Practical aspects of measurement-device-independent quantum key distribution
Open Access
- 1 November 2013
- journal article
- research article
- Published by IOP Publishing in New Journal of Physics
- Vol. 15 (11), 113007
- https://doi.org/10.1088/1367-2630/15/11/113007
Abstract
A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD), removes all attacks from the detection system, the most vulnerable part in QKD implementations. In this paper, we present an analysis for practical aspects of MDI-QKD. To evaluate its performance, we study various error sources by developing a general system model. We find that MDI-QKD is highly practical and thus can be easily implemented with standard optical devices. Moreover, we present a simple analytical method with only two (general) decoy states for the finite decoy-state analysis. This method can be used directly by experimentalists to demonstrate MDI-QKD. By combining the system model with the finite decoy-state method, we present a general framework for the optimal choice of the intensities of the signal and decoy states. Furthermore, we consider a common situation, namely asymmetric MDI-QKD, in which the two quantum channels have different transmittances. We investigate its properties and discuss how to optimize its performance. Our work is of interest not only to experiments demonstrating MDI-QKD but also to other non-QKD experiments involving quantum interference.Keywords
Other Versions
This publication has 56 references indexed in Scilit:
- Device-Independent Quantum Key Distribution with Local Bell TestPhysical Review X, 2013
- Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectorsNew Journal of Physics, 2011
- Full-field implementation of a perfect eavesdropper on a quantum cryptography systemNature Communications, 2011
- Field test of quantum key distribution in the Tokyo QKD NetworkOptics Express, 2011
- Avoiding the blinding attack in QKDNature Photonics, 2010
- Hacking commercial quantum cryptography systems by tailored bright illuminationNature Photonics, 2010
- Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systemsPhysical Review A, 2008
- Decoy State Quantum Key DistributionPhysical Review Letters, 2005
- Beating the Photon-Number-Splitting Attack in Practical Quantum CryptographyPhysical Review Letters, 2005
- Security of Practical Time-Reversed EPR Quantum Key DistributionAlgorithmica, 2002