Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions

Not Accessible

Your library or personal account may give you access

Abstract

Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

© 2014 Optical Society of America

Full Article  |  PDF Article
More Like This
Measurement-device-independent quantum key distribution with modified coherent state

Mo Li, Chun-Mei Zhang, Zhen-Qiang Yin, Wei Chen, Shuang Wang, Guang-Can Guo, and Zheng-Fu Han
Opt. Lett. 39(4) 880-883 (2014)

Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method

Chen-Chen Mao, Xing-Yu Zhou, Jian-Rong Zhu, Chun-Hui Zhang, Chun-Mei Zhang, and Qin Wang
Opt. Express 26(10) 13289-13300 (2018)

Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources

Yang Wang, Wan-Su Bao, Chun Zhou, Mu-Sheng Jiang, and Hong-Wei Li
J. Opt. Soc. Am. B 36(3) B83-B91 (2019)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (2)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (18)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved