You shouldn't see thisYou may have access to the free features available through My Research. You can save searches, save documents, create alerts and more. Please log in through your library or institution to check if you have access.

If you log in through your library or institution you might have access to this article in multiple languages.

Styles include MLA, APA, Chicago and many more. This feature may be available for free if you log in through your library or institution.

You may have access to it for free by logging in through your library or institution.

You may have access to different export options including Google Drive and Microsoft OneDrive and citation management tools like RefWorks and EasyBib. Try logging in through your library or institution to get access to these tools.

Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate detector side channels and prevent all attacks on detectors. The future of MDI-QKD is a quantum network that provides service to many users over untrusted relay nodes. In a real quantum network, the losses of various channels are different and users are added and deleted over time. To adapt to these features, we propose a type of protocol that allows users to independently choose their optimal intensity settings to compensate for different channel losses. Such a protocol enables a scalable high-rate MDI-QKD network that can easily be applied for channels of different losses and allows users to be dynamically added or deleted at any time without affecting the performance of existing users.
Plain Language Summary
Quantum networks, in which information is shared via quantum bits (qubits), have been heralded as revolutionary for computational and communications-related tasks given their theoretical security. However, the practical quantum devices that make up such networks might be intrinsically insecure—realistic detectors are susceptible to hacking attacks. Here, we propose a new method to achieve scalable high-rate quantum networks with untrusted relays, where the relay hosting the detectors can even be operated by the hacker herself. This method can be applied directly to networks with users at arbitrary distances from the relay, thereby mitigating a major limitation of previous methods.
Most quantum networks constructed to date have been based on trusted relays, but quantum networks with untrusted relays have also been proposed using the concept of measurement-device-independent quantum key distribution (MDI-QKD). However, MDI-QKD has worked well up until now only for nearly symmetric-length channels (i.e., the two channels from the two parties, Alice and Bob, leading to the untrusted relay, Charlie, have nearly the same loss). In real-life situations, however, quantum channels can have vastly different losses. Therefore, existing MDI-QKD methods are cumbersome and have low key rates (i.e., the rate of secure bits generated per second). Our new method removes the requirement of nearly equal channel loss completely by allowing the two users to employ quantum optical signals with vastly different intensities. This technique leads to dramatically higher key rates and greatly extends the applicability of MDI-QKD networks. Moreover, it easily allows users to be added or deleted in real time, at arbitrary locations.
We expect that our work will open up new directions of research into asymmetric channels in quantum networks with untrusted relays and inspire more theoretical and experimental work.
Title
Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks
Author
Wang, Wenyuan

; Xu, Feihu; Hoi-Kwong Lo
Publication date
Oct-Dec 2019
American Physical Society
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2550629539
Back to topEPn8dE2IV5JNiLg+3QXByg==:AqKc62i9mUQrpOEGJQg2ATHWdsBRhfZz9nMOS4vj/bGW2CdBNNe1Ol2xDIihBLjiy8ulpSl+aK8wDvga1DdLiKbJfKFV9Uv7tN6gzght12JQK87It1vCvyhpfDHK1KtJ7+YYJXu6I8wx3iYiOSeaQ6mTLk1dfCBe4X1H72+x/pK59W9/qW4yat4BOCAK560GAZZUXIj5r689rFMAvfloQKpFri1cIS7qeqJt7ujfmS2sdaNNrxhgALEkhAdHW4CRyFgh0gHVgp/DVkeAcbGZcnAPFV/2tXdhD8J0SMKyGPhoXud1GGC+qi80A+Ev4S/9Z//PAfKivT+DrAhyP1RivIn+POjgaEnp5Muu0olJHLAtTbQuGCwOSfUz1qcjweMznVm4GyjPqOJqUiy8jTaMxA==