Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment

In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protoco...

Full description

Bibliographic Details
Main Authors: Wenyuan Wang, Norbert Lütkenhaus
Format: Article
Language:English
Published: American Physical Society 2022-11-01
Series:Physical Review Research
Online Access:http://doi.org/10.1103/PhysRevResearch.4.043097
_version_ 1827285391537864704
author Wenyuan Wang
Norbert Lütkenhaus
author_facet Wenyuan Wang
Norbert Lütkenhaus
author_sort Wenyuan Wang
collection DOAJ
description In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protocols what is called “fine-grained statistics,” which is a variation of existing QKD protocols that makes use of originally discarded data to get a better key rate. We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis, similar to reference-frame-independent QKD, but without the need for encoding physically in an additional rotation-invariant basis. Such an analysis can easily be applied to existing systems, or even data already recorded in previous experiments, to gain a significantly higher key rate when considerable misalignment is present, extending the maximum distance for BB84 and MDI-QKD and reducing the need for manual alignment in an experiment.
first_indexed 2024-04-24T10:12:46Z
format Article
id doaj.art-5bb9d079040f4496b6e9b797618d61ce
institution Directory Open Access Journal
issn 2643-1564
language English
last_indexed 2024-04-24T10:12:46Z
publishDate 2022-11-01
publisher American Physical Society
record_format Article
series Physical Review Research
spelling doaj.art-5bb9d079040f4496b6e9b797618d61ce2024-04-12T17:26:06ZengAmerican Physical SocietyPhysical Review Research2643-15642022-11-014404309710.1103/PhysRevResearch.4.043097Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignmentWenyuan WangNorbert LütkenhausIn this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protocols what is called “fine-grained statistics,” which is a variation of existing QKD protocols that makes use of originally discarded data to get a better key rate. We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis, similar to reference-frame-independent QKD, but without the need for encoding physically in an additional rotation-invariant basis. Such an analysis can easily be applied to existing systems, or even data already recorded in previous experiments, to gain a significantly higher key rate when considerable misalignment is present, extending the maximum distance for BB84 and MDI-QKD and reducing the need for manual alignment in an experiment.http://doi.org/10.1103/PhysRevResearch.4.043097
spellingShingle Wenyuan Wang
Norbert Lütkenhaus
Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
Physical Review Research
title Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
title_full Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
title_fullStr Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
title_full_unstemmed Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
title_short Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
title_sort numerical security proof for the decoy state bb84 protocol and measurement device independent quantum key distribution resistant against large basis misalignment
url http://doi.org/10.1103/PhysRevResearch.4.043097
work_keys_str_mv AT wenyuanwang numericalsecurityproofforthedecoystatebb84protocolandmeasurementdeviceindependentquantumkeydistributionresistantagainstlargebasismisalignment
AT norbertlutkenhaus numericalsecurityproofforthedecoystatebb84protocolandmeasurementdeviceindependentquantumkeydistributionresistantagainstlargebasismisalignment