  Biased decoy-state measurement-device-independent quantum key distribution with finite resources , 2015 .

[28]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[29]  Wei Chen,et al.  Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources , 2013 .

[30]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[31]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[32]  M. Fejer,et al.  Experimental passive decoy-state quantum key distribution , 2014, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[33]  Xiang‐Bin Wang,et al.  Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.

[34]  Agarwal,et al.  Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. , 1986, Physical review letters.

[35]  Zheng-Fu Han,et al.  Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source , 2014, Quantum Information Processing.

[36]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.