Next Article in Journal
Application of Theory of Quantum Instruments to Psychology: Combination of Question Order Effect with Response Replicability Effect
Next Article in Special Issue
Analytic Expression of Quantum Discords in Werner States under LQCC
Previous Article in Journal
Research on a Simplified Model of an Aluminum Vapor Chamber in a Heat Dissipation System
Previous Article in Special Issue
A Quantum Cellular Automata Type Architecture with Quantum Teleportation for Quantum Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Sending-or-Not-Sending Twin-Field Quantum Key Distribution with Light Source Monitoring

1
State Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China
2
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
3
Science and Technology on Security Communication Laboratory, Institute of Southwestern Communication, Chengdu 610041, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(1), 36; https://doi.org/10.3390/e22010036
Submission received: 13 December 2019 / Revised: 24 December 2019 / Accepted: 25 December 2019 / Published: 26 December 2019
(This article belongs to the Special Issue Quantum Information Processing)

Abstract

:
Twin-field quantum key distribution (TF-QKD) is proposed to achieve a remote key distribution with a maximum secure transmission distance up to over 500 km. Although the security of TF-QKD in its detection part is guaranteed, there are some remaining problems in the source part. The sending-or-not-sending (SNS) protocol is proposed to solve the security problem in the phase post-selection process; however, the light source is still assumed to be an ideal coherent state. This assumption is not satisfied in real-life QKD systems, leading to practical secure issues. In this paper, we discuss the condition that the photon number distribution (PND) of the source is unknown for the SNS protocol, demonstrate that the security analysis is still valid under a source with unknown PND, and show that with light source monitoring, the performance of the SNS protocol can remain almost unchanged.

1. Introduction

Quantum key distribution (QKD) provides a way for different communication parties to share a set of identical security keys [1,2]. The security of QKD is based on the laws of quantum physics and has been proved theoretically in different ways in the past decades. In addition to security analysis, people have also started to study the performance of QKD and to further improve the performance of real-life QKD systems by proposing new protocols [3,4,5,6,7].
Among all proposed protocols, measurement-device-independent (MDI) protocol is meaningful, since it can make up all the security loopholes in the detection part of QKD systems [8]. MDI protocol has developed rapidly in recent years, with many achievements obtained [9,10,11,12,13,14,15,16,17,18,19]. In theory, the application of the decoy state method [20] has been further studied, and more optimized parameter estimation results are obtained to achieve a better performance [9,10,11]. Besides, different MDI experiment schemes have been proposed [12] and several meaningful experiment achievements, including the field test [13] and the network experiment [14] based on the MDI protocol, have been carried out. Meanwhile, the continuous-variable MDI protocol has also been developed [16,17,18,19]. With the developing of experimental research, the MDI protocol achieved a transmission distance of 404 km in 2016, which was the farthest distance for standard QKD at that time [15].
The transmission distance of QKD has been further increased recently. Based on the MDI protocol, an extraordinary protocol called twin-field quantum key distribution (TF-QKD) was proposed by Lucamarini et al. in 2018, which can increase the transmission distance to over 550 km on standard optical fibers without quantum repeaters [21]. Because of its outstanding advantage in transmission distance, TF-QKD has recently been the subject of a lot of follow-up research [22,23,24,25,26,27,28,29]. Actually, in the original protocol, the phase randomization process will lead to secure issues since the information of random phase is announced to Eve in the post-selection process [30]. In further research, different types of modified TF-QKD protocols have been proposed to improve the incomplete security analysis [22,23,24,25,26]. Through classifying the signals [22], or adding an extra test mode [23], or using a pre-selected global phase [25,26], the security loophole of the post-selected part can be resolved. With the modified protocols, long-distance TF-QKD experiments have already been implemented [28,29]. Recently, an exciting experimental work has shown that the transmission distance for TF-QKD can reach over 500 km in practice [28], showing that TF-type protocols can significantly improve the transmission distance with the currently available technology.
Among those TF-type protocols, the sending-or-not-sending (SNS) protocol proposed by Wang et al. is an effective scheme to combine with the decoy state method to solve the phase randomization problem. In the SNS protocol, there is no post-selection process for the random phases of the signal bits, which are used to generate the final secret keys, thus the problem is avoided [22]. By optimizing the proportion of the sending and not-sending signals, the SNS protocol can still achieve a very long transmission distance.
A remaining problem with the SNS protocol is that the prepared quantum state in the source is assumed to be an ideal coherent state. Actually, the assumption could be broken since the prepared state will deviate from the ideal coherent state due to the non-ideality of the practical laser [31]. Moreover, since the light source structure in the SNS protocol is similar to the BB84 protocol, there will also be an untrusted source problem [32,33,34,35,36] in the source part, causing the photon number distribution (PND) of the light source to be unknown, and the prepared state to no longer be a coherent state.
In this paper, we provide further discussion of the SNS protocol under the unknown PND condition (UPC). By analyzing the form of the prepared state in Eve’s view, it is shown that the security analysis in the SNS protocol is still valid without the coherent state assumption, and the final secret key rate can be derived naturally. By applying a light source monitoring (LSM) method proposed previously [37,38], all relevant parameters can be estimated compactly, thus the secret key rate of the SNS protocol under UPC can be obtained. Moreover, it is indicated that the performance of the SNS protocol under UPC can almost keep the same ideal source condition through the numerical simulation.
The paper is organized as follows. In Section 2, we first analyze the security of the SNS protocol under UPC and give the calculation method of the secret key rate for the SNS protocol under UPC, then introduce an LSM method to obtain tight bounds of the parameters needed in calculating the secret key rate. In Section 3, we show the simulation results by applying the LSM method in the SNS protocol under UPC. Finally, we provide conclusion to our work in Section 4.

2. SNS Protocol with LSM

2.1. Security Analysis under UPC

In the SNS protocol [22,27], Alice (Bob) prepares a coherent state with an intensity μ A ( μ B ), a random modulated phase δ A ( δ B ) and a global phase γ A ( γ B ). Only the states where Alice and Bob choose the same intensity ( μ A = μ B = μ ) will be retained for discussion, thus the joint state sent by Alice and Bob is | μ e i ( δ A + γ A ) | μ e i ( δ B + γ B ) . In Eve’s view, it has the convex form
ρ A B = k p k ( μ ) | ψ k ψ k | ,
where | ψ k refers to a joint state with total photon numbers k, and p k ( μ ) refers to the probability that the joint state contains k photons totally [22]. Specifically, the single-photon part of the state has the form of
| ψ 1 = 1 2 [ e i ( δ B + γ B ) | 0 A | 1 B + e i ( δ A + γ A ) | 1 A | 0 B ] .
| ψ 1 plays an important role during the whole security analysis of the SNS protocol [22]. In fact, the equivalent virtual protocols discussed in the security analysis focus on the single-photon part and the security analysis could remain valid when the phase difference between the two parts of the single state | 1 A | 0 B and | 0 A | 1 B remains to be
Δ ϕ = δ A + γ A δ B γ B .
Under UPC, the quantum state prepared by Alice (Bob) is no longer an ideal coherent state | μ e i ( δ A + γ A ) ( | μ e i ( δ B + γ B ) ), but a state with arbitrary PND, which can be written as | ψ A = k e i k ( δ A + γ A ) P k , A ( μ ) | k A ( | ψ B = k e i k ( δ B + γ B ) P k , B ( μ ) | k B ) after the modulation process, where P k , A ( μ ) ( P k , B ( μ ) ) is completely unknown.
As a result, with the analysis shown in Appendix A, the joint state sent by Alice and Bob can still have the convex form
ρ A B = n p n ( μ ) | ψ n ψ n |
in Eve’s view, with the n-photon state
| ψ n = 1 p n ( μ ) k = 0 n P k , A ( μ ) P n k , B ( μ ) e i k Δ ϕ | k A | n k B ,
and the probability of n-photon
p n ( μ ) = k = 0 n P k , A ( μ ) P n k , B ( μ ) .
Specifically, the single photon part of ρ A B under UPC can be written as
| ψ 1 = 1 2 [ | 0 A | 1 B + e i Δ ϕ | 1 A | 0 B ]
with a symmetric condition
P k , A ( μ ) = P k , B ( μ ) = P k ( μ ) ,
which is also assumed in the original SNS protocol [22]. This result indicates that the original security analysis can be directly applied to UPC, since the phase difference between | 1 A | 0 B and | 0 A | 1 B is still Δ ϕ , that is, | ψ 1 only has a global phase difference with | ψ 1 in Equation (2).

Secret Key Rate

Unlike the original TF-QKD, the SNS protocol divides all the transmitted light pulses into two categories, which are called signal windows and decoy windows [20,22]. In the signal window (equivalent to Z-basis), Alice (Bob) randomly chooses to send or not send a signal pulse, and the data are used to generate keys. In the decoy window (equivalent to X-basis), Alice (Bob) sends decoy states with different intensities and the data are used to estimate the count rate and phase error rate of the signals’ single photon part. In addition, there is a post-selection process for the random phases δ A , δ B to ensure more accurate estimation results, which originates from TF-QKD.
The secret key rate of the SNS protocol has been given as [22,27]:
R = 2 ϵ ( 1 ϵ ) P 1 L ( μ s ) s 1 L [ 1 H ( e 1 p h , U ) ] f S Z H ( E Z ) ,
in which ϵ is the probability that Alice (Bob) chooses to send out a signal pulse (it can be preset in the protocol), H ( x ) = x log 2 x ( 1 x ) log 2 ( 1 x ) is the binary Shannon entropy function, P 1 L ( μ s ) is the lower bound of the probability that a state with intensity μ s sent in signal windows contains single photon, s 1 L and e 1 U refer to the lower bound of the count rate and the upper bound of phase error rate for the single photon part of signals, S Z and E Z refer to the count rate and the bit error rate of the signals. In decoy windows, a three-intensity decoy method with intensities μ d 0 = 0 , μ d 1 , μ d 2 and μ d 2 > μ d 1 > 0 is used to estimate s 1 L and e 1 U and the results are obtained as [22]
s 1 L = p 2 ( μ d 2 ) [ S μ d 1 p 0 ( μ d 1 ) S 0 ] p 2 ( μ d 1 ) [ S μ d 2 p 0 ( μ d 2 ) S 0 ] p 2 ( μ d 2 ) p 1 ( μ d 1 ) p 2 ( μ d 1 ) p 1 ( μ d 2 ) ,
e 1 p h , U = S μ d 1 E μ d 1 p 0 ( μ d 1 ) S 0 / 2 p 1 ( μ d 1 ) s 1 L ,
where p 0 ( μ d k ) , p 1 ( μ d k ) , p 2 ( μ d k ) ( k = 0 , 1 , 2 ) are the probabilities that a state with intensity μ d k sent in decoy windows contains zero, single or two photons, S μ d k , E μ d k are the count rate and bit error rate of a state with intensity μ d k sent in decoy windows.
In the original SNS protocol, the light source is assumed to be able to prepare ideal coherent states [22], thus the PND of the light source satisfies Poisson distribution for each of Alice and Bob, that is,
P n , A ( μ ) = P n , B ( μ ) = P n ( μ ) = e μ μ n n !
for μ = { μ s , μ d 1 , μ d 2 } , hence the probabilities p n ( μ ) ( n = 0 , 1 , 2 ) obtained in Equation (6) can be directly calculated as:
p 0 ( μ ) = P 0 2 ( μ ) , p 1 ( μ ) = 2 P 0 ( μ ) P 1 ( μ ) , p 2 ( μ ) = 2 P 0 ( μ ) P 2 ( μ ) + P 1 2 ( μ ) .
When p n ( μ ) are known, the parameters s 1 L and e 1 U in Equations (10) and (11) can be estimated. In addition, the probability P 1 L ( μ s ) is also obtained exactly from Equation (12). With these results, the secret key rate in Equation (9) can eventually be calculated.
However, as mentioned above, the probabilities p n ( μ ) become unknown under UPC, though the security analysis can be held. Fortunately, as analyzed in Reference [39], the decoy-state method is still valid under UPC when the lower and upper bounds of p n ( μ ) ( n = 0 , 1 , 2 ) are obtained, and the results of s 1 L and e 1 U can be rewritten as
s 1 L = p 2 L ( μ d 2 ) [ S μ d 1 p 0 U ( μ d 1 ) S 0 ] p 2 U ( μ d 1 ) [ S μ d 2 p 0 L ( μ d 2 ) S 0 ] p 2 U ( μ d 2 ) p 1 U ( μ d 1 ) p 2 L ( μ d 1 ) p 1 L ( μ d 2 ) ,
e 1 p h , U = S μ d 1 E μ d 1 p 0 L ( μ d 1 ) S 0 / 2 p 1 L ( μ d 1 ) s 1 L ,
where p n L ( U ) ( μ ) refers to the lower (upper) bound of p n ( μ ) . With Equation (6), p n L ( U ) ( μ ) ( n = 0 , 1 , 2 ) can be obtained as
p 0 L ( U ) ( μ ) = [ P 0 L ( U ) ( μ ) ] 2 , p 1 L ( U ) ( μ ) = 2 P 0 L ( U ) ( μ ) P 1 L ( U ) ( μ ) , p 2 L ( U ) ( μ ) = 2 P 0 L ( U ) ( μ ) P 2 L ( U ) ( μ ) + [ P 1 L ( U ) ( μ ) ] 2
with Equation (8), hence the secret key rate can still be calculated effectively if tight bounds of P n ( μ ) are obtained.

2.2. Parameters Estimation with LSM

The source structure in the SNS protocol is similar to that of the BB84 and MDI protocol, therefore it is possible to apply the LSM scheme proposed in the BB84 and MDI protocol to the SNS protocol to estimate P n ( μ ) . Recently, a new LSM scheme proposed by us in the MDI protocol gives tight bounds of P n ( μ ) in each of Alice’s and Bob’s part under UPC [38]. Since the SNS protocol and the MDI protocol have the same structure in the intensity modulation part, the same LSM module can be added to the SNS protocol as shown in Figure 1, and with the extra LSM module, the same results can be obtained in the SNS protocol as follows [38]:
P 0 U ( μ ) = P 0 L ( μ ) = P μ ( η 0 ) 1 Y 0 ,
P 1 L ( μ ) = ( 1 η 2 ) 2 P μ ( η 1 ) ( 1 η 1 ) 2 P μ ( η 2 ) ( 1 Y 0 ) ( 1 η 1 ) ( 1 η 2 ) ( η 1 η 2 ) ( 1 1 η 1 + 1 1 η 2 ) P 0 U ( μ ) ,
P 1 U ( μ ) = ( 1 η 2 ) ( 1 η 1 ) [ 1 η 2 ( 1 η 1 ) ( 2 η 1 ) ] { P μ ( η 1 ) ( 1 η 1 ) 2 ( 1 Y 0 ) + [ 1 ( 1 η 2 ) 3 ] η 2 ( 1 η 2 ) 2 P 0 U ( μ ) + 1 η 2 η 2 P μ ( η 2 ) η 2 ( 1 η 2 ) 2 ( 1 Y 0 ) P 0 L ( μ ) ( 1 η 1 ) 2 } ,
P 2 L ( μ ) = P μ ( η 2 ) ( 1 Y 0 ) ( 1 η 2 ) 2 η 2 1 η 2 η 2 [ 1 ( 1 η 2 ) 3 ] ( 1 η 2 ) 2 η 2 P 0 U ( μ ) 2 η 2 1 η 2 P 1 U ( μ ) ,
P 2 U ( μ ) = P μ ( η 2 ) ( 1 Y 0 ) ( 1 η 2 ) 2 P 0 L ( μ ) ( 1 η 2 ) 2 P 1 L ( μ ) 1 η 2
with a condition
η 1 ( 2 η 2 ) > 1 ,
where η k ( k = 0 , 1 , 2 ) is the variable attenuation coefficient in the extra LSM module, P μ ( η k ) is the probabilities of the single photon detector’s (SPD) not responding in the LSM module, and Y 0 is the dark count rate of the SPD. When P n ( μ ) are estimated with the LSM scheme, the key parameters s 1 L , e 1 U in Equations (14) and (15) can be calculated, and the secret key rate of SNS protocol under UPC is obtained.

3. Performance with Numerical Simulation

The performance of the original SNS protocol and the SNS protocol with the LSM scheme can be compared with a determined light source condition. Considering an ideal simulation circumstance first [22], the PND of the light source, P n ( μ ) , is assumed to satisfy Equation (12). In this case, the probabilities P μ ( η ) in the LSM scheme can be simulated as [38]
P μ ( η ) = ( 1 Y 0 ) e η μ ,
and the estimation results of P n ( μ ) can be calculated with Equations (17)–(21). Except P μ ( η ) , other parameters used in Equations (9)–(11), (14) and (15), such as S μ d k , E μ d k , S Z , E Z , can be simulated with the same method discussed in the original SNS protocol [22,27], hence the final secret key rate can be calculated.
To compare the performance of the LSM scheme and the original SNS protocol under ideal simulation conditions, the simulation parameters, which are listed in Table 1, are set to be the same as in Reference [22]. Besides, for the LSM scheme, we set the attenuation coefficient as η 0 = 1 , η 1 = 0.95 , η 2 = 0.9 to obtain tight estimation results of P n ( μ ) ; other parameters, including the intensities μ s , μ d 1 , μ d 2 and the sending probability ϵ , are optimized at different transmission distances for both the original protocol and the SNS protocol with the LSM scheme.
The simulation results shown in Figure 2 indicate that, with the LSM scheme, the SNS protocol under UPC can have a performance that is almost the same as that of the original protocol with an ideal source. Specifically, both cases have a maximum transmission distance of up to over 800 km, and the difference between the LSM scheme and the ideal source condition is only about 0.5 km. Besides, the difference of the secret key rate between them is only about 1 % for a typical distance of 100 km.
In order to further analyze the practical performance of the SNS protocol and it with the LSM scheme, it is necessary to consider a more practical simulation circumstance. For a real-life QKD system, the PND of the source’s signals is not fixed although without Eve’s disturbance [31,40,41]. Under this condition, the performance of the original SNS protocol will be degraded even though the security problem of an unknown PND is ignored. Specifically, the signal sent out from the source can be considered as a fluctuated coherent state with a Gaussian-distributed average photon number μ , which has a probability distribution of
P ( μ ) = 1 2 π σ μ exp [ ( μ μ 0 ) 2 2 σ μ 2 ] ,
where μ 0 , σ μ are the mean value and the standard deviation of μ . Without the LSM module, the probabilities P n ( μ ) can only be estimated by assuming that μ belongs to a confidence interval, that is, μ [ μ L , μ U ] , with a confidence level ε = μ L μ U P ( μ ) d μ , where
μ L = ( 1 δ ) μ 0 , μ U = ( 1 + δ ) μ 0 ,
hence the results are
P 0 L ( U ) ( μ ) = e μ U ( L ) , P 1 L ( U ) ( μ ) = μ L ( U ) e μ L ( U ) , P 2 L ( U ) ( μ ) = μ L ( U ) 2 2 e μ L ( U ) .
For the LSM scheme, the probabilities P μ ( η ) can be simulated as
P μ ( η i ) = ( 1 Y 0 ) exp [ η i μ 0 ( η i σ μ ) 2 2 ]
after considering the source fluctuation [36,37], and P n ( μ ) can be estimated by P μ ( η i ) with Equations (17)–(21).
The performance of both the original SNS protocol and the original SNS protocol with LSM are simulated under different fluctuation coefficient σ = σ μ / μ 0 . The parameters are changed to be consistent with those in Reference [21] in Table 2 to simulate a more realistic condition, which is close to the practical experimental conditions [28], and ϵ , μ s , μ d 1 , μ d 2 are optimized as well. For the original SNS protocol, the confidence levels are set as ε = 1 10 10 , and in the LSM scheme, the attenuation coefficients are set as η 0 = 1 , η 1 = 0.95 , η 2 = 0.9 . The simulation results under the practical simulation condition shown in Figure 3 indicate that the LSM scheme still performs well in practice, as its performance remains almost the same under the fluctuated light source. As a comparison, the performance of the original SNS protocol decreases obviously with a light source fluctuation σ = 1 % , and its transmission distance even reduces to less than 500 km when σ = 2 % . Since the condition σ > 1 % is common in real-life QKD systems [40,41], the LSM scheme will have a better performance compared to the original SNS protocol in practice, although only the fluctuation problem is considered.

4. Conclusions

In summary, we analyze the security of the SNS protocol under UPC, and propose an LSM scheme to solve the unknown PND problem in the source part. An important problem for the SNS protocol is whether its security analysis is still valid without assuming the prepared state is an ideal coherent state. In this paper, we calculate the form of the quantum state sent from Alice and Bob in Eve’s view, and show that the single photon part of the state has the same form as the ideal source condition under UPC, thus the security analysis remains valid. We apply the LSM scheme proposed previously to the SNS protocol to estimate the probabilities p n ( μ ) precisely to eventually obtain a tight bound of the secret key rate. Through simulation, we show that, with the proposed LSM scheme, the performance of the SNS protocol under UPC can be almost the same as that of the original SNS protocol with an ideal source. Moreover, the LSM scheme improves the performance of the SNS protocol when considering source fluctuation, indicating that the SNS protocol can still have a long transmission distance with a fluctuated source in real-life QKD systems.

Author Contributions

Conceptualization, Y.Q., Z.C. and Y.Z.; methodology, Y.Q., Z.C. and Y.Z.; validation, Y.Q. and B.X.; formal analysis, Y.Q.; investigation, Y.Q. and Z.C.; resources, Y.Z. and H.G.; writing–original draft preparation, Y.Q.; writing—review and editing, Y.Q., Z.C. and B.X.; visualization, Y.Q.; funding acquisition, H.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China (Grant Nos. 61531003, 61771439) and the National Science Fund for Distinguished Young Scholars of China (Grant No. 61225003).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. The Convex Form of ρ A B under UPC

After the modulation of intensity and phase, the quantum state sent by Alice (Bob) can be written as a state with an arbitrary PND, | ψ A = k e i k ( δ A + γ A ) P k , A ( μ ) | k A ( | ψ B = k e i k ( δ B + γ B ) P k , B ( μ ) | k B ). Although the exact values of P k , A ( μ ) , P k , B ( μ ) are totally unknown, the form of the sent state ρ A B in Eve’s view can be calculated because of the randomness of the phase δ A , δ B . Actually, similar to the situation of original SNS protocol, the new independent variables δ ± = δ A ± δ B can be introduced as well, and the phase δ + is completely random for Eve [22], thus in Eve’s view, the quantum state sent from Alice and Bob is
ρ A B = 0 2 π P ( | ψ A | ψ B ) d δ + = 0 2 π P [ k e i k ( δ A + γ A ) P k , A ( μ ) | k A m e i m ( δ B + γ B ) P m , B ( μ ) | m B ] d δ + = 0 2 π k m P [ e i k ( δ A + γ A ) P k , A ( μ ) | k A | e i m ( δ B + γ B ) P m , B ( μ ) | m B ] d δ + = k m 0 2 π P [ e i ( k + m 2 δ + + k m 2 δ + k γ A + m γ B ) P k , A ( μ ) P m , B ( μ ) | k A | m B ] d δ + = k , k , m , m 0 2 π P k , A ( μ ) P k , A ( μ ) P m , B ( μ ) P m , B ( μ ) e i [ k + m k m 2 δ + + k k + m m 2 δ + ( k k ) γ A + ( m m ) γ B ] | k A | m B B m | A k | d δ + = k , k , m , m δ ( k + m k m ) P k , A ( μ ) P k , A ( μ ) P m , B ( μ ) P m , B ( μ ) e i [ k k + m m 2 δ + ( k k ) γ A + ( m m ) γ B ] | k A | m B B m | A k | = k , k , m P k , A ( μ ) P k , A ( μ ) P m , B ( μ ) P k + k m , B ( μ ) e i ( k k ) Δ ϕ | k A | m B B k + m k | A k | ,
where P ( | x ) = | x x | is the density matrix of | x , δ ( · ) is the Dirac delta function, and Δ ϕ = δ A + γ A δ B γ B .
The results of Equation (A1) can be written as
ρ A B = n | ψ n ( μ ) ψ n ( μ ) | ,
where | ψ n ( μ ) has the form of
| ψ n ( μ ) = k = 0 n P k , A ( μ ) P n k , B ( μ ) | k A | n k B .
After normalization, the form of ρ A B is eventually obtained as
ρ A B = n p n ( μ ) | ψ n ψ n | ,
in which
| ψ n = 1 p n ( μ ) k = 0 n P k , A ( μ ) P n k , B ( μ ) e i k Δ ϕ | k A | n k B
is the n-photon part of ρ A B , and
p n ( μ ) = k = 0 n P k , A ( μ ) P n k , B ( μ )
is the probability of n-photon.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  2. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef] [Green Version]
  4. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef] [Green Version]
  5. Lo, H.-K.; Curty, M.; Tamaki, K. Secure quantum key distribution. Nat. Photonics 2014, 8, 595–604. [Google Scholar] [CrossRef] [Green Version]
  6. Pirandola, S.; Vitali, D.; Tombesi, P.; Lloyd, S. Macroscopic entanglement by entanglement swapping. Phys. Rev. Lett. 2006, 97, 150403. [Google Scholar] [CrossRef] [Green Version]
  7. Braunstein, S.L.; Pirandola, S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 2012, 108, 130502. [Google Scholar] [CrossRef] [Green Version]
  8. Lo, H.-K.; Curty, M.; Qi, B. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [Green Version]
  9. Xu, F.; Curty, M.; Qi, B.; Lo, H.-K. Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 2013, 15, 113007. [Google Scholar] [CrossRef]
  10. Zhou, Y.-H.; Yu, Z.-W.; Wang, X.-B. Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100%. Phys. Rev. A 2014, 89, 052325. [Google Scholar] [CrossRef]
  11. Zhou, Y.-H.; Yu, Z.-W.; Wang, X.-B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Phys. Rev. A 2016, 93, 042324. [Google Scholar] [CrossRef] [Green Version]
  12. Ma, X.; Razavi, M. Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 2012, 86, 062319. [Google Scholar] [CrossRef] [Green Version]
  13. Rubenok, A.; Slater, J.A.; Chan, P.; Lucio-Martinez, I.; Tittel, W. Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks. Phys. Rev. Lett. 2013, 111, 130501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Fu, Y.; Yin, H.-L.; Chen, T.-Y.; Chen, Z.-B. Long-Distance Measurement-Device-Independent Multiparty Quantum Communication. Phys. Rev. Lett. 2015, 114, 090501. [Google Scholar] [CrossRef] [Green Version]
  15. Yin, H.-L.; Chen, T.-Y.; Yu, Z.-W.; Liu, H.; You, L.-X.; Zhou, Y.-H.; Chen, S.J.; Mao, Y.Q.; Huang, M.Q.; Zhang, W.J.; et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. Phys. Rev. Lett. 2016, 117, 190501. [Google Scholar] [CrossRef]
  16. Li, Z.; Zhang, Y.-C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef] [Green Version]
  17. Zhang, Y.-C.; Li, Z.; Yu, S.; Gu, W.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution using squeezed states. Phys. Rev. A 2014, 90, 052325. [Google Scholar] [CrossRef] [Green Version]
  18. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397. [Google Scholar] [CrossRef] [Green Version]
  19. Xu, B.; Li, Z.; Yang, J.; Wei, S.; Su, Q.; Huang, W.; Zhang, Y.; Guo, H. High speed continuous variable source-independent quantum random number generation. Quantum Sci. Technol. 2019, 4, 025013. [Google Scholar] [CrossRef] [Green Version]
  20. Hwang, W.-Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 2003, 91, 057901. [Google Scholar] [CrossRef] [Green Version]
  21. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef] [PubMed]
  22. Wang, X.-B.; Yu, Z.-W.; Hu, X.-L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef] [Green Version]
  23. Ma, X.; Zeng, P.; Zhou, H. Phase-Matching Quantum Key Distribution. Phys. Rev. X 2018, 8, 031043. [Google Scholar] [CrossRef] [Green Version]
  24. Tamaki, K.; Lo, H.-K.; Wang, W.Y.; Lucamarini, M. Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound. arXiv 2018, arXiv:1805.05511. [Google Scholar]
  25. Curty, M.; Azuma, K.; Lo, H.-K. Simple security proof of twin-field type quantum key distribution protocol. NPJ Quantum Inform. 2019, 5, 64. [Google Scholar] [CrossRef]
  26. Grasselli, F.; Curty, M. Practical decoy-state method for twin-field quantum key distribution. New J. Phys. 2019, 21, 073001. [Google Scholar] [CrossRef] [Green Version]
  27. Yu, Z.-W.; Hu, X.-L.; Jiang, C.; Hu, H.; Wang, X.-B. Sending-or-not-sending twin-field quantum key distribution in practice. Sci. Rep. 2019, 9, 3080. [Google Scholar] [CrossRef] [Green Version]
  28. Minder, M.; Pittaluga, M.; Roberts, G.L.; Lucamarini, M.; Dynes, J.F.; Yuan, Z.L.; Shields, A.J. Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 2019, 13, 334. [Google Scholar] [CrossRef]
  29. Wang, S.; He, D.-Y.; Yin, Z.-Q.; Lu, F.-Y.; Cui, C.-H.; Chen, W.; Zhou, Z.; Guo, G.-C.; Han, Z.-F. Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System. Phys. Rev. X 2019, 9, 021046. [Google Scholar] [CrossRef] [Green Version]
  30. Wang, X.-B.; Hu, X.-L.; Yu, Z.-W. Effective Eavesdropping to Twin-Field Quantum Key Distribution. arXiv 2018, arXiv:1805.02272. [Google Scholar]
  31. Wang, X.-B. Decoy-state quantum key distribution with large random errors of light intensity. Phys. Rev. A 2007, 75, 052301. [Google Scholar] [CrossRef] [Green Version]
  32. Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G. Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 2006, 73, 022320. [Google Scholar] [CrossRef] [Green Version]
  33. Zhao, Y.; Qi, B.; Lo, H.-K. Quantum key distribution with an unknown and untrusted source. Phys. Rev. A 2008, 77, 052327. [Google Scholar] [CrossRef] [Green Version]
  34. Peng, X.; Jiang, H.; Xu, B.; Ma, X.; Guo, H. Experimental quantum-key distribution with an untrusted source. Opt. Lett. 2008, 33, 2077–2079. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  35. Peng, X.; Xu, B.; Guo, H. Passive-scheme analysis for solving the untrusted source problem in quantum key distribution. Phys. Rev. A 2010, 81, 042320. [Google Scholar] [CrossRef] [Green Version]
  36. Xu, B.; Peng, X.; Guo, H. Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system. Phys. Rev. A 2010, 82, 042301. [Google Scholar] [CrossRef] [Green Version]
  37. Wang, G.; Li, Z.; Qiao, Y.; Chen, Z.; Peng, X.; Guo, H. Light Source Monitoring in Quantum Key Distribution With Single-Photon Detector at Room Temperature. IEEE J. Quantum Electron. 2018, 54, 9300110. [Google Scholar] [CrossRef] [Green Version]
  38. Qiao, Y.; Wang, G.; Li, Z.; Xu, B.; Guo, H. Monitoring an untrusted light source with single-photon detectors in measurement-device-independent quantum key distribution. Phys. Rev. A 2019, 99, 052302. [Google Scholar] [CrossRef]
  39. Wang, X.-B.; Peng, C.-Z.; Zhang, J.; Yang, L.; Pan, J.-W. General theory of decoy-state quantum cryptography with source errors. Phys. Rev. A 2008, 77, 042311. [Google Scholar] [CrossRef] [Green Version]
  40. Zhao, Y.; Qi, B.; Lo, H.-K.; Qian, L. Security analysis of an untrusted source for quantum key distribution: passive approach. New J. Phys. 2010, 12, 023024. [Google Scholar] [CrossRef]
  41. Xu, F.; Zhang, Y.; Zhou, Z.; Chen, W.; Han, Z.; Guo, G. Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system. Phys. Rev. A 2009, 80, 062309. [Google Scholar] [CrossRef]
Figure 1. The structure of the sending-or-not-sending (SNS) protocol with an extra LSM module in each of Alice’s and Bob’s parts. The LSM module is made up of a variable optical attenuators (VOA) and a single photon detector (SPD). By changing the attenuation coefficient of the VOA, various sets of the results on the responding probability of the SPD are obtained, which can be used to estimate P n ( μ ) effectively. The details of the monitoring scheme have been discussed in Reference [38].
Figure 1. The structure of the sending-or-not-sending (SNS) protocol with an extra LSM module in each of Alice’s and Bob’s parts. The LSM module is made up of a variable optical attenuators (VOA) and a single photon detector (SPD). By changing the attenuation coefficient of the VOA, various sets of the results on the responding probability of the SPD are obtained, which can be used to estimate P n ( μ ) effectively. The details of the monitoring scheme have been discussed in Reference [38].
Entropy 22 00036 g001
Figure 2. The performance of the proposed LSM scheme (red dash curve) compared to original SNS protocol (blue dash curve) with the parameters set as Table 1. The ratios of secret key rate between the LSM scheme and original SNS protocol are about 99.1 % , 98.9 % , 98.8 % at the distance of 100 ,   300 ,   500 km, and the maximum transmission distances of the LSM scheme and original SNS protocol are about 806.0 and 806.5 km.
Figure 2. The performance of the proposed LSM scheme (red dash curve) compared to original SNS protocol (blue dash curve) with the parameters set as Table 1. The ratios of secret key rate between the LSM scheme and original SNS protocol are about 99.1 % , 98.9 % , 98.8 % at the distance of 100 ,   300 ,   500 km, and the maximum transmission distances of the LSM scheme and original SNS protocol are about 806.0 and 806.5 km.
Entropy 22 00036 g002
Figure 3. The performance of the LSM scheme with an untrusted and fluctuated light source compared to original SNS protocol. σ : the fluctuation coefficient. For the LSM scheme, we consider a small fluctuation condition σ = 1 % (black dash curve) and a large fluctuation condition σ = 5 % (red dash curve), and the performance between them is still close. For the original protocol, we consider a small fluctuation condition σ = 1 % (blue curve) and a relatively large fluctuation condition σ = 2 % (yellow curve), since the condition σ = 2 % already has an obviously worse performance than σ = 1 % .
Figure 3. The performance of the LSM scheme with an untrusted and fluctuated light source compared to original SNS protocol. σ : the fluctuation coefficient. For the LSM scheme, we consider a small fluctuation condition σ = 1 % (black dash curve) and a large fluctuation condition σ = 5 % (red dash curve), and the performance between them is still close. For the original protocol, we consider a small fluctuation condition σ = 1 % (blue curve) and a relatively large fluctuation condition σ = 2 % (yellow curve), since the condition σ = 2 % already has an obviously worse performance than σ = 1 % .
Entropy 22 00036 g003
Table 1. Values of parameters used in simulation. α : the fiber loss coefficient (unit: dB/km); Y 0 : the dark count rate of the detector; η D : the detection efficiency; e det : the misalignment error of the QKD system; f: the error correction efficiency.
Table 1. Values of parameters used in simulation. α : the fiber loss coefficient (unit: dB/km); Y 0 : the dark count rate of the detector; η D : the detection efficiency; e det : the misalignment error of the QKD system; f: the error correction efficiency.
α Y 0 η D e det f
0.2 1.0 × 10 11 80 % 1 % 1.1
Table 2. Values of parameters used in simulation (set as in Reference [21] for a more practical condition).
Table 2. Values of parameters used in simulation (set as in Reference [21] for a more practical condition).
α Y 0 η D e det f
0.2 1.0 × 10 9 30 % 3 % 1.15

Share and Cite

MDPI and ACS Style

Qiao, Y.; Chen, Z.; Zhang, Y.; Xu, B.; Guo, H. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with Light Source Monitoring. Entropy 2020, 22, 36. https://doi.org/10.3390/e22010036

AMA Style

Qiao Y, Chen Z, Zhang Y, Xu B, Guo H. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with Light Source Monitoring. Entropy. 2020; 22(1):36. https://doi.org/10.3390/e22010036

Chicago/Turabian Style

Qiao, Yucheng, Ziyang Chen, Yichen Zhang, Bingjie Xu, and Hong Guo. 2020. "Sending-or-Not-Sending Twin-Field Quantum Key Distribution with Light Source Monitoring" Entropy 22, no. 1: 36. https://doi.org/10.3390/e22010036

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop