Skip to main content
Top
Published in: Quantum Information Processing 2/2021

01-02-2021

Differential phase encoded measurement-device-independent quantum key distribution

Authors: Shashank Kumar Ranu, Anil Prabhakar, Prabha Mandayam

Published in: Quantum Information Processing | Issue 2/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We present a measurement-device-independent quantum key distribution (MDI-QKD) using single photons in a linear superposition of three orthogonal time-bin states, for generating the key. The orthogonal states correspond to three distinct paths in the delay line interferometers used by two (trusted) sources. The key information is decoded based on the measurement outcomes obtained by an untrusted third party Charles, who uses a beamsplitter to measure the phase difference between pulses traveling through different paths of the two delay lines. The proposed scheme combines the best of both differential-phase-shift (DPS) QKD and MDI-QKD. It is more robust against phase fluctuations, and also ensures protection against detector side-channel attacks. We prove unconditional security by demonstrating an equivalent protocol involving shared entanglement between the two trusted parties. We show that the secure key rate for our protocol compares well to existing protocols in the asymptotic regime. For the decoy-state variant of our protocol, we evaluate the secure key rate by using a phase-post-selection technique. Finally, we estimate the bit error rate and the phase error rate, in the finite key regime.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
2.
go back to reference Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)ADS Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)ADS
3.
go back to reference Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)ADS Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)ADS
4.
go back to reference Gottesman, D., Lo, H.K., Lutkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. In: Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on (IEEE, 2004), p. 136 Gottesman, D., Lo, H.K., Lutkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. In: Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on (IEEE, 2004), p. 136
5.
go back to reference Biham, E., Huttner, B., Mor, T.: Quantum cryptographic network based on quantum memories. Phys. Rev. A 54(4), 2651 (1996)ADSMathSciNet Biham, E., Huttner, B., Mor, T.: Quantum cryptographic network based on quantum memories. Phys. Rev. A 54(4), 2651 (1996)ADSMathSciNet
6.
go back to reference Qi, B., Fung, C.H.F., Lo, H.K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7(1), 73 (2007)MathSciNetMATH Qi, B., Fung, C.H.F., Lo, H.K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7(1), 73 (2007)MathSciNetMATH
7.
go back to reference Fung, C.H.F., Qi, B., Tamaki, K., Lo, H.K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314 (2007)ADS Fung, C.H.F., Qi, B., Tamaki, K., Lo, H.K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314 (2007)ADS
8.
go back to reference Lamas-Linares, A., Kurtsiefer, C.: Breaking a quantum key distribution system through a timing side channel. Opt. Express 15(15), 9388 (2007)ADS Lamas-Linares, A., Kurtsiefer, C.: Breaking a quantum key distribution system through a timing side channel. Opt. Express 15(15), 9388 (2007)ADS
9.
go back to reference Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78(4), 042333 (2008)ADS Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78(4), 042333 (2008)ADS
10.
go back to reference Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace BB84 quantum cryptography. New J. Phys. 11(6), 065001 (2009)ADS Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace BB84 quantum cryptography. New J. Phys. 11(6), 065001 (2009)ADS
11.
go back to reference Xu, F., Qi, B., Lo, H.K.: Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12(11), 113026 (2010)ADS Xu, F., Qi, B., Lo, H.K.: Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12(11), 113026 (2010)ADS
12.
go back to reference Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4(10), 686 (2010)ADS Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4(10), 686 (2010)ADS
13.
go back to reference Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011)ADS Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011)ADS
14.
go back to reference Weier, H., Krauss, H., Rau, M., Fürst, M., Nauerth, S., Weinfurter, H.: Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 13(7), 073024 (2011)ADS Weier, H., Krauss, H., Rau, M., Fürst, M., Nauerth, S., Weinfurter, H.: Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 13(7), 073024 (2011)ADS
15.
go back to reference Ko, H., Lim, K., Oh, J., Rhee, J.K.K.: Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system. Quantum Inf. Process. 15(10), 4265 (2016)ADSMATH Ko, H., Lim, K., Oh, J., Rhee, J.K.K.: Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system. Quantum Inf. Process. 15(10), 4265 (2016)ADSMATH
16.
go back to reference Fung, C.H.F., Tamaki, K., Qi, B., Lo, H.K., Ma, X.: Security proof of quantum key distribution with detection efficiency mismatch. Quantum Inf. Comput. 9(1), 131–165 (2009)MathSciNetMATH Fung, C.H.F., Tamaki, K., Qi, B., Lo, H.K., Ma, X.: Security proof of quantum key distribution with detection efficiency mismatch. Quantum Inf. Comput. 9(1), 131–165 (2009)MathSciNetMATH
17.
go back to reference Marøy, Ø., Lydersen, L., Skaar, J.: Security of quantum key distribution with arbitrary individual imperfections. Phys. Rev. A 82(3), 032337 (2010)ADS Marøy, Ø., Lydersen, L., Skaar, J.: Security of quantum key distribution with arbitrary individual imperfections. Phys. Rev. A 82(3), 032337 (2010)ADS
18.
go back to reference Kang, G.D., Zhou, Q.P., Fang, M.F.: Measurement-device-independent quantum key distribution with uncharacterized coherent sources. Quantum Inf. Process. 19(1), 1 (2020)ADSMathSciNet Kang, G.D., Zhou, Q.P., Fang, M.F.: Measurement-device-independent quantum key distribution with uncharacterized coherent sources. Quantum Inf. Process. 19(1), 1 (2020)ADSMathSciNet
19.
go back to reference da Silva, T.F., Xavier, G.B., Temporão, G.P., von der Weid, J.P.: Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Opt. Express 20(17), 18911 (2012)ADS da Silva, T.F., Xavier, G.B., Temporão, G.P., von der Weid, J.P.: Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Opt. Express 20(17), 18911 (2012)ADS
20.
go back to reference Yuan, Z., Dynes, J., Shields, A.: Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography. Appl. Phys. Lett. 98(23), 231104 (2011)ADS Yuan, Z., Dynes, J., Shields, A.: Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography. Appl. Phys. Lett. 98(23), 231104 (2011)ADS
21.
go back to reference Mayers, D., Yao, A.: Quantum Cryptography with Imperfect Apparatus. In: Proceedings of the 39th Annual Symposium on Foundations of Computer Science (IEEE Computer Society, USA, 1998), FOCS ’98, p. 503 Mayers, D., Yao, A.: Quantum Cryptography with Imperfect Apparatus. In: Proceedings of the 39th Annual Symposium on Foundations of Computer Science (IEEE Computer Society, USA, 1998), FOCS ’98, p. 503
22.
go back to reference Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution. J. Cryptol. 19(4), 381 (2006)MathSciNetMATH Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution. J. Cryptol. 19(4), 381 (2006)MathSciNetMATH
23.
go back to reference Gisin, N., Pironio, S., Sangouard, N.: Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. Phys. Rev. Lett. 105(7), 070501 (2010)ADS Gisin, N., Pironio, S., Sangouard, N.: Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. Phys. Rev. Lett. 105(7), 070501 (2010)ADS
24.
go back to reference Curty, M., Moroder, T.: Heralded-qubit amplifiers for practical device-independent quantum key distribution. Phys. Rev. A 84, 010304 (2011)ADS Curty, M., Moroder, T.: Heralded-qubit amplifiers for practical device-independent quantum key distribution. Phys. Rev. A 84, 010304 (2011)ADS
25.
go back to reference Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)ADS Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)ADS
26.
go back to reference Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108(13), 130502 (2012)ADS Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108(13), 130502 (2012)ADS
27.
go back to reference Wang, Q., Zhang, C.H., Luo, S., Guo, G.C.: An enhanced proposal on decoy-state measurement device-independent quantum key distribution. Quantum Inf. Process. 15(9), 3785 (2016)ADSMathSciNetMATH Wang, Q., Zhang, C.H., Luo, S., Guo, G.C.: An enhanced proposal on decoy-state measurement device-independent quantum key distribution. Quantum Inf. Process. 15(9), 3785 (2016)ADSMathSciNetMATH
28.
go back to reference Wang, L., Zhou, Y.Y., Zhou, X.J., Chen, X., Zhang, Z.: New scheme for measurement-device-independent quantum key distribution. Quantum Inf. Process. 17(9), 231 (2018)ADSMathSciNetMATH Wang, L., Zhou, Y.Y., Zhou, X.J., Chen, X., Zhang, Z.: New scheme for measurement-device-independent quantum key distribution. Quantum Inf. Process. 17(9), 231 (2018)ADSMathSciNetMATH
29.
go back to reference Zhu, J.R., Zhu, F., Zhou, X.Y., Wang, Q.: The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states. Quantum Inf. Process. 15(9), 3799 (2016)ADSMathSciNetMATH Zhu, J.R., Zhu, F., Zhou, X.Y., Wang, Q.: The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states. Quantum Inf. Process. 15(9), 3799 (2016)ADSMathSciNetMATH
30.
go back to reference Rubenok, A., Slater, J.A., Chan, P., Lucio-Martinez, I., Tittel, W.: Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111(13), 130501 (2013)ADS Rubenok, A., Slater, J.A., Chan, P., Lucio-Martinez, I., Tittel, W.: Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111(13), 130501 (2013)ADS
31.
go back to reference Liu, Y., Chen, T.Y., Wang, L.J., Liang, H., Shentu, G.L., Wang, J., Cui, K., Yin, H.L., Liu, N.L., Li, L., et al.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111(13), 130502 (2013)ADS Liu, Y., Chen, T.Y., Wang, L.J., Liang, H., Shentu, G.L., Wang, J., Cui, K., Yin, H.L., Liu, N.L., Li, L., et al.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111(13), 130502 (2013)ADS
32.
go back to reference Tamaki, K., Lo, H.K., Fung, C.H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85(4), 042307 (2012)ADS Tamaki, K., Lo, H.K., Fung, C.H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85(4), 042307 (2012)ADS
33.
go back to reference Ferenczi, A.: Security proof methods for quantum key distribution protocols, University of Waterloo (2013) Ferenczi, A.: Security proof methods for quantum key distribution protocols, University of Waterloo (2013)
34.
go back to reference Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86(6), 062319 (2012)ADS Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86(6), 062319 (2012)ADS
35.
go back to reference Lin, J., Lutkenhaus, N.: Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 98(4), 042332 (2018)ADS Lin, J., Lutkenhaus, N.: Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 98(4), 042332 (2018)ADS
36.
go back to reference Ma, X., Zeng, P., Zhou, H.: Phase-matching quantum key distribution. Phys. Rev. X 8(3), 031043 (2018) Ma, X., Zeng, P., Zhou, H.: Phase-matching quantum key distribution. Phys. Rev. X 8(3), 031043 (2018)
37.
go back to reference Xu, F., Curty, M., Qi, B., Lo, H.K.: Measurement-device-independent quantum cryptography. IEEE J. Sel. Top. Quantum Electron. 21(3), 148 (2014)ADS Xu, F., Curty, M., Qi, B., Lo, H.K.: Measurement-device-independent quantum cryptography. IEEE J. Sel. Top. Quantum Electron. 21(3), 148 (2014)ADS
38.
go back to reference Inoue, K.: Differential phase-shift quantum key distribution systems. IEEE J. Sel. Top. Quantum Electron. 21(3), 109 (2015)ADS Inoue, K.: Differential phase-shift quantum key distribution systems. IEEE J. Sel. Top. Quantum Electron. 21(3), 109 (2015)ADS
39.
go back to reference Inoue, K., Waks, E., Yamamoto, Y.: Differential-phase-shift quantum key distribution using coherent light. Phys. Rev. A 68(2), 022317 (2003)ADS Inoue, K., Waks, E., Yamamoto, Y.: Differential-phase-shift quantum key distribution using coherent light. Phys. Rev. A 68(2), 022317 (2003)ADS
40.
go back to reference Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89(3), 037902 (2002)ADS Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89(3), 037902 (2002)ADS
41.
go back to reference Waks, E., Takesue, H., Yamamoto, Y.: Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 73(1), 012344 (2006)ADS Waks, E., Takesue, H., Yamamoto, Y.: Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 73(1), 012344 (2006)ADS
42.
go back to reference Wen, K., Tamaki, K., Yamamoto, Y.: Unconditional security of single-photon differential phase shift quantum key distribution. Phys. Rev. Lett. 103(17), 170503 (2009)ADS Wen, K., Tamaki, K., Yamamoto, Y.: Unconditional security of single-photon differential phase shift quantum key distribution. Phys. Rev. Lett. 103(17), 170503 (2009)ADS
43.
go back to reference Inamori, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599 (2007)ADS Inamori, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599 (2007)ADS
44.
go back to reference Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)ADS Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)ADS
45.
go back to reference Hayashi, M., Nakayama, R.: Security analysis of the decoy method with the Bennett-brassard 1984 protocol for finite key lengths. New J. Phys. 16(6), 063009 (2014)ADSMATH Hayashi, M., Nakayama, R.: Security analysis of the decoy method with the Bennett-brassard 1984 protocol for finite key lengths. New J. Phys. 16(6), 063009 (2014)ADSMATH
46.
go back to reference Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)ADS Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)ADS
47.
go back to reference Wang, Y., Bao, W.S., Zhou, C., Jiang, M.S., Li, H.W.: Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources. JOSA B 36(3), B83 (2019) Wang, Y., Bao, W.S., Zhou, C., Jiang, M.S., Li, H.W.: Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources. JOSA B 36(3), B83 (2019)
48.
go back to reference Ma, X., Fung, C.H.F., Razavi, M.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86(5), 052305 (2012)ADS Ma, X., Fung, C.H.F., Razavi, M.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86(5), 052305 (2012)ADS
49.
go back to reference Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun 5, 3732 (2014)ADS Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun 5, 3732 (2014)ADS
50.
51.
go back to reference Ranu, S.K., Shaw, G.K., Prabhakar, A., Mandayam, P.: Security with 3-pulse differential phase shift quantum key distribution. In: 2017 IEEE Workshop on Recent Advances in Photonics (WRAP). IEEE, pp. 1–7 (2017) Ranu, S.K., Shaw, G.K., Prabhakar, A., Mandayam, P.: Security with 3-pulse differential phase shift quantum key distribution. In: 2017 IEEE Workshop on Recent Advances in Photonics (WRAP). IEEE, pp. 1–7 (2017)
52.
go back to reference Diamanti, E.: Security and implementation of differential phase shift quantum key distribution systems, Stanford University (2006) Diamanti, E.: Security and implementation of differential phase shift quantum key distribution systems, Stanford University (2006)
53.
go back to reference Shaw, G., Sridharan, S., Ranu, S., Shingala, F., Mandayam, P., Prabhakar, A.: Equivalence of space and time-bins in DPS-QKD, arXiv preprint quant-ph, arXiv:2008.03083 (2020) Shaw, G., Sridharan, S., Ranu, S., Shingala, F., Mandayam, P., Prabhakar, A.: Equivalence of space and time-bins in DPS-QKD, arXiv preprint quant-ph, arXiv:2008.03083 (2020)
54.
go back to reference Ou, Z.Y.J.: Multi-photon Quantum Interference. Springer, Berlin (2007)MATH Ou, Z.Y.J.: Multi-photon Quantum Interference. Springer, Berlin (2007)MATH
55.
go back to reference Korzh, B., Walenta, N., Houlmann, R., Zbinden, H.: A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator. Opt. Express 21(17), 19579–19592 (2013)ADS Korzh, B., Walenta, N., Houlmann, R., Zbinden, H.: A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator. Opt. Express 21(17), 19579–19592 (2013)ADS
56.
go back to reference Scarani, V., Renner, R.: Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 100(20), 200501 (2008)ADS Scarani, V., Renner, R.: Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 100(20), 200501 (2008)ADS
59.
go back to reference Kahn, J., Kasper, B., Pollock, K.: Optical phaselock receiver with multigigahertz signal bandwidth. Electron. Lett. 25(10), 626 (1989)ADS Kahn, J., Kasper, B., Pollock, K.: Optical phaselock receiver with multigigahertz signal bandwidth. Electron. Lett. 25(10), 626 (1989)ADS
60.
go back to reference Kazovsky, L.G.: Decision-driven phase-locked loop for optical homodyne receivers: performance analysis and laser linewidth requirements. IEEE Trans. Electron Devices 32(12), 2630 (1985)ADS Kazovsky, L.G.: Decision-driven phase-locked loop for optical homodyne receivers: performance analysis and laser linewidth requirements. IEEE Trans. Electron Devices 32(12), 2630 (1985)ADS
61.
go back to reference Ferrero, V., Camatel, S.: Optical phase locking techniques: an overview and a novel method based on single side sub-carrier modulation. Opt. Express 16(2), 818 (2008)ADS Ferrero, V., Camatel, S.: Optical phase locking techniques: an overview and a novel method based on single side sub-carrier modulation. Opt. Express 16(2), 818 (2008)ADS
62.
go back to reference Renner, R., Konig, R.: Quantum cryptography and universal composability-universally composable privacy amplification against quantum adversaries. Lecture Notes Comput. Sci. 3378, 407 (2005)MATH Renner, R., Konig, R.: Quantum cryptography and universal composability-universally composable privacy amplification against quantum adversaries. Lecture Notes Comput. Sci. 3378, 407 (2005)MATH
63.
go back to reference Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Theory of Cryptography Conference. Springer, pp. 386–406 (2005) Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Theory of Cryptography Conference. Springer, pp. 386–406 (2005)
64.
go back to reference Devetak, I.: Proceedings of the Royal Society A 461, 207 (2005) Devetak, I.: Proceedings of the Royal Society A 461, 207 (2005)
65.
go back to reference Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1 (2008)MATH Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1 (2008)MATH
66.
go back to reference Ma, X., Lutkenhaus, N.: Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD. Quantum Inf. Comput. 12(3–4), 203–214 (2012)MathSciNetMATH Ma, X., Lutkenhaus, N.: Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD. Quantum Inf. Comput. 12(3–4), 203–214 (2012)MathSciNetMATH
Metadata
Title
Differential phase encoded measurement-device-independent quantum key distribution
Authors
Shashank Kumar Ranu
Anil Prabhakar
Prabha Mandayam
Publication date
01-02-2021
Publisher
Springer US
Published in
Quantum Information Processing / Issue 2/2021
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03006-2

Other articles of this Issue 2/2021

Quantum Information Processing 2/2021 Go to the issue