Acta Optica Sinica, Volume. 40, Issue 24, 2427001(2020)

Measurement-Device-Independent Quantum Key Distribution of Finite Detector's Dead Time in Heralded Pair Coherent State

Yefeng He1,3, Yankun Zhao2、*, Chunyu Li2, and Jiarui Guo1
Author Affiliations
  • 1School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, China
  • 2School of Communication and Information Engineering, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, China
  • 3Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi 541004, China
  • show less
    References(35)

    [1] Mayers D. Unconditional security in quantum cryptography[J]. Journal of the ACM, 48, 351-406(2001).

    [2] Gottesman D, Lo H K, Lutkenhaus N et al. Security of quantum key distribution with imperfect devices. [C]∥International Symposium On Information Theory, June 27 - July 2, 2004, Chicago, IL, USA. New York: IEEE, 8178599(2004).

    [3] Bennett C H, Brassard G. An update on quantum cryptography[M]. ∥Blakley G R, Chaum D. Advances in cryptology. Lecture notes in computer science. Heidelberg: Springer, 196, 475-480(1985).

    [5] Lo H K, Ma X F, Chen K. Decoy state quantum key distribution[J]. Physical Review Letters, 94, 230504(2005).

    [6] Bennett C H, Brassard G, Ekert A K. Quantum cryptography[J]. Scientific American, 267, 50-57(1992).

    [7] Wang Q, Wang X B. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources[J]. Physical Review A, 88, 052332(2013).

    [9] Brassard G, Lütkenhaus N, Mor T et al. Limitations on practical quantum cryptography[J]. Physical Review Letters, 85, 1330-1333(2000).

    [12] Zhao Y, Fung C F, Qi B et al. Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems[J]. Physical Review A, 78, 042333(2008).

    [13] Makarov V, Skaar J. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols[J]. Quantum Information & Computation, 8, 622-635(2008).

    [14] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution[J]. Physical Review Letters, 108, 130503(2012).

    [15] Sun S H, Gao M, Li C Y et al. Practical decoy-state measurement-device-independent quantum key distribution[J]. Physical Review A, 87, 052329(2013).

    [17] Zhu Z D, Zhao S H, Wang X Y et al. Phase modulate free measurement device independent quantum key distribution[J]. Journal of Optoelectronics·Laser, 29, 181-186(2018).

    [18] Kang G D, Zhou Q P, Fang M F. Measurement-device-independent quantum key distribution with uncharacterized coherent sources[J]. Quantum Information Processing, 19, 1-18(2019).

    [19] Tamaki K, Lo H K. Fung C H F, et al. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw[J]. Physical Review A, 85, 042307(2012).

    [20] Abruzzo S, Kampermann H, Bruß D. Measurement-device-independent quantum key distribution with quantum memories[J]. Physical Review A, 89, 012301(2014).

    [21] Chen D, Zhao S H, Shi L et al. Measurement-device-independent quantum key distribution with pairs of vector vortex beams[J]. Physical Review A, 93, 032320(2016).

    [22] Yu Z W, Zhou Y H, Wang X B. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method[J]. Physical Review A, 91, 032318(2015).

    [23] Wang X Y, Zhao S H, Dong C et al. Orbital angular momentum-encoded measurement device independent quantum key distribution under atmospheric turbulence[J]. Quantum Information Processing, 18, 304(2019).

    [28] Zhang S L, Zou X B, Li C F et al. A universal coherent source for quantum key distribution[J]. Chinese Science Bulletin, 54, 1863-1871(2009).

    [29] Dixon A R, Yuan Z L, Dynes J F et al. Continuous operation of high bit rate quantum key distribution[J]. Applied Physics Letters, 96, 161102(2010).

    [31] Burenkov V, Qi B, Fortescue B et al. Security of high speed quantum key distribution with finite detector dead time[J]. Quantum Information & Computation, 14, 217-235(2014).

    [33] Dong C, Zhao S H, Shi L. Measurement device-independent quantum key distribution with heralded pair coherent state[J]. Quantum Information Processing, 15, 4253-4263(2016).

    [34] Ma X, Razavi M. Alternative schemes for measurement-device-independent quantum key distribution[J]. Physical Review A, 86, 062319(2012).

    Tools

    Get Citation

    Copy Citation Text

    Yefeng He, Yankun Zhao, Chunyu Li, Jiarui Guo. Measurement-Device-Independent Quantum Key Distribution of Finite Detector's Dead Time in Heralded Pair Coherent State[J]. Acta Optica Sinica, 2020, 40(24): 2427001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Quantum Optics

    Received: Jul. 28, 2020

    Accepted: Sep. 15, 2020

    Published Online: Nov. 23, 2020

    The Author Email: Zhao Yankun (1364853816@qq.com)

    DOI:10.3788/AOS202040.2427001

    Topics