Abstract
Efficiency in measurement-device-independent quantum key distribution(MDI-QKD) can be improved not only by the protocol, but also single-photon sources. We study the behavior of MDI-QKD with statistical fluctuation using quantum blockade source. Numerical simulation for a type of 4-intensity protocol shows that, after parameter optimization, this source can improve the final key rate by 100 times compared with traditional weak coherent state sources.
Similar content being viewed by others
Introduction
Quantum key distribution (QKD)1,2,3,4,5 allows two remote parties to distribute secure keys through public channels. QKD can ensure unconditional security guaranteed by the laws of quantum physics1,2,3,4,5. However, in practical implementation, the imperfections of QKD system like imperfect single-photon sources will cause loopholes that eavesdropper may make use of. To overcome this insecurity, the decoy state method was proposed6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26, and one can still keep the unconditional security of QKD with imperfect single-photon sources27,28,29,30,31. Then, to patch up the loophole caused by the limitation of detection efficiency as well as channel losses32,33, the device independent QKD (DI-QKD)34,35,36,37 and the measurement-device independent QKD (MDI-QKD)38,39,40 were developed. The combination of the decoy-state method and MDI-QKD has been studied both experimentally41,42,43,44,45 and theoretically46,47,48,49,50,51,52,53,54,55,56,57.
Yet, because of the complexity of the system compared with the BB84 protocol, the key rate of the decoy-state MDI-QKD is rather lower than BB84. Taking into account the statistical fluctuation, the data size and the communication time become the great influence to the final key rate47,48,50,56. For example, the number of total pulses at each side N is usually larger than 1012 to generate keys. To overcome this difficulty, previously58 we provided a very efficient 4-intensity protocol which can remarkably improve the key rate and communication distance. It can improve the key rate by almost 2 magnitude orders after parameter optimization. However, one should not counted on the unrealistic wish to further improve the efficiency unlimitedly by taking progress on the protocol only. We should also consider the path of improving the quality of the single-photon sources. Generally, at present the weak coherent state(WCS) sources are used for practical QKD. But the WCS pulses have a large vacuum component and significant fraction of multi-photon states, these will severely reduce the key rate and transmission distance. The situation is even worse in MDI-QKD because the large fraction of vacuum pulses(both vacuum decoy states and vacuum fraction in a Poisson pulse) at one side lead to a large observed value of the error rate in X basis. Fortunately, a quantum blockade source(QBS) can conspicuously enhance the signal photon component. The method of using quantum blockade source in QKD was proposed59 with a simple simulation of asymptotic key rate. However, it considers only the traditional BB84 protocol, it has not studied the important MDI-QKD and the finite size effects for practical QKD. Here in this work, we study the application of quantum blockade source in practical decoy state method MDI-QKD with most high efficient protocol, the 4-intensity protocol. Our numerical results will verify the remarkable progress of about 100 times rise in key rate.
Results
The photon blocade
Photon blockade as a nonlinear quantum optical process can be realized experimentally with single atoms coupled to a resonator60,61, solid-state with (quantum dot) QD coupled to dielectric resonators62,63,64,65 and nonlinear Kerr medium66,67. Particularly, Kerr-type material has advantages in its controllability and flexibility. To obtain a high quality single-photon sources, in our previous work(OL2016), we have calculated and simulated explicitly the photon-number distribution for pulses outside cavities. In the single-photon blockade using Kerr-type resonators under the condition of different parameters, it reveals an optimized single-photon state probability. In that work, we have simulated the system with quantum trajectory method68,69,70. In this method, for each single trajectory we simulate, we monitory the number of photons from the output of the resonantor. And the output light could be generally expanded in the Fock basis as: \(|{a}_{out}\rangle ={\sum }_{n=0}^{\infty }{c}_{n}|n\rangle \) where |c n |2 is the probability of photon state |n〉. At last we can estimate the photon number probability P n = \(\frac{{|{c}_{n}|}^{2}}{\sum {|{c}_{i}|}^{2}}\) from the number of counted photons.
Obviously, when evaluating the superiority of certain sources in decoy state method QKD, the photon number probability is wanted. To obtain P n , one needs to simulate the system using quantum trajectory method. For this, the calculation takes a lot of computation resource. And it is not likely to reach the continuous functions but discrete results (seen in Table 1) of the system parameters to P n . This situation urges us to change the normal strategy of dealing with decoy state method MDI-QKD under the influence of statistical fluctuation, which will be discussed later in the work.
Protocol
We use subscript A or B to denote a source at Alice’s side or Bob’s side. In the protocol we proposed before58, sources x A and y A (x B and y B ) only emit pulses in X basis while source z A (z B ) only emits pulses in Z basis. The protocol needs four different states \({\rho }_{{o}_{A}}=|0\rangle \langle 0|,{\rho }_{{x}_{A}},{\rho }_{{y}_{A}},{\rho }_{{z}_{A}}\) \(({\rho }_{{o}_{B}}=|0\rangle \langle 0|,{\rho }_{{x}_{B}},{\rho }_{{y}_{B}},{\rho }_{{z}_{B}})\) respectively.
In photon number space, suppose
We call x A , x B as well as y A , y B the decoy sources; z A , z B the signal sources, and o A , o B the vacuum sources.
At each time, Alice will randomly choose source l A with probability \({p}_{{l}_{A}}\) for l = o, x, y, z. Similarly, Bob will randomly choose source r B with probability \({p}_{{r}_{B}}\) for r = o, x, y, z. The emitted pulse pairs (one pulse from Alice, one pulse from Bob) are sent to the un-trusted third party (UTP). We shall use notation lr to indicate the two-pulse source when Alice use source l A and Bob use source r B to general a pulse pair, e.g., source xy is the source that Alice uses source x A and Bob uses source y B . Also, here in our protocol, the intensity for pulses in Z basis can be different from those of X basis, this makes more freedom in choosing the intensities and hence further raises the key rate. Those effective events caused by pulse pairs from source zz will be used for key distillation, while the effective events caused by sources in X basis and vacuum sources will be used to estimate the yield and the phase-flip error rate of the single-photon pulse pairs.
The final key rate of per pulse pair can be calculated as6,7
In which, \({\underline{s}}_{11}\) is the lower bound of the single photon counting rate s11, and \({\bar{e}}_{11}\) is the upper bound of the single photon error rate e11, H is the binary Shannon entropy, f is the factor of error correction inefficiency. S lr note the counting rate in UTP while Alice choice the source l and Bob choice the source r, E lr and T lr note the error rate and error counting rate respectively. (Meaning T lr = E lr S lr ).
As S zz and E zz can directly get in UTP, to obtain the final key rate, one needs to know \({\underline{s}}_{11}\) as well as \({\bar{e}}_{11}\) by the decoy state method. As was shown in ref.58, both \({\underline{s}}_{11}\) and \({\bar{e}}_{11}\) are functionals of a common variable \( {\mathcal H} \) (See details in the appendix). The final key rate is then
And as shown in detail in the appendix, \( {\mathcal I} \) is the range of values for \( {\mathcal H} \).
Numerical simulation
With the protocol introduced above, we can numerically calculate the key rate and evaluate the performance of the MDI-QKD. In considering the finite-size effects, we shall take a failure probability of 10−7 with a normal distribution. Finite size effects are very important in the practical application of QKD, because of the finite transition time and relatively small data size, especially when one needs communication with little delay, like generating fresh key.
For these purpose, to achieve a practical useful key rate, we need both the protocol introduced above and the optimization algorithm. There are variety parameters in the protocol (if using the traditional WCS sources, the parameters are the intensities and the emitting probabilities for each sources, which means six variables). Not like the situation without statistical fluctuation, globally optimization will make remarkable difference in the final key rates.
Usually, we describe the decoy state method system by several continuously parameters and optimiz them in computer program. But the case here makes this strategy difficult, because our quantum blockade source is described by the disperse P n . Though these P n are essentially based on several continuously parameters in quantum blockade system, but as discuss above, one have to implement Monte Carlo algorithm to conduct the photon number distribution, which takes a lot of time and the results are may not smooth enough for the farther optimization.
To solve the predicament, we no longer optimize the quantum blockade source itself, but add a linear attenuation device(optical fiber for example) right after each source. Equally obtain the continuously changing source as
here η is the penetration rate, and η ∈ [0, 1].
Through this treatment, we need only one kind of quantum blockade source to accomplish the whole decoy state method MDI-QKD. By choice three different η, two decoy sources and one signal source can be easily obtained. And we just need to optimize the three η and corresponding emittion probabilities, which would make the problem simpler and more calculable.
In the numerical simulation, we take a simple treatment using normal distribution to make a fair comparison with the prior art results56,57,58, and uniformly set failure probability ε = 10−7, and implement the global optimization for each method compared in our figures.
Table 2 shows the device parameters and data sizes used in numerical simulations. Except for the parameters listed, we also set error correction inefficiency f e = 1.16 for all the simulation. The parameters choice is based on58 to provide comprehensive and fair comparison and the two lines represent two typical experimental setup.
In Fig. 1, we compare the performances of quantum blockade source with different photon number distributions in Table 1. The result approximately declares that P1 is the most important parameter to estimate the advantage of quantum blockade source in MDI-QKD. But we must point out that the key rate is also affect by the other P n .
Based on this conclusion, in Figs 2 and 3, we chooses quantum blockade source III to compare with the traditional weak coherent source, and the advantage is observable with both case a and case b. In Fig. 4, we plot the single photon pulse pair error rates of the two sources discussed above in the calculation of case a in Fig. 2. And it clearly shows that the remarkable reduction of single photon pulse pair error rate for the quantum blockade source comparing with the traditional weak coherent source, which is the main contribution to the improvement of key rate.
We also give some typical key rates in certain distance points in Table 3. In that table, the key rates in lines 2 and 3 are obtained with parameters of case a, and the other two lines are calculated with parameters of case b in Table 2. It clearly shows the significantly increasing of the key rate due to the quantum blockade sources used, and we also explain that this advantage is mainly due to the reduction of single photon pair error rate.
And here we also compare the secure key rate of our numerical simulation with an existing MDI-QKD experiment71. Given the same detector parameters, alignment errors and pulse number, at the distance of 259 km, the key rate of the MDI-QKD experiment with weak coherent state is 3.48 × 10−9 and the key rate of quantum blockade sources is 1.88 × 10−7.
Discussion
In summary, we have investigated the performance of quantum blockade source in practical MDI-QKD. Although the previous work59 obtain the similar simulations to prove the advantage of quantum blockade source comparing with the WCS, but the statistical fluctuation and global optimization are not included there. Even the finite data size reduces the key rate, one can still reach the irresistibly superiority of quantum blockade source by the efficient decoy state method considering statistical fluctuation58 and global optimization strategy. It demonstrates that by implementing the scheme above, the quantum blockade source can greatly improve the key rate and communication distance of practical MDI-QKD, which is nearly tens of or hundreds of times.
Methods
When statistical fluctuation is considered, the estimation will be tougher, but as mentioned above, using our newly developed strategy58, those two parameters of great importance can be estimated easily and tight.
To deal with the decoy state method with statistical fluctuation, we need bring in the expected value of observed variable S lr , T lr , as the form of 〈S lr 〉 and 〈T lr 〉, so the estimation equations are:
In these two estimations, we choice s11 and e11 as the functions of \( {\mathcal H} \), which is the common part of them. (The detail prove of this method can be seen in our previous work58). By using this kinds of estimations, the final key rate is also the functions of \( {\mathcal H} \). Then through scanning \( {\mathcal H} \) in the interval giving by the statistical fluctuation of certain failure probability, the minimum value of \(R( {\mathcal H} )\) is final key rate. And it’s much better than the result of treat statistical fluctuation in s11 and e11 respectively.
So we have,
And \( {\mathcal I} =[h-\delta ,\,h+\delta ]\) with
This result is obtained by the theory of statistical fluctuation, γ is the parameter decided by the failure probability.(For example, if we choice the failure probability as 1e − 7, then γ = 5.3)
The other advantage of our method propose in refs58,72 is the joint-treatment of the statistical fluctuation, which allow us to get the expect values in the estimations of \({\underline{s}}_{11}\) and \({\bar{e}}_{11}\) by the following constraints:
and
References
Bennett, C. H. & Brassard, G. In Proc. of IEEE Int. Conf. on Computers, Systems, and Signal Processing (IEEE, New York), pp. 175–179 (1984).
Gisin, N., Ribordy, G., Tittel, W. & Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002).
Gisin, N. & Thew, R. Quantum communication Nature Photonics. 1, 165 (2006).
Dusek, M., Lütkenhaus, N. & Hendrych, M. In Progress in Optics VVVX, edited by E. Wolf (Elsevier, 2006).
Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009).
Inamori, H., Lütkenhaus, N. & Mayers, D. European Physical Journal D. 41, 599 (2007).
Gottesman, D. et al. Quantum Inf. Comput. 4, 325 (2004).
Hwang, W. Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).
Wang, X. B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).
Lo, H. K., Ma, X. F. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
Wang, X. B. Decoy-state protocol for quantum cryptography with four different intensities of coherent light. Phys. Rev. A. 72, 012322 (2005).
Ma, X. F., Qi, B., Zhao, Y. & Lo, H. K. Practical decoy state for quantum key distribution. Phys. Rev. A. 72, 012326 (2005).
Adachi, Y., Yamamoto, T., Koashi, M. & Imoto, N. Simple and efficient quantum key distribution with parametric down-conversion. Phys. Rev. Lett. 99, 180503 (2007).
Hayashi, M. Practical evaluation of security for quantum key distribution. Phys. Rev. A. 75, 022307 (2006).
Hayashi, M. Upper bounds of eavesdropper’s performances in finite-length code with the decoy method. Phys. Rev. A. 76, 012329 (2007).
Rosenberg, D. et al. Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503 (2007).
Schmitt-Manderbach, T. et al. xperimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km. Phys. Rev. Lett. 98, 010504 (2007).
Peng, C. Z. et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007).
Yuan, Z. L., Sharpe, A. W. & Shields, A. J. Appl. Phys. Lett. 90, 011118 (2007).
Dixon, A. R., Yuan, Z. L., Dynes, J. F., Sharpe, A. W. & Shields, A. J. Opt. Express. 16, 18790 (2008).
Zhao, Y., Qi, B., Ma, X. F., Lo, H. K. & Qian, L. Experimental quantum key distribution with decoy states. Phys. Rev. Lett. 96, 070502 (2006).
Y. Zhao, et al. In Proceedings of IEEE International Symposium on Information Theory, Seattle, pp. 2094–2098 (IEEE, New York, 2006).
Wang, X. B., Peng, C. Z., Zhang, J., Yang, L. & Pan, J. W. General theory of decoy-state quantum cryptography with source errors. Phys. Rev. A. 77, 042311 (2008).
Hu, J. Z. & Wang, X. B. Reexamination of the decoy-state quantum key distribution with an unstable source. Phys. Rev. A. 82, 012331 (2010).
Wang, X. B. Hiroshima, T., Tomita, A. & Hayashi, M. Quantum information with gaussian states. Physics Reports. 448 (2007).
Wang, X. B., Yang, L., Peng, C. Z. & Pan, J. W. Decoy-state quantum key distribution with both source errors and statistical fluctuations. New J. Phys. 11, 075006 (2009).
Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Limitations on Practical Quantum Cryptography. Phys. Rev. Lett. 85, 1330 (2000).
Lütkenhaus, N. Security against individual attacks for realistic quantum key distribution. Phys. Rev. A. 61, 052304 (2000).
Lütkenhaus, N. & Jahma, M. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4, 44 (2002).
Huttner, B. B., Imoto, N., Gisin, N. & Mor, T. Quantum cryptography with coherent states. Phys. Rev. A. 51, 1863 (1995).
Yuen, H. P. Quantum amplifiers, quantum duplicators and quantum cryptography. Quantum Semiclassic. Opt. 8, 939 (1996).
Lyderson, L., Makarov, V. & Skaar, J. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics. 4, 686 (2010).
Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Commu. 2, 349 (2011).
Mayers, D. & Yao, A. C.C. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS98), p. 503 (IEEE Computer Society, Washington, DC, 1998).
Acin, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).
Scarani, V. & Renner, R. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-Way postprocessing. Phys. Rev. Lett. 100, 200501 (2008).
Scarani, V. & Renner, R. In 3rd Workshop on Theory of Quantum Computation, Communication and Cryptography (TQC 2008), See also arXiv: 0806.0120 (University of Tokyo, Tokyo 30 Jan-1 Feb 2008).
Lo, H. K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
Tamaki, K., Lo, H. K., Fung, C. H. F. & Qi, B. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A. 85, 042307 (2012).
Braunstein, S. L. & Pirandola, S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012).
Rubenok, A., Slater, J. A., Chan, P., Lucio-Martinez, I. & Tittel, W. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111, 130501 (2013).
Rubenok, A., Slater, J. A., Chan, P., Lucio-Martinez, I. & Tittel, W. Proof-of-principle field test of quantum key distribution immune to detector attacks. arxiv: 1204.0738v1.
Ferreira da Silva, T. et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Phys. Rev. A. 88, 052303 (2013).
Tang, Z. et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Phys. Rev. Lett. 112, 190503 (2014).
Tang, Y. L. et al. Measurement-device-independent quantum key distribution over 200 km. Phys. Rev. Lett. 113, 190501 (2014).
Wang, X. B. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors. Phys. Rev. A. 87, 012320 (2013).
Ma, X. F., Fred Fung, C. H. & Razavi, M. Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A. 86, 052305 (2012).
Wang, Q. & Wang, X. B. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A. 88, 052332 (2013).
Xu, F., Qi, B., Liao, Z. & Lo, H. K. Long distance measurement-device-independent quantum key distribution with entangled photon sources. Appl. Phys. Lett. 061101 (2013).
Curty, M. et al. Finite-key analysis for measurement-device-independent quantum key distribution. arXiv: 1307.1081v1.
Yu, Z. W., Zhou, Y. H. & Wang, X. B. Three-intensity decoy-state method for measurement-device-independent quantum key distribution. Phys. Rev. A. 88, 062339 (2013).
Yu, Z. W., Zhou, Y. H. & Wang, X. B. Decoy state method for measurement device independent quantum key distribution with different intensities in only one basis. arXiv: 1309.0471v1.
Yu, Z. W., Zhou, Y. H. & Wang, X. B. Generalized three-intensity decoy state method for measurement device independent quantum key distribution. arXiv: 1309.5886v1.
Zhou, Y. H., Yu, Z. W. & Wang, X. B. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100%. Phys. Rev. A. 89, 052325 (2014).
Wang, Q. & Wang, X. B. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Scientific Reports. 4, 4612 (2014).
Xu, F., Xu, H. & Lo, H. K. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A. 89, 052333 (2014).
Yu, Z. W., Zhou, Y. H. & Wang, X. B. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Phys. Rev. A. 91, 032318 (2015).
Zhou, Y. H., Yu, Z. W. & Wang, X. B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Phys. Rev. A. 93, 042324 (2016).
Li, A., Chen, T., Zhou, Y. H. & Wang, X. B. Optics Letters, Vol.41, No.9 (2016). On-demand single-photon sources via quantum blockade and applications in decoy-state quantum key distribution. Optics Letters, 41, No. 9 (2016).
Carmichael, H. J. Photon antibunching and squeezing for a single atom in a resonant cavity. Phys. Rev. Lett. 55, 2790 (1985).
Birnbaum, K. M. et al. Photon blockade in an optical cavity with one trapped atom. Nature. 436, 87 (2005).
Hennessy, K. et al. Quantum nature of a strongly coupled single quantum dot-cavity system. Nature. 445, 896 (2007).
Faraon, A. et al. Nat. Phys. 4, 859 (2008).
He, Y. M. Nature Nanotechnology 8, 213 (2013).
He, Y. M. et al. On-demand semiconductor single-photon source with near-unity indistinguishability. Nature Nanotechnology 8, 213 (2013).
Gullans, M., Chang, D. E., Koppens, F. H. L., Garcìa de Abajo, F. J. & Lukin, M. D. Single-photon nonlinear optics with graphene plasmons. Phys. Rev. Lett. 111, 247401 (2013).
Smolyaninov, I. I., Zayats, A. V., Gungor, A. & Davis, C. C. Single-photon tunneling via localized surface plasmons. Phys. Rev. Lett. 88, 187402 (2002).
Tian, L. & Carmichael, H. J. Quantum trajectory simulations of two-state behavior in an optical cavity containing one atom. Phys. Rev. A. 46, R6801 (1992).
Carmichael, H. J. An Open Systems Approach to Quantum Optics, Lecture Notes in Physics (Springer Science& Business Media) (1993).
Plenio, M. B. & Knight, P. L. The quantum-jump approach to dissipative dynamics in quantum optics. Rev. Mod. Phys. 70, 101 (1998).
Hua-Lei, Y. et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. Phys. Rev. Lett. 117, 190501 (2016).
Liu., Y. et al. Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111, 130502 (2013).
Acknowledgements
We acknowledge the financial support in part by the 10000-Plan of Shandong province (Taishan Scholars), National High-Tech Program of China grant No. 2011AA010800 and 2011AA010803, NSFC grant No. 11474182, 11774198, U1738142, 11174177 and 60725416, and the key R&D Plan Project of Shandong Province, grant No. 2015GGX101035 and the National key R&D plan, grant No. 2017YFA0303901.
Author information
Authors and Affiliations
Contributions
Xiang-Bin Wang proposed this work, Zong-Wen Yu and Yi-Heng Zhou studied the QKD part, Ao Li studied the quantum blockade part. Xiao-Long Hu and Cong Jiang did the calculations and drew the figures. Zong-Wen Yu and Yi-Heng Zhou wrote the manuscript.
Corresponding author
Ethics declarations
Competing Interests
The authors declare no competing interests.
Additional information
Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Zhou, YH., Yu, ZW., Li, A. et al. Measurement-device-independent quantum key distribution via quantum blockade. Sci Rep 8, 4115 (2018). https://doi.org/10.1038/s41598-018-21576-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-018-21576-7
This article is cited by
-
A Multi-party Quantum Key Agreement Protocol Based on Shamir’s Secret Sharing
International Journal of Theoretical Physics (2019)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.