Abstract

Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

© 2014 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources

Yang Wang, Wan-Su Bao, Chun Zhou, Mu-Sheng Jiang, and Hong-Wei Li
J. Opt. Soc. Am. B 36(3) B83-B91 (2019)

Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method

Chen-Chen Mao, Xing-Yu Zhou, Jian-Rong Zhu, Chun-Hui Zhang, Chun-Mei Zhang, and Qin Wang
Opt. Express 26(10) 13289-13300 (2018)

Polarization-multiplexing-based measurement-device-independent quantum key distribution without phase reference calibration

Hongwei Liu, Jipeng Wang, Haiqiang Ma, and Shihai Sun
Optica 5(8) 902-909 (2018)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (2)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (18)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription