Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel

Abstract

We show that a high key rate of Measurement-Device-Independent Quantum Key Distribution (MDIQKD) over asymmetric and unstable quantum channel can be obtained by full optimization and compensation. Employing a gradient optimization method, we make the full optimization taking both the global optimization for the 12 independent parameters and the joint constraints for statistical fluctuations. We present a loss-compensation method by monitoring the channel loss for an unstable channel. The numerical simulation shows that the method can produce high key rate for both the asymmetric channel and the unstable channel. Compared with the existing results of independent constraints, our result here improves the key rate by 1 to tens of times in typical experimental conditions.

Introduction

Quantum key distribution (QKD) provides the communication users with secure keys to encrypt their information. Bennett and Brassard proposed BB84 protocol1 to realize QKD, but the lack of practical single-photon sources limited the use of origin BB84 protocol. BB84 protocol with imperfect single-photon sources would suffer from the photon-number-splitting (PNS) attack2,3,4. This loophole can be fixed by the decoy-state method5,6,7,8. With the decoy-state method, QKD can be used in the practical system between users with longer distace9,10,11. After that, measurement-device-independent QKD (MDIQKD) was proposed to avoid any loophole from the imperfect detection devices12,13,14,15. Combined with decoy-state method, MDIQKD can also avoid the loophole from the imperfect single-photon sources15,16. Nowadays, the decoy-state MDIQKD has become the mainstream of the studies of quantum key distribution both theoretically16,17,18,19,20,21,22,23,24,25,26,27,28,29 and experimentally30,31,32,33,34,35,36,37,38,39,40,41,42,43. Various numerical models and optimization methods21,22,23,24 have improved the key rate and secure distance a lot. The numerical model by Xu et al.21 can apply to the case of asymmetrical channel rather precisely. The maximum distance of MDIQKD has been experimentally increased to 404 kilometers38 using the 4-intensity protocol24 with joint constraints for statistical fluctuations23. Another experiment exceeding 400-kilometer distance applying the decoy-state method but not using MDIQKD scheme was reported recently43.

In the scheme of decoy-state MDIQKD, at each time the user Alice (Bob) randomly chooses her (his) basis, bit value and intensity to send a pulse in a corresponding state, e.g. BB84 state in a polarization-coding MDIQKD, to an untrusted third party (UTP) Charlie. Charlie performs a collective measurement on each pulse pair and announces the measurement result in the public channel. After Charlie announces the measurement results, Alice and Bob announce the bases and intensities they use. Based on all announcement, Alice and Bob can calculate the yield and the error rate of single-photon pulse pairs, and then distill the secure key.

For the practical applications, the asymmetric and unstable channels are common cases both in fiber and free space. For example, when we consider the quantum network, due to the different geographical locations of users, the channel losses can be largely different. And if we want implement MDIQKD in free space, the channels are always asymmetric and unstable too, due to the atmospheric turbulence or moving sites (such as the satellite). Although the security of MDIQKD doesn’t make any assumption to the channel, the unstable and/or asymmetric quantum channel decreases the key rate quite a lot. Therefore, directly applying the optimized parameters for symmetric channel does not give a good performance in an asymmetric channel or an unstable channel. Here, we propose full optimization of four-intensity decoy-state MDIQKD protocol to largely increase the key rate in asymmetric channels than existing results of partial optimization. For full optimization, we mean: (1) Using 12 independent parameters, (2) Applying joint constraints23,24 for statistical fluctuations. If one only use one of the above two operations, that is partial optimization. Moreover, a loss-compensation method is presented with optimization to increase the performance of MDIQKD in unstable channels.

Results

Four-intensity decoy-state MDIQKD

Among all existing protocols of decoy-state MDIQKD, the 4-intensity protocol seems to be the most efficient one24 which has been extensively verified experimentally37,38,39,40. As was stated in the four-intensity decoy-state method in Ref.24, Alice and Bob each uses 4 different intensities, including one vacuum. This means in general, there are 7 different intensities for both sides with 6 independent parameters for non-vacuum intensities. Together with the frequencies of using each intensities, there are 12 independent parameters in general in the protocol. Also, the four-intensity protocol suggests using the joint constraints in statistical fluctuation of different observable23,24. A full implementation of the four-intensity protocol means doing optimization among all those 12 parameters with joint constraints fully.

Explicitly, in the four-intensity decoy-state method in ref.24, Alice (Bob) uses a source zA (zB) with intensity μaz (μbz) that only emits photons in the Z basis, two sources xA and yA (xB and yB) with intensities μax and μay (μbx and μby) that only emit photons in the X basis and a vacuum source oA (oB) that only emits vacuum pulses. At each time, Alice (Bob) randomly chooses a source in the four sources above to send a pulse, with probability \({p}_{a{l}_{A}},l=z,x,y,o\,({p}_{b{r}_{B}},r=z,x,y,o)\). So we call it “four-intensity protocol”.

The key rate of the decoy-state MDIQKD is given by:

$$R={p}_{az}{p}_{bz}\{{a}_{z1}{b}_{z1}\underline{\langle {s}_{11}\rangle }\,\mathrm{[1}-H\,(\overline{\langle {e}_{11}^{ph}\rangle })]-f{S}_{zz}H({E}_{zz})\}$$
(1)

where az1 and bz1 are the fraction of single photons of sources zA and zB, \(\underline{\langle {s}_{11}\rangle }\) and \(\overline{\langle {e}_{11}^{ph}\rangle }\) are the bound of yield and phase-flip error rate of single-photon pulse pairs which can be obtained by the decoy-state method, Szz and Ezz are yield and bit-flip error rate when Alice and Bob both send pulses with source zA/zB, \(H(p)=-\,p{\mathrm{log}}_{2}p-\mathrm{(1}-p){\mathrm{log}}_{2}\mathrm{(1}-p)\) is the binary entropy function and f is the correction efficiency.

Details for calculation of the key rate can be found in the appendix.

Optimization of source parameters

In the numerical simulation, we will estimate what values we would observe for the yields and error rates in a certain model and use these values to calculate the key rate. Given the properties of the channel and the detection devices, we can regard the key rate as a function of source parameters:

$$\begin{array}{r}\tilde{R}=\tilde{R}({\mu }_{ax},{\mu }_{ay},{\mu }_{az},{p}_{ax},{p}_{ay},{p}_{az},{\mu }_{bx},{\mu }_{by},{\mu }_{bz},{p}_{bx},{p}_{by},{p}_{bz})=\tilde{R}(\overrightarrow{x}\mathrm{).}\end{array}$$
(2)

If we use weak coherent state sources, the relation between the intensity μ and the photon number distribution \(\rho ={\sum }_{k}\,{a}_{k}|k\rangle \langle k|\) is \({a}_{k}={e}^{-\mu }\frac{{\mu }^{k}}{k!}\).

In the calculation of the key rate, we need to take the joint fluctuation and the scan of \( {\mathcal H} \) (the definition of \( {\mathcal H} \) is in the appendix) into consideration. In addition, the number of parameters we need to optimize is large, which means the parameter space is very huge. Therefore, normal optimization method costs a lot of time. We should improve the optimization method to get the optimal parameters quickly. Firstly, we consider the “gradient” of the key rate function29:

$$\frac{{\rm{\Delta }}\tilde{R}}{{\rm{\Delta }}{x}_{k}}=\frac{\tilde{R}({x}_{k}+{\rm{\Delta }}{x}_{k},{x}_{i})-\tilde{R}({x}_{k}-{\rm{\Delta }}{x}_{k},{x}_{i})}{2{\rm{\Delta }}{x}_{k}}.$$
(3)

In the case that both \(\tilde{R}\)(xk + Δxk, xi) and \(\tilde{R}\)(xk − Δxk, xi) are less than \(\tilde{R}\)(xk, xi), we set \(\frac{{\rm{\Delta }}\tilde{R}}{{\rm{\Delta }}{x}_{k}}=0\). With

$$\frac{{\rm{\Delta }}\tilde{R}}{{\rm{\Delta }}\overrightarrow{x}}=(\frac{{\rm{\Delta }}\tilde{R}}{{\rm{\Delta }}{x}_{1}},\ldots ,\frac{{\rm{\Delta }}\tilde{R}}{{\rm{\Delta }}{x}_{12}})$$
(4)

we can find the direction that key rate increases the fastest and get close to the optimal parameters quickly.

To avoid the case that the optimal parameters are the local optimal point, which satisfies \(\tilde{R}\)(xk + Δxk, xi) ≤ \(\tilde{R}\)(xk, xi) for any k but is not the maximum point in the whole area, we search the points in the nearby area to see whether there is higher key rate. Accurately, we calculate the key rate \(\tilde{R}\)(xk + δkΔl); δk = −1, 0, 1; k = 1, …, 12 with a certain Δl. If there are some points with higher key rate, we jump to the point with highest key rate in the nearby area and execute the above procedure again.

In our simulation, we found that in most cases, the gradient method brings us to the optimal point. But in some cases, it brings us to the local optimal point.

Loss-compensation method

For the case of unstable channel, according to our MDIQKD protocol, all source parameters should be determined before the QKD process and fixed during the QKD process. Even though we can detect the channel transmittance η at any time, we cannot change the source parameters to optimize the key rate at real time. The decoy state method requests that the intensities of pulses must be fixed. Say, switching among 3 fixed intensities. If one change the intensities beyond these 3 intensities, or change the intensities non-randomly, the result of the decoy-state method will be invalid. With the fixed source parameters μA and μB and unstable channel transmittance ηA(t) and ηB(t), which means the transmittance changes dependently on time, there are always some cases that the intensities at the two sides of Charlie’s beam splitter deviate a lot, saying that at some time ti, μAηA(ti) and μBηB(ti) deviate a lot. These cases will give a quite high error rate that decreases the key rate a lot.

First we consider the case with stable channel that satisfies μAηA > μBηB. In an asymmetric channel, if one attenuates one path, the channel will become symmetric and the detected error rate will be small. However, in such a case, the amount of detected bits is also decreased and the final key rate is not necessarily improved. If we add extra loss \(\frac{{\mu }_{B}{\eta }_{B}}{{\mu }_{A}{\eta }_{A}}\le {\tilde{\eta }}_{A}\le 1\) to the channel between Alice and Charlie, we can get a better key rate. Given the transmittance and the intensities of sources, the specific value of \({\tilde{\eta }}_{A}\) can be determined by numerical simulation.

Then we come to the case with unstable channel. Technically, the channel loss cannot be changed too fast. Otherwise the physical compensation cannot be made instantaneously. We assume that the transmittance remains unchanged during each time window, which means the transmittance doesn’t fluctuate too rapidly. Suppose that we are given the transmittance distribution \(\{{\eta }_{A}^{\mathrm{(1)}},\cdots ,{\eta }_{A}^{(i)},\cdots \}\) and \(\{{\eta }_{B}^{\mathrm{(1)}},\cdots ,{\eta }_{B}^{(i)},\cdots \}\) and fixed μA, μB. A general loss-compensation method is to add different extra loss \({\tilde{\eta }}^{(ij)}\) < 1 to Alice’s or Bob’s channel for different transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) and we can determine the optimal value of each \({\tilde{\eta }}^{(ij)}\) for each \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) pair. But in practice, the optimization of so many variables is out of any computer’s ability. So we keep only one extra loss \(\tilde{\eta }\) and raise a variable δ. When the transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) satisfies \({\eta }_{A}^{(i)}/{\eta }_{B}^{(j)} > \delta \), Charlie should add the extra loss \(\tilde{\eta }\) to the channel between Alice and Charlie. When the transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\) satisfies \({\eta }_{B}^{(j)}/{\eta }_{A}^{(i)} > \delta \), Charlie should add the extra loss \(\tilde{\eta }\) to the channel between Bob and Charlie. In other cases, Charlie doesn’t have to add any extra loss to the channel. We can use numerical simulation, combined with optimization of source parameters, to determine the values of \(\tilde{\eta }\) and δ to get the best key rate when given a specific transmittance distribution.

In the simulation of the unstable channel, suppose that we have the transmittance distribution \(\{{\eta }_{A}^{\mathrm{(1)}},\cdots ,{\eta }_{A}^{(i)},\cdots \}\), \(\{{\eta }_{B}^{\mathrm{(1)}},\cdots ,{\eta }_{B}^{(j)},\cdots \}\) and the corresponding probability \(\{{p}_{A}^{\mathrm{(1)}},\cdots ,{p}_{A}^{(i)},\cdots \}\), \(\{{p}_{B}^{\mathrm{(1)}},\cdots ,{p}_{B}^{(j)},\cdots \}\). We can calculate the “transmittance pair distribution” \(\{{\eta }_{A}^{\mathrm{(1)}}\otimes {\eta }_{B}^{\mathrm{(1)}},\cdots ,{\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)},\cdots \}\) and the corresponding probability \(\{{p}_{A}^{\mathrm{(1)}}\ast {p}_{B}^{\mathrm{(1)}},\cdots ,{p}_{A}^{(i)}\ast {p}_{B}^{(j)},\cdots \}\). With a certain source pair lr and a certain transmittance pair \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\), the observed yield \({S}_{lr}({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)})\) and the observed error rate \({E}_{lr}({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)})\) can be calculated as in ref.44 theoretically. Then the yield and the error rate in the whole process can be calculated by

$${S}_{lr}=\sum _{i,j}\,{p}_{A}^{(i)}{p}_{B}^{(j)}{S}_{lr}({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)})$$
(5)

and

$${E}_{lr}=\sum _{i,j}\,{p}_{A}^{(i)}{p}_{B}^{(j)}{E}_{lr}({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\mathrm{).}$$
(6)

When the loss-compensation is performed, we can calculate the Slr, Elr in the same way except the (ij)-th transmittance pair is changed into \({\eta }_{A}^{(i)}\tilde{\eta }\otimes {\eta }_{B}^{(j)}\) if \(\frac{{\eta }_{A}^{(i)}}{{\eta }_{B}^{(j)}} > \delta \), or \({\eta }_{A}^{(i)}\otimes {\eta }_{B}^{(j)}\tilde{\eta }\) if \(\frac{{\eta }_{B}^{(j)}}{{\eta }_{A}^{(i)}} > \delta \).

Numerical simulation

First we consider the case that the channel is stable but asymmetric. We shall estimate what values would be probably observed for the yields in the normal cases by the linear models15,21,22 and the errors in X basis by the useful model for misalignment error under asymmetric channel in ref.21. We show the optimized key rate in some asymmetric cases in Fig. 1 and some results in certain distances in Table 1, in comparison with the results of independent bounds in ref.45, with device parameters in Table 2. From Fig. 1, we can find that with full implementation of the four-intensity MDIQKD and full optimization of the source parameters, quite good key rate can be achieved. In particular, we have taken the joint constraints23,24 for statistical fluctuations, this affects the key rate significantly. Taking joint constraints will consume some more computational time. The computation can be done very fast if we apply formulas of refs23,24 rather than the linear programming. In our numerical simulation, we have already overcome the problem of unpredictable behavior such as jitters45. Actually, the computational time seems not to be a major issue for the practical application. In the application for the unstable channel, one can choose to test the channels and do the optimization for the major loss values of the changing channel before running the protocol.

Figure 1
figure 1

Optimized key rate versus the total distance between Alice and Bob in asymmetric channel with the device parameters in Table 2.

Table 1 Optimized key rate at different distances in asymmetric channel with the parameters in Table 2.
Table 2 Device parameters for Table 1.

Then for the unstable channel, we consider a simple case that \({\eta }_{A}^{(i)}=\mathrm{(3}+2i)\) dB, \({\eta }_{B}^{(j)}=\mathrm{(13}+2j)\) dB with probability \({p}_{A}^{(i)}={p}_{B}^{(j)}=0.2\) for i, j = 1, …, 5 (Here the detector’s efficiency is contained in the total loss). We show the key rate with different δ and \(\tilde{\eta }\) with source parameters optimized in Table 3.

Table 3 Optimized key rate with different δ and \(\tilde{\eta }^{\prime} \) in unstable channel with the parameters in Table 2.

The case that δ = \(\tilde{\eta }^{\prime} \) = 0 dB is equal to that we don’t perform the loss-compensation method. In the second line of Table 3, we can see that an improper loss-compensation (δ = −7 dB and \(\tilde{\eta }^{\prime} \) = 5 dB) will decrease the key rate. We can find that in this transmittance distribution, setting δ = −8.75 dB and \(\tilde{\eta }^{\prime} \) = 4.5 dB can maximize the key rate in our loss-compensation method.

Discussion

We propose a full implementation of four-intensity decoy-state MDIQKD. Even if the channels between the users and UTP are asymmetric, our four-intensity protocol still has a good performance. We also propose a loss-compensation method. This method can improve the key rate a lot in unstable channel.

Method: calculation of the key rate

Asymptotic case

We define the yield, the error yield and the error rate as follow. Consider a pulse pair set \({\mathscr{C}}\), which contains \({N}_{{\mathscr{C}}}\) pulse pairs totally. These pairs cause \({M}_{{\mathscr{C}}}\) effective counts and \({W}_{{\mathscr{C}}}\) error counts. In this case, the yield \({S}_{{\mathscr{C}}}={M}_{{\mathscr{C}}}/{N}_{{\mathscr{C}}}\), the error yield \({T}_{{\mathscr{C}}}={W}_{{\mathscr{C}}}/{N}_{{\mathscr{C}}}\) and the error rate \({E}_{{\mathscr{C}}}={W}_{{\mathscr{C}}}/{M}_{{\mathscr{C}}}\).

In photon number space, the density matrices of the pulses from the sources can be written as

$${\rho }_{{l}_{A}}=\sum _{k=0}^{\infty }\,{a}_{lk}|k\rangle \langle k|,\,l=x,y,z$$
(7)

and

$${\rho }_{{r}_{B}}=\sum _{k=0}^{\infty }\,{b}_{rk}|k\rangle \langle k|,\,r=x,y,z.$$
(8)

We assume that the states above satisfy these conditions:

$$\frac{{a}_{yk}}{{a}_{xk}}\ge \frac{{a}_{y2}}{{a}_{x2}}\ge \frac{{a}_{y1}}{{a}_{x1}},\,\frac{{b}_{yk}}{{b}_{xk}}\ge \frac{{b}_{y2}}{{b}_{x2}}\ge \frac{{b}_{y1}}{{b}_{x1}}$$
(9)

for k > 2, so that the decoy-state results can apply. Familiar sources used in practice, such as weak-coherent-state sources and heralded single-photon sources out of the parametric-down conversion, satisfy the conditions above.

In the following, we will omit the subscript A and B in lA and rB if it doesn’t cause confusion. A pulse pair of lr is a pair where Alice’s pulse is from l and Bob’s pulse if from r. The two-mode source lr emits all lr pairs.

The main idea of decoy state is that the yield of |m〉|n〉 photon pairs from different source pairs should be the same in the asymptotic case, which means

$$\langle {s}_{mn}^{lr}\rangle =\langle {s}_{mn}\rangle ,\,l,r=x,y,z.$$
(10)

Using Eq. (10) and the convex form of yield of lr source pairs

$$\langle {S}_{lr}\rangle =\sum _{m,n=0}^{\infty }\,{a}_{lm}{b}_{rn}\langle {s}_{mn}\rangle ,$$
(11)

we can calculate the lower bound of the yield of single-photon pairs:

$$\langle {s}_{11}\rangle \ge \underline{\langle {s}_{11}\rangle }=\frac{{S}_{+}-{S}_{-}-{a}_{y1}{b}_{y2} {\mathcal H} }{{a}_{x1}{a}_{y1}({b}_{x1}{b}_{y2}-{b}_{x2}{b}_{y1})}$$
(12)

where

$${S}_{+}={a}_{y1}{b}_{y2}\langle {S}_{xx}\rangle +{a}_{x1}{b}_{x2}{a}_{y0}\langle {S}_{oy}\rangle +{a}_{x1}{b}_{x2}{b}_{y0}\langle {S}_{yo}\rangle ,$$
(13)
$${S}_{-}={a}_{x1}{b}_{x2}\langle {S}_{yy}\rangle +{a}_{x1}{b}_{x2}{a}_{y0}{b}_{y0}\langle {S}_{oo}\rangle $$
(14)

and

$$ {\mathcal H} ={a}_{x0}\langle {S}_{ox}\rangle +{b}_{x0}\langle {S}_{xo}\rangle -{a}_{x0}{b}_{x0}\langle {S}_{oo}\rangle \mathrm{.}$$
(15)

Eq. (12) holds when

$${K}_{a}=\frac{{a}_{y1}{a}_{x2}}{{a}_{x1}{a}_{y2}}\le \frac{{b}_{y1}{b}_{x2}}{{b}_{x1}{b}_{y2}}={K}_{b}.$$
(16)

In the case of Ka > Kb, the lower bound of s11 can be calculated with Eqs (1215) by making exchange between axk and bxk, and exchange between ayk and byk, for k = 1, 2.

Similarly, we can calculate the upper bound of phase-flip error rate of single-photon pairs:

$$\langle {e}_{11}^{ph}\rangle \le \overline{\langle {e}_{11}^{ph}\rangle }=\frac{\langle {T}_{xx}\rangle - {\mathcal H} \mathrm{/2}}{{a}_{x1}{b}_{x1}\underline{\langle {s}_{11}\rangle }}.$$
(17)

With \(\underline{\langle {s}_{11}\rangle }\) and \(\overline{\langle {e}_{11}^{ph}\rangle }\), we can calculate the key rate with Eq. (1).

Nonasymptotic case

In the nonasymptotic regime, we should consider the statistical fluctuation of the observable, e.g. the difference between observed values and mean values. Given a failure probability ε, the observed value \({S}_{{\mathscr{C}}}\) of an observable of a set \({\mathscr{C}}\) and its mean value \(\langle {S}_{{\mathscr{C}}}\rangle \) satisfy:

$$-{{\rm{\Delta }}}_{-}\le {S}_{{\mathscr{C}}}-\langle {S}_{{\mathscr{C}}}\rangle \le {{\rm{\Delta }}}_{+}.$$
(18)

If we perform a standard error analysis, Δ can be given by

$${{\rm{\Delta }}}_{-}={{\rm{\Delta }}}_{+}=\gamma \sqrt{\frac{{S}_{{\mathscr{C}}}}{{N}_{{\mathscr{C}}}}}$$
(19)

where \({N}_{{\mathscr{C}}}\) is the number of elements in set \({\mathscr{C}}\) and γ = 5.3 given the failure probability ε = 10−7.

According to the idea of joint constraints of statistical fluctuation23, the set \({\mathscr{C}}\) can be either all pulse pairs from a source pair, or the combination of all pulse pairs from different source pairs. Taking all these joint constraints into consideration, the bound of 〈s11〉 and \(\langle {e}_{11}^{ph}\rangle \) can be calculated tighter.

As a joint term in \(\underline{\langle {s}_{11}\rangle }\) and \(\overline{\langle {e}_{11}^{ph}\rangle }\), \( {\mathcal H} \) should fluctuate jointly in Eq. (12) and Eq. (17), instead of taking the worst case independently24. We regard R as a function of \( {\mathcal H} \), scan \( {\mathcal H} \) in its possible range and take the minimum R as the final key rate:

$$\tilde{R}=\mathop{min}\limits_{ {\mathcal H} \in [\underline{ {\mathcal H} },\overline{ {\mathcal H} }]}R( {\mathcal H} )$$
(20)

Method: verifying the global optimization

When we search the points in the nearby area in our optimization algorithm, we can change the parameter Δl in our programme. In the cases with different Δl, e.g. Δl = 0.1, 0.001, 0.0001…, we obtain almost the same optimized results.

We make another test that to each point, we start from many sets of different initial values of parameters. We then obtain almost the same results for the optimized parameters.

These strongly indicate that our result is indeed the globally optimized result.

References

  1. Bennett, C. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, 175–179 (1984).

  2. Huttner, B., Imoto, N., Gisin, N. & Mor, T. Quantum cryptography with coherent states. Physical Review A 51, 1863 (1995).

    ADS  CAS  Article  Google Scholar 

  3. Yuen, H. P. Quantum amplifiers, quantum duplicators and quantum cryptography. Quantum and Semiclassical Optics: Journal of the European Optical Society Part B 8, 939 (1996).

    ADS  Article  Google Scholar 

  4. Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Limitations on practical quantum cryptography. Physical Review Letters 85, 1330 (2000).

    ADS  CAS  Article  Google Scholar 

  5. Inamori, H., Lütkenhaus, N. & Mayers, D. Unconditional security of practical quantum key distribution. The European Physical Journal D-Atomic, Molecular, Optical and Plasma Physics 41, 599–627 (2007).

    ADS  CAS  Google Scholar 

  6. Hwang, W.-Y. Quantum key distribution with high loss: toward global secure communication. Physical Review Letters 91, 057901 (2003).

    ADS  Article  Google Scholar 

  7. Wang, X.-B. Beating the photon-number-splitting attack in practical quantum cryptography. Physical review letters 94, 230503 (2005).

    ADS  Article  Google Scholar 

  8. Lo, H.-K., Ma, X. & Chen, K. Decoy state quantum key distribution. Physical review letters 94, 230504 (2005).

    ADS  Article  Google Scholar 

  9. Wang, Q. et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. Physical review letters 100, 090501 (2008).

    ADS  Article  Google Scholar 

  10. Xu, F. et al. Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system. Physical Review A 80, 062309 (2009).

    ADS  Article  Google Scholar 

  11. Zhang, C.-H., Luo, S.-L., Guo, G.-C. & Wang, Q. Approaching the ideal quantum key distribution with two-intensity decoy states. Physical Review A 92, 022332 (2015).

    ADS  Article  Google Scholar 

  12. Lydersen, L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature photonics 4, 686–689 (2010).

    ADS  CAS  Article  Google Scholar 

  13. Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature communications 2, 349 (2011).

    Article  Google Scholar 

  14. Braunstein, S. L. & Pirandola, S. Side-channel-free quantum key distribution. Physical review letters 108, 130502 (2012).

    ADS  Article  Google Scholar 

  15. Lo, H.-K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Physical review letters 108, 130503 (2012).

    ADS  Article  Google Scholar 

  16. Wang, X.-B. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors. Physical Review A 87, 012320 (2013).

    ADS  Article  Google Scholar 

  17. Wang, Q. & Wang, X.-B. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Physical Review A 88, 052332 (2013).

    ADS  Article  Google Scholar 

  18. Curty, M. et al. Finite-key analysis for measurement-device-independent quantum key distribution. Nature communications 5 (2014).

  19. Yu, Z.-W., Zhou, Y.-H. & Wang, X.-B. Three-intensity decoy-state method for measurement-device-independent quantum key distribution. Physical Review A 88, 062339 (2013).

    ADS  Article  Google Scholar 

  20. Zhou, Y.-H., Yu, Z.-W. & Wang, X.-B. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100%. Physical Review A 89, 052325 (2014).

    ADS  Article  Google Scholar 

  21. Xu, F., Curty, M., Qi, B. & Lo, H.-K. Practical aspects of measurement-device-independent quantum key distribution. New Journal of Physics 15, 113007 (2013).

    ADS  Article  Google Scholar 

  22. Xu, F., Xu, H. & Lo, H.-K. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Physical Review A 89, 052333 (2014).

    ADS  Article  Google Scholar 

  23. Yu, Z.-W., Zhou, Y.-H. & Wang, X.-B. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Physical Review A 91, 032318 (2015).

    ADS  Article  Google Scholar 

  24. Zhou, Y.-H., Yu, Z.-W. & Wang, X.-B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Physical Review A 93, 042324 (2016).

    ADS  Article  Google Scholar 

  25. Wang, Q., Zhou, X.-Y. & Guo, G.-C. Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources. Scientific reports 6 (2016).

  26. Jiang, C., Yu, Z.-W. & Wang, X.-B. Measurement-device-independent quantum key distribution with source state errors in photon number space. Physical Review A 94, 062323 (2016).

    ADS  Article  Google Scholar 

  27. Jiang, C., Yu, Z.-W. & Wang, X.-B. Measurement-device-independent quantum key distribution with source state errors and statistical fluctuation. Physical Review A 95, 032325 (2017).

    ADS  Article  Google Scholar 

  28. Zhou, X.-Y., Zhang, C.-H., Zhang, C.-M. & Wang, Q. Obtaining better performance in the measurement-device-independent quantum key distribution with heralded single-photon sources. Physical Review A 96, 052337 (2017).

    ADS  Article  Google Scholar 

  29. Hu, X.-L., Zhou, Y.-H., Yu, Z.-W. & Wang, X.-B. Practical measurement-device-independent quantum key distribution without vacuum sources. Physical Review A 95, 032331 (2017).

    ADS  Article  Google Scholar 

  30. Rubenok, A., Slater, J. A., Chan, P., Lucio-Martinez, I. & Tittel, W. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Physical review letters 111, 130501 (2013).

    ADS  CAS  Article  Google Scholar 

  31. Chan, P., Slater, J. A., Lucio-Martinez, I., Rubenok, A. & Tittel, W. Modeling a measurement-device-independent quantum key distribution system. Optics express 22, 12716–12736 (2014).

    ADS  CAS  Article  Google Scholar 

  32. Liu, Y. et al. Experimental measurement-device-independent quantum key distribution. Physical review letters 111, 130502 (2013).

    ADS  Article  Google Scholar 

  33. da Silva, T. F. et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Physical Review A 88, 052303 (2013).

    ADS  Article  Google Scholar 

  34. Tang, Z. et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Physical review letters 112, 190503 (2014).

    ADS  Article  Google Scholar 

  35. Tang, Y.-L. et al. Measurement-device-independent quantum key distribution over 200 km. Physical review letters 113, 190501 (2014).

    ADS  Article  Google Scholar 

  36. Wang, C. et al. Phase-reference-free experiment of measurement-device-independent quantum key distribution. Physical review letters 115, 160502 (2015).

    ADS  Article  Google Scholar 

  37. Comandar, L. C. et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers. Nature Photonics 10, 312 (2016).

    ADS  CAS  Article  Google Scholar 

  38. Yin, H.-L. et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Physical Review Letters 117, 190501 (2016).

    ADS  Article  Google Scholar 

  39. Wang, C. et al. Measurement-device-independent quantum key distribution robust against environmental disturbances. Optica 4, 1016–1023 (2017).

    Article  Google Scholar 

  40. Roberts, G. L. et al. Experimental measurement-device-independent quantum digital signatures. Nature Communications 8, 1098 (2017).

    ADS  CAS  Article  Google Scholar 

  41. Pirandola, S. et al. High-rate measurement-device-independent quantum cryptography. Nature Photonics 9, 397 (2015).

    ADS  CAS  Article  Google Scholar 

  42. Wang, C.-Y. et al. Integrated server for measurement-device-independent quantum key distribution network. arXiv preprint arXiv:1808.08586 (2018).

  43. Boaron, A. et al. Secure quantum key distribution over 421 km of optical fiber. arXiv preprint arXiv:1807.03222 (2018).

  44. Wang, Q. & Wang, X.-B. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Scientific reports 4 (2014).

  45. Wang, W., Xu, F. & Lo, H.-K. Enabling a scalable high-rate measurement-device-independent quantum key distribution network. arXiv preprint arXiv:1807.03466 (2018).

Download references

Acknowledgements

We acknowledge the financial support in part by The National Key Research and Development Program of China grant No. 2017YFA0303901; NSFC grant No. 11474182, 11774198 and U1738142; the key Research and Development Plan Project of Shandong Province, grant No. 2015GGX101035; Shandong Peninsula National Innovation Park Development Project; Taishan Scholars of Shandong Province. Yuan Cao was supported by the Youth Innovation Promotion Association of CAS.

Author information

Affiliations

Authors

Contributions

X.B.W. and Y.C. proposed this work. X.L.H. and Z.W.Y. did the calculations and drew the figures. X.L.H. and Y.C. wrote the manuscript.

Corresponding author

Correspondence to Xiang-Bin Wang.

Ethics declarations

Competing Interests

The authors declare no competing interests.

Additional information

Publisher’s note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Hu, XL., Cao, Y., Yu, ZW. et al. Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel. Sci Rep 8, 17634 (2018). https://doi.org/10.1038/s41598-018-35507-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1038/s41598-018-35507-z

Keywords

  • Unstable Channel
  • Asymmetric Channel
  • Measurement-device-independent Quantum Key Distribution (MDIQKD)
  • Joint Constraints
  • Channel Loss

Further reading

Comments

By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing