ﻻ يوجد ملخص باللغة العربية
Measurement-device-independent quantum key distribution (MDI-QKD) provides us a powerful approach to resist all attacks at detection side. Besides the unconditional security, people also seek for high key generation rate, but MDI-QKD has relatively low key generation rate. In this paper, we provide an efficient approach to increase the key generation rate of MDI-QKD by adopting multiple degrees of freedom (DOFs) of single photons to generate keys. Compared with other high-dimension MDI-QKD protocols encoding in one DOF, our protocol is more flexible, for our protocol generating keys in independent subsystems and the detection failure or error in a DOF not affecting the information encoding in other DOFs. Based on above features, our MDI-QKD protocol may have potential application in future quantum communication field.
Device-independent quantum key distribution protocols allow two honest users to establish a secret key with minimal levels of trust on the provider, as security is proven without any assumption on the inner working of the devices used for the distrib
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side. However, the protocol still keeps the strict assumptions on the source side that the four
The measurement-device-independent (MDI) QKD is considered to be an alternative to overcome the currently trusted satellite paradigm. However, the feasibility of the space-based MDI-QKD remains unclear in terms of the factors: the high-loss uplink be
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side-channel loopholes and has shown excellent performance in long-distance secret keys sharing. Conventional security proofs, however, require additional as
Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of the quantum Internet. Considering extensive QKD implementations of trusted node networks,