Literature DB >> 24116758

Experimental measurement-device-independent quantum key distribution.

Yang Liu1, Teng-Yun Chen, Liu-Jun Wang, Hao Liang, Guo-Liang Shentu, Jian Wang, Ke Cui, Hua-Lei Yin, Nai-Le Liu, Li Li, Xiongfeng Ma, Jason S Pelc, M M Fejer, Cheng-Zhi Peng, Qiang Zhang, Jian-Wei Pan.   

Abstract

Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

Year:  2013        PMID: 24116758     DOI: 10.1103/PhysRevLett.111.130502

Source DB:  PubMed          Journal:  Phys Rev Lett        ISSN: 0031-9007            Impact factor:   9.161


  20 in total

1.  The ultimate physical limits of privacy.

Authors:  Artur Ekert; Renato Renner
Journal:  Nature       Date:  2014-03-27       Impact factor: 49.962

2.  Experimental quantum key distribution certified by Bell's theorem.

Authors:  D P Nadlinger; P Drmota; B C Nichol; G Araneda; D Main; R Srinivas; D M Lucas; C J Ballance; K Ivanov; E Y-Z Tan; P Sekatski; R L Urbanke; R Renner; N Sangouard; J-D Bancal
Journal:  Nature       Date:  2022-07-27       Impact factor: 69.504

3.  Mode-pairing quantum key distribution.

Authors:  Pei Zeng; Hongyi Zhou; Weijie Wu; Xiongfeng Ma
Journal:  Nat Commun       Date:  2022-07-07       Impact factor: 17.694

4.  Hacking on decoy-state quantum key distribution system with partial phase randomization.

Authors:  Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang
Journal:  Sci Rep       Date:  2014-04-23       Impact factor: 4.379

5.  All-photonic intercity quantum key distribution.

Authors:  Koji Azuma; Kiyoshi Tamaki; William J Munro
Journal:  Nat Commun       Date:  2015-12-16       Impact factor: 14.919

6.  Experimental quantum fingerprinting with weak coherent pulses.

Authors:  Feihu Xu; Juan Miguel Arrazola; Kejin Wei; Wenyuan Wang; Pablo Palacios-Avila; Chen Feng; Shihan Sajeed; Norbert Lütkenhaus; Hoi-Kwong Lo
Journal:  Nat Commun       Date:  2015-10-30       Impact factor: 14.919

7.  Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

Authors:  Ting-Ting Song; Su-Juan Qin; Qiao-Yan Wen; Yu-Kun Wang; Heng-Yue Jia
Journal:  Sci Rep       Date:  2015-10-16       Impact factor: 4.379

8.  Simulating of the measurement-device independent quantum key distribution with phase randomized general sources.

Authors:  Qin Wang; Xiang-Bin Wang
Journal:  Sci Rep       Date:  2014-04-14       Impact factor: 4.379

9.  Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol.

Authors:  Akihiro Mizutani; Kiyoshi Tamaki; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto
Journal:  Sci Rep       Date:  2014-06-10       Impact factor: 4.379

10.  W-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution.

Authors:  Changhua Zhu; Feihu Xu; Changxing Pei
Journal:  Sci Rep       Date:  2015-12-08       Impact factor: 4.379

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.