Next Article in Journal
Real-Time Detection of Important Sounds with a Wearable Vibration Based Device for Hearing-Impaired People
Previous Article in Journal
Robust Offset-Free Speed Tracking Controller of Permanent Magnet Synchronous Generator for Wind Power Generation Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantification of the Impact of Photon Distinguishability on Measurement-Device- Independent Quantum Key Distribution

1
Department of Physics and Nuclear Engineering, United States Military Academy, West Point, NY 10996, USA
2
Department of Systems Engineering, Center for Cyberspace Research, Air Force Institute of Technology, Wright-Patterson Air Force Base, OH 45433, USA
*
Author to whom correspondence should be addressed.
Electronics 2018, 7(4), 49; https://doi.org/10.3390/electronics7040049
Submission received: 11 March 2018 / Revised: 30 March 2018 / Accepted: 2 April 2018 / Published: 5 April 2018
(This article belongs to the Special Issue Quantum Communications Systems)

Abstract

:
Measurement-Device-Independent Quantum Key Distribution (MDI-QKD) is a two-photon protocol devised to eliminate eavesdropping attacks that interrogate or control the detector in realized quantum key distribution systems. In MDI-QKD, the measurements are carried out by an untrusted third party, and the measurement results are announced openly. Knowledge or control of the measurement results gives the third party no information about the secret key. Error-free implementation of the MDI-QKD protocol requires the crypto-communicating parties, Alice and Bob, to independently prepare and transmit single photons that are physically indistinguishable, with the possible exception of their polarization states. In this paper, we apply the formalism of quantum optics and Monte Carlo simulations to quantify the impact of small errors in wavelength, bandwidth, polarization and timing between Alice’s photons and Bob’s photons on the MDI-QKD quantum bit error rate (QBER). Using published single-photon source characteristics from two-photon interference experiments as a test case, our simulations predict that the finite tolerances of these sources contribute ( 4.04 ± 20 / N sifted ) % to the QBER in an MDI-QKD implementation generating an N sifted -bit sifted key.

1. Introduction

Quantum Key Distribution (QKD) is an application of quantum cryptography—the process of exploiting quantum effects to establish secure communications between two authorized users, Alice and Bob, in the presence of an unwanted third party, Eve. QKD protocols promise unconditionally secure communications through exchange of encoded photons, which, due to their quantum nature, are altered in a detectable way if they are observed by an unauthorized eavesdropper [1].
In conventional QKD protocols such as BB84 [2], the original QKD protocol, a photon is randomly encoded in one of a pre-determined set of quantum states by Alice. Alice transmits the photon to Bob who obtains partial information on Alice’s encoding by performing a randomly selected projective measurement on the photon. Subsequently Alice reveals partial information on her encoding over an open classical channel. Along with the measurement results, this additional information allows Bob to identify the original encoding state of a subset of the transmitted photons with certainty. The encoding of this subset constitutes the raw shared secret key that Alice and Bob use for encrypted communications [3]. As Eve does not have access to the results of Bob’s measurements, she lacks the necessary information to infer the secret bits.
Since 1984, other protocols have been proposed to address security vulnerabilities in implementations of BB84 [4,5,6,7,8]. One such protocol is Measurement-Device-Independent QKD (MDI-QKD), depicted in Figure 1, which addresses the vulnerability of Bob’s measurement to malicious signals introduced on the quantum channel by Eve. MDI-QKD moves the act of photon measurement from Bob to an untrusted third party, Charlie (shown in red). Alice and Bob each send one polarization-encoded photon to Charlie, who subjects them to two-photon interference in a symmetric 50:50 beam splitter, followed by polarization-sensitive detection via a pair of polarizing beam splitters and four single-photon detectors, each corresponding to a polarization and beam splitter output port ( d V , d H , c V , c H ). Charlie publicly announces which detectors registered photons. Subsequently, Alice and Bob publicly announced which polarization basis (horizontal-vertical or antidiagonal-diagonal) they used for encoding. From this information and their private knowledge of their own photon encodings, Alice and Bob can infer one bit of shared secret key in 25% of the exchanges under ideal circumstances. Figure 2 demonstrates these steps explicitly for two key attempts—one in the horizontal-vertical basis and one in the antidiagonal-diagonal basis. The blue and green arrows denote communication on a sensitive quantum channel, while red arrows denote communication on an open classical channel visible to Charlie. Similarly, Table 1 displays all possible same-basis input states, Charlie’s potential detection states for each input, and the shared bit value associated with a given input state. When Alice and Bob choose opposite encoding bases for a trial, that trial is discarded and no key is generated. The same-basis inputs | V | V and | H | H cannot be used to generate a key bit because Charlie can infer the bit from his measurement and knowledge of the encoding basis. There are also some detected states for antidiagonal-diagonal basis encodings that can occur for multiple input states, making them unusable for key generation.
Despite its immunity from eavesdropping attacks on the detector, MDI-QKD is susceptible to physical non-idealities that can limit the key generation rate by introducing quantum bit errors, which are physically indistinguishable from perturbations caused by Eve’s measurements [9]. In addition to detector inefficiencies, dark count rates [10] and polarization errors, MDI-QKD is also susceptible to bit errors caused by timing differences [7] and photon distinguishability in pulse envelope, bandwidth and wavelength [11]. Prior research has addressed polarization and timing errors [10], as well as the feasibility of implementing the protocol utilizing weak coherent pulses from independent laser sources [11], but significant assumptions about photon source characteristics remain unexplored.
In this paper, we analyze the impact of error tolerances in photon polarization encoding, timing, wavelength and bandwidth on the quantum bit error rate (QBER) of an otherwise ideal MDI-QKD implementation using single photon sources with Gaussian pulse envelopes. In Section 2 we specify the photon temporal wave functions and apply the formalism of quantum optics to calculate probabilities for Charlie’s measurement outcomes as a function of Alice’s and Bob’s encoding choices and the tolerances of their photon sources. In Section 3 we describe our Monte Carlo simulation of the MDI-QKD protocol based on these probabilities to determine the associated Quantum Bit Error Rate (QBER). In Section 4 we present the results of our simulations and discuss the sensitivity of MDI-QKD to various contributions to photon distinguishability. We conclude the paper in Section 5 with a discussion of the implications of our results for studying practical implementations of MDI-QKD and identify possible extensions to our work.

2. Two-Photon Interference in the Polarizing Beam Splitter

The MDI-QKD protocol relies on quantum interference of two indistinguishable photons incident on a 50:50 beam splitter [10,12]. This interference, known as the Hong-Ou-Mandel (HOM) effect, suppresses the probability that two identical photons simultaneously entering the beam splitter through different ports will be detected exiting the beam splitter through different ports; they must always exit the beam splitter together [13]. Distinguishable photons under the same circumstances show no such correlations. Ideally, photons employed in MDI-QKD are identical in every physical characteristic except (potentially) their polarization angles. Under these conditions, two identically polarized photons will always exhibit HOM interference; however, non-idealities in the photon sources or beam splitter characteristics give rise to partial distinguishability and a non-zero probability of unexpected coincidence events—observation of ostensibly indistinguishable photons exiting different beam splitter ports [11,14,15].
We apply the formalism of quantum optics following the development of Loudon [16] to relate the probabilities of coincidence events, and ultimately the performance limits of MDI-QKD systems, to photon source tolerances. Alice and Bob independently prepare single photon pulses characterized by temporal wave functions ξ a , b ( t ) and polarization angles θ a , b . The input state at the beam splitter is then the product state
| ξ a , θ a | ξ b , θ b = d t 1 ξ a ( t 1 ) a ^ H ( t 1 ) cos θ a + a ^ V ( t 1 ) sin θ a d t 2 ξ b ( t 2 ) b ^ H ( t 2 ) cos θ b + b ^ V ( t 2 ) sin θ b | 0 ,
where a ^ H , V ( t ) and b ^ H , V ( t ) are the creation operator densities for horizontally and vertically polarized photons at the a and b beam splitter inputs, and | 0 is the 4-mode vacuum. Normalization is achieved by requiring
d t ξ a * ( t ) ξ a ( t ) = d t ξ b * ( t ) ξ b ( t ) = 1 .
The beam splitter output state | ψ out can be constructed from the input state using the beam splitter transformation,
a ^ H , V ( t ) T c ^ H , V ( t ) + R d ^ H , V ( t ) b ^ H , V ( t ) R c ^ H , V ( t ) + T d ^ H , V ( t ) ,
where T and R are the transmission and reflection amplitudes of the symmetric beam splitter, subject to the unitarity conditions
T 2 + R 2 = 1 T R * = T * R ,
and c ^ H , V ( t ) and d ^ H , V ( t ) are the creation operator densities for horizontally and vertically polarized photons at the c and d beam splitter outputs. Applying (3) to (1) we find
| ψ out = d t 1 ξ a ( t 1 ) ( T c ^ H ( t 1 ) + R d ^ H ( t 1 ) ) cos θ a + ( T c ^ V ( t 1 ) + R d ^ V ( t 1 ) ) sin θ a d t 2 ξ b ( t 2 ) ( R c ^ H ( t 2 ) + T d ^ H ( t 2 ) ) cos θ b + ( R c ^ V ( t 2 ) + T d ^ V ( t 2 ) ) sin θ b | 0 .
The right hand side of (5) can be written as a summation of terms each contributing amplitudes to one of the 10 mutually exclusive experimental outcomes:
| ψ out = | c V c V + | c H c H + | d V d V + | d H d H + | c V c H + | d V d H + | c V d V + | c H d H + | c H d V + | c V d H ,
where, for example,
| c V d V = d t 1 d t 2 ξ a ( t 1 ) ξ b ( t 2 ) sin θ a sin θ b T 2 c ^ V ( t 1 ) d ^ V ( t 2 ) + R 2 d ^ V ( t 1 ) c ^ V ( t 2 ) | 0
corresponds to the outcome in which one photon is counted in detector c V and one photon is counted in detector d V . The probability of the outcome c V d V is then
P ( c V d V ) = c V d V | c V d V .
The dependence of the outcome probabilities on the photon wave functions can be expressed in terms of the overlap integral [16]
J 2 = d t ξ a * t ξ b t 2 .
With J 2 as defined in (9), the probabilities for each of the detection events are
P ( c V c V ) = P ( d V d V ) = sin 2 θ a sin 2 θ b T 2 R 2 1 + J 2 P ( c H c H ) = P ( d H d H ) = cos 2 θ a cos 2 θ b T 2 R 2 1 + J 2 P ( c V c H ) = P ( d V d H ) = T 2 R 2 sin 2 θ a cos 2 θ b + cos 2 θ a sin 2 θ b + 2 sin θ a cos θ a sin θ b cos θ b J 2 P ( c V d H ) = sin 2 θ a cos 2 θ b T 4 + cos 2 θ a sin 2 θ b R 4 2 cos θ a sin θ a cos θ b sin θ b T 2 R 2 J 2 P ( c H d V ) = sin 2 θ a cos 2 θ b R 4 + cos 2 θ a sin 2 θ b T 4 2 cos θ a sin θ a cos θ b sin θ b T 2 R 2 J 2 P ( c V d V ) = sin 2 θ a sin 2 θ b 1 2 T 2 R 2 1 + J 2 P ( c H d H ) = cos 2 θ a cos 2 θ b 1 2 T 2 R 2 1 + J 2 .
In order to make specific predictions, we model the photon wave functions ξ ( t ) a , b as Gaussian wave packets with center angular frequency ω a , b , bandwidth Δ ω a , b , and beam splitter arrival time t a , b . Using the normalized wave functions
ξ a , b ( t ) = 2 Δ ω a , b 2 π 1 / 4 e i ω a , b t Δ ω a , b 2 ( t t a , b ) 2 ,
the overlap integral evaluates to
J 2 = 2 Δ ω a Δ ω b Δ ω a 2 + Δ ω b 2 exp ω a ω b 2 2 Δ ω a 2 + Δ ω b 2 exp 4 Δ ω a 2 Δ ω b 2 t a t b 2 2 Δ ω a 2 + Δ ω b 2 .
Combining (10) and (12) we model the HOM effect, as in Figure 3, where the incomplete suppression of coincidence events as a result of photon wavelength and pulse bandwidth differences is apparent. We also use these results in Monte Carlo simulations of the MDI-QKD protocol, as discussed in Section 3, to determine the associated QBER.

3. Monte Carlo Simulation Methodology

To determine the MDI-QKD QBER for achievable single photon source tolerances, we perform Monte Carlo simulations utilizing the probabilities of (10) and the overlap integral of (12). The single photon source parameters (wavelength λ = 788 nm, wavelength tolerance σ λ = 0.17 nm, pulse bandwidth Δ ω = 1.18 × 10 12 rad/s, pulse bandwidth tolerance σ Δ ω = 1.18 × 10 10 rad/s, synchronization tolerance σ t = 0.26 ps, and polarization angle tolerance σ θ = 1 ) are selected consistently with those described by Kaltenbaek et al. [17], who report a ( 96 ± 1 ) % HOM-interference visibility using independent single photon sources in an entanglement swapping experiment that is functionally identical to a MDI-QKD implementation. They report the standard deviation of their pulse synchronization and the full-width-at-half-maximum of the filters used to limit fluctuations in the photon wavelengths. We estimate the bandwidth of their pulses on the basis of the width of their HOM-dips and assume a 1% relative fluctuation. The assumed polarization standard deviation is typical of laboratory optics [18]. The results of [17] are particularly relevant because the two photon sources used are completely independent, communicating only via an electronic synchronization signal, just as required for MDI-QKD. The simulation procedure is outlined below.
(1)
Construct N raw -element arrays of Alice’s and Bob’s randomly selected basis choices.
(2)
Construct N raw -element arrays of Alice’s and Bob’s randomly selected raw keys bits.
(3)
Compare Alice’s and Bob’s random basis selections and discard trials corresponding to opposite-basis selection from further consideration, retaining N same N raw / 2 trials.
(4)
Compute the photon polarization angles for each photon in each trial from the choices of basis, raw key bits, and polarization error tolerances.
(5)
Compute the photon wavelength errors for each photon in each trial from the photon wavelength tolerances.
(6)
Compute the bandwidth of each photon pulse in each trial from the mean bandwidth and the bandwidth tolerances.
(7)
Compute the photon arrival time synchronization error for each trial from the synchronization time tolerance.
(8)
Use the results of steps (4) through (7) to calculate the probability of each possible measurement outcome for each trial.
(9)
For each trial select a particular measurement outcome in accordance with the probabilities calculated in step (8).
(10)
Discard unusable trials and flip Bob’s key bit in accordance with the results of step (9), retaining N sifted N raw / 4 bits.
(11)
Compare Alice’s and Bob’s sifted keys to determine the QBER = N error / N sifted [19].
This procedure is implemented in Python 3 [20] and executed with version 4.4.0-Windows-x86_64 of Anaconda3 [21]. Random measurement outcomes are selected by calls to the numpy.random.choice() routine of the numpy package [22]. The code is fully documented and provided in the online supplement.
Given the source parameters and tolerances, the QBER is a well-defined quantity for an infinitely long sifted key, and can be estimated to the desired precision by averaging the QBERs obtained from repeated simulations of finite key length. Random bit errors will obey Poisson statistics, so we expect the sample standard deviation of their rate to scale as 1 / N sifted .

4. Simulation Results and Discussion

Employing the procedure described in Section 3, averages over 1000 simulations using raw keys with lengths N raw = 100 to 1,024,000 bits give QBERs of ( 4.04 ± 20 / N sifted ) % . The observed sample standard deviation of the QBER follows the expected dependence on the length of the sifted key. These results are consistent with the HOM-interference visibility reported in [17]. The fraction of bits discarded due to opposite basis selection or unusable measurement results are also in line with expectations—approximately 25% of the raw key bits are retained in the sifted key.
Additionally, we explore the consequences of systematically relaxing photon source tolerances to determine the sensitivity of the QBER to fluctuations in wavelength, pulse bandwidth, polarization angle, and source synchronization. The results of these simulations are shown in Figure 4. Each point in the figure represents the average QBER from 100 iterations with N raw = 2500 for a fixed set of photon source parameters. The standard deviations of (a) photon wavelength; (b) pulse bandwidth; (c) polarization angle; and (d) photon synchronization are varied relative to their nominal values, indicated by orange diamonds, while other photon source parameters are held fixed. As expected, the QBER increases with increasing probability of photon distinguishability due to source fluctuations.
In our simulation of the MDI-QKD protocol, we obtain Alice’s and Bob’s sifted keys, from which we can identify specific bit errors and calculate the QBER explicitly. In a fielded QKD system, a sifted key that contains errors is not useful for encrypted communication and neither party alone possesses sufficient information to identify and correct these errors. Further, the finite QBER sets a information-theoretic non-zero upper bound on how much information Eve might have obtained about the sifted key by eavesdropping on the quantum channel. All bit errors in our simulated sifted key are attributable to finite source tolerances rather than an eavesdropper. However, in practice, bit errors due to the actions of Eve on the quantum channel are physically indistinguishable from bit errors arising from finite source tolerances (or other system imperfections), and thus, in a rigorous security analysis, bit errors arising from all sources must be attributed to information gained by Eve [1].
The process of removing bit errors and Eve’s information from the sifted keys to obtain a shorter secure shared key is called key distillation. The first step of the process is the estimation of the QBER. This can be achieved by publicly comparing a random sample of bits from the sifted key. As the selected bits are revealed on an open channel, they must be discarded, reducing the length of the sifted key. For given key distillation and QKD protocols, the QBER determines the fraction of the remaining key bits that must be consumed to achieve the desired error free and secure key. If the QBER exceeds a protocol-dependent threshold, this fraction is greater than one and the key distillation fails [23]. Even if the QBER does not exceed the threshold, the length of the distilled key can be a tiny fraction of the length of the original sifted key, making the absolute rate of secure shared key generation prohibitively low. For these reasons, minimizing all sources of bit errors, including those due to finite photon source tolerances, is critical for MDI-QKD system performance.
Assuming the QBER does not exceed the failure threshold, classical error correction and privacy amplification protocols are applied to the remaining sifted key to complete the key distillation. The extensive literature addressing the application of error correction and privacy amplification to QKD protocols is summarized by Nielsen and Chuang . In particular, it is known that effective error correction and privacy amplification protocols exist for the BB84 protocol when the QBER is below 11%, and this threshold is believed to be acceptable for all similar QKD protocols [24,25]. MDI-QKD, as we have formulated it, is not identical to BB84. However, it is similar in that, from the point of view of Alice, MDI-QKD is functionally equivalent to BB84 if she conceptualizes Charlie as an agent of Bob. Accordingly, we expect the threshold QBER for MDI-QKD to be no less than 11%, which is significantly above the QBER we obtained in our simulation of realistic source non-idealities.
The practical implementation of MDI-QKD depends on limiting bit errors due to incomplete HOM interference. By simulating the MDI-QKD protocol using photon source tolerances from a well-characterized two-photon interference study, we demonstrate both good agreement with experiment and the ability to relate the achievable visibility to fluctuations in specific photon properties. From the plots in Figure 4, it is clear that the QBER is sensitive to both photon wavelength and pulse timing. Modest increases in the trial-to-trial fluctuations of photon wavelengths and arrival times lead to significant increases in the QBER, while suppressing either of these fluctuations results in a factor of two improvement. In contrast, the QBER is relatively insensitive to changes in the bandwidth standard deviation and polarization angle standard deviation, even if these fluctuations are suppressed entirely.
The sensitivity of the QBER to wavelength and timing fluctuations points to the need for design tradeoffs to optimize system performance. In the experiment of [17], wavelength fluctuations are limited by narrow filters that block out-of-tolerance photons from reaching the detectors. While this enhances the HOM visibility, it also reduces the detection rate. As QKD performance is measured on the basis of the rate at which secret key can be generated, there is a point of diminishing returns when the QBER is improved at the expense of transmission rate. Similar reasoning applies to photon synchronization if improvements in the timing of pulse generation come at the expense of a reduced probability of generating a photon. A reduction in the detection rate could also occur with tighter polarization angle and pulse bandwidth control without improvement in the QBER, thus reducing overall QKD system performance.
Even though the QBER is not particularly sensitive to bandwidth fluctuations in the region of parameter space under consideration, the sensitivity to pulse synchronization is closely related to the nominal bandwidth. As the bandwidth is inversely proportional to the temporal width of the pulse, larger bandwidth pulses are shorter in duration, thus requiring tighter synchronization tolerances to ensure large wave function overlap, reliable HOM interference, and a low QBER. We also note that the use of very narrow wavelength filters has the potential to complicate the analysis by altering the shape of the photon wave function.

5. Conclusions

These results are significant to the development of physics-based modeling of HOM interference in MDI-QKD. The next logical step in this program is to incorporate our model into a system-level simulation such as the qkdX framework [26] that fully incorporates the effects of photon propagation, transmission losses, detector limitations and security enhancing variations of the MDI-QKD protocol [27,28]. This work could also be extended to consider other types of pulse shapes or probability distributions, and to account for the effects of optical filters on the shape of the photon wave function envelope. Ultimately, these enhancements will lead to high-fidelity simulations that expedite the development of robust MDI-QKD implementations.

Acknowledgments

This work was funded in part by the United States Military Academy Department of Physics and Nuclear Engineering. We would like to acknowledge the contributions from Jeffrey Morris in familiarizing us with QKD concepts and the MDI-QKD protocol. The conclusions of this work are those of the authors and do not reflect official positions of the Department of the Army or the Department of Defense. As employees of the U.S. Government, the authors’ copyright interest are subject to limitations under U.S. copyright law. This manuscript has been cleared for public release.

Author Contributions

G.K.S. extended the MDI-QKD model to arbitrary photon temporal wave functions, ran the simulations, and conducted the analysis. B.K.H. and W.M.M. developed and validated the MDI-QKD simulations. L.O.M. proposed the study, conducted background research, identified the critical parameters in need of modeling and simulation, and provided ongoing guidance as the work progressed. L.E.H. fully incorporated arbitrary source polarizations into the model and provided direct supervision of the project.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analysis, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
QKDQuantum key distribution
MDI-QKDMeasurement-device-independent quantum key distribution
QBERQuantum bit error rate
BB84Bennett and Brassard 1984
HOMHong-Ou-Mandel
BSBeam splitter
PBSPolarizing beam splitter

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef]
  2. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems & Signal Processing, Bangalore, India, 9–12 December 1984; IEEE: New York, NY, USA, 1984; Volume 1, pp. 175–179. [Google Scholar]
  3. Liao, Z. Experimental Realization of Decoy State Polarization Encoding Measurement-Device-Independent Quantum Key Distribution. Master’s Thesis, University of Toronto, Toronto, ON, Canada, 2013. [Google Scholar]
  4. Mailloux, L.O.; Grimaila, M.R.; Engle, R.D.; Mclaughlin, C.V.; Baumgartner, G.B. Using Modeling and Simulation to Study Photon Number Splitting Attacks. IEEE Access 2016, 4, 2188–2197. [Google Scholar] [CrossRef]
  5. Scarani, V.; Kurtsiefer, C. The black paper of quantum cryptography: Real implementation problems. Theor. Comput. Sci. 2014, 560, 27–32. [Google Scholar] [CrossRef]
  6. Makarov, V.; Anisimov, A.; Skaar, J. Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 2006, 74, 022313. [Google Scholar] [CrossRef]
  7. Xu, F.; Curty, M.; Qi, B.; Lo, H.K. Measurement-device-independent quantum cryptography. IEEE J. Sel. Top. Quantum Electron. 2015, 21, 148–158. [Google Scholar]
  8. Braunstein, S.L.; Pirandola, S. Side-Channel-Free Quantum Key Distribution. Phys. Rev. Lett. 2012, 108, 130502. [Google Scholar] [CrossRef] [PubMed]
  9. Scarini, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef]
  10. Lo, H.K.; Curty, M.; Qi, B. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed]
  11. Lo, H.K.; Curty, M.; Qi, B. Supplemental Information for ‘Measurement-device-independent quantum key distribution’. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed]
  12. Russell, M.; Mailloux, L.; Hodson, D.; Grimaila, M. A Bell State Analyzer Model for Measurement Device Independent Quantum Key Distribution. In Proceedings of the 2017 International Conference on Scientific Computing, Bath, UK, 11–15 September 2017; American Council on Science and Education, CSREA Press: Las Vegas, NV, USA, 2017; pp. 127–133. [Google Scholar]
  13. Hong, C.K.; Ou, Z.Y.; Mandel, L. Measurement of subpicosecond time intervals between two photons by interference. Phys. Rev. Lett. 1987, 59, 2044–2046. [Google Scholar] [CrossRef] [PubMed]
  14. Mährlein, S.; Oppel, S.; Wiegner, R.; von Zanthier, J. Hong-Ou-Mandel interference without beam splitters. J. Mod. Opt. 2017, 64, 921–929. [Google Scholar] [CrossRef]
  15. Kobayashi, T.; Ikuta, R.; Yasui, S.; Miki, S.; Yamashita, T.; Terai, H.; Yamamoto, T.; Koashi, M.; Imoto, N. Frequency-domain Hong-Ou-Mandel Interference. Nat. Photonics 2016, 10, 441–444. [Google Scholar] [CrossRef]
  16. Loudon, R. The Quantum Theory of Light, 3rd ed.; Oxford University Press: Oxford, UK, 2000. [Google Scholar]
  17. Kaltenbaek, R.; Prevedel, R.; Aspelmeyer, M.; Zeilinger, A. High-fidelity entanglement swapping with fully independent sources. Phys. Rev. A 2009, 79, 40302. [Google Scholar] [CrossRef]
  18. Barbarow, W.S. Finding the Optimal Polarizer. 2009. Available online: https://www.meadowlark.com (accessed on 18 February 2018).
  19. Elmabrok, O.; Razavi, M. Wireless quantum key distribution in indoor environments. J. Opt. Soc. Am. B 2018, 35, 197–207. [Google Scholar] [CrossRef]
  20. Python Software Foundation. Available online: https://www.python.org/ (accessed on 11 March 2018).
  21. Anaconda, Inc. Available online: https://www.anaconda.com/ (accessed on 11 March 2018).
  22. NumPy Developers. Available online: https://www.numpy.org/ (accessed on 11 March 2018).
  23. Kosloski, J.T. QKD Quantum Channel Authentication. arXiv, 2006; arXiv:quant-ph/0603101. [Google Scholar]
  24. Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information, 10th ed.; Cambridge University Press: Cambridge, UK, 2016. [Google Scholar]
  25. Shor, P.W.; Preskill, J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Phys. Rev. Lett. 2000, 85, 441–444. [Google Scholar] [CrossRef] [PubMed]
  26. Mailloux, L.O.; Morris, J.D.; Grimaila, M.R.; Hodson, D.D.; Jacques, D.R.; Colombi, J.M.; McLaughlin, C.V.; Holes, J.A. A Modeling Framework for Studying Quantum key Distribution System Implementation Nonidealities. IEEE Access 2015, 3, 110–130. [Google Scholar] [CrossRef]
  27. Wu, C.F.; Du, Y.; Wang, J.D.; Wei, Z.J.; Qin, X.J.; Zhao, F.; Zhang, Z.M. Analysis on performance optimization in measurement-device-independent quantum key distribution using weak coherent states. Acta Phys. Sin. 2016, 65, 1–9. [Google Scholar]
  28. Zhu, F.; Zhang, C.H.; Liu, A.P.; Wang, Q. Enhancing the performance of the measurement-device- independent quantum key distribution with heralded pair-coherent sources. Phys. Lett. A 2016, 380, 1408–1413. [Google Scholar] [CrossRef]
Figure 1. Diagram of MDI-QKD instrumentation.
Figure 1. Diagram of MDI-QKD instrumentation.
Electronics 07 00049 g001
Figure 2. Representative sequences of events for the MDI-QKD protocol for two particular input states.
Figure 2. Representative sequences of events for the MDI-QKD protocol for two particular input states.
Electronics 07 00049 g002
Figure 3. Coincidence probability as a function of beam splitter arrival time difference for photon pairs with varying degrees of distinguishability. The coincidence rate vanishes for perfectly identical photons arriving simultaneously, with the width of the HOM dip determined by the pulse bandwidth. (a) displays the coincidence probability curves for two photons with an identical bandwidth Δ ω = 1 . 18 × 10 12 rad/s and different wavelengths. (b) uses two photons with an identical wavelength λ = 788 nm and different bandwidths, which center around Δ ω = 1 . 18 × 10 12 rad/s. These parameters are chosen consistently with those of the simulations described in Section 4.
Figure 3. Coincidence probability as a function of beam splitter arrival time difference for photon pairs with varying degrees of distinguishability. The coincidence rate vanishes for perfectly identical photons arriving simultaneously, with the width of the HOM dip determined by the pulse bandwidth. (a) displays the coincidence probability curves for two photons with an identical bandwidth Δ ω = 1 . 18 × 10 12 rad/s and different wavelengths. (b) uses two photons with an identical wavelength λ = 788 nm and different bandwidths, which center around Δ ω = 1 . 18 × 10 12 rad/s. These parameters are chosen consistently with those of the simulations described in Section 4.
Electronics 07 00049 g003
Figure 4. Dependence of the QBER on photon source tolerances for a single variable. The QBER values are averaged over 100 trials of N r a w = 2500 with uncertainty dominated by shot noise. Error bars represent three times the standard deviation of the mean in either direction.
Figure 4. Dependence of the QBER on photon source tolerances for a single variable. The QBER values are averaged over 100 trials of N r a w = 2500 with uncertainty dominated by shot noise. Error bars represent three times the standard deviation of the mean in either direction.
Electronics 07 00049 g004
Table 1. Nominal probability of generating a key bit and the shared secret bit value for all eight same-basis photon polarization encodings and associated measurement outcomes.
Table 1. Nominal probability of generating a key bit and the shared secret bit value for all eight same-basis photon polarization encodings and associated measurement outcomes.
Electronics 07 00049 i001

Share and Cite

MDPI and ACS Style

Simon, G.K.; Huff, B.K.; Meier, W.M.; Mailloux, L.O.; Harrell, L.E. Quantification of the Impact of Photon Distinguishability on Measurement-Device- Independent Quantum Key Distribution. Electronics 2018, 7, 49. https://doi.org/10.3390/electronics7040049

AMA Style

Simon GK, Huff BK, Meier WM, Mailloux LO, Harrell LE. Quantification of the Impact of Photon Distinguishability on Measurement-Device- Independent Quantum Key Distribution. Electronics. 2018; 7(4):49. https://doi.org/10.3390/electronics7040049

Chicago/Turabian Style

Simon, Garrett K., Blake K. Huff, William M. Meier, Logan O. Mailloux, and Lee E. Harrell. 2018. "Quantification of the Impact of Photon Distinguishability on Measurement-Device- Independent Quantum Key Distribution" Electronics 7, no. 4: 49. https://doi.org/10.3390/electronics7040049

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop