Figure 6
From: Measurement-device-independent quantum key distribution with leaky sources

The secret key rate in logarithmic scale as a function of the distance in Case 1 for the four-intensity protocol. (a) Here we consider a fixed value of the total number of transmitted pulses, \(N=10^{14}\) and various values for the intensity \(I_\text{max}\). (b) Here we fix \(I_{\text{max}}=10^{-16}\) and consider various values for N.