Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 79 tok/s
Gemini 2.5 Pro 55 tok/s Pro
GPT-5 Medium 27 tok/s Pro
GPT-5 High 26 tok/s Pro
GPT-4o 85 tok/s Pro
GPT OSS 120B 431 tok/s Pro
Kimi K2 186 tok/s Pro
2000 character limit reached

Hybrid Implementation for Untrusted-node-based Quantum Key Distribution Network (2503.05095v1)

Published 7 Mar 2025 in quant-ph

Abstract: Quantum key distribution (QKD) serves as a cornerstone of secure quantum communication, providing unconditional security grounded in quantum mechanics. While trusted-node networks have facilitated early QKD deployment, their vulnerability to node compromise underscores the need for untrusted-node architectures. Measurement-device-independent QKD (MDI-QKD) and twin-field QKD (TF-QKD) have emerged as leading candidates, addressing security vulnerabilities and extending transmission distances. Despite the wide adoptions in various fiber scaling, no integrated implementation of these two protocols has been demonstrated to date. Here, we present a hybrid system that seamlessly integrates TF-QKD and MDI-QKD into one untrusted-node-based architecture. Utilizing an efficient phase estimation method based on asymmetric interferometers, we convert twin-field global phase tracking to relative phase calibration, allowing near continuous running of both protocols. Experiments demonstrate secure finite-size key rates for sending-or-not-sending QKD and MDI-QKD over fiber distances of 150 to 431 km. The results align with theoretical simulations and show the ability to surpass the absolute repeaterless key capacity. Our work offers an unified framework for deploying multi-protocol QKD networks, laying the foundation for adaptable and scalable quantum infrastructures that can meet a wide range of security and performance needs.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Ai Generate Text Spark Streamline Icon: https://streamlinehq.com

Paper Prompts

Sign up for free to create and run prompts on this paper using GPT-5.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-up Questions

We haven't generated follow-up questions for this paper yet.