Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protoco...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
American Physical Society
2022-11-01
|
Series: | Physical Review Research |
Online Access: | http://doi.org/10.1103/PhysRevResearch.4.043097 |
_version_ | 1827285391537864704 |
---|---|
author | Wenyuan Wang Norbert Lütkenhaus |
author_facet | Wenyuan Wang Norbert Lütkenhaus |
author_sort | Wenyuan Wang |
collection | DOAJ |
description | In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protocols what is called “fine-grained statistics,” which is a variation of existing QKD protocols that makes use of originally discarded data to get a better key rate. We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis, similar to reference-frame-independent QKD, but without the need for encoding physically in an additional rotation-invariant basis. Such an analysis can easily be applied to existing systems, or even data already recorded in previous experiments, to gain a significantly higher key rate when considerable misalignment is present, extending the maximum distance for BB84 and MDI-QKD and reducing the need for manual alignment in an experiment. |
first_indexed | 2024-04-24T10:12:46Z |
format | Article |
id | doaj.art-5bb9d079040f4496b6e9b797618d61ce |
institution | Directory Open Access Journal |
issn | 2643-1564 |
language | English |
last_indexed | 2024-04-24T10:12:46Z |
publishDate | 2022-11-01 |
publisher | American Physical Society |
record_format | Article |
series | Physical Review Research |
spelling | doaj.art-5bb9d079040f4496b6e9b797618d61ce2024-04-12T17:26:06ZengAmerican Physical SocietyPhysical Review Research2643-15642022-11-014404309710.1103/PhysRevResearch.4.043097Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignmentWenyuan WangNorbert LütkenhausIn this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protocols what is called “fine-grained statistics,” which is a variation of existing QKD protocols that makes use of originally discarded data to get a better key rate. We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis, similar to reference-frame-independent QKD, but without the need for encoding physically in an additional rotation-invariant basis. Such an analysis can easily be applied to existing systems, or even data already recorded in previous experiments, to gain a significantly higher key rate when considerable misalignment is present, extending the maximum distance for BB84 and MDI-QKD and reducing the need for manual alignment in an experiment.http://doi.org/10.1103/PhysRevResearch.4.043097 |
spellingShingle | Wenyuan Wang Norbert Lütkenhaus Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment Physical Review Research |
title | Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment |
title_full | Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment |
title_fullStr | Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment |
title_full_unstemmed | Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment |
title_short | Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment |
title_sort | numerical security proof for the decoy state bb84 protocol and measurement device independent quantum key distribution resistant against large basis misalignment |
url | http://doi.org/10.1103/PhysRevResearch.4.043097 |
work_keys_str_mv | AT wenyuanwang numericalsecurityproofforthedecoystatebb84protocolandmeasurementdeviceindependentquantumkeydistributionresistantagainstlargebasismisalignment AT norbertlutkenhaus numericalsecurityproofforthedecoystatebb84protocolandmeasurementdeviceindependentquantumkeydistributionresistantagainstlargebasismisalignment |