Reference frame independent and measurement device independent quantum key distribution(RFI-MDI-QKD)has the advantages of being immune to detector side loopholes and misalignment of the reference frame.However,several...Reference frame independent and measurement device independent quantum key distribution(RFI-MDI-QKD)has the advantages of being immune to detector side loopholes and misalignment of the reference frame.However,several former related research works are based on the unrealistic assumption of perfect source preparation.In this paper,we merge a loss-tolerant method into RFI-MDI-QKD to consider source flaws into key rate estimation and compare it with quantum coin method.Based on a reliable experimental scheme,the joint influence of both source flaws and reference frame misalignment is discussed with consideration of the finite-key effect.The results show that the loss-tolerant RFI-MDI-QKD protocol can reach longer key rate performance while considering the existence of source flaws in a real-world implementation.展开更多
基金supported by the State Key Laboratory of Information Photonics and Optical Communications(Beijing University of Posts and Telecommunications)(No.IPOC2021ZT10)the National Natural Science Foundation of China(No.11904333)the Fundamental Research Funds for the Central Universities(No.2019XD-A02)。
文摘Reference frame independent and measurement device independent quantum key distribution(RFI-MDI-QKD)has the advantages of being immune to detector side loopholes and misalignment of the reference frame.However,several former related research works are based on the unrealistic assumption of perfect source preparation.In this paper,we merge a loss-tolerant method into RFI-MDI-QKD to consider source flaws into key rate estimation and compare it with quantum coin method.Based on a reliable experimental scheme,the joint influence of both source flaws and reference frame misalignment is discussed with consideration of the finite-key effect.The results show that the loss-tolerant RFI-MDI-QKD protocol can reach longer key rate performance while considering the existence of source flaws in a real-world implementation.