Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (2024)

Physical Review A

covering atomic, molecular, and optical physics and quantum information
  • Highlights
  • Letters
  • Recent
  • Accepted
  • Collections
  • Authors
  • Referees
  • Search
  • Press
  • About
  • Editorial Team

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution

Feihu Xu, He Xu, and Hoi-Kwong Lo
Phys. Rev. A 89, 052333 – Published 29 May 2014
  • Article
  • References
  • Citing Articles (157)

PDFHTMLExport Citation

Abstract

Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field tests using attenuated lasers combined with the decoy-state technique. Although researchers have studied various decoy-state MDI-QKD protocols with two or three decoy states, a clear comparison between these protocols is still missing. This invokes the question of how many types of decoy states are needed for practical MDI-QKD. Moreover, the system parameters to implement decoy-state MDI-QKD are only partially optimized in all previous works, which casts doubt on the actual performance of former demonstrations. Here, we present analytical and numerical decoy-state methods with one, two, and three decoy states. We provide a clear comparison among these methods and find that two decoy states already enable a near-optimal estimation and more decoy states cannot improve the key rate much in either asymptotic or finite-data settings. Furthermore, we perform a full optimization of system parameters and show that full optimization can significantly improve the key rate in the finite-data setting. By simulating a real experiment, we find that full optimization can increase the key rate by more than one order of magnitude compared to nonoptimization. A local search method to optimize efficiently the system parameters is proposed. This method can be four orders of magnitude faster than a trivial exhaustive search to achieve a similar optimal key rate. We expect that this local search method could be valuable for general fields in physics.

  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (1)
  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (2)
  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (3)
  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (4)
  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (5)
  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (6)
  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (7)
  • Received 23 January 2014

DOI:https://doi.org/10.1103/PhysRevA.89.052333

©2014 American Physical Society

Authors & Affiliations

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand

Issue

Vol. 89, Iss. 5 — May 2014

Reuse & Permissions
Access Options
Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (10)

Authorization Required

Other Options
  • Buy Article »
  • Find an Institution with the Article »

×

Download & Share

PDFExportReuse & PermissionsCiting Articles (157)

×

Images

  • Figure 1

    Key rate comparison with the infinite data set. The dotted black curve is the perfect key rate with infinite decoy states. The blue solid curve is our optimized key rate using the numerical approach with two decoy states, where the intensities are ω=0.0005, ν=0.01, and optimized μ. For comparison purposes, we present the nonoptimized and partially optimized key rates using the methods and parameters of Refs.[27, 29, 30]: the black dashed curve is from using[30] with ω=0, ν=0.01, and optimized μ; the red (dark gray) dashed curve is from using[29] with ω=0.01, ν=0.1, and μ=0.3; the green (light gray) dashed curve is from using[27] with ω=0, ν=0.1, and μ=0.5. Notice that if the parameter optimization is also applied to Refs[27, 29], all the key rates are almost the same. In the asymptotic case, parameter optimization is simple, as only the intensities are required to be optimized and a smaller value of decoy-state intensity can, in principle, result in a better estimation. Parameter optimization can still increase the key rate and extend the secure distance.

    Reuse & Permissions

  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (12)

    Figure 2

    Practical key rate comparison (with statistical fluctuations). The optimal parameters and key rate for a distance of 50 km (standard fiber) are shown in Table3. All the key rates are simulated with N=1012. The blue solid and red dashed-dotted curves (almost overlapping) are, respectively, our optimized key rates (after a full optimization) using the numerical (Appendixpp1-s1) and analytical (Appendixpp1-s2) methods with two decoy states. The black dashed curve is from using the method of Ref.[30], where only partial parameters (i.e., the intensities) are optimized. The green (gray) dashed curve is from using the method of Ref.[27], where some typical parameters are assumed without optimization. Without full parameter optimization, the key rates in Refs[27, 30] are around one order of magnitude lower than ours across different distances. Our method can enable secure MDI-QKD over distances 25 km longer than those in[27, 30]. These results highlight the importance of parameter optimization in practical decoy-state MDI-QKD.

    Reuse & Permissions

  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (13)

    Figure 3

    Asymptotic key rates with different numbers of decoy states. The solid curve is the one with infinite decoy states. The dashed, dash-dotted, and dotted curves are, respectively, the one-, two-, and three-decoy-state results using numerical methods (see Appendixpp1-s1). The signal state μ is optimized in all cases, while some reasonable values of decoy states are adopted: for one decoy state, ν=0.0005; for two decoy states, ν=0.01 and ω=0.0005; for three decoy states, ν1=0.1, ν2=0.01, and ω=0.0005. We emphasize that the key rates with analytical methods of Appendixpp1-s2 almost overlap with the ones presented here, which shows that the analytical approaches provide a very good estimation. The estimation using two decoy states gives a key rate that is nearly the same as the one using three decoy states and is higher than that for the one-decoy-state case. Therefore, two decoy states can already result in a near-optimal estimation, and more decoy states cannot improve the key rate.

    Reuse & Permissions

  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (14)

    Figure 4

    Secret key rate in logarithmic scale as a function of the distance under different numbers of decoy states. The main figure is for data set N=1012, and the insert is for N=1014. The key rates are obtained using numerical methods with one (dashed curve), two (solid curve), and three (dash-dotted curve) decoy states. The key rates with two and three decoy states almost overlap. In simulation, we perform a full parameter optimization for all cases. Our results show that after a full parameter optimization, the two-decoy-state method can give an almost optimal key rate, which is higher than the one for one decoy state. Three decoy states cannot help increase the key rate.

    Reuse & Permissions

  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (15)

    Figure 5

    Coordinate descent (CD). The CD algorithm searches along one coordinate direction in each iteration, and it uses a different coordinate direction cyclically. For instance, on the equal-error contour of two-dimensional subspace, CD starts at point A (arbitrarily) and descends vertically along direction e1 to B, then horizontally along direction e2 toward C. After cyclic iterations of vertical and horizontal descent, the algorithm stops at D, where it is very close to the optimal. This simplified two-dimensional example illustrates how a generalized search in any dimensional space can be done analogously.

    Reuse & Permissions

  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (16)

    Figure 6

    Plot of the intensity μ as a function of the transmission distance for the decoy-state MDI-QKD with infinite decoy states.

    Reuse & Permissions

  • Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (17)

    Figure 7

    (a) Convexity of the key rate function. The key rate is simulated by sweeping μ and ν and optimizing other parameters. (b) Key rate as a function of the decoy state ω. As long as the intensity of ω is below 1×103, the key rate is very close to the optimum. A perfect vacuum (ω=0) is not essentially required in practical decoy-state QKD experiments.

    Reuse & Permissions

×

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution (2024)
Top Articles
Latest Posts
Article information

Author: Cheryll Lueilwitz

Last Updated:

Views: 5881

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Cheryll Lueilwitz

Birthday: 1997-12-23

Address: 4653 O'Kon Hill, Lake Juanstad, AR 65469

Phone: +494124489301

Job: Marketing Representative

Hobby: Reading, Ice skating, Foraging, BASE jumping, Hiking, Skateboarding, Kayaking

Introduction: My name is Cheryll Lueilwitz, I am a sparkling, clean, super, lucky, joyous, outstanding, lucky person who loves writing and wants to share my knowledge and understanding with you.