1 Introduction

Quantum key distribution [1] (QKD) has long been a promising area for application of quantum effects toward solving secure communication problems and its unconditional security can be ensured by the theory of quantum mechanics [2,3,4]. Despite these developments, there is still a large gap between theory and practice, in the sense that the security is based on assumptions that are not met by experimental implementations. Subtle details in implementations may introduce some laws that could potentially open side channel loopholes to attack, such as photon number splitting attack (PNS) [5], partially random phase attack [6], fake state attack [7], time shift attack [8], and blinding attack [9]. Recently, measurement-device-independent quantum key distribution (MDI-QKD) has been proposed by Lo et al. [10], which is immune to all the detector side channel attacks.

In recent MDI-QKD experiment, Refs. [11, 12] implemented the proof-of-principle demonstration of time-bin encoding and polarization encoded MDI-QKD, and in Ref. [13, 14] two real demonstrations with key exchange have been performed with time-bin encoding and polarization encoded for MDI-QKD. Recently, Ref. [15] reported the results of MDI-QKD over 404 km of ultralow-loss optical fiber and 311 km of standard optical fiber by employing an optimized four-intensity decoy-state method.

Weak coherence source (WCS), which has a Poisson distribution of photon number and emits n-photon state with the possibility \(P_{\mathrm{WCS}} =\hbox {e}^{-\mu }{\mu ^{n}}/{n!}\), is usually used instead of single photon source in practical experiments. However, due to the multi-photon events of WCS, the implementations of MDI-QKD protocol usually employ decoy-state method to beat the PNS attack. Besides the WCSs, there is another easily implementable source, the heralded single-photon source (HSPS) [16,17,18], which seem to give the compromise between high single-photon events and low multi-photon events in QKD.

Spontaneous parametric downconversion (SPDC) process is widely used as the sources in QKD such as the trigged or heralded single-photon source. Ref. [19] derived a formula for estimating the single-photon contribution for the MDI-QKD with Poisson-distributed heralded source with post-selection (HSPS). Ref. [20] proposed MDI-QKD with thermal distributed SPDCS using polarization encoding to increase the fraction of the yield of single photon. There are some strategies for improving the single-photon character and decreasing multi-photon event of the heralded source. Ref. [21] proposed a multiple heralded source with post-selection (MHPS) scheme to suppress multi-photon events by using an m-to-1 optical switch triggered by a detector on the idler photon of each heralded source. Ref [22] proposed a symmetric scheme (SMHPS) using m heralded units linked by \(m-1\) binary optical switch in a tree structure to overcome the limitation of the low efficiency of m-to-1 optical switches. Ref. [23] proposed an asymmetric scheme (AMHPS) to settle the scalability issue suffered in the symmetric scheme. Ref. [24] demonstrates the different architectures inserted in a common model of QKD implementation based on the BB84 protocol in detail.

In this paper, we present a modified decoy-state MDI-QKD scheme with multiple crystal heralded source with post-selection and analyze the two architectures of MHPS in decoy-state-modified MDI-QKD. The symmetric scheme, which linked by 2-to-1 optical switches in a log-tree structure, is adopted to overcome the limitation of the low efficiency of m-to-1 optical switches. The asymmetric scheme, which shows a chained structure, is used to cope with the scalability issue with increase in the number of crystals suffered in the symmetric scheme. The numerical simulations show that our modified scheme has apparent advances both in distance and key generation rate compared to the original MDI-QKD with weak coherent source.

2 Model and deduction

In our modified MDI-QKD protocol, Alice and Bob generated a polarization entangled photon pair by exploiting spontaneous parametric down conversion in a \(\beta \)-barium borate crystal (BBO) using multiple crystal heralded unit. The two parties both adopt the two-intensity decoy state, where a variable optical attenuator and a random number generator are used to change the output statistics after HS source, to solve the multi-photon events also existed in multiple crystal heralded sources. They use single-photon detectors \(({D}_{\mathrm{A}}/{D}_{\mathrm{B}})\) to detect the more idle light and randomly prepare the signal light into a BB84 polarization state with a polarization modulator. Charlie performs a partial BSM when the signal pulses from Alice and Bob arrive at a 50:50 beam splitter. Four single-photon detectors are employed to detect the results. Based on announcement for each pulse, Alice and Bob compare the bases they used and estimate the secret key rate using the decoy state method [25]:

$$\begin{aligned} R=P_{\mu _2 } \left( 1 \right) P_{\nu _2 } \left( 1 \right) Y_{11}^z \left[ {1-H_2 \left( {e_{11}^x } \right) } \right] -Q_{\mu _2 \nu _2 }^z f\left( {E_{\mu _2 \nu _2 }^z } \right) H_2 \left( {E_{\mu _2 \nu _2 }^z } \right) , \end{aligned}$$
(1)

where Alice’s pulse intensity is \(\mu _i \) and Bob’s pulse intensity is \(\nu _j \), \(P_{\mu _2} \left( 1 \right) \) and \(P_{\nu _2} \left( 1 \right) \) denote the single photon number distribution of signal state, f is the error correction, \(H_2 \) is the binary Shannon function, \(Q_{\mu _i \nu _j }\) and \(E_{\mu _i \nu _j }\) are used to denote the gain and QBER, respectively:

$$\begin{aligned} Q_{\mu _i \nu _j }^w= & {} \sum _{n,m=0}^\infty {P_{\mu _i } \left( n \right) } P_{\nu _j } \left( m \right) Y_{nm}^w \end{aligned}$$
(2)
$$\begin{aligned} E_{\mu _i \nu _j }^w Q_{\mu _i \nu _j }^w= & {} \sum _{n,m=0}^\infty {P_{\mu _i } \left( n \right) } P_{\nu _j } \left( m \right) e_{nm}^w Y_{nm}^w, \end{aligned}$$
(3)

where \(w=x\), z denotes the choice of two bases, x-base is used as test set to estimate the parameters of channel and z-base is used to distill the final secret key. \(P_{\mu _\mathrm{i} } \left( m \right) \) and \(P_{\nu _j } \left( n \right) \) denote the photon number distribution, respectively. \(Y_{nm}\) is the yield and \(e_{nm}\) is the error rate, respectively, where n and m denote the number photons sent by the legitimate users.

The modified MDI-QKD scheme with MHPS, which consists of an array of m heralded source (HS) units simultaneously pumped with a laser pulse with intensity, shows the better compromise between high pair production rate and low multi-photon events. For each HS unit, the more idle photon is used as a trigger for the signal one, which is injected into an optical switch. The ideal photon number distribution of MHPS is given as follows:

$$\begin{aligned} P_n^{\mathrm{MHPS}} (\mu ,m)=\left\{ {{\begin{array}{l@{\quad }l} \hbox {e}^{-m\mu },&{}\quad n=0 \\ \frac{\mu ^{n}}{n!}\hbox {e}^{-\mu }\frac{1-\hbox {e}^{-m\mu }}{1-\hbox {e}^{-\mu }},&{}\quad n\ge 1 \\ \end{array} }} \right. \end{aligned}$$
(4)

where \(\mu \) is the pump intensity and m is the number of HS unit, which can be employed a parallel implementation to suppress the multi-photons events by making the intensity of the pump of each crystal low. However, an efficient implementation of m-to-1 switch is not currently available in MHPS. By employing a total of \(m-1\) binary polarization switching routers, the SMHPS and AMHPS configuration are introduced in realistic scenarios. The schematic of MDI-QKD with SMHPS and AMHPS is shown in Figs. 1 and 2, respectively. Moreover, detection efficiency \(\eta \) and optical switch transmissivity \(\gamma \) are considered to make our schemes more practical with state-of-the-art technology.

Fig. 1
figure 1

Schematic of MDI-QKD with SMHPS

In the schematic of MDI-QKD with SMHPS, Alice (Bob) use parallel nonlinear crystals (NLC) which are pumped with intensity \(\mu /{\gamma ^{k}}\). The photon number distribution of SMHPS is given by:

$$\begin{aligned} \begin{aligned} P_n^{\mathrm{SMHPS}} (\mu ,m,\eta ,\gamma )&=\frac{\left( {1-\eta } \right) \mu \hbox {e}^{-\left( {1-\eta } \right) \mu }}{n!}\hbox {e}^{-\eta \mu \left( {{2^{k}}/{\gamma ^{k}}} \right) } \\&\quad +\frac{\mu ^{n}\hbox {e}^{-\mu }}{n!}\frac{1-(1-\eta )^{n}\hbox {e}^{-\eta \left( {1/{\gamma ^{k}-1}} \right) \mu }}{1-\hbox {e}^{-\eta \left( {\mu /{\gamma ^{k}}} \right) }}\left( {1-\hbox {e}^{-\eta \mu \left( {{2^{k}}/{\gamma ^{k}}} \right) }} \right) \end{aligned} \end{aligned}$$
(5)
Fig. 2
figure 2

Schematic of MDI-QKD with AMHPS

Different with MDI-QKD with SMHPS using same intensity to pump the NLC, MDI-QKD with AMHPS adopted a different intensity to compensate the different number of traversed 2-to-1 optical switches. The photon number distribution of AMHPS is:

$$\begin{aligned} \begin{aligned} P_n^{\mathrm{AMHPS}} (\mu ,m,\eta ,\gamma )=&\frac{\left( {1-\eta } \right) \mu \hbox {e}^{-\left( {1-\eta } \right) \mu }}{n!}\hbox {e}^{-\eta \mu \left\{ {\left[ {\left( {2-\gamma } \right) \gamma ^{1-m}-1} \right] /(1-\gamma )} \right\} } \\&+\frac{\mu ^{n}\hbox {e}^{-\mu }}{n!}\sum _{i=1}^m \hbox {e}^{-\eta \mu \left[ {\left( {\gamma ^{1-i}-1} \right) /\left( {1-\gamma } \right) } \right] }\\&\times \left[ {1-(1-\eta )^{n}\hbox {e}^{-\eta \mu }\hbox {e}^{-\eta \mu /\gamma ^{k_i }}} \right] \end{aligned} \end{aligned}$$
(6)

where \(k_i =\left\{ {{\begin{array}{ll} i,&{}i\le m-1 \\ m-1,&{}i=m \\ \end{array} }} \right. \).

Table 1 Multi-photon probabilities, single-photon probabilities, and vacuum events of different sources

Table 1 shows the comparison of multi-photon probabilities, single-photon probabilities and vacuum events between WCS and MHPS. Multiple crystal heralded source with post-selection seems to give the best compromise between high single-photon events and low multi-photon events.

In the following, we give two tight formulas to estimate these parameters. For simplicity, we assume that the detection efficiency and dark count rate of the trigger detector of Alice’s and Bob’s are same, that is \(\eta ^A =\eta ^B =\eta ,P_d^A =P_d^B =P_d \).

The lower bound of \(Y_{11}^w \)—note that the expression of Eq. (2) is independent on w, and thus we neglect the superscript w for simplicity in the following of the paper.Then the total gain \(Q_{\mu _i \nu _j }\) for the signal state (\(\mu _2 ,\nu _2 )\) and the decoy state \((\mu _1 ,\nu _1 )\) are:

$$\begin{aligned}&\frac{1-\hbox {e}^{-\mu _i }}{1-\hbox {e}^{-m_A \mu _i }}\frac{1-\hbox {e}^{-\nu _j }}{1-\hbox {e}^{-m_B \nu _j }}\hbox {e}^{\mu _i +\nu _j }Q_{\mu _i \nu _j } \nonumber \\&\quad =\frac{1-\hbox {e}^{-\nu _j }}{1-\hbox {e}^{-m_B \nu _j }}\nu _j Q_{0\nu _j } +\frac{1-\hbox {e}^{-\mu _i }}{1-\hbox {e}^{-m_A \mu _i }}\mu _i Q_{\mu _i 0} -Q_{00} +\mu _i \nu _j Y_{11} +h\left( {\mu _i ,\nu _j } \right) \qquad \quad \end{aligned}$$
(7)
$$\begin{aligned}&h\left( {\mu _i ,\nu _j } \right) =\sum _{m=2}^\infty {\frac{\mu _i \nu _j^m }{m!}} Y_{1m} +\sum _{m=2}^\infty {\frac{\mu _{_i }^n \nu _j }{n!}} Y_{n1} +\sum _{m=2}^\infty {\frac{\mu _{_i }^n \nu _j^m }{n!m!}} Y_{nm} \end{aligned}$$
(8)

Thus we will have:

$$\begin{aligned}&\frac{1-\hbox {e}^{-\mu _2 }}{1-\hbox {e}^{-m_A \mu _2 }}\frac{1-\hbox {e}^{-\nu _2 }}{1-\hbox {e}^{-m_B \nu _2 }}\hbox {e}^{\mu _2 +\nu _2 }Q_{\mu _2 \nu _2 } -\frac{1-\hbox {e}^{-\mu _1 }}{1-\hbox {e}^{-m_A \mu _1 }}\frac{1-\hbox {e}^{-\nu _1 }}{1-\hbox {e}^{-m_B \nu _1 }}\hbox {e}^{\mu _1 +\nu _1 }Q_{\mu _1 \nu _1 }\nonumber \\&\quad =g_1 +\left( {\mu _2 \nu _2 -\mu _1 \nu _1 } \right) Y_{11} +\sum _{m=2}^\infty {\frac{\mu _2 \nu _2^m -\mu _1 \nu _1^m }{m!}} Y_{1m} \nonumber \\&\quad \quad +\sum _{n=2}^\infty {\frac{\mu _2^n \nu _2 -\mu _1^n \nu _1 }{n!}} Y_{n1} +\sum _{n,m=2}^\infty {\frac{\mu _{_2 }^n \nu _2^m -\mu _1^n \nu _1^m }{n!m!}} Y_{nm} \nonumber \\&\quad \ge g_1 +g_2 +g_3 -(\mu _2 \nu _2 -\mu _1 \nu _1 +\alpha \mu _2 \nu _1 +\alpha \mu _1 \nu _2 )Y_{11} \end{aligned}$$
(9)

where we use the fact that for any \(n,m\ge 2\), the following inequalities always hold, which are given by [26]:

$$\begin{aligned} \frac{\mu _2 v_2^m -\mu _1 v_1^m }{\mu _2 v_1^m +\mu _1 v_2^m }\ge & {} \frac{\mu _2 v_2^2 -\mu _1 v_1^2 }{\mu _2 v_1^ +\mu _1 v_2^2 }\equiv a>0 \nonumber \\ \frac{\mu _2^n v_2 -\mu _1^n v_1 }{\mu _2^n v_1 +\mu _1^n v_2 }\ge & {} \frac{\mu _2^2 v_2 -\mu _1^2 v_1 }{\mu _2^2 v_1^ +\mu _1^2 v_2}\equiv b>0 \nonumber \\ \frac{\mu _2^n v_2^m -\mu _1^n v_1^m }{\mu _2^n v_1^m +\mu _1^n v_2^m }\ge & {} \frac{\mu _2^2 v_2^2 -\mu _1^2 v_1^2 }{\mu _2^2 v_1^2 +\mu _1^2 v_2^2 }\equiv c>0 \end{aligned}$$
(10)

And \(\alpha =\min \left\{ {a,b,c} \right\} \)

Here \(g_0 ,g_1 ,g_2 \) are defined as:

$$\begin{aligned} g_{1}= & {} \frac{1-\hbox {e}^{-\nu _2 }}{1-\hbox {e}^{-m_B \nu _2 }}\hbox {e}^{\nu _2 }Q_{0\nu _2 } +\frac{1-\hbox {e}^{-\mu _2 }}{1-\hbox {e}^{-m_A \mu _2 }}\hbox {e}^{\mu _2 }Q_{\mu _2 0} \nonumber \\&-\,\frac{1-\hbox {e}^{-\nu _1 }}{1-\hbox {e}^{-m_B \nu _1 }}\hbox {e}^{\nu _1 }Q_{0\nu _1 } -\frac{1-\hbox {e}^{-\mu _1 }}{1-\hbox {e}^{-m_A \mu _1 }}\hbox {e}^{\mu _1 }Q_{\mu _1 0} \nonumber \\ g_{2}= & {} \alpha \left( \frac{1-\hbox {e}^{-\mu _2 }}{1-\hbox {e}^{-m_A \mu _2 }}\frac{1-\hbox {e}^{-\nu _1 }}{1-\hbox {e}^{-m_B \nu _1 }}\hbox {e}^{\mu _2 }\hbox {e}^{\nu _1 }Q_{\mu _2 \nu _1 } -\frac{1-\hbox {e}^{-\mu _2 }}{1-\hbox {e}^{-m_A \mu _2 }}\hbox {e}^{\mu _2 }Q_{\mu _2 0}\right. \nonumber \\&\left. -\,\frac{1-\hbox {e}^{-\nu _1 }}{1-\hbox {e}^{-m_B \nu _1 }}\hbox {e}^{\nu _1 }Q_{0\nu _1 } +Q_{00} \right) \nonumber \\ g_{3}= & {} \alpha \left( \frac{1-\hbox {e}^{-\mu _1 }}{1-\hbox {e}^{-m_A \mu _1 }}\frac{1-\hbox {e}^{-\nu _2 }}{1-\hbox {e}^{-m_B \nu _2 }}\hbox {e}^{\mu _1 }\hbox {e}^{\nu _2 }Q_{\mu _1 \nu _2 } -\frac{1-\hbox {e}^{-\mu _1 }}{1-\hbox {e}^{-m_A \mu _1 }}\hbox {e}^{\mu _1 }Q_{\mu _1 0}\right. \nonumber \\&\left. -\,\frac{1-\hbox {e}^{-\nu _2 }}{1-\hbox {e}^{-m_B \nu _2 }}\hbox {e}^{\nu _2 }Q_{0\nu _2 } +Q_{00} \right) \end{aligned}$$
(11)

Thus the lower bound of \(Y_{11} \) is given by:

$$\begin{aligned} Y_{11}\ge & {} \underline{Y_{11}} \nonumber \\\equiv & {} \frac{g_0 +g_1 +g_2 -\frac{1-\hbox {e}^{-\mu _{2} }}{1-\hbox {e}^{{-m}_{A} \mu _2 }}\frac{1-\hbox {e}^{{-}\nu _{2} }}{1-\hbox {e}^{{-m}_{B} \nu _2 }}\hbox {e}^{\mu _2 }\hbox {e}^{\nu _2 }Q_{\mu _2 \nu _2 } }{\left( {\mu _1 \nu _1 -\mu _2 \nu _2 +\alpha \mu _2 \nu _2 +\alpha \mu _1 \nu _1 } \right) } \nonumber \\&+\,\frac{\frac{1-\hbox {e}^{-\mu _{1} }}{1-\hbox {e}^{-{m}_{A} \mu _1 }}\frac{1-\hbox {e}^{-\nu _{1} }}{1-\hbox {e}^{-m_{B} \nu _1 }}\hbox {e}^{\mu _1 }\hbox {e}^{\nu _1 }Q_{\mu _1 \nu _1 } }{\left( {\mu _1 \nu _1 -\mu _2 \nu _2 +\alpha \mu _2 \nu _2 +\alpha \mu _1 \nu _1 } \right) } \end{aligned}$$
(12)

The upper bound of \(e_{11}^w \)—according to Eqs. (3) and (10), we can calculate the upper bound of single-photon error rate:

$$\begin{aligned} e_{11}\le & {} \overline{e_{11} } \equiv \frac{\frac{1-\hbox {e}^{-\mu _1 }}{1-\hbox {e}^{-m_A \mu _1 }}\frac{1-\hbox {e}^{-\nu _1 }}{1-\hbox {e}^{-m_B \nu _1 }}\hbox {e}^{\mu _1 }\hbox {e}^{\nu _1 }Q_{\mu _1 \nu _1 } E_{\mu _1 \nu _1 } -\frac{1-\hbox {e}^{-\mu _1 }}{1-\hbox {e}^{-m_A \mu _1 }}\hbox {e}^{\mu _1 }Q_{\mu _1 0} E_{\mu _1 0} }{\mu _1 \underline{\nu _1 Y_{11}}} \nonumber \\&-\frac{\frac{1-\hbox {e}^{-\nu _1 }}{1-\hbox {e}^{-m_B \nu _1 }}\hbox {e}^{\nu _1 }Q_{0\nu _1 } E_{0\nu _1 } +Q_{00} E_{00} }{\mu _1 \underline{\nu _1 Y_{11}}} \end{aligned}$$
(13)

Compared with the original MDI-QKD formulas, we found that MHPS bring at least one advantage: It is possible to obtain a higher value of the one-photon probability with MHPS owing to the post-selection procedure, which turns multi-detectors trigger event into one-photon output event by blocking the output of all the HS units but one with a certain probability.

3 Simulations

In the present section, we compare the performances of the SMHPS and AMHPS sources for different values of the number of HS units. The parameter \(\mu \), related to the number of generated pairs per pulse, is the free parameter used to numerically maximize the rate.

The measurement apparatus is characterized by detectors with quantum efficiency \(\eta _{\mathrm{c}} =14.5\%\) and dark count probability \(d_{\mathrm{c}} =3\times 10^{-6}\), corresponding to the state-of-the-art semiconductor single-photon detectors. The optimal intensity of signal state with WCS is \(0.5{\sim }0.6\), and the optimal intensity of signal state with MHPS is \(0.2{\sim }0.3\). The efficiency of the error correction code is \(f=1.16\) and (a) \(m=2\) (b) \(m=8\) to illustrate the performance of different sources with different value m. The main parameters are listed in Tables 2 and 3:

Table 2 List of experimental parameters for the measurement part
Table 3 List of experimental parameters for Alice (Bob)
Fig. 3
figure 3

A comparison for the probability of vacuum events between WCS, MHPS, SMHPS, and AMHPS

Fig. 4
figure 4

A comparison for the probability of single-photon events between WCS, MHPS, SMHPS, and AMHPS

The probability of vacuum events and single photon number distribution of the MHPS, SMHPS, and AMHPS are shown in Figs. 3 and 4, respectively. As shown in Fig. 3, the vacuum events of all three sources are decreasing rapidly when increasing the number m of the crystals. As shown in Fig. 4, when the detection efficiency and the transmissivity are fixed (\(\eta =0.7, \gamma =0.5)\), the single-photon performance does not always improve for SMHPS, while the AMHPS offers a better performance when the number of crystals is increased.

Fig. 5
figure 5

Key rate R versus the maximal secure transmittance distance L with different sources. Blue solid line: MDI-QKD protocol using single-photon source. Red dash line: asymptotic MDI-QKD protocol with weak coherent source. Green dot line: our modified MDI-QKD protocol using SMHPS \((m=2)\) beams. Black dot-dashed line: our modified MDI-QKD protocol using SMHPS \((m=8)\) (Color figure online)

Fig. 6
figure 6

Key rate R versus the maximal secure transmittance distance L with different sources. Blue solid line: MDI-QKD protocol using single-photon source. Red dash line: asymptotic MDI-QKD protocol with weak coherent source. Green dot line: our modified MDI-QKD protocol using AMHPS \((m=2)\) beams. Black dot-dashed line: our modified MDI-QKD protocol using AMHPS \((m=8)\) (Color figure online)

In Figs. 5 and 6, we compared the key generation rates of SMHPS and AMHPS with single-photon source and weak coherent source. The performance of the SMHPS and AMHPS are also compared for different values m. Both the key rate and the maximum secure transmittance distance of SMHPS and AMHPS are better than MDI-QKD with WCS owing to the use of parallel HS strategies, which not only suppresses the multi-photons events, but also keeps an acceptable production rate of single photons. For \(m=2\), the performance of SMHPS and AMHPS are identical because the architecture of SMHPS and AMHPS are equivalent. When the number of crystals increases to \(m=8\), the maximal secure transmittance distance of SMHPS decreases owing to the effect of the increased absorption in optical switches. On the contrary, the AMHPS, which employs the same kind of binary switches but the different multiplex way, shows improvement with eight HS units. The AMHPS shows better scalability than the SMHPS because the addition of HS units in SMHPS degrades the performance.

Fig. 7
figure 7

Key rate R versus the maximal secure transmittance distance L with different key size for fixed m in MDI-QKD with SMHPS

Fig. 8
figure 8

Key rate R versus the maximal secure transmittance distance L with different key size for fixed \(m=4\) in MDI-QKD with AMHPS

From Figs. 7 and 8, the performance varies heavily with different pulse numbers in MDI-QKD protocol with SMHPS and AMHPS, respectively. However, in the linear regime before the cutting-off, the scheme can work at the level close to the situation with no fluctuation. We should mention that, not as Curty et al.’s work, the statistical fluctuation analysis done in the manuscript is by far not a composable security proof, but it shows the overall trend of the behavior for different sources in the finite size regime.

4 Conclusion

In conclusion, we present a modified MDI-QKD with multiple crystal heralded single-photon sources. The symmetric scheme and asymmetric architectures are proposed to improve the single-photon character of the heralded source in MDI-QKD. The symmetric scheme is adopted to overcome the limitation of the current low efficiency of m-to-1 optical switches, while the asymmetric scheme is used to cope with the scalability issue with increasing the number of crystals suffered in symmetric scheme. MDI-QKD with multiple crystal heralded sources with post-selection has shown better performance than the original MDI-QKD protocol owing to the use of parallel HS strategies, which not only suppresses the multi-photons events, but also keeps an acceptable production rate of single photons. Furthermore, integrated devices represent the best resource to achieve high efficiency of the SPDC process and ensure good coupling into single mode fibers. [28] The recent advances in integrated photonics suggest an increasing role of multiple crystal heralded sources. If built into a single chip, they might be a valid alternative to lasers in quantum key distribution and other quantum information tasks requiring single photons to work properly.