Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources

Not Accessible

Your library or personal account may give you access

Abstract

Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a notorious security loophole problem in QKD. Importantly, both finite-key effects and intensity fluctuations of the practical photon sources are nonnegligible in a full key rate analysis of practical QKD. In this paper, for the case with finite-key effects and without intensity fluctuations, we present a way to estimate the phase error rate for MDI-QKD and compare performances of the parameter estimation based on Hoeffding’s inequality and the Chernoff bound. By using Azuma’s inequality, we also present the finite-key analysis with composable security against general attacks for a biased decoy-state MDI-QKD protocol with intensity fluctuations. Our simulation results show that the effect of our phase error rate estimation is almost the same as the results in Phys. Rev. A 91, 022313 (2015) [CrossRef]  , and the parameter estimation using the Chernoff bound is tighter than that using Hoeffding’s inequality. In addition, the influence of intensity fluctuations is more obvious when the data size of total transmitting signals is small. Our results highlight that it is important to keep the stability of the intensity modulator and estimate accurately the emitted pulse’s intensity for practical implementations.

© 2019 Optical Society of America

Full Article  |  PDF Article
More Like This
Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method

Chen-Chen Mao, Xing-Yu Zhou, Jian-Rong Zhu, Chun-Hui Zhang, Chun-Mei Zhang, and Qin Wang
Opt. Express 26(10) 13289-13300 (2018)

Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources

RuiKe Chen, WanSu Bao, Chun Zhou, Hongwei Li, Yang Wang, and HaiZe Bao
Opt. Express 24(6) 6594-6605 (2016)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (41)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved