• Chinese Optics Letters
  • Vol. 20, Issue 9, 092701 (2022)
Jipeng Wang, Zhenhua Li, Zhongqi Sun, Tianqi Dou, Wenxiu Qu, Fen Zhou, Yanxin Han, Yuqing Huang, and Haiqiang Ma*
Author Affiliations
  • School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • show less
    DOI: 10.3788/COL202220.092701 Cite this Article Set citation alerts
    Jipeng Wang, Zhenhua Li, Zhongqi Sun, Tianqi Dou, Wenxiu Qu, Fen Zhou, Yanxin Han, Yuqing Huang, Haiqiang Ma. Loss-tolerant measurement device independent quantum key distribution with reference frame misalignment[J]. Chinese Optics Letters, 2022, 20(9): 092701 Copy Citation Text show less

    Abstract

    Reference frame independent and measurement device independent quantum key distribution (RFI-MDI-QKD) has the advantages of being immune to detector side loopholes and misalignment of the reference frame. However, several former related research works are based on the unrealistic assumption of perfect source preparation. In this paper, we merge a loss-tolerant method into RFI-MDI-QKD to consider source flaws into key rate estimation and compare it with quantum coin method. Based on a reliable experimental scheme, the joint influence of both source flaws and reference frame misalignment is discussed with consideration of the finite-key effect. The results show that the loss-tolerant RFI-MDI-QKD protocol can reach longer key rate performance while considering the existence of source flaws in a real-world implementation.

    1. Introduction

    The first quantum key distribution (QKD) protocol, BB84 protocol[1], is proven secure in defending the formidable decryption ability in the approaching era of quantum computing[24]. In this decade, it is significant to narrow down the gap between ideal unconditional security and imperfect realistic devices. From the viewpoint of Eve, there are two main types of vulnerabilities to security, which are the light source at the transmitter and the detector at receiver[57]. As a countermeasure, the decoy state protocol can circumvent the photon number splitting attack, and a weak coherent source can be applied in QKD applications[810]. In addition, measurement device independent (MDI) protocol[11] can remove all the side channels’ loopholes aiming at the measurement devices. Besides, MDI-QKD realizes a star-type quantum network and improves the ability of long distance transmission[1214]. With the important practical prospect, it has been experimentally demonstrated to break through the 400 km fiber transmission[15] and applied in the chip-based platform as well as the free-space channel[1619].

    Reference frame misalignment is regarded as another inevitable problem of the QKD system, such as phase drift in the phase encoding scheme, which plays a severe negative role in disturbing the stable operation of QKD systems. By preparing and measuring the states by one more basis, the reference frame independent (RFI) protocol[20] is an effective solution to reduce the influence of reference frame misalignment on final key rates without extra requirements for a reference frame calibration device. Merging the advantages of the above two protocols, RFI-MDI-QKD is proposed[21] and experimentally demonstrated from the system clock 1 MHz to 50 MHz[22,23]. Recently, Zhou et al.[24] achieved the longest transmission distance of 200 km in a fiber system by combining the collective constraint and joint study strategy.

    One of the assumptions in guaranteeing the security of MDI-QKD is the perfect preparation of quantum signals, which is not rigorous since perfect preparation devices in realistic scenarios do not exist. In Ref. [25], the impact of imperfect states is investigated in two types of phase encoding MDI-QKD schemes, and the rigorous estimation of secure key rates is given by the quantum coin (QC) method. Additionally, Ref. [26] proposed an improved and rigorous method to consider the basis dependent coding errors in MDI-QKD, where precise source coding can be loosened. Subsequently, the loss-tolerant (LT) protocol[27] proposed a more effective method to consider, but cut down the pessimistic impact source on secure key rate estimation. Reference [28] demonstrates the LT MDI-QKD experimentally as a compromised solution to balance the QKD’s performance with the existence of source flaws. In this paper, we use the method of LT protocol to remove the perfect state assumption and investigate RFI-MDI-QKD with consideration of source flaw. Compared with the QC method, the comprehensive impact of both source flaw and reference frame misalignment is analyzed numerically. Besides, we consider the finite-key analysis[26,29] in final key estimation and elaborate the protocol based on the feasible MDI-QKD application scheme to keep close combination of protocol theory and real-world practice.

    2. Protocol

    We introduce the RFI-MDI-QKD protocol based on the polarization multiplexing phase encoding scheme[23] illustrated in Fig. 1. The lasers of Alice and Bob sites emit the phase-randomized pulses with synchronized time and overlapped wavelength. Besides, the intensity of each laser pulse is modulated by the first intensity modulator (IM1), equiprobably and randomly, with three different intensities that are signal μ, decoy ν, and vacuum state 0, respectively. Then, a polarization multiplexing Mach–Zehnder interferometer (PMZI) is designed to split a single input pulse into two adjacent output pulses H and V with orthogonal polarization. Subsequently, phase modulators (PMs) and IMs are utilized for encoding. Particularly, bit 0 or 1 of the Z basis denoted by |0Z or |1 is prepared by suppressing pulse H or V via IM2. As for the X and Y basis, neither of the pulses H and V are suppressed. Meanwhile, the optical pulse V is modulated with the phase 0 or π2 to prepare the bit 0 in the X or Y basis. Then, the encoded pulses are sent to the detector site (Charlie). A polarization controller (PC) is necessary to compensate for polarization drift due to the long transmission channel.

    Schematic diagram of phase encoding polarization multiplexing MDI-QKD protocol. BS, beam splitter; PBS, polarization beam splitter; PMZI, polarization-multiplexing Mach–Zehnder interferometer; PC, polarization controller and compensation. The polarization maintaining fibers separated by PBS are colored red and green to represent the orthogonal polarization H and V, respectively. The case is depicted by pulse H (red) and pulse V (green) when |ϕ0X〉A and |ϕ0Z〉B are prepared.

    Figure 1.Schematic diagram of phase encoding polarization multiplexing MDI-QKD protocol. BS, beam splitter; PBS, polarization beam splitter; PMZI, polarization-multiplexing Mach–Zehnder interferometer; PC, polarization controller and compensation. The polarization maintaining fibers separated by PBS are colored red and green to represent the orthogonal polarization H and V, respectively. The case is depicted by pulse H (red) and pulse V (green) when |ϕ0XA and |ϕ0ZB are prepared.

    The role of Charlie is to detect a successful coincidence of quantum states, which are projected into the Bell state |Φ±=|0Z|0Z±|1Z|1Z2, |Ψ±=|0Z|1Z±|1Z|0Z2, which corresponds to the case where they send the same or converse bit of the Z basis. |Φ± cannot be distinguished and used for the key generation because two indistinguishable photons will meet at the beam splitter (BS) simultaneously, and Hong–Ou–Mandel (HOM) interference occurs[30]. However, for |Ψ±, two photons arrive at the BS in different temporal windows, which leads to successful detection results, which are two different detectors triggered at that time. In the X or Y basis, |Ψ+ can be detected when Alice and Bob share the same bit, while the detection result of |Ψ corresponds to the preparation of the opposite bit. At the detection sites, Charlie announces which is the successful detection event of |Ψ+ or |Ψ via the classical channel, so Alice and Bob will know whether they have prepared the same bit (i=j) or should perform a bit flip to keep the bit in accordance with each other (ij). After Alice and Bob announce to each other their basis α,β as well as their intensity choices Ma,Mb{μ,ν,0}, the detector result can be classified into correct gains and error gains, which is shown in Fig. 2. The estimation of gains Qiα,jβMaMb, which denotes the gain when Alice and Bob send their states |ϕiα and |ϕjβ, has been introduced explicitly now. In this paper, we apply the Chernoff bound method and consider statistical fluctuations into numerical simulation based on Refs. [22,23,26,29], The fluctuation range (upper and lower bounds) of the gain Qiα,jβMaMb with error probability 12ϵ is given by Qiα,jβMaMb,U=Qiα,jβMaMb(1+ξlr),Qiα,jβMaMb,L=Qiα,jβMaMb(1ξlr),f(ϵ1.5)NMaMbQiα,jβMaMbξMaMbf(ϵ4/16)NMaMbQiα,jβMaMb.

    Detector result. The figure illustrates how the double click of Charlie’s site detector (DH0, DH1, DV0, DV1 shown in Fig. 1) corresponds to the gains or error rate, when Alice and Bob prepare their states |ϕiα〉A and |ϕjβ〉B. The case is classified by their basis choices α, β and whether their bits are equal or not.

    Figure 2.Detector result. The figure illustrates how the double click of Charlie’s site detector (DH0, DH1, DV0, DV1 shown in Fig. 1) corresponds to the gains or error rate, when Alice and Bob prepare their states |ϕA and |ϕB. The case is classified by their basis choices α, β and whether their bits are equal or not.

    Here, f(x)=2ln(x1) and NMaMb represents the total number of pulses that are sent from Alice and Bob with the intensity choices Ma,Mb. Superscripts U and L indicate the upper and lower bounds of the corresponding quantity. Further, the corresponding single-photon yield Yiα,jβL(U) can be ranged by Yiα,jβL=μa2μbS1va2vbS2μaμbvavb(μava),S1=Qiα,jβvaνb,Le(νa+νb)+Qiα,jβ0a0b,LQiα,jβva0b,UevaQiα,jβ0avb,Uevb,S2=Qiα,jβμaμb,Ue(μa+μb)+Qiα,jβ0a0b,UQiα,jβμa0b,LeμaQiα,jβ0aμb,Leμb,Yiα,jβU=e(va+vb)Qiα,jβ0a0b,U+Qiα,jβvavb,UevaQiα,jβva0b,LevbQiα,jβ0abb,Lνavb.

    Meanwhile, parts of gains are classified into error gains EQαβMaMb. As for the Z basis, EQZZμμ=Q0Z,0Zμμ+Q1Z,1Zμμ, and single-photon error rate Eαβ11,U, we can see EZZ11,U(L)=Y0Z,0ZU(L)+Y1Z,1ZU(L)Y0Z,0ZL(U)+Y1Z,1ZL(U)+Y1Z,0ZL(U)+Y0Z,1ZL(U). Similarly, the error rate of the other basis choice can find its lower or upper bound.

    Above all, after λEC=fECQZZμμEQZZμμ is sacrificed for error correction, the final key of RFI-MDI-QKD can be bounded by[21,31]RL=μaμbe(μa+μb)(1IE)α=β=ZYiα,jβLλEC,IE=(1EZZ11,U)h(1+vmax2)+EZZ11,Uh[1+f(vmax)2],f(vmax)=CL2(1EZZ11,U)2vmax2EZZ11,U,vmax=min(11EZZ11,UCL2,1).

    Notice that CL=α,β{X,Y}(12Eαβ11,L)2 is crucial, in which the RFI protocol takes effect and keeps the key rate vulnerable to the reference frame drift. When considering finite-key effect, the minimum of C is reckoned by choosing the corresponding Eαβ11 value between its upper and lower bounds: CL=α,β{X,Y}min:(12Eαβ11)2,s.t.Eαβ11,LEαβ11Eαβ11,U.

    When source flaws are considered, the phase error rate above Eαβ11 is not simply the error rate derived from Yiα,jβ(α,β{X,Y}) but given by the yield of fictitious or virtual states Yiα,jβvir. Based on the LT protocol, the sending of Alice’s states to Eve (Charlie) prepared in the Z basis can be equivalently written into the entanglement state, which is |ΨA=12(|0ZA1|ϕ0ZA2E+|1ZA1|ϕ1ZA2E),where A1, A2, and E are Alice’s system to generate bit value, the extended system possessed by Alice, and the system sent to Eve, respectively. To be more understandable, the projective measurement is done on system A1 by the Z basis with a perfect outcome of bit 0 or 1. At the same time, the imperfect real state |ϕ1Z or |ϕ0Z is sent to Eve (Charlie). Now, consider a virtual protocol where system A1 is measured by the X or Y basis. In this case, a fictitious state |ϕjαvir(α,β{X,Y}) sent to Eve is deduced, while |ΨA can be rewritten by |ΨA=12(|0XA1|ϕ0XvirA2E+|1XA1|ϕ1XvirA2E),|ΨA=12(|0YA1|ϕ0YvirA2E+|1YA1|ϕ1YvirA2E).

    Similarly, the fictitious state of Bob |ϕjβvir can be also deduced as Alice’s. Subsequently, the yields when Alice and Bob send their fictitious states can be expressed as Yiα,jβvir=PiαvirPjβvir[SσtAiα,vir(SσtBjβ,vir)T]·qσtAσtB,SσtAiα,vir=[SIAiα,vir,SXAiα,vir,SYAiα,vir,SZAiα,vir],SσtBjβ,vir=[SIBjβ,vir,SXBjβ,vir,SYBjβ,vir,SZBjβ,vir],qσtAσtB=[qIAIB,qIAXB,qIAYB,qIAZB,qXAIB,qXAXB,qXAYB,qXAZB,qYAIB,qYAXB,qYAYB,qYAZB,qZAIB,qZAXB,qZAYB,qZAZB].

    Here, focusing on Alice, Piαvir denotes the probability of emitting Alice’s fictitious state |ϕiαvir calculated by ΨA|(|ϕiαAϕiα|AId)|ΨA that includes four elements, which is the Bloch vector of virtual states |ϕiαvirA calculated by tr(σtρiαvir), where ρiαvir means the corresponding density matrix of state, and σt(t{I,X,Y,Z}) is Pauli matrices. For Bob, SσtBjβ,vir and Pjβvir are deduced the same way. In the end, qσtAσtB indicates the transmission rate of σtAσtB representing the composite system of transmission channels in the MDI-QKD protocol, which is Alice to Eve and Bob to Eve. Shown as Eq. (11) and elaborated in Section 3, the real state |ϕ1Z or |ϕ0Z can be quantified, which further implies Pjαvir, Pjβvir, SσtAjα,vir, and SσtBjβ,vir can also be quantified. However, qσtAσtB still remains unknown. The solution is to calculate them from the yield of actual states Yiα,jβ in a form similar to Eq. (9), which is qσtAσtB=Yiα,jβPiαPjβ[SσtAiα(SσtBjβ)T].

    The corresponding value for real states Pjα, Pjβ, SσtAjα, and SσtBjβ can be quantified as well. Here, qσtAσtB can be regarded as an unknown 16-element aggregation. Therefore, only four states for the preparation of Alice and Bob, which are iα,jβ(0Z,1Z,0X,0Y), are sufficient to form a system of linear equations to solve qσtAσtB. As the mathematics relationship between the yield of actual and fictitious states implies, the yield of fictitious states can also find their bounds Yiα,jβvir,L(U) by substituting the upper and lower bounds Yiα,jβL(U) into Eq. (9). By this method, we could deduce fictitious phase error Eαβ11,U(L)(α,β{X,Y}) as well as corresponding CL with the influence of source flaw and finite-key effect in the final key rate simulation.

    3. Source Flaw

    As the protocol requires, it is necessary to quantify QαβMaMb while considering the source flaws and phase drift. In the following, the phase drift is denoted by ω characterizing the relationship between reference frames of the X and Y basis, which is XB=cosωXA+sinωYA and YB=cosωYAsinωXA. Next, for the source flaw, δ1(2) defines the deficiency in preparation of |0(1)Z and is mainly derived from the finite extinction ratio of IM2. In addition, δ3 represents the imperfection due to asymmetrical attenuation between two arms of the PMZI. Also, θ1(2) characterizes the imperfection of phase modulation on |0X(Y). The method to quantify the source flaws is to calibrate the derivation between a perfect preparation structure and an imperfect one. However, perfect modulation does not exist. Therefore, in the MDI-QKD protocol, a more rigorous approach is to quantify the source flaw of derivation between Alice and Bob rather than that of each site. It is equal to a situation where the Alice site is perfect, and all imperfections are attributed to the Bob site, which is actually the derivation of source flaw as well as the phase drift between Alice and Bob. In this way, the single-photon states of Alice are represented by |ϕ0ZA=|0Z,|ϕ1ZA=|1Z,|ϕ0XA=|0Z+|1Z2=|0X,|ϕ0YA=|0Z+i|1Z2=|0Y,while Bob’s are |ϕ0ZB=cos(δ1)|0Z+sin(δ1)|1Z,|ϕ1ZB=sin(δ2)|0Z+cos(δ2)|1Z,|ϕ0XB=sin(π4+δ3)|0Z+cos(π4+δ3)ei(θ1+ω)|1Z,|ϕ0YB=sin(π4+δ3)|0Z+cos(π4+δ3)ei(π2+θ2+ω)|1Z.

    Subsequently, the gains of detectors QH0(H1) or QV0(V1) are determined by the interference of coherent states arriving at BS1(2). Considering the case where both Alice and Bob prepare 0(1) bit in the Z basis, Alice’s state with intensity μa arriving at BS1 and BS2 can be represented by |eiϕaηaμa and zero. The total loss after the fiber channel distance L is estimated by ηa=10αL10ηdetector, where α and ηdetector denote the fiber channel attenuation coefficient and detector efficiency, respectively. For Bob, it corresponds to |eiϕbηbμbsin2(δ1(2)) and |eiϕbηbμbcos2(δ1(2)). As for the case when |0X(Y) is prepared by both sites, |eiϕaηaμacos2(π4) and |eiϕbηbμbcos2(π4+δ3) represent the states at BS1. Meanwhile, |ei(ϕb+θ1(2)+ω)ηbμbsin2(π4+δ3) and |eiϕaηaμasin2(π4) arrive at BS2. According to Ref. [32], we define A (ΔϕB) as the coherent states of Alice (Bob) arriving at BS1(2), and, thus, the gains of corresponding detectors can be estimated by Q0=12π02π1(1edark)exp(|A+eiΔϕB|2)dΔϕ,Q1=12π02π1(1edark)exp(|A+eiπeiΔϕB|2)dΔϕ,where edark characterizes the dark count rates of single-photon detectors. Additionally, the difference of randomized phase between Alice and Bob Δϕ=ϕaϕb should be integrated over [0,2π). In the end, according to the meaning of each detector result shown in Fig. 2, QαβMaMb could be estimated numerically in our simulation.

    4. Analysis

    In the beginning, the transmission performance of the RFI-MDI-QKD protocol by the LT and QC methods is illustrated in Fig. 3. For simplicity, δ1,δ2,δ3 are assumed to be the same value δ, instead of being considered individually. It can be seen that, the key rate given by QC method[25] plunges more sharply with the distance, while the LT protocol achieves a much longer transmission distance, especially in the case of δ=0.075. When considering finite-key effect, LT can still keep its superiority, although the key rate and largest transmission distance shrink at smaller data size.

    Comparison of RFI-MDI-QKD with loss-tolerant (LT, solid line) and quantum coin (QC, dashed line) methods with different data sizes ( NMaMb = 1011, 1012, 1013) and the source flaw (δ = 0 or 0.075). The intensities of signal and decoy states are optimized. Other simulation parameters are provided in Table 1.

    Figure 3.Comparison of RFI-MDI-QKD with loss-tolerant (LT, solid line) and quantum coin (QC, dashed line) methods with different data sizes ( NMaMb = 1011, 1012, 1013) and the source flaw (δ = 0 or 0.075). The intensities of signal and decoy states are optimized. Other simulation parameters are provided in Table 1.

    edarkfECNMaMbϵαηdetector
    1×1071.2101310100.2 dB/km15%

    Table 1. Simulation Parameter

    Then, the key rates at the fixed distance and NMaMb=1013 are studied in Fig. 4, where the X axis is source flaw δ and phase drift ω. To indicate the influence of δ and ω explicitly, there is only one variable for each key rate curve, in other words, phase drift is set to zero when the change of source flaw δ is investigated and vice versa. The discussion can be summarized into the following three points. (1) The decrease of key rates due to ω in the RFI-MDI-QKD protocol is very slight, which demonstrates its strong robustness against reference frame misalignment. Notice that source flaw θ is the imperfection of phase encoding and has the same effect of ω as Eq. (11) implies. Therefore, imperfect phase modulation θ can be tolerated as well. (2) The enlarging gap of key rates under the same source flaw and phase drift reveals that the LT protocol can provide better immunity at a longer transmission distance. (3) The tolerating limitations of source flaw δ are not finite. This is because the key rate is restricted by growing λEC with the growth of δ. The upper bound δ=0.09 in our simulation has already covered the value of former experimental research[28].

    Key rate versus source flaw δ and phase drift ω in the RFI-MDI-QKD protocol with LT (solid line) and QC (dashed line) methods at the fixed distance of 2 km (red), 20 km (purple), and 40 km (blue).

    Figure 4.Key rate versus source flaw δ and phase drift ω in the RFI-MDI-QKD protocol with LT (solid line) and QC (dashed line) methods at the fixed distance of 2 km (red), 20 km (purple), and 40 km (blue).

    The joint impact of both source flaws δ and phase drift ω on the LT RFI-MDI-QKD is presented by Fig. 5(a). It is noted that the key rate is symmetric about the phase drift of π4. Concretely, the phase drift of π4 leads to the severest error. However, the key rate cannot remain stable at δ near the tolerating limitation when the phase drift goes around π4. In the end, to demonstrate the benefit of the RFI-QKD protocol more clearly, we also compare RFI-MDI-QKD with the original LT MDI-QKD protocol[28], where IE is estimated directly by h(EXX11)[28] in Fig. 5(b). Shown by their key rate ratio, the robustness superiority of RFI-MDI-QKD is obvious when phase drift happens to QKD systems.

    (a) Key rate of loss-tolerant RFI-MDI-QKD under the joint impact of source flaw δ and phase drift ω ∈ [0, π/2] at 2 km. (b) Key rate ratio (R1/R2) of MDI-QKD to RFI-MDI-QKD protocol with the LT method, which is denoted by R1 and R2, respectively.

    Figure 5.(a) Key rate of loss-tolerant RFI-MDI-QKD under the joint impact of source flaw δ and phase drift ω ∈ [0, π/2] at 2 km. (b) Key rate ratio (R1/R2) of MDI-QKD to RFI-MDI-QKD protocol with the LT method, which is denoted by R1 and R2, respectively.

    5. Conclusion

    In summary, we demonstrate the advantages of RFI-MDI-QKD and provide rigorous key rate estimation with source flaws under finite-key analysis. The protocol inherits the merits of four states preparation of the initial LT MDI-QKD protocol[27] compared to the previously reported six states RFI-MDI-QKD, which can evidently reduce the cost and complexity of the experimental system. Compared to Ref. [33] discussing RFI-MDI-QKD with source flaw, apart from utilizing the finite-key analysis in the final key estimation, we step further to illustrate how much LT effects can be influenced by different phase drift and compare the protocol with the QC method. Conclusively, the LT RFI-MDI-QKD can alleviate the security vulnerability due to detector side-channel attacks, reference frame misalignment, and imperfect source preparation. The protocol can be regarded as a promising scheme for a wider real-world environment application, especially satellite-based and airborne-based applications, where a flexible relay links structure is needed[34,35]. In the end, this protocol can be further improved based on some new researches that make a contribution to RFI-MDI-QKD that boosts the key rate performance by optimized decoy-state[36] or using fewer states[37].

    References

    [1] C. H. Bennett, G. Brassard. Quantum cryptography: public key distribution and coin tossing. International Conference on Computer System and Signal Processing, 175(1984).

    [2] F. Xu, X. Ma, Q. Zhang, H.-K. Lo, J.-W. Pan. Secure quantum key distribution with realistic devices. Rev. Mod. Phys., 92, 025002(2020).

    [3] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, M. Peev. The security of practical quantum key distribution. Rev. Mod. Phys., 81, 1301(2009).

    [4] Q. Zhang, F. Xu, Y.-A. Chen, C.-Z. Peng, J.-W. Pan. Large scale quantum key distribution: challenges and solutions. Opt. Express, 26, 24260(2018).

    [5] N. Lütkenhaus, M. Jahma. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys., 4, 44(2002).

    [6] Y. Zhao, C.-H. Fred Fung, B. Qi, C. Chen, H.-K. Lo. Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A, 78, 042333(2008).

    [7] L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, V. Makarov. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics, 4, 686(2010).

    [8] X.-B. Wang. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett., 94, 230503(2005).

    [9] H.-K. Lo, X. Ma, K. Chen. Decoy state quantum key distribution. Phys. Rev. Lett., 94, 230504(2005).

    [10] Y.-H. Zhou, Z.-W. Yu, X.-B. Wang. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Phys. Rev. A, 93, 042324(2016).

    [11] H.-K. Lo, M. Curty, B. Qi. Measurement-device-independent quantum key distribution. Phys. Rev. Lett., 108, 130503(2012).

    [12] W. Wang, F. Xu, H.-K. Lo. Asymmetric protocols for scalable high-rate measurement-device-independent quantum key distribution networks. Phys. Rev. X, 9, 041012(2019).

    [13] Y.-L. Tang, H.-L. Yin, Q. Zhao, H. Liu, X.-X. Sun, M.-Q. Huang, W.-J. Zhang, S.-J. Chen, L. Zhang, L.-X. You, Z. Wang, Y. Liu, C.-Y. Lu, X. Jiang, X. Ma, Q. Zhang, T.-Y. Chen, J.-W. Pan. Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X, 6, 011024(2016).

    [14] G.-Z. Tang, S.-H. Sun, C.-Y. Li. Experimental point-to-multipoint plug-and-play measurement-device-independent quantum key distribution network. Chin. Phys. Lett., 36, 070301(2019).

    [15] H.-L. Yin, T.-Y. Chen, Z.-W. Yu, H. Liu, L.-X. You, Y.-H. Zhou, S.-J. Chen, Y. Mao, M.-Q. Huang, W.-J. Zhang, H. Chen, M. J. Li, D. Nolan, F. Zhou, X. Jiang, Z. Wang, Q. Zhang, X.-B. Wang, J.-W. Pan. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett., 117, 190501(2016).

    [16] K. Wei, W. Li, H. Tan, Y. Li, H. Min, W.-J. Zhang, H. Li, L. You, Z. Wang, X. Jiang, T.-Y. Chen, S.-K. Liao, C.-Z. Peng, F. Xu, J.-W. Pan. High-speed measurement-device-independent quantum key distribution with integrated silicon photonics. Phys. Rev. X, 10, 031030(2020).

    [17] L. Cao, W. Luo, Y. X. Wang, J. Zou, R. D. Yan, H. Cai, Y. Zhang, X. L. Hu, C. Jiang, W. J. Fan, X. Q. Zhou, B. Dong, X. S. Luo, G. Q. Lo, Y. X. Wang, Z. W. Xu, S. H. Sun, X. B. Wang, Y. L. Hao, Y. F. Jin, D. L. Kwong, L. C. Kwek, A. Q. Liu. Chip-based measurement-device-independent quantum key distribution using integrated silicon photonic systems. Phys. Rev. Appl., 14, 011001(2020).

    [18] H. Semenenko, P. Sibson, A. Hart, M. G. Thompson, J. G. Rarity, C. Erven. Chip-based measurement-device-independent quantum key distribution. Optica, 7, 238(2020).

    [19] Y. Cao, Y.-H. Li, K.-X. Yang, Y.-F. Jiang, S.-L. Li, X.-L. Hu, M. Abulizi, C.-L. Li, W. Zhang, Q.-C. Sun, W.-Y. Liu, X. Jiang, S.-K. Liao, J.-G. Ren, H. Li, L. You, Z. Wang, J. Yin, C.-Y. Lu, X.-B. Wang, Q. Zhang, C.-Z. Peng, J.-W. Pan. Long-distance free-space measurement-device-independent quantum key distribution(2020).

    [20] A. Laing, V. Scarani, J. G. Rarity, J. L. O’Brien. Reference-frame-independent quantum key distribution. Phys. Rev. A, 82, 012304(2010).

    [21] C.-M. Zhang, J.-R. Zhu, Q. Wang. Practical decoy-state reference-frame-independent measurement-device-independent quantum key distribution. Phys. Rev. A, 95, 032309(2017).

    [22] C. Wang, Z.-Q. Yin, S. Wang, W. Chen, G.-C. Guo, Z.-F. Han. Measurement-device-independent quantum key distribution robust against environmental disturbances. Optica, 4, 1016(2017).

    [23] H. Liu, J. Wang, H. Ma, S. Sun. Polarization-multiplexing-based measurement-device-independent quantum key distribution without phase reference calibration. Optica, 5, 902(2018).

    [24] X.-Y. Zhou, H.-J. Ding, M.-S. Sun, S.-H. Zhang, J.-Y. Liu, C.-H. Zhang, J. Li, Q. Wang. Reference-frame-independent measurement-device-independent quantum key distribution over 200 km of optical fiber. Phys. Rev. Appl., 15, 064016(2021).

    [25] K. Tamaki, H.-K. Lo, C.-H. F. Fung, B. Qi. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A, 85, 042307(2012).

    [26] X.-B. Wang. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors. Phys. Rev. A, 87, 012320(2013).

    [27] K. Tamaki, M. Curty, G. Kato, H.-K. Lo, K. Azuma. Loss-tolerant quantum cryptography with imperfect sources. Phys. Rev. A, 90, 052314(2014).

    [28] Z. Tang, K. Wei, O. Bedroya, L. Qian, H.-K. Lo. Experimental measurement-device-independent quantum key distribution with imperfect sources. Phys. Rev. A, 93, 042308(2016).

    [29] M. Curty, F. Xu, W. Cui, C. C. W. Lim, K. Tamaki, H.-K. Lo. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun., 5, 3732(2014).

    [30] H. Chen, X.-B. An, J. Wu, Z.-Q. Yin, S. Wang, W. Chen, Z.-F. Han. Hong–Ou–Mandel interference with two independent weak coherent states. Chin. Phys. B, 25, 020305(2016).

    [31] F. Xu, M. Curty, B. Qi, H.-K. Lo. Practical aspects of measurement-device-independent quantum key distribution. New J. Phys., 15, 113007(2013).

    [32] X. Ma, M. Razavi. Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A, 86, 062319(2012).

    [33] J.-Y. Liu, X.-Y. Zhou, Q. Wang. Reference-frame-independent measurement-device-independent quantum key distribution using fewer states. Phys. Rev. A, 103, 022602(2021).

    [34] Y. Xue, W. Chen, S. Wang, Z. Yin, L. Shi, Z. Han. Airborne quantum key distribution: a review. Chin. Opt. Lett., 19, 122702(2021).

    [35] X. Wang, C. Dong, S. Zhao, Y. Liu, X. Liu, H. Zhu. Feasibility of space-based measurement-device-independent quantum key distribution. New J. Phys., 23, 045001(2021).

    [36] J.-Y. Liu, X.-Y. Zhou, C.-H. Zhang, H.-J. Ding, Y.-P. Chen, J. Li, Q. Wang. Boosting the performance of reference-frame-independent measurement-device-independent quantum key distribution. J. Light. Technol., 39, 5486(2021).

    [37] J.-Y. Liu, X.-Y. Zhou, Q. Wang. Reference-frame-independent measurement-device-independent quantum key distribution using fewer states. Phys. Rev. A, 103, 022602(2021).

    Jipeng Wang, Zhenhua Li, Zhongqi Sun, Tianqi Dou, Wenxiu Qu, Fen Zhou, Yanxin Han, Yuqing Huang, Haiqiang Ma. Loss-tolerant measurement device independent quantum key distribution with reference frame misalignment[J]. Chinese Optics Letters, 2022, 20(9): 092701
    Download Citation