Next Article in Journal
A Magic Act in Causal Reasoning: Making Markov Violations Disappear
Previous Article in Journal
Advancing Traditional Dunhuang Regional Pattern Design with Diffusion Adapter Networks and Cross-Entropy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources

1
Guangxi Key Laboratory of Cryptography and Infomation Security, Guilin University of Electronic Technology, Guilin 541004, China
2
School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(6), 547; https://doi.org/10.3390/e27060547
Submission received: 17 April 2025 / Revised: 18 May 2025 / Accepted: 18 May 2025 / Published: 22 May 2025
(This article belongs to the Section Quantum Information)

Abstract

:
The twin-field (TF) protocol is a key protocol in quantum key distribution (QKD) that enables remote key distribution, achieving a maximum secure transmission distance of over 500 km. However, the TF protocol still faces several security issues in real-world environments. To address the issue of untrusted sources, one effective solution is to introduce a light-source monitoring module into the system. Analysis shows that a solution based on untagged bits (UBs) can achieve ideal monitoring performance. This solution can capture UB signals to accurately estimate key parameters in the protocol’s security analysis, ultimately deriving a tight bound for the secure bit rate. Simulations show that this solution approximates the performance of ideal light sources in the presence of untrusted sources and effectively mitigates the impact of light-source fluctuations. It outperforms other solutions in key performance metrics, such as transmission distance.

1. Introduction

Quantum key distribution (QKD) is a secure communication protocol with strong security guarantees. In 1984, the BB84 protocol [1] emerged, marking the beginning of quantum communication. Since then, various protocols have emerged, including the BBM92 protocol [2], SARG04 protocol [3], differential phase protocol [4], and six-state protocol [5]. On the other hand, rapid theoretical advancements in QKD have been accompanied by significant experimental achievements. In 1992, Bennett and Brassard successfully built the first QKD experimental system [6] and demonstrated the key distribution process of the BB84 protocol. In 1999, Bechmann-Pasquinucci and Tittel proposed the use of high-dimensional quantum qubits [7] for QKD to enhance its information-carrying capacity, replacing traditional two-dimensional qubits. In 2002, Cerf and Bourennane analyzed the security of d-level QKD systems [8]. The feasibility of high-dimensional QKD has been gradually demonstrated by researchers with studies focusing on transmission distance [9,10] and security [11,12,13]. Although the communication distance and key length of this system are limited, it proved that QKD is feasible. This indicates that QKD research is continuously evolving and becoming more sophisticated. However, as research progresses, scholars have identified several security vulnerabilities in QKD applications. These include the photon number-splitting (PNS) attack [14], the fake state (FS) attack [15], the time-shift (TS) attack [16], and the detector-blinding (DB) attack [17].
Scholars have proposed various methods and protocols to counter the above attacks. In 2004, Gottesman, Lo, N. Lütkenhaus, and Preskill proposed an analytical method for assessing the security of the BB84 protocol with non-ideal devices, which was known as the GLLP [18] theory. This theory effectively extends the security of the BB84 protocol to practical applications, analyzing the real-world security of QKD. Subsequent theoretical advancements, such as the decoy state method [19] and optimized parameter estimation techniques, have been developed to improve the performance of practical systems [20,21,22], enhancing both security and efficiency. To address side-channel attack threats faced by detectors, scholars have proposed the measurement-device-independent (MDI) protocol [23].
To improve the performance of practical QKD systems, Lucamarini et al. proposed the twin-field (TF) protocol [24] in 2018. Due to its significant advantages in transmission, it has sparked widespread research. Many subsequent enhanced protocols, referred to as TF-type protocols, further improved both the security and performance of the system. Among the TF-type protocols, sending-or-not-sending (SNS) protocol [25] is more widely used. The SNS protocol achieves long-distance secure transmission by configuring a series of sending or not sending signals. Recently, researchers have analyzed the security of the SNS protocol under different situations [26,27,28,29,30]. Researchers also have proposed various methods to enhance the performance of the SNS protocol. For example, by using the independent lasers [31], introducing the actively odd parity pairing (AOPP) method [32,33,34] and applying the phase postselection [35], the transmission range of the SNS protocol can be significantly extended. Nonetheless, practical implementation challenges persist. Researchers have addressed the practical security issues of the SNS protocol, particularly those related to the light source [36,37,38,39,40,41,42,43,44]. In our preliminary work, we investigated light source monitoring. Although this work is theoretically significant, it is not practical for real-world system implementation. In this paper, we propose a practical solution, untagged bits (UBs) [45], to effectively address the light source security challenges in SNS protocol.
This paper is organized as follows. In Section 2, we describe the steps of the SNS protocol, analyze its security, and estimate key parameters. In Section 3, we present numerical simulations and analyze the results. Finally, Section 4 concludes the paper.

2. SNS Protocol with UB

2.1. Introduction of SNS Protocol

Although the structure of the SNS protocol is similar to that of the TF protocol, it optimizes the signal preparation and post-processing steps. The steps of the SNS protocol are as follows [25]:
  • At each time window i, Alice (Bob) determines whether it is a signal or decoy window. If it is a decoy window, Alice (Bob) prepares a coherent state μ d e i δ + i γ and sends it to Charlie. If it is a signal window, Alice (Bob) prepares a coherent state μ s e i δ + i γ with probability ϵ and sends it to Charlie. μ d and μ s represent the photon intensity of the decoy state and the signal state, δ { δ A , δ B } represents the random phase, and γ { γ A , γ B } represents the phase offset of the channel.
  • Charlie receives the states sent by Alice and Bob and publishes all the measurement results for the effective events. Effective events are defined as follows: (1) When Alice and Bob simultaneously decide on the signal window, Alice (Bob) decides to send the signal, while Bob (Alice) decides not to send it, corresponding to Charlie announcing only detector D 0 ( 1 ) clicks. (2) When Alice and Bob simultaneously decide on the decoy window, they prepare coherent states with the same intensity, and in this window, the random phases δ A and δ B satisfy [25]
    1 | cos ( δ A δ B ) | | λ | ,
    corresponding to Charlie announcing only detector D 1 ( 0 ) clicks. The value of λ is determined by the size of the phase slice chosen by Alice and Bob, as described in Ref. [24].
  • After Charlie publishes all the measurement results, Alice and Bob announce all the windows and the details of the decoy windows to classify the data accordingly and determine the parameters of the security key formula.
  • The secret key rate of the SNS protocol has been given as [25,26]
    R = 2 ϵ ( 1 ϵ ) P 1 L ( μ s ) s 1 L [ 1 H ( e 1 U ) ] f S Z H ( E Z ) .
ϵ represents the probability that Alice (Bob) sends the signal state to Charlie during the signal window. P 1 L ( μ s ) refers to the lower bound of the probability of sending a signal that contains a single photon. We define Z-data [26] as events in which Alice and Bob simultaneously select the signal window. Z 1 -data refers to effective events where one party chooses to send the signal while the other does not. s 1 L and e 1 U represent the lower bound of the count rate and the upper bound of the phase error rate of single-photon events in the Z 1 -data. S Z and E Z represent the count rate and bit error rate of the signal, f is the error correction efficiency, and H ( x ) = x l o g 2 x ( 1 x ) l o g 2 ( 1 x ) refers to the binary Shannon entropy function.
Under asymptotic conditions, Equation (2) remains valid and can accurately estimate the parameters s 1 L and e 1 U [25].
s 1 s 1 L = p 2 L μ 2 S μ 1 p 0 U μ 1 S μ 0 p 2 U μ 1 S μ 2 p 0 L μ 2 S μ 0 p 2 U μ 2 p 1 U μ 1 p 2 L μ 1 p 1 L ( μ 2 ) ,
e 1 e 1 U = S μ 1 E μ 1 p 0 L ( μ 1 ) S μ 0 E μ 0 p 1 L ( μ 1 ) s 1 L .
μ 0 = 0 < μ 1 < μ 2 represents the three intensities of the decoy windows. p 0 L ( U ) ( μ i ) , p 1 L ( U ) ( μ i ) , and   p 2 L ( U ) ( μ i ) ( i = ( 0 , 1 , 2 ) ) can be directly calculated as
p 0 L ( U ) ( μ i ) = P 0 , A L ( U ) ( μ i ) P 0 , A L ( U ) ( μ i ) ,
p 1 L ( U ) ( μ i ) = P 0 , A L ( U ) ( μ i ) P 1 , B L ( U ) ( μ i ) + P 1 , A L ( U ) ( μ i ) P 0 , B L ( U ) ( μ i ) ,
p 2 L ( U ) ( μ i ) = P 0 , A L ( U ) ( μ i ) P 2 , B L ( U ) ( μ i ) + P 2 , A L ( U ) ( μ i ) P 0 , B L ( U ) ( μ i ) + P 1 , A L ( U ) ( μ i ) P 1 , B L ( U ) ( μ i ) .

2.2. Security Analysis

In the SNS protocol, Z-data are generated from effective events when Alice (Bob) sends a signal state while Bob (Alice) does not. Therefore, the security of the SNS protocol is equivalent to that of the BB84 protocol with a decoy-state scheme. Equation (2) holds under asymptotic conditions. However, the key challenge lies in accurately estimating s 1 L , e 1 U . For X-data, when both communicating parties select decoy states of the same intensity, the output two-mode quantum state is given by | φ = | μ e i δ A     | μ e i δ B , where μ represents the average photon number of the decoy state. Although the random phases δ A and δ B in X-data satisfy Equation (1), indicating that δ A δ B is not random, the value of δ A + δ B remains random. We define a new variable δ ± = δ A ± δ B . Under this new variable, the output quantum state becomes [25]
| φ = | μ e i δ + + δ 2     | μ e δ + δ 2 .
In Eve’s view, the dual light field state can be regarded as a mixed state represented by φ due to the random selection of δ + over the interval [ 0 , 2 π ) . Therefore, the SNS protocol confirms that after transmission through the channel, the dual light field state can be expressed as shown in Equation (9).
ρ A B = k p k | ψ k ψ k | .
In Equation (9), ψ k denotes the component of the joint state of the two optical fields containing a total of k photons, while p k represents the probability of this joint state occurring. This indicates that the decoy-state method can be applied to estimate the count rate and bit error rate of the single-photon component based on the X-data. Specifically, this applies to partial signals corresponding to zero-, single-, and two-photon components, where k = 0, 1, or 2 can be expressed as the following equations.
| ψ 0 = | 0 A | 0 B , p 0 = e 2 μ ,
| ψ 1 = 1 2 ( | 0 A | 1 B + e i Δ | 1 A | 0 B ) , p 1 = 2 μ e 2 μ ,
| ψ 2 = 1 2 ( | 0 A | 2 B + 2 e i Δ | 1 A | 1 B + e i 2 Δ | 2 A | 0 B ) , p 2 = 2 μ 2 e 2 μ ,
Δ = δ A + γ A δ B γ B .
Under untrusted source conditions, as opposed to ideal light source conditions, each communicating party emits arbitrary quantum states as
ψ A ( B ) = n = 0 e i n ( δ A ( B ) + γ A ( B ) ) P n , A ( B ) μ n A ( B ) .
Referring to the SNS protocol [25], a new variable δ ± = δ A ± δ B is defined, which leads to Eve’s observation that the joint state sent by the two communicating parties can be expressed as
ρ A B = 0 2 π P | ψ A | ψ B d δ + ,
P x = x x refers to the density operator. Calculating and normalizing Equation (15) yields the result.
ρ A B = n p n ( μ ) | ψ n ψ n | ,
ψ n = 1 P n μ k = 0 n P k , A μ P n k , B μ k A n k B ,
p n ( μ ) = k = 0 n P k , A ( μ ) P n k , B ( μ ) .
Further analysis shows that when the light source conditions of both communicating parties are consistent,
P k , A ( μ ) = P k , B ( μ ) = P k ( μ ) ,
the single-photon component of ρ A B can be expressed as
ψ 1 = 1 2 0 A 1 B + e i Δ 1 A 0 B .
This means that the same results can be obtained as with ideal light sources even under untrusted light source conditions. Therefore, the security analysis method of the original SNS protocol remains valid. Under untrusted source conditions, the security of the protocol can still be guaranteed.

2.3. Parameters Estimation with UB

In the original SNS protocol, Alice (Bob) sends a coherent signal [25], where the average number of photons follows a Poisson distribution
P n , A ( μ ) = P n , B ( μ ) = P n ( μ ) = e μ μ n n ! ,
we can then calculate Equations (5)–(7) using Equation (21). However, under untrusted light conditions, the photon distribution no longer follows a Poisson distribution. Therefore, light source monitoring is required to estimate p 0 L ( U ) ( μ i ) , p 1 L ( U ) ( μ i ) and p 2 L ( U ) ( μ i ) .
The light structure of the SNS protocol is similar to that of the MDI protocol with both protocols sharing similarities in phase and intensity modulation. The details of the SNS protocol, which is based on the UB monitoring scheme, are shown in Figure 1. The communicating parties estimate the probabilities of zero-, one-, and two-photon signals P k , A ( μ ) , P k , B ( μ ) ( k = 0 , 1 , 2 ) . Specifically, the monitoring parameter can be obtained through the UB light monitoring structure, which is the UB signal ratio, and it is denoted as Δ . Δ is expressed by the following inequality:
1 Δ N = N min N max P N 1 .
The UB signal is defined as photons n a and n b , which are prepared by the communicating parties and located in the signal intervals N min A , N max A and N min B , N max B , respectively. 1 Δ represents the probability that both communicating parties send UB signals. By applying Equation (22), the probabilities of zero-, single-, and two-photon signals in the secure bit rate formula can be further estimated using the following key parameters
P i α = N = 0 P ( N ) P N α ( i ) , ( i { 0 , 1 , 2 } ) .
P N α m is the probability that the final signal after transmission contains m photons when the original signal has N photons with intensity α .
P N α m = C N m η α m 1 η α N m .
As a result, with the analysis shown in Appendix A, we can obtain the upper and lower bounds of P i α .
P 0 α 1 Δ 1 η α N max ,
P 0 α Δ + 1 Δ 1 η α N min + Δ 1 η α N max + 1 ,
P 1 α N = N min N max P N N min η α 1 η α N min 1 1 Δ N min η α 1 η α N min 1 ,
P 1 α Δ N min 1 η α 1 η α N min 2 + 1 Δ N max η α 1 η α N max 1 + Δ N ˜ η α 1 η α N ˜ 1 ,
P 2 α 1 Δ N min N min 1 2 η α 2 1 η α N min 2 ,
F 2 α Δ C N min 1 2 η α 2 1 η α N min 3 + 1 Δ C N max 2 η α 2 1 η α N max 2 + Δ C N ¯ 2 η α 2 1 η α N ¯ 2 .
The previous analysis precisely determines the upper and lower bounds of P i α . Furthermore, by substituting the results into Equations (3) and (4), the key parameters—the single photon response rate and bit error rate—can be estimated for the protocol’s security analysis. Finally, the secure bit rate R is calculated using the formula in Equation (2).

3. Performance with Numerical Simulation

The key parameter in the secure bit rate formula for the UB light monitoring scheme is the UB signal proportion 1 Δ , which is determined by the actual light source signal characteristics and the UB signal interval N min , N max . Δ can be expressed as the following equation [45]
Δ = G ( μ ) = 1 1 2 erf N max μ 2 μ erf N min μ 2 μ ,
when the light source is considered ideal, u = N ¯ and the Δ can be directly calculated.
However, in practical analysis, the laser device is affected by the working environment, and fluctuations in light intensity are commonly observed. To simulate the experimental environment, we introduce the light intensity fluctuation parameter σ 0 and set Δ as
Δ = 1 N m i n N m a x [ 1 G ( μ ) ] P ( μ ) d μ ,
P ( μ ) = 1 2 π σ exp ( μ μ 0 ) 2 2 σ 2 ,
σ = σ 0 × N ¯ , μ 0 = N ¯ .
Other calculation parameters are similar to those in the original SNS [25,26] protocol. To accurately estimate the performance of the UB light monitoring scheme, it is necessary to select an appropriate light source signal range based on experimental conditions to determine the UB signal proportion, which is followed by the calculation of the ideal secure bit rate. To simulate the experimental environment, we select the average photon number N ¯ = 1 × 10 7 , the light intensity fluctuation parameter σ 0 = 1 % and the interval parameter δ = 0.043 . Additionally, the traversal interval is set to [ N m i n , N m a x ] = [ ( 1 δ ) N , ( 1 + δ ) N ] followed by performance simulation under these conditions.
Based on the parameter estimation results from the previous section, simulations of the SNS protocol using the UB monitoring scheme can be performed under untrusted source conditions. First, we perform a performance simulation of the SNS protocol using ideal experimental parameters, which are set to be the same as in Reference [25] and listed in Table 1. The simulation results are shown in Figure 2. They demonstrate that the protocol can achieve performance close to that of an ideal light source environment, even under untrusted source conditions, when the UB light source monitoring is introduced. Under the set monitoring conditions, the maximum secure transmission distance can reach 817.5 km, which is over 95% of the ideal light source environment.
Furthermore, we can analyze the performance of this monitoring scheme under untrusted source conditions and actual simulation parameters. The simulation results are shown in Figure 3. To simulate a real-world QKD system, we also consider factors such as a high dark count rate and low detection efficiency. Additionally, factors such as fiber attenuation, inherent system errors, and non-ideal data coordination efficiency are also considered in a non-ideal environment. Finally, the experimental parameters are chosen based on Table 2. The simulation result shows that under untrusted source conditions, the maximum secure transmission of the SNS protocol based on the UB monitoring scheme can reach 490 km, which is over 92% of the ideal light source environment. According to this result, although combining the UB monitoring scheme requires sacrificing some signals outside the UB interval, the performance can still be maintained within an acceptable range under certain experimental conditions.

4. Conclusions

Under untrusted source conditions, the primary factors to consider are the security of the dual light-field protocol as well as sufficient secure bit rate and transmission. In this paper, we introduce UB light monitoring into the SNS protocol. The introduction of UB light-source monitoring in the SNS protocol provides a novel and effective solution. By externally monitoring the light source signals of the communicating parties, following filtering and phase randomization, the proportion of UB signals with photon numbers within a specified interval N min , N max can be determined. This allows for the accurate estimation of key parameters in the protocol’s security bit rate formula, such as the probabilities of zero-photon, single-photon, and two-photon signals. Consequently, a compact lower bound for the security bit rate can be effectively determined. Furthermore, this scheme monitors the laser source signal before attenuation, bypassing the challenges of low detection efficiency and high costs commonly associated with single-photon detection for weak light monitoring.
The simulation analysis demonstrates that this scheme can achieve 817.5 km of secure transmission under ideal simulation parameters, which closely matches the transmission performance of an ideal light source environment. Under actual simulation parameters, the scheme can achieve 490 km of secure transmission, matching over 92% of the performance in an ideal light source environment. Compared to other protocol schemes, this scheme demonstrates better tolerance to light source fluctuations and offers significant advantages in transmission distance and secure bit rate.

Author Contributions

Conceptualization, J.H. and W.L.; methodology, J.H. and W.L.; validation, J.H. and Y.Q.; formal analysis, J.H., Y.Q. and W.L.; investigation, J.H. and W.L.; resources, Y.Q.; writing—original draft preparation, J.H.; writing—review and editing, J.H. and W.L.; visualization, J.H.; funding acquisition, Y.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (62301177) and Guangxi Science and Technology Program (GuiKeAD21220107).

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. The Bounds Estimation of P i α

The attenuation coefficient η α m represents the total attenuation from the laser source to the output when the original signal contains m photons. Here, α = s , d denotes the signal and decoy states, respectively. η α m is given by the following equation
η α = μ α N ¯ = 2 μ α N min + N max .
The upper and lower bounds of P i α i = 0 , 1 , 2 can be estimated theoretically. The elimination method is similar to the decoy scheme and can be used to scale the decay probability when N N min , N max . Firstly, P i α i = 0 , 1 , 2 can be rewritten as
P i α = N = 0 N min 1 P N P N α i + N = N min N max P N P N α i + N = N max + 1 P N P N α i .
Analyzing the upper and lower bounds of each component in Equation (A2)
C N + 1 i ( 1 η α ) N + 1 C N i ( 1 η α ) N = N + 1 N + 1 i ( 1 η α ) = 1 + i N + 1 i ( 1 η α ) .
When i = 0,
C N + 1 0 ( 1 η α ) N + 1 C N 0 ( 1 η α ) N < 1 ,
P N max α 0 P N α 0 P N min α 0 .
By substituting Equation (A5) into Equation (24), we obtain
P 0 α N = N min N max P N P N α 0 N = N min N max P N C N max 0 η α 0 1 η α N max 0 ,
P 0 α N = 0 N min 1 P N + N = N min N max P N C N min 0 η α 0 1 η α N min 0 + N = 0 N min 1 P N C N max + 1 0 η α 0 1 η α N max + 1 ,
because
N = N min N max P ( N ) C N max 0 η α 0 ( 1 η α ) N max 0 = N = N min N max P ( N ) ( 1 η α ) N max ( 1 Δ ) ( 1 η α ) N max ,
N = 0 N min 1 P N + N = N min N max P N C N min 0 η α 0 1 η α N min 0 + N = 0 N min 1 P N C N max + 1 0 η α 0 1 η α N max + 1 Δ + 1 Δ 1 η α N min + Δ 1 η α N max + 1 ,
by substituting Equation (A8) and Equation (A9) into Equation (A6) and Equation (A7), respectively, we can obtain the upper and lower bounds of P 0 α :
P 0 α 1 Δ 1 η α N max ,
P 0 α Δ + 1 Δ 1 η α N min + Δ 1 η α N max + 1 .
Likewise, for Equation (A3), when i = 1,
C N + 1 1 1 η α N + 1 C N 1 1 η α N = N + 1 N 1 2 μ α N min + N max ,
it can be seen that Equation (A12) decreases with N. Here, we make it equal to 1,
N + 1 N 1 2 μ α N min + N max = 1 ,
we can determine the inflection point N of Equation (A12)
N = N ˜ = N min + N max 2 μ α 1 .
In a QKD system, it is typically set that μ α < 1 , which implies that N ˜ > N max . Based on the above result, the upper and lower bounds of P 1 α can be calculated.
P 1 α N = N min N max P N P N α 1 N = N min N max P N C N min 1 η α 1 1 η α N min 1 ,
P 1 α N = 0 N min 1 P N P N α 1 + N = N min N max P N C N max 1 η α 1 1 η α N max 1 + N = N max + 1 P N P N α 1 .
It should be noted that
N = N min N max P ( N ) = 1 Δ .
To monitor the observable parameters, we can further simplify the upper and lower bounds of P 1 α :
P 1 α N = N min N max P N N min η α 1 η α N min 1 1 Δ N min η α 1 η α N min 1 ,
P 1 α Δ N min 1 η α 1 η α N min 2 + 1 Δ N max η α 1 η α N max 1 + Δ N ˜ η α 1 η α N ˜ 1 .
Finally, when i = 2, Equation (A3) can be written as
C N + 1 1 1 η α N + 1 C N 1 1 η α N = N + 1 N 1 1 2 μ α N min + N max ,
similarly, the inflection point can be calculated as
N + 1 N 1 2 μ α N min + N max = 1 ,
thus, we obtain the following equation
N = N min + N max μ α 1 .
Similarly, since μ α < 1 , it follows that N > N max . Based on this, we can determine the upper and lower bounds of P 2 α as follows
P 2 α N = N min N max P N P N α 2 N = N min N max P N C N min 2 η α 2 1 η α N min 2 = N = N min N max P N N min N min 1 2 η α 2 1 η α N min 2 1 Δ N min N min 1 2 η α 2 1 η α N min 2 ,
F 2 α N = 0 N min 1 P N P N α 2 + N = N min N max P N C N max 2 η α 2 1 η α N max 2 + N = N max + 1 P N P N α 2 Δ C N min 1 2 η α 2 1 η α N min 3 + 1 Δ C N max 2 η α 2 1 η α N max 2 + Δ C N ¯ 2 η α 2 1 η α N ¯ 2 .

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  2. Bennett, C.H.; Brassard, G.; Mermin, N.D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 1992, 68, 557. [Google Scholar] [CrossRef] [PubMed]
  3. Scarani, V.; Acin, A.; Ribordy, G.; Gisin, N. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 2004, 92, 057901. [Google Scholar] [CrossRef]
  4. Inoue, K.; Waks, E.; Yamamoto, Y. Differential phase shift quantum key distribution. Phys. Rev. Lett. 2002, 89, 037902. [Google Scholar] [CrossRef] [PubMed]
  5. Bruß, D. Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 1998, 81, 3018. [Google Scholar] [CrossRef]
  6. Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptol. 1992, 5, 3–28. [Google Scholar] [CrossRef]
  7. Bechmann-Pasquinucci, H.; Tittel, W. Quantum cryptography using larger alphabets. Phys. Rev. A 2000, 61, 062308. [Google Scholar] [CrossRef]
  8. Cerf, N.J.; Bourennane, M.; Karlsson, A.; Gisin, N. Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 2002, 88, 127902. [Google Scholar] [CrossRef]
  9. Mower, J.; Zhang, Z.; Desjardins, P.; Lee, C.; Shapiro, J.H.; Englund, D. High-dimensional quantum key distribution using dispersive optics. Phys. Rev. A 2013, 87, 062322. [Google Scholar] [CrossRef]
  10. Liu, J.; Lin, Z.; Liu, D.; Feng, X.; Liu, F.; Cui, K.; Zhang, W. High-dimensional quantum key distribution using energy-time entanglement over 242 km partially deployed fiber. Quantum Sci. Technol. 2024, 9, 015003. [Google Scholar] [CrossRef]
  11. Zahidy, M.; Ribezzo, D.; De Lazzari, C.; Vagniluca, I.; Biagi, N.; Müller, R.; Bacco, D. Practical high-dimensional quantum key distribution protocol over deployed multicore fiber. Nat. Commun. 2024, 15, 1651. [Google Scholar] [CrossRef] [PubMed]
  12. Sekga, C.; Mafu, M.; Senekane, M. High-dimensional quantum key distribution implemented with biphotons. Sci. Rep. 2023, 13, 1229. [Google Scholar] [CrossRef]
  13. Ding, Y.; Bacco, D.; Dalgaard, K.; Cai, X.; Zhou, X.; Rottwitt, K.; Oxenløwe, L.K. High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits. npj Quantum Inf. 2017, 3, 25. [Google Scholar] [CrossRef]
  14. Lütkenhaus, N. Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 2000, 61, 052304. [Google Scholar] [CrossRef]
  15. Makarov, V.; Hjelme, D.R. Faked states attack on quantum cryptosystems. J. Mod. Opt. 2005, 52, 691–705. [Google Scholar] [CrossRef]
  16. Qi, B.; Fung, C.H.F.; Lo, H.K.; Ma, X. Time-shift attack in practical quantum cryptosystems. arXiv 2005, arXiv:quant-ph/0512080. [Google Scholar] [CrossRef]
  17. Wei, K.; Liu, H.; Ma, H.; Yang, X.; Zhang, Y.; Sun, Y.; Xiao, J.; Ji, Y. Feasible attack on detector-device-independent quantum key distribution. Sci. Rep. 2017, 7, 449. [Google Scholar] [CrossRef]
  18. Gottesman, D.; Lo, H.K.; Lütkenhaus, N.; Preskill, J. Security of quantum key distribution with imperfect devices. In Proceedings of the International Symposium on Information Theory (ISIT 2004), Chicago, IL, USA, 27 June–2 July 2004; Volume 136. [Google Scholar]
  19. Hwang, W.-Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 2003, 91, 057901. [Google Scholar] [CrossRef]
  20. Xu, F.; Curty, M.; Qi, B.; Lo, H.-K. Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 2013, 15, 113007. [Google Scholar] [CrossRef]
  21. Zhou, Y.-H.; Yu, Z.-W.; Wang, X.-B. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100%. Phys. Rev. A 2014, 89, 052325. [Google Scholar] [CrossRef]
  22. Zhou, Y.-H.; Yu, Z.-W.; Wang, X.-B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Phys. Rev. A 2016, 93, 042324. [Google Scholar] [CrossRef]
  23. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef]
  24. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef]
  25. Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef]
  26. Yu, Z.W.; Hu, X.L.; Jiang, C.; Xu, H.; Wang, X.B. Sending-or-not-sending twin-field quantum key distribution in practice. Sci. Rep. 2019, 9, 3080. [Google Scholar] [CrossRef]
  27. Hu, X.L.; Jiang, C.; Yu, Z.W.; Wang, X.B. Sending-or-not-sending twin-field protocol for quantum key distribution with asymmetric source parameters. Phys. Rev. A 2019, 100, 062337. [Google Scholar] [CrossRef]
  28. Jiang, C.; Yu, Z.W.; Hu, X.L.; Wang, X.B. Unconditional security of sending or not sending twin-field quantum key distribution with finite pulses. Phys. Rev. Appl. 2019, 12, 024061. [Google Scholar] [CrossRef]
  29. Peng, Q.; Chen, J.P.; Xing, T.; Wang, D.; Wang, Y.; Liu, Y.; Huang, A. Practical security of twin-field quantum key distribution with optical phase-locked loop under wavelength-switching attack. npj Quantum Inf. 2025, 11, 7. [Google Scholar] [CrossRef]
  30. Sun, M.S.; Zhang, C.H.; Ma, X.; Zhou, X.Y.; Wang, Q. Sending-or-not-sending twin-field quantum key distribution with measurement imperfections. IEEE Commun. Lett. 2022, 26, 2004–2008. [Google Scholar] [CrossRef]
  31. Chen, J.-P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.; Hu, X.-L.; Guan, J.-Y.; Yu, Z.-W.; Xu, H.; Lin, J.; et al. Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef]
  32. Liu, H.; Jiang, C.; Zhu, H.T.; Zou, M.; Yu, Z.W.; Hu, X.L.; Xu, H.; Ma, S.; Han, Z.; Chen, J.-P.; et al. Field test of twin-field quantum key distribution through sending-or-not-sending over 428 km. Phys. Rev. Lett. 2021, 126, 250502. [Google Scholar] [CrossRef]
  33. Liu, Y.; Zhang, W.J.; Jiang, C.; Chen, J.P.; Zhang, C.; Pan, W.X.; Ma, D.; Dong, H.; Xiong, J.-M.; Zhang, C.-J.; et al. Experimental twin-field quantum key distribution over 1000 km fiber distance. Phys. Rev. Lett. 2023, 130, 210801. [Google Scholar] [CrossRef]
  34. Liu, Y.; Zhang, W.J.; Jiang, C.; Chen, J.P.; Ma, D.; Zhang, C.; Pan, J.W. 1002 km twin-field quantum key distribution with finite-key analysis. Quantum Front. 2023, 2, 16. [Google Scholar] [CrossRef]
  35. Shan, Y.G.; Zhou, Y.; Yin, Z.Q.; Wang, S.; Chen, W.; He, D.Y.; Han, Z.F. Sending-or-not-sending quantum key distribution with phase postselection. Phys. Rev. Appl. 2024, 22, 024056. [Google Scholar] [CrossRef]
  36. Qiao, Y.; Chen, Z.; Zhang, Y.; Xu, B.; Guo, H. Sending-or-not-sending twin-field quantum key distribution with light source monitoring. Entropy 2019, 22, 36. [Google Scholar] [CrossRef]
  37. Lu, Y.F.; Wang, Y.; Jiang, M.S.; Liu, F.; Zhang, X.X.; Bao, W.S. Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations. Quantum Inf. Process. 2021, 20, 135. [Google Scholar] [CrossRef]
  38. Xue, K.; Zhao, S.; Mao, Q.; Xu, R. Plug-and-play sending-or-not-sending twin-field quantum key distribution. Quantum Inf. Process. 2021, 20, 320. [Google Scholar] [CrossRef]
  39. Xue, K.; Shen, Z.; Zhao, S.; Mao, Q. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method. Entropy 2022, 24, 662. [Google Scholar] [CrossRef]
  40. Lu, Y.F.; Wang, Y.; Jiang, M.S.; Zhang, X.X.; Liu, F.; Li, H.W.; Zhou, C.; Tang, S.-B.; Wang, J.-Y.; Bao, W.-S. Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources. Entropy 2021, 23, 1103. [Google Scholar] [CrossRef]
  41. Xu, H.; Hu, X.L.; Feng, X.L.; Wang, X.B. Hybrid protocol for sending-or-not-sending twin-field quantum key distribution. Opt. Lett. 2020, 45, 4120–4123. [Google Scholar] [CrossRef]
  42. Hu, X.L.; Jiang, C.; Yu, Z.W.; Wang, X.B. Sending-or-not-sending twin-field quantum key distribution with imperfect vacuum sources. New J. Phys. 2022, 24, 063014. [Google Scholar] [CrossRef]
  43. Wen, K.; Fei, L.; Wan, Z.A.; Wu, X.Y.; Li, H.T.; Peng, H.; Li, Y.P. Intensity fluctuation analysis for sending or not sending twin field quantum key distribution. Proc. SPIE 2023, 12617, 1390–1397. [Google Scholar]
  44. Sun, M.S.; Wang, W.L.; Zhou, X.Y.; Zhang, C.H.; Wang, Q. Source monitoring twin-field quantum key distribution assisted with Hong-Ou-Mandel interference. Phys. Rev. Res. 2023, 5, 043179. [Google Scholar] [CrossRef]
  45. Zhao, Y.; Qi, B.; Lo, H.K. Quantum key distribution with an unknown and untrusted source. Phys. Rev. A 2008, 77, 052327. [Google Scholar] [CrossRef]
  46. Park, J.; Lee, J.; Heo, J. Improved statistical fluctuation analysis for twin-field quantum key distribution. Quantum Inf. Process. 2021, 20, 127. [Google Scholar] [CrossRef]
Figure 1. The structure of the sending-or-not-sending (SNS) protocol with an extra UB module in each of Alice’s and Bob’s parts. The UB module is composed of an attenuator (ATT) and a photon detector (PD).
Figure 1. The structure of the sending-or-not-sending (SNS) protocol with an extra UB module in each of Alice’s and Bob’s parts. The UB module is composed of an attenuator (ATT) and a photon detector (PD).
Entropy 27 00547 g001
Figure 2. Performance diagram of SNS protocol based on UB monitoring solution under ideal parameters.
Figure 2. Performance diagram of SNS protocol based on UB monitoring solution under ideal parameters.
Entropy 27 00547 g002
Figure 3. Performance diagram of SNS protocol based on UB monitoring solution under actual parameters.
Figure 3. Performance diagram of SNS protocol based on UB monitoring solution under actual parameters.
Entropy 27 00547 g003
Table 1. Values of parameters used in simulation. α : the fiber loss coefficient (unit: dB/km); p d : the dark count rate of the detector; η D : the detection efficiency; e d e t : the misalignment error of the QKD system; f: the error correction efficiency.
Table 1. Values of parameters used in simulation. α : the fiber loss coefficient (unit: dB/km); p d : the dark count rate of the detector; η D : the detection efficiency; e d e t : the misalignment error of the QKD system; f: the error correction efficiency.
α p d η D e d e t f
0.2 dB/km 1 × 10 11 0.81%1.1
Table 2. Values of parameters used in simulation (set as in Refs. [24,46] for more practical conditions).
Table 2. Values of parameters used in simulation (set as in Refs. [24,46] for more practical conditions).
α p d η D e d e t f
0.2 dB/km 1 × 10 8 0.62%1.15
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, J.; Li, W.; Qiao, Y. An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources. Entropy 2025, 27, 547. https://doi.org/10.3390/e27060547

AMA Style

Huang J, Li W, Qiao Y. An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources. Entropy. 2025; 27(6):547. https://doi.org/10.3390/e27060547

Chicago/Turabian Style

Huang, Jiajian, Weigang Li, and Yucheng Qiao. 2025. "An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources" Entropy 27, no. 6: 547. https://doi.org/10.3390/e27060547

APA Style

Huang, J., Li, W., & Qiao, Y. (2025). An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources. Entropy, 27(6), 547. https://doi.org/10.3390/e27060547

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop