Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment

In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protoco...

Full description

Bibliographic Details
Main Authors: Wenyuan Wang, Norbert Lütkenhaus
Format: Article
Language:English
Published: American Physical Society 2022-11-01
Series:Physical Review Research
Online Access:http://doi.org/10.1103/PhysRevResearch.4.043097