Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors

XB Wang - Physical Review A—Atomic, Molecular, and Optical …, 2013 - APS
We study the measurement-device-independent quantum key distribution (MDIQKD) in
practice with limited resources when there are only three different states in implementing the …

Three-intensity decoy-state method for measurement-device-independent quantum key distribution

ZW Yu, YH Zhou, XB Wang - Physical Review A, 2013 - APS
We study the measurement-device-independent quantum key distribution (MDI-QKD) in
practice with limited resources, when there are only three different states in implementing …

Practical decoy-state measurement-device-independent quantum key distribution

SH Sun, M Gao, CY Li, LM Liang - Physical Review A—Atomic, Molecular, and …, 2013 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the
detection attacks; thus when it is combined with the decoy-state method, the final key is …

Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources

Q Wang, XB Wang - Physical Review A—Atomic, Molecular, and Optical …, 2013 - APS
We study decoy-state measurement-device-independent quantum key distribution using
heralded single-photon sources. This has the advantage that the observed error rate in the X …

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution

F Xu, H Xu, HK Lo - Physical Review A, 2014 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) has been
demonstrated in both laboratories and field tests using attenuated lasers combined with the …

Statistical fluctuation analysis for measurement-device-independent quantum key distribution

X Ma, CHF Fung, M Razavi - Physical Review A—Atomic, Molecular, and …, 2012 - APS
Measurement-device-independent quantum key distribution with a finite number of decoy
states is analyzed under finite-data-size assumption. By accounting for statistical fluctuations …

Source attack of decoy-state quantum key distribution using phase information

YL Tang, HL Yin, X Ma, CHF Fung, Y Liu, HL Yong… - Physical Review A …, 2013 - APS
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve
information-theoretically secure key generation. This field is now approaching the stage of …

Practical aspects of measurement-device-independent quantum key distribution

F Xu, M Curty, B Qi, HK Lo - New Journal of Physics, 2013 - iopscience.iop.org
A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD),
removes all attacks from the detection system, the most vulnerable part in QKD …

Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw

K Tamaki, HK Lo, CHF Fung, B Qi - … Review A—Atomic, Molecular, and Optical …, 2012 - APS
In this paper, we study the unconditional security of the so-called measurement-device-
independent quantum key distribution (MDIQKD) with the basis-dependent flaw in the …

Simulating of the measurement-device independent quantum key distribution with phase randomized general sources

Q Wang, XB Wang - Scientific reports, 2014 - nature.com
We present a model on the simulation of the measurement-device independent quantum
key distribution (MDI-QKD) with phase randomized general sources. It can be used to …