Practical decoy-state measurement-device-independent quantum key distribution

Shi-Hai Sun, Ming Gao, Chun-Yan Li, and Lin-Mei Liang
Phys. Rev. A 87, 052329 – Published 29 May 2013; Erratum Phys. Rev. A 88, 019905 (2013)

Abstract

Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks; thus when it is combined with the decoy-state method, the final key is unconditionally secure, even if a practical weak coherent source is used by Alice and Bob. However, until now, the analysis of decoy-state MDI-QKD with a weak coherent source is incomplete. In this paper, we derive, with only vacuum+weak decoy state, some tight formulas to estimate the lower bound of yield and the upper bound of error rate for the fraction of signals in which both Alice and Bob send a single-photon pulse to the untrusted third party Charlie. The numerical simulations show that our method with only vacuum+weak decoy state can asymptotically approach the theoretical limit of the infinite number of decoy states. Furthermore, the statistical fluctuation due to the finite length of date is also considered based on the standard statistical analysis.

  • Received 18 March 2013

DOI:https://doi.org/10.1103/PhysRevA.87.052329

©2013 American Physical Society

Erratum

Erratum: Practical decoy-state measurement-device-independent quantum key distribution [Phys. Rev. A 87, 052329 (2013)]

Shi-Hai Sun, Ming Gao, Chun-Yan Li, and Lin-Mei Liang
Phys. Rev. A 88, 019905 (2013)

Authors & Affiliations

Shi-Hai Sun1,*, Ming Gao2, Chun-Yan Li1, and Lin-Mei Liang1,3,†

  • 1Department of Physics, National University of Defense Technology, Changsha 410073, People's Republic of China
  • 2State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, People's Republic of China
  • 3State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha 410073, People's Republic of China

  • *shsun@nudt.edu.cn
  • nmliang@nudt.edu.cn

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 87, Iss. 5 — May 2013

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×