Document Type : Original Research Paper

Author

Department of Electrical Engineering and Information Technology, Iranian Research Organization for Science & Technology (IROST), Tehran, Iran.

Abstract

Background and Objectives: Quantum Key Distribution (QKD) ensures secure communication through quantum mechanics, but real-world implementations face vulnerabilities from detector blinding, time-shift, and side-channel attacks. While Measurement-Device-Independent QKD (MDI-QKD) mitigates detector vulnerabilities, it lacks real-time attack monitoring and struggles with finite-key limitations. This study presents an MDI ack QKD protocol that integrates deterministic acknowledgment pulses and multi-intensity decoy states to achieve robust, device-independent security with real-time attack detection.
Methods: The proposed protocol combines MDI-QKD’s device-independent framework with interleaved deterministic acknowledgment pulses and four-level decoy intensities. Alice and Bob generate weak coherent pulses with randomized phases, embedding acknowledgment pulses with probability ( Pd = 0.1 ) to probe channel integrity. An untrusted relay performs Bell-state measurements using superconducting nanowire single-photon detectors (SNSPDs). Multi-intensity decoy statistics enable finite-key parameter estimation, while integrated photonic platforms ensure scalability. Security is analyzed using the universally composable framework, with simulations and preliminary experiments conducted over metropolitan fiber distances.
Results: Numerical simulations demonstrate secure key rates exceeding 10 Mbps at 50 km and ~1 Mbps at 100 km under realistic conditions (0.2 dB/km fiber loss, 85% detector efficiency, 1 GHz pulse rate). Experimental tests on an integrated photonic chip at 1550 nm achieved raw key rates of 1.1 Mbps at 50 km with decoy accuracy within ±7%. Deterministic acknowledgments detected blinding attacks with high sensitivity, and multi-intensity decoys provided tight finite-key bounds, maintaining composable security against collective and coherent attacks.
Conclusion: The MDI ack QKD protocol achieves high-rate, device-independent quantum key distribution with real-time attack monitoring, offering a scalable solution for metropolitan quantum networks. Its compatibility with integrated photonics enables compact, stable implementations, while deterministic acknowledgments and multi-intensity decoys ensure robust security against evolving threats. This approach paves the way for practical, unconditionally secure communication systems, with potential for satellite-ground and multi-node network extensions.

Keywords


LETTERS TO EDITOR

Journal of Electrical and Computer Engineering Innovations (JECEI) welcomes letters to the editor for the post-publication discussions and corrections which allows debate post publication on its site, through the Letters to Editor. Letters pertaining to manuscript published in JECEI should be sent to the editorial office of JECEI within three months of either online publication or before printed publication, except for critiques of original research. Following points are to be considering before sending the letters (comments) to the editor.


[1] Letters that include statements of statistics, facts, research, or theories should include appropriate references, although more than three are discouraged.

[2] Letters that are personal attacks on an author rather than thoughtful criticism of the author’s ideas will not be considered for publication.

[3] Letters can be no more than 300 words in length.

[4] Letter writers should include a statement at the beginning of the letter stating that it is being submitted either for publication or not.

[5] Anonymous letters will not be considered.

[6] Letter writers must include their city and state of residence or work.

[7] Letters will be edited for clarity and length.

CAPTCHA Image