Abstract
Measurement-device-independent quantum key distribution can remove all possible detector side channels, and is robust against state preparation flaws when further combined with the loss-tolerant method. However, the secure key rate in this scenario is relatively low, thus hindering its practical application. Here, we first present a four-intensity decoy-state protocol where the signal intensity is modulated only in Z basis for key generation while the decoy intensities are modulated in both Z and X bases for parameter estimation. Moreover, we adopt collective constraint and joint-study strategy in statistical fluctuation analysis. We have also experimentally demonstrated this protocol and the result indicates high performance and good security for practical applications.
© 2023 Optica Publishing Group
Full Article | PDF ArticleMore Like This
Jun-Lin Bai, Yuan-Mei Xie, Yao Fu, Hua-Lei Yin, and Zeng-Bing Chen
Opt. Lett. 48(13) 3551-3554 (2023)
Chao Wang, Shuang Wang, Zhen-Qiang Yin, Wei Chen, Hong-Wei Li, Chun-Mei Zhang, Yu-Yang Ding, Guang-Can Guo, and Zheng-Fu Han
Opt. Lett. 41(23) 5596-5599 (2016)
Yi-Peng Chen, Jing-Yang Liu, Ming-Shuo Sun, Xing-Xu Zhou, Chun-Hui Zhang, Jian Li, and Qin Wang
Opt. Lett. 46(15) 3729-3732 (2021)