Asymmetric sending or not sending twin-field quantum key distribution in practice

Quantum key distribution (QKD) offers a secret way to share keys between legitimate users which is guaranteed by the law of quantum mechanics. Most recently, the limitation of transmission distance without quantum repeaters was broken through by twin-field QKD [Nature (London) 557, 400 (2018)]. Based on its main idea, sending or not-sending (SNS) QKD protocol was proposed [Phys. Rev. A 98, 062323 (2018)], which filled the remaining security loopholes and can tolerate large misalignment errors. In this paper, we give a more general model for SNS QKD, where the two legitimate users, Alice and Bob, can possess asymmetric quantum channels. By applying the method present in the work, the legitimate users can achieve dramatically increased key generation rate and transmission distance compared with utilizing the original symmetric protocol. Therefore, our present work represents a further step along the progress of practical QKD.

[1]  J. Cirac,et al.  Long-distance quantum communication with atomic ensembles and linear optics , 2001, Nature.

[2]  Xiang‐Bin Wang,et al.  Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.

[3]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[4]  Xiang‐Bin Wang,et al.  Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel , 2018, Scientific Reports.

[5]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[6]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[7]  Feihu Xu,et al.  Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.

[8]  Zong-Wen Yu,et al.  Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.

[9]  S. Pirandola,et al.  General Benchmarks for Quantum Repeaters , 2015, 1512.04945.

[10]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[11]  Hua-Lei Yin,et al.  Measurement-Device-Independent Twin-Field Quantum Key Distribution , 2018, Scientific Reports.

[12]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[13]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[14]  Hai Xu,et al.  Sending-or-not-sending twin-field quantum key distribution in practice , 2018, Scientific Reports.

[15]  Chun-Mei Zhang,et al.  Obtaining better performance in the measurement-device-independent quantum key distribution with heralded single-photon sources , 2017 .

[16]  Nicolas Gisin,et al.  Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.

[17]  Jie Lin,et al.  Simple security analysis of phase-matching measurement-device-independent quantum key distribution , 2018, Physical Review A.

[18]  Rong Wang,et al.  Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.

[19]  Chun-Mei Zhang,et al.  Twin-field quantum key distribution with modified coherent states. , 2019, Optics letters.

[20]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[21]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[22]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[23]  Y.-H. Zhou,et al.  Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.

[24]  Xiongfeng Ma,et al.  Phase-Matching Quantum Key Distribution , 2018, Physical Review X.

[25]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.