Abstract
We show that a high key rate of Measurement-Device-Independent Quantum Key Distribution (MDIQKD) over asymmetric and unstable quantum channel can be obtained by full optimization and compensation. Employing a gradient optimization method, we make the full optimization taking both the global optimization for the 12 independent parameters and the joint constraints for statistical fluctuations. We present a loss-compensation method by monitoring the channel loss for an unstable channel. The numerical simulation shows that the method can produce high key rate for both the asymmetric channel and the unstable channel. Compared with the existing results of independent constraints, our result here improves the key rate by 1 to tens of times in typical experimental conditions.
Similar content being viewed by others
Introduction
Quantum key distribution (QKD) provides the communication users with secure keys to encrypt their information. Bennett and Brassard proposed BB84 protocol1 to realize QKD, but the lack of practical single-photon sources limited the use of origin BB84 protocol. BB84 protocol with imperfect single-photon sources would suffer from the photon-number-splitting (PNS) attack2,3,4. This loophole can be fixed by the decoy-state method5,6,7,8. With the decoy-state method, QKD can be used in the practical system between users with longer distace9,10,11. After that, measurement-device-independent QKD (MDIQKD) was proposed to avoid any loophole from the imperfect detection devices12,13,14,15. Combined with decoy-state method, MDIQKD can also avoid the loophole from the imperfect single-photon sources15,16. Nowadays, the decoy-state MDIQKD has become the mainstream of the studies of quantum key distribution both theoretically16,17,18,19,20,21,22,23,24,25,26,27,28,29 and experimentally30,31,32,33,34,35,36,37,38,39,40,41,42,43. Various numerical models and optimization methods21,22,23,24 have improved the key rate and secure distance a lot. The numerical model by Xu et al.21 can apply to the case of asymmetrical channel rather precisely. The maximum distance of MDIQKD has been experimentally increased to 404 kilometers38 using the 4-intensity protocol24 with joint constraints for statistical fluctuations23. Another experiment exceeding 400-kilometer distance applying the decoy-state method but not using MDIQKD scheme was reported recently43.
In the scheme of decoy-state MDIQKD, at each time the user Alice (Bob) randomly chooses her (his) basis, bit value and intensity to send a pulse in a corresponding state, e.g. BB84 state in a polarization-coding MDIQKD, to an untrusted third party (UTP) Charlie. Charlie performs a collective measurement on each pulse pair and announces the measurement result in the public channel. After Charlie announces the measurement results, Alice and Bob announce the bases and intensities they use. Based on all announcement, Alice and Bob can calculate the yield and the error rate of single-photon pulse pairs, and then distill the secure key.
For the practical applications, the asymmetric and unstable channels are common cases both in fiber and free space. For example, when we consider the quantum network, due to the different geographical locations of users, the channel losses can be largely different. And if we want implement MDIQKD in free space, the channels are always asymmetric and unstable too, due to the atmospheric turbulence or moving sites (such as the satellite). Although the security of MDIQKD doesn’t make any assumption to the channel, the unstable and/or asymmetric quantum channel decreases the key rate quite a lot. Therefore, directly applying the optimized parameters for symmetric channel does not give a good performance in an asymmetric channel or an unstable channel. Here, we propose full optimization of four-intensity decoy-state MDIQKD protocol to largely increase the key rate in asymmetric channels than existing results of partial optimization. For full optimization, we mean: (1) Using 12 independent parameters, (2) Applying joint constraints23,24 for statistical fluctuations. If one only use one of the above two operations, that is partial optimization. Moreover, a loss-compensation method is presented with optimization to increase the performance of MDIQKD in unstable channels.
Results
Four-intensity decoy-state MDIQKD
Among all existing protocols of decoy-state MDIQKD, the 4-intensity protocol seems to be the most efficient one24 which has been extensively verified experimentally37,38,39,40. As was stated in the four-intensity decoy-state method in Ref.24, Alice and Bob each uses 4 different intensities, including one vacuum. This means in general, there are 7 different intensities for both sides with 6 independent parameters for non-vacuum intensities. Together with the frequencies of using each intensities, there are 12 independent parameters in general in the protocol. Also, the four-intensity protocol suggests using the joint constraints in statistical fluctuation of different observable23,24. A full implementation of the four-intensity protocol means doing optimization among all those 12 parameters with joint constraints fully.
Explicitly, in the four-intensity decoy-state method in ref.24, Alice (Bob) uses a source zA (zB) with intensity μaz (μbz) that only emits photons in the Z basis, two sources xA and yA (xB and yB) with intensities μax and μay (μbx and μby) that only emit photons in the X basis and a vacuum source oA (oB) that only emits vacuum pulses. At each time, Alice (Bob) randomly chooses a source in the four sources above to send a pulse, with probability \({p}_{a{l}_{A}},l=z,x,y,o\,({p}_{b{r}_{B}},r=z,x,y,o)\). So we call it “four-intensity protocol”.
The key rate of the decoy-state MDIQKD is given by:
where az1 and bz1 are the fraction of single photons of sources zA and zB, \(\underline{\langle {s}_{11}\rangle }\) and \(\overline{\langle {e}_{11}^{ph}\rangle }\) are the bound of yield and phase-flip error rate of single-photon pulse pairs which can be obtained by the decoy-state method, Szz and Ezz are yield and bit-flip error rate when Alice and Bob both send pulses with source zA/zB, \(H(p)=-\,p{\mathrm{log}}_{2}p-\mathrm{(1}-p){\mathrm{log}}_{2}\mathrm{(1}-p)\) is the binary entropy function and f is the correction efficiency.
Details for calculation of the key rate can be found in the appendix.
Optimization of source parameters
In the numerical simulation, we will estimate what values we would observe for the yields and error rates in a certain model and use these values to calculate the key rate. Given the properties of the channel and the detection devices, we can regard the key rate as a function of source parameters:
If we use weak coherent state sources, the relation between the intensity μ and the photon number distribution \(\rho ={\sum }_{k}\,{a}_{k}|k\rangle \langle k|\) is \({a}_{k}={e}^{-\mu }\frac{{\mu }^{k}}{k!}\).
In the calculation of the key rate, we need to take the joint fluctuation and the scan of \( {\mathcal H} \) (the definition of \( {\mathcal H} \) is in the appendix) into consideration. In addition, the number of parameters we need to optimize is large, which means the parameter space is very huge. Therefore, normal optimization method costs a lot of time. We should improve the optimization method to get the optimal parameters quickly. Firstly, we consider the “gradient” of the key rate function29:
In the case that both \(\tilde{R}\)(xk + Δxk, xi) and \(\tilde{R}\)(xk − Δxk, xi) are less than \(\tilde{R}\)(xk, xi), we set \(\frac{{\rm{\Delta }}\tilde{R}}{{\rm{\Delta }}{x}_{k}}=0\). With
we can find the direction that key rate increases the fastest and get close to the optimal parameters quickly.
To avoid the case that the optimal parameters are the local optimal point, which satisfies \(\tilde{R}\)(xk + Δxk, xi) ≤ \(\tilde{R}\)(xk, xi) for any k but is not the maximum point in the whole area, we search the points in the nearby area to see whether there is higher key rate. Accurately, we calculate the key rate \(\tilde{R}\)(xk + δkΔl); δk = −1, 0, 1; k = 1, …, 12 with a certain Δl. If there are some points with higher key rate, we jump to the point with highest key rate in the nearby area and execute the above procedure again.
In our simulation, we found that in most cases, the gradient method brings us to the optimal point. But in some cases, it brings us to the local optimal point.
Loss-compensation method
For the case of unstable channel, according to our MDIQKD protocol, all source parameters should be determined before the QKD process and fixed during the QKD process. Even though we can detect the channel transmittance η at any time, we cannot change the source parameters to optimize the key rate at real time. The decoy state method requests that the intensities of pulses must be fixed. Say, switching among 3 fixed intensities. If one change the intensities beyond these 3 intensities, or change the intensities non-randomly, the result of the decoy-state method will be invalid. With the fixed source parameters μA and μB and unstable channel transmittance ηA(t) and ηB(t), which means the transmittance changes dependently on time, there are always some cases that the intensities at the two sides of Charlie’s beam splitter deviate a lot, saying that at some time ti, μAηA(ti) and μBηB(ti) deviate a lot. These cases will give a quite high error rate that decreases the key rate a lot.
First we consider the case with stable channel that satisfies μAηA > μBηB. In an asymmetric channel, if one attenuates one path, the channel will become symmetric and the detected error rate will be small. However, in such a case, the amount of detected bits is also decreased and the final key rate is not necessarily improved. If we add extra loss \(\frac{{\mu }_{B}{\eta }_{B}}{{\mu }_{A}{\eta }_{A}}\le {\tilde{\eta }}_{A}\le 1\) to the channel between Alice and Charlie, we can get a better key rate. Given the transmittance and the intensities of sources, the specific value of \({\tilde{\eta }}_{A}\) can be determined by numerical simulation.
Then we come to the case with unstable channel. Technically, the channel loss cannot be changed too fast. Otherwise the physical compensation cannot be made instantaneously. We assume that the transmittance remains unchanged during each time window, which means the transmittance doesn’t fluctuate too rapidly. Suppose that we are given the transmittance distribution \(\{{\eta }_{A}^{\mathrm{(1)}},\cdots ,{\eta }_{A}^{(i)},\cdots \}\) and \(\{{\eta }_{B}^{\mathrm{(1)}},\cdots ,{\eta }_{B}^{(i)},\cdots \}\) and fixed μA, μB. A general loss-compensation method is to add different extra loss \({\tilde{\eta }}^{(ij)}\) < 1 to Alice’s or Bob’s channel for different transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) and we can determine the optimal value of each \({\tilde{\eta }}^{(ij)}\) for each \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) pair. But in practice, the optimization of so many variables is out of any computer’s ability. So we keep only one extra loss \(\tilde{\eta }\) and raise a variable δ. When the transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) satisfies \({\eta }_{A}^{(i)}/{\eta }_{B}^{(j)} > \delta \), Charlie should add the extra loss \(\tilde{\eta }\) to the channel between Alice and Charlie. When the transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) satisfies \({\eta }_{B}^{(j)}/{\eta }_{A}^{(i)} > \delta \), Charlie should add the extra loss \(\tilde{\eta }\) to the channel between Bob and Charlie. In other cases, Charlie doesn’t have to add any extra loss to the channel. We can use numerical simulation, combined with optimization of source parameters, to determine the values of \(\tilde{\eta }\) and δ to get the best key rate when given a specific transmittance distribution.
In the simulation of the unstable channel, suppose that we have the transmittance distribution \(\{{\eta }_{A}^{\mathrm{(1)}},\cdots ,{\eta }_{A}^{(i)},\cdots \}\), \(\{{\eta }_{B}^{\mathrm{(1)}},\cdots ,{\eta }_{B}^{(j)},\cdots \}\) and the corresponding probability \(\{{p}_{A}^{\mathrm{(1)}},\cdots ,{p}_{A}^{(i)},\cdots \}\), \(\{{p}_{B}^{\mathrm{(1)}},\cdots ,{p}_{B}^{(j)},\cdots \}\). We can calculate the “transmittance pair distribution” \(\{{\eta }_{A}^{\mathrm{(1)}}\otimes {\eta }_{B}^{\mathrm{(1)}},\cdots ,{\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)},\cdots \}\) and the corresponding probability \(\{{p}_{A}^{\mathrm{(1)}}\ast {p}_{B}^{\mathrm{(1)}},\cdots ,{p}_{A}^{(i)}\ast {p}_{B}^{(j)},\cdots \}\). With a certain source pair lr and a certain transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\), the observed yield \({S}_{lr}({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)})\) and the observed error rate \({E}_{lr}({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)})\) can be calculated as in ref.44 theoretically. Then the yield and the error rate in the whole process can be calculated by
and
When the loss-compensation is performed, we can calculate the Slr, Elr in the same way except the (ij)-th transmittance pair is changed into \({\eta }_{A}^{(i)}\tilde{\eta }\otimes {\eta }_{B}^{(j)}\) if \(\frac{{\eta }_{A}^{(i)}}{{\eta }_{B}^{(j)}} > \delta \), or \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\tilde{\eta }\) if \(\frac{{\eta }_{B}^{(j)}}{{\eta }_{A}^{(i)}} > \delta \).
Numerical simulation
First we consider the case that the channel is stable but asymmetric. We shall estimate what values would be probably observed for the yields in the normal cases by the linear models15,21,22 and the errors in X basis by the useful model for misalignment error under asymmetric channel in ref.21. We show the optimized key rate in some asymmetric cases in Fig. 1 and some results in certain distances in Table 1, in comparison with the results of independent bounds in ref.45, with device parameters in Table 2. From Fig. 1, we can find that with full implementation of the four-intensity MDIQKD and full optimization of the source parameters, quite good key rate can be achieved. In particular, we have taken the joint constraints23,24 for statistical fluctuations, this affects the key rate significantly. Taking joint constraints will consume some more computational time. The computation can be done very fast if we apply formulas of refs23,24 rather than the linear programming. In our numerical simulation, we have already overcome the problem of unpredictable behavior such as jitters45. Actually, the computational time seems not to be a major issue for the practical application. In the application for the unstable channel, one can choose to test the channels and do the optimization for the major loss values of the changing channel before running the protocol.
Then for the unstable channel, we consider a simple case that \({\eta }_{A}^{(i)}=\mathrm{(3}+2i)\) dB, \({\eta }_{B}^{(j)}=\mathrm{(13}+2j)\) dB with probability \({p}_{A}^{(i)}={p}_{B}^{(j)}=0.2\) for i, j = 1, …, 5 (Here the detector’s efficiency is contained in the total loss). We show the key rate with different δ and \(\tilde{\eta }\) with source parameters optimized in Table 3.
The case that δ = \(\tilde{\eta }^{\prime} \) = 0 dB is equal to that we don’t perform the loss-compensation method. In the second line of Table 3, we can see that an improper loss-compensation (δ = −7 dB and \(\tilde{\eta }^{\prime} \) = 5 dB) will decrease the key rate. We can find that in this transmittance distribution, setting δ = −8.75 dB and \(\tilde{\eta }^{\prime} \) = 4.5 dB can maximize the key rate in our loss-compensation method.
Discussion
We propose a full implementation of four-intensity decoy-state MDIQKD. Even if the channels between the users and UTP are asymmetric, our four-intensity protocol still has a good performance. We also propose a loss-compensation method. This method can improve the key rate a lot in unstable channel.
Method: calculation of the key rate
Asymptotic case
We define the yield, the error yield and the error rate as follow. Consider a pulse pair set \({\mathscr{C}}\), which contains \({N}_{{\mathscr{C}}}\) pulse pairs totally. These pairs cause \({M}_{{\mathscr{C}}}\) effective counts and \({W}_{{\mathscr{C}}}\) error counts. In this case, the yield \({S}_{{\mathscr{C}}}={M}_{{\mathscr{C}}}/{N}_{{\mathscr{C}}}\), the error yield \({T}_{{\mathscr{C}}}={W}_{{\mathscr{C}}}/{N}_{{\mathscr{C}}}\) and the error rate \({E}_{{\mathscr{C}}}={W}_{{\mathscr{C}}}/{M}_{{\mathscr{C}}}\).
In photon number space, the density matrices of the pulses from the sources can be written as
and
We assume that the states above satisfy these conditions:
for k > 2, so that the decoy-state results can apply. Familiar sources used in practice, such as weak-coherent-state sources and heralded single-photon sources out of the parametric-down conversion, satisfy the conditions above.
In the following, we will omit the subscript A and B in lA and rB if it doesn’t cause confusion. A pulse pair of lr is a pair where Alice’s pulse is from l and Bob’s pulse if from r. The two-mode source lr emits all lr pairs.
The main idea of decoy state is that the yield of |m〉|n〉 photon pairs from different source pairs should be the same in the asymptotic case, which means
Using Eq. (10) and the convex form of yield of lr source pairs
we can calculate the lower bound of the yield of single-photon pairs:
where
and
Eq. (12) holds when
In the case of Ka > Kb, the lower bound of s11 can be calculated with Eqs (12–15) by making exchange between axk and bxk, and exchange between ayk and byk, for k = 1, 2.
Similarly, we can calculate the upper bound of phase-flip error rate of single-photon pairs:
With \(\underline{\langle {s}_{11}\rangle }\) and \(\overline{\langle {e}_{11}^{ph}\rangle }\), we can calculate the key rate with Eq. (1).
Nonasymptotic case
In the nonasymptotic regime, we should consider the statistical fluctuation of the observable, e.g. the difference between observed values and mean values. Given a failure probability ε, the observed value \({S}_{{\mathscr{C}}}\) of an observable of a set \({\mathscr{C}}\) and its mean value \(\langle {S}_{{\mathscr{C}}}\rangle \) satisfy:
If we perform a standard error analysis, Δ can be given by
where \({N}_{{\mathscr{C}}}\) is the number of elements in set \({\mathscr{C}}\) and γ = 5.3 given the failure probability ε = 10−7.
According to the idea of joint constraints of statistical fluctuation23, the set \({\mathscr{C}}\) can be either all pulse pairs from a source pair, or the combination of all pulse pairs from different source pairs. Taking all these joint constraints into consideration, the bound of 〈s11〉 and \(\langle {e}_{11}^{ph}\rangle \) can be calculated tighter.
As a joint term in \(\underline{\langle {s}_{11}\rangle }\) and \(\overline{\langle {e}_{11}^{ph}\rangle }\), \( {\mathcal H} \) should fluctuate jointly in Eq. (12) and Eq. (17), instead of taking the worst case independently24. We regard R as a function of \( {\mathcal H} \), scan \( {\mathcal H} \) in its possible range and take the minimum R as the final key rate:
Method: verifying the global optimization
When we search the points in the nearby area in our optimization algorithm, we can change the parameter Δl in our programme. In the cases with different Δl, e.g. Δl = 0.1, 0.001, 0.0001…, we obtain almost the same optimized results.
We make another test that to each point, we start from many sets of different initial values of parameters. We then obtain almost the same results for the optimized parameters.
These strongly indicate that our result is indeed the globally optimized result.
References
Bennett, C. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, 175–179 (1984).
Huttner, B., Imoto, N., Gisin, N. & Mor, T. Quantum cryptography with coherent states. Physical Review A 51, 1863 (1995).
Yuen, H. P. Quantum amplifiers, quantum duplicators and quantum cryptography. Quantum and Semiclassical Optics: Journal of the European Optical Society Part B 8, 939 (1996).
Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Limitations on practical quantum cryptography. Physical Review Letters 85, 1330 (2000).
Inamori, H., Lütkenhaus, N. & Mayers, D. Unconditional security of practical quantum key distribution. The European Physical Journal D-Atomic, Molecular, Optical and Plasma Physics 41, 599–627 (2007).
Hwang, W.-Y. Quantum key distribution with high loss: toward global secure communication. Physical Review Letters 91, 057901 (2003).
Wang, X.-B. Beating the photon-number-splitting attack in practical quantum cryptography. Physical review letters 94, 230503 (2005).
Lo, H.-K., Ma, X. & Chen, K. Decoy state quantum key distribution. Physical review letters 94, 230504 (2005).
Wang, Q. et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. Physical review letters 100, 090501 (2008).
Xu, F. et al. Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system. Physical Review A 80, 062309 (2009).
Zhang, C.-H., Luo, S.-L., Guo, G.-C. & Wang, Q. Approaching the ideal quantum key distribution with two-intensity decoy states. Physical Review A 92, 022332 (2015).
Lydersen, L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature photonics 4, 686–689 (2010).
Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature communications 2, 349 (2011).
Braunstein, S. L. & Pirandola, S. Side-channel-free quantum key distribution. Physical review letters 108, 130502 (2012).
Lo, H.-K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Physical review letters 108, 130503 (2012).
Wang, X.-B. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors. Physical Review A 87, 012320 (2013).
Wang, Q. & Wang, X.-B. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Physical Review A 88, 052332 (2013).
Curty, M. et al. Finite-key analysis for measurement-device-independent quantum key distribution. Nature communications 5 (2014).
Yu, Z.-W., Zhou, Y.-H. & Wang, X.-B. Three-intensity decoy-state method for measurement-device-independent quantum key distribution. Physical Review A 88, 062339 (2013).
Zhou, Y.-H., Yu, Z.-W. & Wang, X.-B. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100%. Physical Review A 89, 052325 (2014).
Xu, F., Curty, M., Qi, B. & Lo, H.-K. Practical aspects of measurement-device-independent quantum key distribution. New Journal of Physics 15, 113007 (2013).
Xu, F., Xu, H. & Lo, H.-K. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Physical Review A 89, 052333 (2014).
Yu, Z.-W., Zhou, Y.-H. & Wang, X.-B. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Physical Review A 91, 032318 (2015).
Zhou, Y.-H., Yu, Z.-W. & Wang, X.-B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Physical Review A 93, 042324 (2016).
Wang, Q., Zhou, X.-Y. & Guo, G.-C. Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources. Scientific reports 6 (2016).
Jiang, C., Yu, Z.-W. & Wang, X.-B. Measurement-device-independent quantum key distribution with source state errors in photon number space. Physical Review A 94, 062323 (2016).
Jiang, C., Yu, Z.-W. & Wang, X.-B. Measurement-device-independent quantum key distribution with source state errors and statistical fluctuation. Physical Review A 95, 032325 (2017).
Zhou, X.-Y., Zhang, C.-H., Zhang, C.-M. & Wang, Q. Obtaining better performance in the measurement-device-independent quantum key distribution with heralded single-photon sources. Physical Review A 96, 052337 (2017).
Hu, X.-L., Zhou, Y.-H., Yu, Z.-W. & Wang, X.-B. Practical measurement-device-independent quantum key distribution without vacuum sources. Physical Review A 95, 032331 (2017).
Rubenok, A., Slater, J. A., Chan, P., Lucio-Martinez, I. & Tittel, W. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Physical review letters 111, 130501 (2013).
Chan, P., Slater, J. A., Lucio-Martinez, I., Rubenok, A. & Tittel, W. Modeling a measurement-device-independent quantum key distribution system. Optics express 22, 12716–12736 (2014).
Liu, Y. et al. Experimental measurement-device-independent quantum key distribution. Physical review letters 111, 130502 (2013).
da Silva, T. F. et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Physical Review A 88, 052303 (2013).
Tang, Z. et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Physical review letters 112, 190503 (2014).
Tang, Y.-L. et al. Measurement-device-independent quantum key distribution over 200 km. Physical review letters 113, 190501 (2014).
Wang, C. et al. Phase-reference-free experiment of measurement-device-independent quantum key distribution. Physical review letters 115, 160502 (2015).
Comandar, L. C. et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers. Nature Photonics 10, 312 (2016).
Yin, H.-L. et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Physical Review Letters 117, 190501 (2016).
Wang, C. et al. Measurement-device-independent quantum key distribution robust against environmental disturbances. Optica 4, 1016–1023 (2017).
Roberts, G. L. et al. Experimental measurement-device-independent quantum digital signatures. Nature Communications 8, 1098 (2017).
Pirandola, S. et al. High-rate measurement-device-independent quantum cryptography. Nature Photonics 9, 397 (2015).
Wang, C.-Y. et al. Integrated server for measurement-device-independent quantum key distribution network. arXiv preprint arXiv:1808.08586 (2018).
Boaron, A. et al. Secure quantum key distribution over 421 km of optical fiber. arXiv preprint arXiv:1807.03222 (2018).
Wang, Q. & Wang, X.-B. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Scientific reports 4 (2014).
Wang, W., Xu, F. & Lo, H.-K. Enabling a scalable high-rate measurement-device-independent quantum key distribution network. arXiv preprint arXiv:1807.03466 (2018).
Acknowledgements
We acknowledge the financial support in part by The National Key Research and Development Program of China grant No. 2017YFA0303901; NSFC grant No. 11474182, 11774198 and U1738142; the key Research and Development Plan Project of Shandong Province, grant No. 2015GGX101035; Shandong Peninsula National Innovation Park Development Project; Taishan Scholars of Shandong Province. Yuan Cao was supported by the Youth Innovation Promotion Association of CAS.
Author information
Authors and Affiliations
Contributions
X.B.W. and Y.C. proposed this work. X.L.H. and Z.W.Y. did the calculations and drew the figures. X.L.H. and Y.C. wrote the manuscript.
Corresponding author
Ethics declarations
Competing Interests
The authors declare no competing interests.
Additional information
Publisher’s note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Hu, XL., Cao, Y., Yu, ZW. et al. Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel. Sci Rep 8, 17634 (2018). https://doi.org/10.1038/s41598-018-35507-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-018-35507-z
Keywords
This article is cited by
-
State-of-the-Art Survey of Quantum Cryptography
Archives of Computational Methods in Engineering (2021)
-
The performance of three-intensity decoy-state measurement-device-independent quantum key distribution
Quantum Information Processing (2020)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.