| Literature DB >> 33286852 |
Wen-Fei Cao1,2, Yi-Zheng Zhen1,2, Yu-Lin Zheng1,2, Shuai Zhao1,2, Feihu Xu1,2, Li Li1,2, Zeng-Bing Chen3, Nai-Le Liu1,2, Kai Chen1,2.
Abstract
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario. Here, we propose a flexible and extensible scheme named as open-destination measurement-device-independent QKD network. The scheme enjoys security against untrusted relays and all detector side-channel attacks. Particularly, any users can accomplish key distribution under assistance of others in the network. As an illustration, we show in detail a four-user network where two users establish secure communication and present realistic simulations by taking into account imperfections of both sources and detectors.Entities:
Keywords: measurement-device-independent; quantum cryptography; quantum key distribution; quantum network
Year: 2020 PMID: 33286852 PMCID: PMC7597171 DOI: 10.3390/e22101083
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1An optical diagram for the polarization-encoding open-destination measurement-device-independent quantum key distribution (MDI-QKD) network. The GHZ source outputs 4-partite GHZ entangled state in polarization and the light source outputs BB84 polarization state. The BSM represents the Bell state measurement, where BS is the 50:50 beam splitter, PBS is the polarization beam splitter, and , , , and are single-photon detectors. A click in and , or in and , indicates a projection into the Bell state , and a click in and , or in and , indicates a projection into the Bell state .
Figure A1(a) The schematic diagram for the open-destination MDI-QKD scheme. Users and denote communication users, while users and denote auxiliary users. (b) The equivalent topological schematic diagram when users and communicate with each other. According to BSM results of relays 3 and 4 and quantum states of auxiliary users and , the GHZ state is projected to a virtual Bell state. (c) The final equivalent topological schematic diagram that users and perform MDI-QKD, according to the BSM results and the virtual Bell state.
Figure 2Lower bound on the secret key rate R versus communication distance between communication users using Werner-like states source. The red line denotes , i.e., the perfect GHZ source. The parameters are chosen according to experiments [35]: the detection efficiency , the misalignment-error probability of the system , the dark count rate of the detector , the error correction efficiency , the intrinsic loss coefficient of the standard telecom fiber channel .
The equivalent GHZ analyzer measurement results of three communication users. Here, GHZ denotes the post-selected GHZ state from the GHZ source; BSM result 1(2,3) denotes the BSM results of three relays nearby the communication users’ side; GHZ analyzer denotes the results of corresponding GHZ analyzer among three communication users.
| GHZ | BSM Result 1 | BSM Result 2 | BSM Result 3 | GHZ Analyzer |
|---|---|---|---|---|
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
| ||
|
|
|
|
The correspondence between the POVM on state labeled k and the BSM result labeled by with auxiliary state labeled by .
| State of System | BSM Result on Systems | POVM on System |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The equivalent BSM results of two communication users. Here, Bell denotes the post-selected Bell state from the GHZ source; BSM result 1(2) denotes the BSM results of the two relays nearby the communication users’ side; BSM denotes the results of corresponding BSM between two communication users.
| Bell | BSM Result 1 | BSM Result 2 | BSM |
|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Flip table according to the preparation bases and the equivalent BSM result at communication users side.
| Basis |
|
|
|---|---|---|
| No Flip | No Flip | |
| No Flip | Flip |
List of experimental parameters used for simulation. is the detection efficiency; is the misalignment-error probability of the system; is the dark count rate of the detector; f is error correction efficiency; is the intrinsic loss coefficient of the standard telecom fiber channel.
|
|
|
|
|
|
|---|---|---|---|---|
|
|
|
|
|
|
List of the parameters for the equivalent detectors. () denotes the equivalent detection efficiency for Z (X) basis, and denotes the equivalent dark count.
|
|
|
|
|---|---|---|
|
|
|
|