Abstract

Parameter selection has significant influence on the performance of practical measurement-device-independent quantum key distributions. In this paper, we develop a general model for optimizing the performance of decoy-state measurement-device-independent quantum key distributions under practical experimental conditions, e.g., with finite number of pulses and including intensity fluctuations. By implementing the local search algorithm, we are able to carry out full parameter optimization within reasonable computer time. Moreover, we do calculation for the two most often used light sources, i.e., the weak coherent sources and heralded single-photon sources. Our simulation results show that the case of using heralded single-photon sources would suffer less influence from realistic conditions, exhibiting relatively better performance on both the secure key rate and secure transmission distance.

© 2017 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Biased three-intensity decoy-state scheme on the measurement-device-independent quantum key distribution using heralded single-photon sources

Chun-Hui Zhang, Chun-Mei Zhang, Guang-Can Guo, and Qin Wang
Opt. Express 26(4) 4219-4229 (2018)

Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources

Yang Wang, Wan-Su Bao, Chun Zhou, Mu-Sheng Jiang, and Hong-Wei Li
J. Opt. Soc. Am. B 36(3) B83-B91 (2019)

Enhanced measurement-device-independent quantum key distribution in reference-frame-independent scenario

Hao Zhang, Chun-Hui Zhang, Chun-Mei Zhang, Guang-Can Guo, and Qin Wang
J. Opt. Soc. Am. B 36(2) 476-481 (2019)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (5)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (10)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription