Measurement device-independent quantum key distribution with heralded pair coherent state

The original measurement device-independent quantum key distribution is reviewed, and a modified protocol using heralded pair coherent state (HPCS) is proposed to overcome the quantum bit error rate associated with the dark count rate of the detectors in long-distance quantum key distribution. Our simulation indicates that the secure transmission distance can be improved evidently with HPCS owing to the lower probability of vacuum events when compared with weak coherent source scenario, while the secure key rate can be increased with HPCS due to the higher probability of single-photon events when compared with heralded single-photon source scenario. Furthermore, we apply the finite key analysis to the decoy state MDI-QKD with HPCS and obtain a practical key rate.

[1]  G. Weihs,et al.  Entangled quantum key distribution with a biased basis choice , 2009, 0901.0960.

[2]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[3]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[4]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[5]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[6]  Vadim Makarov,et al.  Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..

[7]  Takayoshi Kobayashi,et al.  Decoy state quantum key distribution with a photon number resolved heralded single photon source , 2006 .

[8]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[9]  Qin Wang,et al.  Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources , 2016 .

[10]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[11]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[12]  Qin Wang,et al.  Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.

[13]  Wanyi Gu,et al.  Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.

[14]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[15]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[16]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[17]  S. Braunstein,et al.  Better late than never: information retrieval from black holes. , 2009, Physical review letters.

[18]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[19]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[20]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[21]  Shi-Hai Sun,et al.  Experimental demonstration of an active phase randomization and monitor module for quantum key distribution , 2012 .

[22]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[23]  Qin Wang,et al.  Simulating of the measurement-device independent quantum key distribution with phase randomized general sources , 2014, Scientific Reports.

[24]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[25]  L. Liang,et al.  Gaussian-modulated coherent-state measurement-device-independent quantum key distribution , 2013, 1312.5025.

[26]  N. Gisin,et al.  Quantum cryptography , 1998 .

[27]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[28]  Agarwal,et al.  Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. , 1986, Physical review letters.

[29]  Chun Zhou,et al.  Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations , 2010, Science China Information Sciences.

[30]  Wei Chen,et al.  Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources , 2013 .

[31]  H. Lo,et al.  Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.