Alternative schemes for measurement-device-independent quantum key distribution
Top Cited Papers
- 19 December 2012
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 86 (6)
- https://doi.org/10.1103/physreva.86.062319
Abstract
Practical schemes for measurement-device-independent quantum key distribution using phase and path or time encoding are presented. In addition to immunity to existing loopholes in detection systems, our setup employs simple encoding and decoding modules without relying on polarization maintenance or optical switches. Moreover, by employing a modified sifting technique to handle the dead-time limitations in single-photon detectors, our scheme can be run with only two single-photon detectors. With a phase-post-selection technique, a decoy-state variant of our scheme is also proposed, whose key generation rate scales linearly with the channel transmittance. DOI: http://dx.doi.org/10.1103/PhysRevA.86.062319 Received 17 July 2012Published 19 December 2012©2012 American Physical SocietyKeywords
Other Versions
This publication has 56 references indexed in Scilit:
- Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systemsPhysical Review A, 2008
- Security proof for quantum-key-distribution systems with threshold detectorsPhysical Review A, 2008
- Squashing Models for Optical Measurements in Quantum CommunicationPhysical Review Letters, 2008
- Unconditional security of practical quantum key distributionThe European Physical Journal D, 2007
- Effects of detector efficiency mismatch on security of quantum cryptosystemsPhysical Review A, 2006
- Secure Quantum Key Distribution with an Uncharacterized SourcePhysical Review Letters, 2003
- Unconditional security in quantum cryptographyJournal of the ACM, 2001
- Simple Proof of Security of the BB84 Quantum Key Distribution ProtocolPhysical Review Letters, 2000
- Unconditional Security of Quantum Key Distribution over Arbitrarily Long DistancesScience, 1999
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991