Next Article in Journal
Soyasapogenol-B as a Potential Multitarget Therapeutic Agent for Neurodegenerative Disorders: Molecular Docking and Dynamics Study
Next Article in Special Issue
Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method
Previous Article in Journal
Robustness and Flexibility of Neural Function through Dynamical Criticality
Previous Article in Special Issue
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Passive Light Source Monitoring for Sending or Not Sending Twin-Field Quantum Key Distribution

1
Institute of Quantum Information and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
Broadband Wireless Communication and Sensor Network Technology, Key Lab of Ministry of Education, NUPT, Nanjing 210003, China
3
Telecommunication and Networks, National Engineering Research Center, NUPT, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2022, 24(5), 592; https://doi.org/10.3390/e24050592
Submission received: 24 March 2022 / Revised: 15 April 2022 / Accepted: 21 April 2022 / Published: 23 April 2022
(This article belongs to the Special Issue Practical Quantum Communication)

Abstract

:
Twin-field quantum key distribution (TF-QKD) can break the repeaterless linear bound and possess the measurement-device-independent security, and thus seems very promising in practical applications of quantum secure communication. In most reported TF-QKD protocols, light sources are assumed to possess trusted and fixed photon number distributions (PND), which are unrealistic assumptions in practical applications. Fortunately, the light source monitoring (LSM) method is proposed to circumvent this problem by actively adjusting the attenuation coefficient and monitoring the photon number distribution of light sources. However, the active light source monitoring (ALSM) method may induce additional modulation errors due to imperfect attenuation devices, deteriorating practical performances of TF-QKD systems. In this manuscript, we propose a passive light source monitoring (PLSM) scheme for TF-QKD, and employ the sending-or-not-sending (SNS) TF-QKD as an example for illustration. Simulation results show that our present work can greatly exceed both the original SNS protocol and the ALSM scheme when light source fluctuations and modulation errors are taken into account.

1. Introduction

Quantum key distribution (QKD) allows two legitimate parties, Alice and Bob, to share secure keys based on the laws of quantum physics. The security of BB84 protocol was proven in theory by many scientists [1,2,3,4,5,6,7]. However, there are still some loopholes in the measurement devices. To remove those attacks directed on the measurement devices, the measurement-device-independent quantum key distribution (MDI-QKD) [8] was put forward. Thereafter, a lot of related experiments and theories have been done on MDI-QKD, making it more efficient and practical [9,10,11,12,13]—just its key rate is still limited by the fundamental limit of channel capacities without quantum repeaters, e.g., the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound [14,15].
Recently, Lucamarini et al. proposed the twin-field quantum key distribution (TF-QKD) protocol [16], which can break the PLOB bound [14,15] and make the rate distance dependence change from a linear to square root. Up to date, many variants of TFQKD protocols have been proposed and experimentally demonstrated [17,18,19,20,21,22,23,24,25,26,27,28]. However, some assumptions are made for the sources in most reported works, i.e., with a trusted and fixed photon-number distribution (PND), which usually can not be satisfied in practical implementations. Those unreasonable assumptions will inevitably compromise the security of practical QKD systems. To solve the problem, the light source monitoring (LSM) method was put forward and experimentally realized by actively modulating local attenuator into different losses [29,30], hereafter called the active light source monitoring (ALSM) scheme. However, unfortunately, the ALSM scheme will bring new loopholes and then deteriorate practical performances of TF-QKD systems during intensity modulation processes due to imperfections of attenuated devices.
In this paper, we propose a passive light source monitoring (PLSM) scheme for TF-QKD, which is accomplished by a passive monitoring module consisting of a beam splitter and two detectors at the source side. Through the PLSM module, we can obtain four monitoring events by two local detectors and then precisely estimate the bounds of source distributions. Specifically, we employ the sending-or-not-sending (SNS) TFQKD [18,31,32,33] as an example for illustration. Compared with the ALSM method, our PLSM method can passively monitor the PND and dramatically exceed the performance of ALSM when modulation errors are considered.

2. PLSM Scheme in SNS−TFQKD

In this section, we describe the SNS−TFQKD scheme [18,31,32,33] with PLSM. The schematic of the setup is shown in Figure 1, where it involves two senders, Alice and Bob, and one untrustworthy third party (UTP), Charlie. The detailed process of the SNS−TFQKD with a four-intensity decoy-state PLSM scheme can be described as follows:
Step 1. Alice and Bob do some preparatory work before sending the pulse: they send a reference coherent light to Charlie, and Charlie performs phase compensation.
Step 2. The N pulses generated by Alice and Bob are encoded by a modulation module, which contains a phase modulator (PM) and an intensity modulator (IM). During this process, each pulse is randomly chosen as the X (decoy) or Z (signal) window. At any time window i, Alice (Bob) independently determines whether it is a decoy window or a signal window. If the decoy window is chosen, she (he) prepares state v k e i δ A i + i γ A i v k e i δ B i + i γ B i and sends it to Charlie, v k ( k = 0 , 1 , 2 ) . If the signal window is selected, Alice (Bob) sends states u e i δ A i + i γ A i u e i δ B i + i γ B i to Charlie with a probability of ε , and with a probability of ( 1 ε ) for not sending, where the γ A , γ B are global phases of the coherent states.
Step 3. The pulses are split into two modes, where the idler mode is for performing PLSM and the signal mode is for encoding information and sending it to Charlie. The idler mode is further split by a local beam splitter and then sent into two local detectors. As a result, four detection events can be obtained. For example, in Alice’s PLSM module, these events can be denoted as l ( l = x , y , z , w ) : x, neither D 1 or D 2 clicks; y, only D 1 clicks; z, only D 2 clicks; w, and both D 1 and D 2 click.
Step 4. Charlie measures all received states with a beam splitter and two detectors ( D L and D R ), and then announces the effective measurement outcome, i.e., which detector clicks.
Step 5. Alice and Bob announce the local detection events l and the kind of window (X window or Z window) for each pulse. In addition, the intensity and encoding phases ( δ A , δ B ) in the X basis should also be disclosed.
Step 6. Alice and Bob use the data in the X basis to estimate channel parameters, and they randomly select some bits in the Z basis for the error test and use the remaining bits to extract the final secure keys.
In this protocol, Z basis is defined as the time window when both Alice and Bob choose the signal window; X basis is denoted as the time window when both Alice and Bob choose the same decoy window (with intensity v k ), and, simultaneously, the random phases δ A , δ B prepared in the window satisfy
1 cos δ A δ B | λ | .
Here, λ is determined by the size of the phase slice chosen by Alice and Bob. In addition, the effective measurement outcome denotes that only one detector ( D L or D R ) clicks.
In the PLSM module, when the event l occurs, the idler state is projected into ρ = P n ( μ ) q n l | n n | , where P n ( μ ) denotes the photon number distribution of the weak coherent state (WCS) with mean photon number μ ( μ { v 0 , v 1 , v 2 , u } ) , P n ( μ ) = e μ μ n n ! , and q n l is the probability of an n-photon state projecting into event l given by [34,35]
q n x = 1 d s 2 1 η s n , q n y = 1 d s 1 η s n 1 + t η s 1 η s n + d s 1 , q n z = 1 d s 1 η s n 1 t η s 1 η s n + d s 1 , q n w = 1 q n x q n y q n z ,
where d s and η s are the dark counting rate and detection efficiency of the local detectors at the sender’s side (Alice and Bob), respectively, and t is the transmittance of BS 2 and BS 4 . Here, for simplicity, we assume that two local detectors in PLSM module have the same detection efficiency and dark count rate, which means η 1 = η 2 = η s , d 1 = d 2 = d s . Define a n l ( μ ) : = P n ( μ ) q n l as the photon number distribution under different counting events.
Then, we estimate the upper and lower bounds of probabilities of different photon-number states, i.e., the vacuum state, the one-photon state and the two-photon state. By measuring the idler mode, the gain of four events can be obtained as
Q x ( μ ) = a n x ( μ ) = e μ μ n n ! 1 d s 2 1 η s n , Q y ( μ ) = a n y ( μ ) = e μ μ n n ! 1 d s 1 η s n 1 + t η s 1 η s n + d s 1 , Q z ( μ ) = a n z ( μ ) = e μ μ n n ! 1 d s 1 η s n 1 t η s 1 η s n + d s 1 , Q w ( μ ) = a n w ( μ ) = 1 Q x ( μ ) Q y ( μ ) Q z ( μ ) .
According to the derivation presented in Appendix A, the estimations of P n L ( μ ) , P n U ( μ ) ( n = 0 , 1 , 2 ) are given by
P 0 L ( μ ) = P 0 U ( μ ) = Q x ( μ ) ( 1 d s ) 2 ,
P 1 L ( μ ) = q 2 z Q y ( μ ) q 2 y Q z ( μ ) q 2 z q 0 y q 0 z q 2 y P 0 L ( μ ) q 2 z q 1 y q 1 z q 2 y ,
P 1 U ( μ ) = ( q 2 y q 3 y ) Q z ( μ ) q 2 z Q y ( μ ) + q 2 z q 0 y q 2 z q 3 y q 0 z q 2 y + q 0 z q 3 y P 0 L ( μ ) + q 2 z q 3 y q 1 y q 2 y q 3 y q 2 y q 1 y q 3 y ,
P 2 L ( μ ) = Q y ( μ ) q 0 y q 3 y P 0 U ( μ ) q 1 y q 3 y P 1 U ( μ ) q 3 y q 2 y q 3 y ,
P 2 U ( μ ) = Q z ( μ ) q 0 z P 0 L ( μ ) q 1 z P 1 L ( μ ) q 2 z ,
where P n L ( U ) ( μ ) represents the lower or upper bounds on the probability of having the n-photon state given the mean photon number μ .
In the SNS−TFQKD, Alice and Bob simultaneously send photon pulses to the untrustworthy third party (UTP) Charlie. According to Ref. [36], the decoy-state method is still applicable under unknown PND conditions; the lower bound of the single-photon counting rate and the upper bound of the single-photon error rate can be estimated as
s 1 L = p 2 L v 2 S v 1 p 0 U v 1 S 0 p 2 U v 1 S v 2 p 0 L v 2 S 0 p 2 U v 2 p 1 U v 1 p 2 L v 1 p 1 L v 2 ,
e 1 p h , U = S v 1 E v 1 p 0 L v 1 S 0 / 2 p 1 L v 1 s 1 L .
Here, we set v 0 = 0 , v 2 > v 1 > 0 , and S v k , E v k are the counting rate and the bit error rate of a state with intensity v k sent in decoy windows, respectively. In addition, the relationships between P n L ( U ) ( μ ) and p n L ( U ) ( μ ) are set by [30]
p 0 L ( U ) ( μ ) : = P 0 L ( U ) ( μ ) 2 , p 1 L ( U ) ( μ ) : = 2 P 0 L ( U ) ( μ ) P 1 L ( U ) ( μ ) , p 2 L ( U ) ( μ ) : = 2 P 0 L ( U ) ( μ ) P 2 L ( U ) ( μ ) + P 1 L ( U ) ( μ ) 2 .
Finally, the secure key rate is
R = 2 ε ( 1 ε ) P 1 L u s 1 L 1 H e 1 p h , U S Z f H E Z ,
where ε represents the probability that Alice (Bob) chooses to send out a signal pulse (it can be preset in the protocol); H ( x ) = x log 2 x ( 1 x ) log 2 ( 1 x ) is the binary Shannon entropy function; P 1 L u is the lower bound of the probability of single photons in the signal state; S Z and E Z refer to the gain and the average quantum bit error of pulses with intensity u sent in signal windows.

3. Numerical Simulations and Analysis

In the following, we perform numerical simulations for the original SNS−TFQKD [18], the SNS−TFQKD with ALSM [30] and the SNS−TFQKD with PLSM. In simulations, the gain and the quantum bit error of decoy states in X basis in Equations (9) and (10) are expressed as
S v k = S v k C + S v k E , S v k E v k = E o p t S v k C + 1 E o p t S v k E , S v k C = 1 Δ 1 P d c Δ / 2 Δ / 2 e v k η ( 1 cos δ ) d δ 1 P d c 2 e 2 v k η , S v k E = 1 Δ 1 P d c Δ / 2 Δ / 2 e v k η ( 1 + cos δ ) d δ 1 P d c 2 e 2 v k η ,
where S v k C ( S v k E ) is the counting rate of twin-field states entering into the correct (wrong) detector; η = η D 10 α s 20 denotes the total channel transmittance, where α and s are the loss coefficient and the length of channels, respectively; η D and P d c each refer to the efficiency and the dark count rate of detectors at Charlie’s side, respectively. δ = δ B δ A is the phase difference between the twin-field states prepared by Alice and Bob; Δ = 2 π / M is the size of the phase slice and M is the number of phase slices; E o p t represents the optical misalignment error, S 0 is the counting rate of the vacuum state, and S 0 = 2 P d c 1 P d c . The average quantum bit error and the counting rate for the signal states can be respectively expressed as:
S Z E Z = 2 P d c 1 P d c ( 1 ε ) 2 + 2 ε 2 1 P d c e u η I 0 u η 1 P d c e u η , S Z = 4 ε ( 1 ε ) 1 P d c e u η 2 1 1 P d c e u η 2 + S Z E Z .
Here, I 0 ( x ) is the 0-order hyperbolic Bessel function of the first kind [31].
In the following, we do comparisons among three schemes, the original SNS−TFQKD, the ALSM SNS−TFQKD, and the present PLSM SNS−TFQKD, by using either ideal light sources without intensity fluctuations or practical light sources with intensity fluctuations. In addition, we also analyze the effect of modulation error on the ALSM scheme. The basic device parameters are shown in Table 1 [30].
In ALSM, the attenuation coefficients are set as η 0 = 1 , η 1 = 0.95 , η 2 = 0.9 . For a fair comparison, in our scheme, the detection efficiency in PLSM module is set as η s = 0.9 . In addition, the dark count rate of local detectors d s in ALSM and PLSM is set with the same value denoted as P d c as listed in row a of Table 1. In addition, we adopt the local search algorithm (LSA) [9] to optimize the parameters ϵ , t , v 0 , v 1 , v 2 , u . The numerical simulation results are presented in Figure 2, Figure 3 and Figure 4.
The performance of different monitoring methods with ideal sources without intensity fluctuations are presented in Figure 2. Simulation results show that the performance of our proposed PLSM SNS−TFQKD is comparable to both the original SNS−TFQKD and the ALSM SNS−TFQKD. It is also clear that the maximum transmission distance of all schemes exceeds 800 km. In addition, if actively odd-parity pairing (AOPP) [33] of post data processing is adopted, it can further improve the distance and key rate of SNS−TFQKD significantly.
However, in realistic implementations, the fluctuation of light sources is a common phenomenon in QKD systems [37,38]; therefore, it should be taken into account. In general, the signal from light sources can be considered as a coherent state, whose intensity usually possesses a Gaussian distribution:
G ( μ ) = 1 2 π σ μ exp μ μ 0 2 2 σ μ 2 ,
where μ 0 and σ μ represent the mean value and standard deviation, respectively. Define the fluctuation coefficient as σ : = σ μ / μ 0 , and Q l μ can be rewritten as
Q l μ 0 = Q l μ G ( μ ) d μ .
After calculating and simplifying, the counting rate of four events can be reformulated as
Q x ( μ 0 ) = ( 1 d s ) 2 exp 1 2 η s 2 μ 0 + η s σ μ 2 , Q y ( μ 0 ) = ( 1 d s ) exp μ 0 2 2 σ μ 2 ( 1 d s ) exp μ 0 η s σ μ 2 2 2 σ μ 2 exp μ 0 ( 1 t ) η s σ μ 2 2 2 σ μ 2 , Q z ( μ 0 ) = ( 1 d s ) exp μ 0 2 2 σ μ 2 ( 1 d s ) exp μ 0 η s σ μ 2 2 2 σ μ 2 exp μ 0 t η s σ μ 2 2 2 σ μ 2 , Q w ( μ 0 ) = 1 Q x ( μ 0 ) Q y ( μ 0 ) Q z ( μ 0 ) .
On the other hand, S v k C and S v k E will change if light fluctuations are considered, which can be expressed as [36]
S ^ v k C = S v k C G ( v k ) d v k = 1 Δ 1 P d c Δ / 2 Δ / 2 e v k η ( 1 cos δ ) d δ 1 P d c 2 e 2 v k η G ( v k ) d v k , S ^ v k E = S v k E G ( v k ) d v k = 1 Δ 1 P d c Δ / 2 Δ / 2 e v k η ( 1 + cos δ ) d δ 1 P d c 2 e 2 v k η G ( v k ) d v k .
Then, the counting rate and the quantum bit error of decoy states in X basis can be respectively re-expressed as
S ^ v k = S ^ v k C + S ^ v k E , S ^ v k E ^ v k = E o p t S ^ v k C + 1 E o p t S ^ v k E .
Then, s 1 L and e 1 p h , U can be rewritten as [7]
s 1 L = p 2 L v 2 S ^ v 1 p 0 U v 1 S 0 p 2 U v 1 S ^ v 2 p 0 L v 2 S 0 p 2 U v 2 p 1 U v 1 p 2 L v 1 p 1 L v 2 ,
e 1 p h , U = S ^ v 1 E ^ v 1 p 0 L v 1 S 0 / 2 p 1 L v 1 s 1 L .
In the following, we compare the performance of SNS−TFQKD with various schemes under different fluctuation coefficients σ .
In order to simulate the realistic condition, we use a set of practical system parameters in row b of Table 1 [16]. In the realistic condition, the coefficient of light intensity fluctuation σ is usually greater than 1 % [39]; therefore, we set coefficient of intensity fluctuations as σ = 1 % and σ = 2 % .
As we can see from Figure 3a,b, when intensity fluctuations are taken into account, both ALSM and our present PLSM can show much better performance compared with the original SNS TF-QKD protocol. For example, when σ = 1 % or 2 % , both ALSM and our present PLSM only slightly decrease its key rate and transmission distance, while the original SNS TF-QKD protocol rapidly drops its key rate and transmission distance.
In practice, when switching between different coefficients, it may bring into modulation errors in the ALSM scheme. We define the attenuation coefficients modulation error as Ω , then η U = η ( 1 + Ω ) , η L = η ( 1 Ω ) , where η U and η L are the upper bound and lower bound of attenuation coefficients. Based on [30], P n L ( U ) ( μ ) in ALSM has been reestimated in Appendix B. The simulation results are shown in Figure 4, and it is obvious that our scheme can show much better performance than the ALSM scheme when the modulation error is accounted. For example, when we reasonably set Ω = 0.02 % , the maximum transmission distance drops from 540 km to 435 km for the ALSM scheme, while it still remains constant for our PLSM scheme. Obviously, the ALSM scheme is very susceptible to intensity modulation errors.

4. Conclusions

In this paper, we propose a PLSM scheme for TF-QKD, which is accomplished by implementing a passive monitoring module consisting of a beam splitter and two detectors at the source side. Through the PLSM module, we can obtain four kinds of monitoring events with two local detectors and can then precisely estimate the bounds of source distributions. We build a theoretical model and carry out corresponding numerical simulations. Simulation results show that our present work can outperform the original SNS−TFQKD protocol when there are existing intensity fluctuations in the light sources. Moreover, it shows much better performance than the reported ALSM scheme when modulation errors are taken into account. Therefore, our present work can not only reduce assumptions on the source distribution in former TF-QKD protocols, but also close the additional loopholes existing in the former active monitoring scheme, and thus seems very promising in practical implementations of QKD in the near future.

Author Contributions

Conceptualization, C.Z., H.Y., X.Z., J.L. and Q.W.; Writing—original draft, X.Q.; Writing—review & editing, X.Q. All authors have read and agreed to the published version of the manuscript.

Funding

We gratefully acknowledge the financial support from the National Key R&D Program of China (2018YFA0306400, 2017YFA0304100), the National Natural Science Foundation of China (12074194, U19A2075, 12104240, 62101285), the Leading-edge technology Program of Jiangsu Natural Science Foundation (BK20192001), the Natural Science Foundation of Jiangsu Province (BK20210582), NUPTSF (NY220122, NY220123), and the Postgraduate Research & Practice Innovation Program of Jiangsu Province (SJCX21_0260).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors are grateful to the anonymous reviewers for their constructive suggestions and comments.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Upper Bound and Lower Bound of Pn (μ) in PLSM

In this appendix, in order to obtain P n L ( U ) ( μ ) , we use the gain of four events by measuring the idler mode:
Q x ( μ ) = P n ( μ ) q n x ,
Q y ( μ ) = P n ( μ ) q n y ,
Q z ( μ ) = P n ( μ ) q n z ,
Q w ( μ ) = 1 Q x ( μ ) Q y ( μ ) Q z ( μ ) .
With Equation (A1), we have
Q x ( μ ) = P n ( μ ) 1 d s 2 1 η s n .
When setting η s = 1 , we can obtain
P 0 L ( μ ) = P 0 U ( μ ) = Q x ( μ ) ( 1 d s ) 2 .
Combining Equations (A2) and (A3) to eliminate the parameter P 2 ( μ ) :
q 2 z Q y ( μ ) q 2 y Q z ( μ ) = P 0 ( μ ) q 0 y q 2 z q 2 y q 0 z + P 1 ( μ ) q 1 y q 2 z q 2 y q 1 z + i = 3 P i ( μ ) q 2 z q i y q i z q 2 y P 0 ( μ ) q 0 y q 2 z q 2 y q 0 z + P 1 ( μ ) q 1 y q 2 z q 2 y q 1 z ,
then P 1 L ( μ ) is obtained as
P 1 L ( μ ) = q 2 z Q y ( μ ) q 2 y Q z ( μ ) q 2 z q 0 y q 0 z q 2 y P 0 L ( μ ) q 2 z q 1 y q 1 z q 2 y .
According to Equations (A1) and (A2), we scale appropriately and change the equation to an inequality as
P n ( μ ) q n y P 0 ( μ ) q 0 y + P 1 ( μ ) q 1 y + P 2 ( μ ) q 2 y ,
P n ( μ ) q n z P 0 ( μ ) q 0 z + P 1 ( μ ) q 1 z + P 2 ( μ ) P 2 z ,
P n ( μ ) q n y P 0 ( μ ) q 0 y + P 1 ( μ ) q 1 y + P 2 ( μ ) q 2 y + q 3 y 1 P 0 ( μ ) P 1 ( μ ) P 2 ( μ ) ,
P n ( μ ) q n z P 0 ( μ ) q 0 z + P 1 ( μ ) q 1 z + P 2 ( μ ) q 2 z + q 3 z 1 P 0 ( μ ) P 1 ( μ ) P 2 ( μ ) .
Using Equations (A9) and (A12) to eliminate the parameter P 2 ( μ ) , we obtain the upper bound of P 1 ( μ )
P 1 U ( μ ) = ( q 2 y q 3 y ) Q z ( μ ) q 2 z Q y ( μ ) + q 2 z q 0 y q 2 z q 3 y q 0 z q 2 y + q 0 z q 3 y P 0 L ( μ ) + q 2 z q 3 y q 1 y q 2 y q 3 y q 2 y q 1 y q 3 y .
The lower bound of P 2 ( μ ) can be obtained by using P 0 U ( μ ) and P 1 U ( μ ) in Equation (A11), and the upper bound P 2 ( μ ) can be obtained by using P 0 L ( μ ) and P 1 L ( μ ) in Equation (A9):
P 2 L ( μ ) = Q y ( μ ) q 0 y q 3 y P 0 U ( μ ) q 1 y q 3 y P 1 U ( μ ) q 3 y q 2 y q 3 y ,
P 2 U ( μ ) = Q z ( μ ) q 0 z P 0 L ( μ ) q 1 z P 1 L ( μ ) q 2 z .

Appendix B. Upper Bound and Lower Bound of Pn (μ) in ALSM

According to Ref. [29], we set Q μ η k as the probabilities of the single photon detector not responding with η k for source μ , which can be described as
Q μ η 0 = 1 Y 0 n = 0 1 η 0 n P n ( μ ) ,
Q μ η 1 = 1 Y 0 n = 0 1 η 1 n P n ( μ ) ,
Q μ η 2 = 1 Y 0 n = 0 1 η 2 n P n ( μ ) ,
and then we set η k U = max { η k ( 1 + Ω ) , 1 } , η k L = η k ( 1 Ω ) ( k = 0 , 1 , 2 ) . When considering the modulation errors, P n L ( U ) ( μ ) ( n = 0 , 1 , 2 ) can be reestimated as
P 0 L ( μ ) = Q μ η 0 U 1 Y 0 , P 0 U ( μ ) = Q μ η 0 L 1 Y 0 ,
P 1 L ( μ ) = 1 η 2 L 2 Q μ η 1 L 1 η 1 L 2 Q μ η 2 L 1 Y 0 1 η 1 L 1 η 2 L η 1 L η 2 L 1 1 η 1 L + 1 1 η 2 L P 0 U ( μ ) ,
P 1 U ( μ ) = 1 η 2 U 1 η 1 L 1 η 2 U 1 η 1 L 2 η 2 U Q μ η 1 L 1 η 1 L 2 1 Y 0 + 1 1 η 2 U 3 η 2 U 1 η 2 U 2 P 0 U ( μ ) + 1 η 2 U η 2 U Q μ η 2 U η 2 U 1 η 2 U 2 1 Y 0 P 0 U ( μ ) 1 η 1 L 2 ,
P 2 L ( μ ) = Q μ η 2 L 1 Y 0 1 η 2 L 2 η 2 L 1 η 2 L η 2 L 1 1 η 2 L 3 1 η 2 L 2 η 2 L P 0 U ( μ ) 2 η 2 L 1 η 2 L P 1 U ( μ ) ,
P 2 U ( μ ) = Q μ η 2 L 1 Y 0 1 η 2 L 2 P 0 L ( μ ) 1 η 2 L 2 P 1 L ( μ ) 1 η 2 L .
Then these reestimated PNDs are used in ALSM SNS−TFQKD to calculate the final secure rate.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  2. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Mayers, D. Unconditional security in quantum cryptography. JACM 2001, 48, 351–406. [Google Scholar] [CrossRef]
  5. Lo, H.-K.; Chau, H.-F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 1999, 283, 2050. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptol. 1992, 5, 3. [Google Scholar] [CrossRef]
  7. Wang, X.-B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 2005, 94, 230503. [Google Scholar] [CrossRef] [Green Version]
  8. Lo, H.-K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [Green Version]
  9. Xu, F.; Xu, H.; Lo, H.-K. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052333. [Google Scholar] [CrossRef] [Green Version]
  10. Curty, M.; Xu, F.; Cui, W.; Lim, C.C.W.; Tamaki, K.; Lo, H.-K. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 2014, 5, 3732. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  11. Yu, Z.-W.; Zhou, Y.-H.; Wang, X.-B. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Phys. Rev. A 2015, 91, 032318. [Google Scholar] [CrossRef] [Green Version]
  12. Zhou, Y.-H.; Yu, Z.-W.; Wang, X.-B. Making the decoy-state measurement-device independent quantum key distribution practically useful. Phys. Rev. A 2016, 93, 042324. [Google Scholar] [CrossRef] [Green Version]
  13. Jiang, C.; Yu, Z.-W.; Hu, X.-L.; Wang, X.-B. Higher key rate of measurement-device-independent quantum key distribution through joint data processing. Phys. Rev. A 2021, 103, 012402. [Google Scholar] [CrossRef]
  14. Tamaki, K.; Lo, H.-K.; Wang, W.-Y.; Lucamarini, M. Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound. arXiv 2018, arXiv:1805.05511. [Google Scholar]
  15. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 15043. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Lucamarini, M.; Yuan, Z.-L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400. [Google Scholar] [CrossRef] [PubMed]
  17. Ma, X.; Zeng, P.; Zhou, H. Phase-matching quantum key distribution. Phys. Rev. X 2018, 8, 031043. [Google Scholar] [CrossRef] [Green Version]
  18. Wang, X.-B.; Yu, Z.-W.; Hu, X.-L.T. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef] [Green Version]
  19. Cui, C.; Yin, Z.Q.; Wang, R.; Chen, W.; Wang, S.; Guo, G.-C.; Han, Z.-F. Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl. 2019, 11, 034053. [Google Scholar] [CrossRef] [Green Version]
  20. Curty, M.; Azuma, K.; Lo, H.-K. Simple security proof of twin-field type quantum key distribution protocol. Npj Quantum Inf. 2019, 5, 64. [Google Scholar] [CrossRef]
  21. Lin, J.; Lütkenhaus, N. Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 2018, 98, 042332. [Google Scholar] [CrossRef] [Green Version]
  22. Maeda, K.; Sasaki, T.; Koashi, M. Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit. Nat. Commun. 2019, 10, 3140. [Google Scholar] [CrossRef] [Green Version]
  23. Minder, M.; Pittaluga, M.; Roberts, G.L.; Lucamarini, M.; Dynes, J.F.; Yuan, Z.L.; Shields, A.J. Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 2019, 13, 334. [Google Scholar] [CrossRef]
  24. Liu, Y.; Yu, Z.-W.; Zhang, W.; Guan, J.Y.; Chen, J.-P.; Zhang, C.; Hu, X.-L.; Li, H.; Chen, T.-Y.; You, L.; et al. Experimental twin-field quantum key distribution through sending or not sending. Phys. Rev. Lett. 2019, 123, 100505. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Wang, S.; He, D.-Y.; Yin, Z.-Q.; Lu, F.-Y.; Cui, C.-H.; Chen, W.; Zhou, Z.; Guo, G.-C.; Han, Z.-F. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system. Phys. Rev. X 2019, 9, 021046. [Google Scholar] [CrossRef] [Green Version]
  26. Zhong, X.; Hu, J.; Curty, M.; Qian, L.; Lo, H.-K. Proof-of-principle experimental demonstration of twin-field type quantum key distribution. Phys. Rev. Lett. 2019, 123, 100506. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Fang, X.-T.; Zeng, P.; Liu, H. Implementation of quantum key distribution surpassing the linear rate-transmittance bound. Nat. Photonics 2020, 14, 422. [Google Scholar] [CrossRef]
  28. Chen, J.-P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.; Hu, X.L.; Guan, J.-Y.; Yu, Z.-W.; Xu, H.; Lin, J.; et al. Sending-or-not-sending with independent lasers: Secure twin-field quantum key distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef] [Green Version]
  29. Qiao, Y.; Wang, G.; Li, Z.; Xu, B.; Guo, H. Monitoring an untrusted light source with single-photon detectors in measurement-device-independent quantum key distribution. Phys. Rev. A 2019, 99, 052302. [Google Scholar] [CrossRef]
  30. Qiao, Y.; Wang, G.; Li, Z.; Xu, B.; Guo, H. Sending-or-not-sending twin-field quantum key distribution with light source monitoring. Entropy 2019, 22, 36. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  31. Jiang, C.; Yu, Z.-W.; Hu, X.L.; Wang, X.-B. Unconditional security of sending or not sending twin-field quantum key distribution with finite pulses. Phys. Rev. Appl. 2019, 12, 024061. [Google Scholar] [CrossRef] [Green Version]
  32. Zhang, C.H.; Zhang, C.M.; Wang, Q. Twin-field quantum key distribution with modified coherent states. Opt. Lett. 2019, 44, 1468–1471. [Google Scholar] [CrossRef]
  33. Xu, H.; Yu, Z.-W.; Jiang, C.; Hu, X.L.; Wang, X.-B. Sending-or-not-sending twin-field quantum key distribution: Breaking the directtransmission key rate. Phys. Rev. A 2020, 101, 042330. [Google Scholar] [CrossRef]
  34. Wang, Q.; Zhang, C.-H.; Wang, X.-B. Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rev. A 2016, 93, 032312. [Google Scholar] [CrossRef]
  35. Zhang, C.-H.; Wang, D.; Zhou, X.-Y.; Wang, S.; Zhang, L.-B.; Yin, Z.-Q.; Chen, W.; Han, Z.-F.; Guo, G.-C.; Wang, Q. Proof-of-principle demonstration of parametric down-conversion source based quantum key distribution over 40 dB channel loss. Opt. Express 2018, 26, 25921. [Google Scholar] [CrossRef] [PubMed]
  36. Wang, X.-B.; Peng, C.-Z.; Zhang, J.; Yang, L.; Pan, J.-W. General theory of decoy-state quantum cryptography with source errors. Phys. Rev. A 2008, 77, 042311. [Google Scholar] [CrossRef] [Green Version]
  37. Zhao, Y.; Qi, B.; Lo, H.-K.; Qian, L. Security Analysis of an untrusted source for quantum key distribution: Passive approach. New J. Phys. 2010, 12, 023024. [Google Scholar] [CrossRef]
  38. Wang, X.-B. Decoy-state quantum key distribution with large random errors of light intensity. Phys. Rev. A 2007, 75, 052301. [Google Scholar] [CrossRef] [Green Version]
  39. Xu, F.; Zhang, Y.; Zhou, Z.; Chen, W.; Han, Z.; Guo, G. Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system. Phys. Rev. A 2009, 80, 062309. [Google Scholar] [CrossRef]
Figure 1. Schematic of the SNS−TFQKD system with PLSM. The PLSM module consists of a beam splitter (BS) and two local single-photon detectors.
Figure 1. Schematic of the SNS−TFQKD system with PLSM. The PLSM module consists of a beam splitter (BS) and two local single-photon detectors.
Entropy 24 00592 g001
Figure 2. The secure key rate of different monitoring method using a set of parameters in row a of Table 1. The blue solid curve represents the original SNS−TFQKD; the red dash curve denotes our present PLSM SNS−TFQKD; and the green dash curve is the ALSM SNS−TFQKD. In addition, the variation trend of the key rate ranging between 780 km and 785 km is illustrated in the inset. It shows that our proposal can offer a key rate comparable to both the original SNS−TFQKD and the ALSM SNS−TFQKD when using photon sources without fluctuations.
Figure 2. The secure key rate of different monitoring method using a set of parameters in row a of Table 1. The blue solid curve represents the original SNS−TFQKD; the red dash curve denotes our present PLSM SNS−TFQKD; and the green dash curve is the ALSM SNS−TFQKD. In addition, the variation trend of the key rate ranging between 780 km and 785 km is illustrated in the inset. It shows that our proposal can offer a key rate comparable to both the original SNS−TFQKD and the ALSM SNS−TFQKD when using photon sources without fluctuations.
Entropy 24 00592 g002
Figure 3. The secure key rate of different schemes with intensity fluctuation σ = 1 % in (a) and σ = 2 % in (b) when intensity modulation errors are not taken into account.
Figure 3. The secure key rate of different schemes with intensity fluctuation σ = 1 % in (a) and σ = 2 % in (b) when intensity modulation errors are not taken into account.
Entropy 24 00592 g003
Figure 4. The secure key rate of different monitoring methods when different modulation errors are taken into account. Here, parameters in line b of Table 1 and the intensity fluctuation δ = 2 % are used. The blue solid curve represents the original SNS−TFQKD; the green solid curve is the ALSM SNS−TFQKD when Ω = 0 ; the red solid curve denotes the PLSM SNS−TFQKD; the orange dotted-dash curve and the black dash curve denote the ALSM SNS−TFQKD with modulation errors Ω = 0.01 % and Ω = 0.02 % , respectively.
Figure 4. The secure key rate of different monitoring methods when different modulation errors are taken into account. Here, parameters in line b of Table 1 and the intensity fluctuation δ = 2 % are used. The blue solid curve represents the original SNS−TFQKD; the green solid curve is the ALSM SNS−TFQKD when Ω = 0 ; the red solid curve denotes the PLSM SNS−TFQKD; the orange dotted-dash curve and the black dash curve denote the ALSM SNS−TFQKD with modulation errors Ω = 0.01 % and Ω = 0.02 % , respectively.
Entropy 24 00592 g004
Table 1. The basic system parameters used in our numerical simulations. α : the loss coefficient of fiber at telecommunication wavelength (dB/km); η D and P d c are the efficiency and dark count rate of detectors at Charlie’s side; E o p t : the misalignment error of the QKD system; f: the error correction efficiency; M: the number of phase slices.
Table 1. The basic system parameters used in our numerical simulations. α : the loss coefficient of fiber at telecommunication wavelength (dB/km); η D and P d c are the efficiency and dark count rate of detectors at Charlie’s side; E o p t : the misalignment error of the QKD system; f: the error correction efficiency; M: the number of phase slices.
α M η D P dc E opt f
set a0.2 dB/km16 80 % 10 11 1 % 1.1
set b0.2 dB/km16 30 % 10 9 3 % 1.15
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Qian, X.; Zhang, C.; Yuan, H.; Zhou, X.; Li, J.; Wang, Q. Passive Light Source Monitoring for Sending or Not Sending Twin-Field Quantum Key Distribution. Entropy 2022, 24, 592. https://doi.org/10.3390/e24050592

AMA Style

Qian X, Zhang C, Yuan H, Zhou X, Li J, Wang Q. Passive Light Source Monitoring for Sending or Not Sending Twin-Field Quantum Key Distribution. Entropy. 2022; 24(5):592. https://doi.org/10.3390/e24050592

Chicago/Turabian Style

Qian, Xuerui, Chunhui Zhang, Huawei Yuan, Xingyu Zhou, Jian Li, and Qin Wang. 2022. "Passive Light Source Monitoring for Sending or Not Sending Twin-Field Quantum Key Distribution" Entropy 24, no. 5: 592. https://doi.org/10.3390/e24050592

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop