Next Article in Journal
Spherulites: How Do They Emerge at an Onset of Nonequilibrium Kinetic-Thermodynamic and Structural Singularity Addressing Conditions?
Next Article in Special Issue
Quantum Oblivious Transfer: A Short Review
Previous Article in Journal
Impact of Surface Roughness on Flow Physics and Entropy Generation in Jet Impingement Applications
Previous Article in Special Issue
Passive Light Source Monitoring for Sending or Not Sending Twin-Field Quantum Key Distribution
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method

1
Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications (NUPT), Nanjing 210003, China
2
Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing 210003, China
3
College of Computer Science and Technology, Nanjing Tech University, Nanjing 211816, China
*
Authors to whom correspondence should be addressed.
Entropy 2022, 24(5), 662; https://doi.org/10.3390/e24050662
Submission received: 18 April 2022 / Accepted: 6 May 2022 / Published: 8 May 2022
(This article belongs to the Special Issue Practical Quantum Communication)

Abstract

:
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters. Its variant protocol, sending or not-sending quantum key distribution (SNS-QKD), not only fixes the security vulnerability of TF-QKD, but also can tolerate large misalignment errors. However, the current SNS-QKD protocol is based on the active decoy-state method, which may lead to side channel information leakage when multiple light intensities are modulated in practice. In this work, we propose a passive decoy-state SNS-QKD protocol to further enhance the security of SNS-QKD. Numerical simulation results show that the protocol not only improves the security in source, but also retains the advantages of tolerating large misalignment errors. Therefore, it may provide further guidance for the practical application of SNS-QKD.

1. Introduction

Quantum key distribution (QKD) allows legitimate communicators to share a common key based on the laws of quantum physics [1,2,3]. Thus far, QKD has been developed for nearly 40 years, and great progress has been made both theoretically and experimentally. The emergence of excellent protocols, such as the BB84 protocol [4], Measurement-Device-Independent QKD (MDI-QKD) protocol [5,6,7,8,9] and Round-Robin Differential-Phase-Shift QKD (RRDPS-QKD) protocol [10,11,12], has promoted the progress of QKD. Unfortunately, the above protocols have not broken through the basic rate-distance limit of repeaterless QKD, which is called the PLOB bound [13].
In 2018, the revolutionary twin-field quantum key distribution (TF-QKD) protocol proposed by Lucanarini et al. [14] was able to effectively overcome the PLOB bound, and its experimental secure transmission distance even exceeded 500km. Then, many variant QKD protocols and further studies [15,16,17,18,19,20,21,22] followed to develop the performance of TF-QKD. As the protocol with the longest transmission distance in current QKD experiments, sending-or-not-sending TF-QKD (SNS-QKD) [15,23,24,25,26,27,28,29,30] not only fixes the security vulnerability of TF-QKD, but also tolerates large misalignment errors. Since the single-photon interference is not needed in the signal window [15], SNS-QKD is more practical than other TF-QKD variant protocols.
The QKD systems always adopt the decoy-state method [31,32,33,34,35] to tackle photon-number-splitting (PNS) attacks [36,37], so as to guarantee the security of the light source. Usually, different intensities are actively modulated by the acousto- or electro-optic modulators on the light sources in experiments. Although active modulation is sufficient to achieve decoy-state SNS-QKD, passive modulation of the pulse is still necessary in some cases—for instance, when the intensity modulator is not properly designed so that some physical parameters of the emitted pulses depend on the particular setting [38]. Thus, the active modulation of the pulse intensity at this time will cause severe security problems [38]. Thus far, passive decoy-state methods have been proposed [39,40,41,42,43] and verified [7,44] to be able to reduce the information leakage. However, SNS-QKD using the passive decoy-state method has not been proposed.
Here, in this work, we propose a passive decoy-state SNS-QKD scheme to further improve the security of SNS-QKD in a light source. The scheme uses the heralded single-photon source (HSPS) [45] as a signal source, while the weak coherent state source (WCSs) is still used as a decoy source. The authorized user Alice (or Bob) passively selects whether it is a signal window or a decoy window according to the local detection events occurring at her (his) side. In addition, we compare the performance of the passive scheme with the original SNS-QKD under different conditions, and it is indicated that the proposed protocol retains all the advantages of the original SNS-QKD.
The paper is arranged as follows. In Section 2, we describe the content of our protocol and its settings. We analyze the security of the passive decoy-state method SNS protocol in Section 3 and give the method of calculating the key rate in Section 4. In Section 5, we present the numerical simulation and give an analysis of the these results. Finally, the conclusion is given in Section 6.

2. Passive Decoy-State SNS-QKD Protocol

Before introducing our protocol, some assumptions are clarified. First of all, Alice, Bob and Charlie are completely isolated. Secondly, the path of local detection is much shorter than mode S and mode D.
The schematic diagram of passive decoy-state SNS-QKD is shown in Figure 1. Firstly, the pulses are split into two modes (mode D and mode S) by BS1. The mode D is used to send decoy-state pulses, and mode S is used to send signal-state pulses. Next, Alice and Bob passively select one of the modes according to local detection. If Alice (Bob) selects mode D (mode S), she (he) will use the VOA to attenuate the mode S (mode D) pulses. After the pulses are interfered by BS, Charlie announces the results of the successful events. Then, Alice and Bob extract the sifted keys according to the published measurement results. Finally, Alice and Bob can share a secure key after performing error correction and private amplification. The detailed steps of our passive decoy-state SNS-QKD scheme can be described as follows.
Step 1: First of all, the pulses are split into two modes (mode D and mode S) by BS1. The mode D adopts the weak coherent state sources (WCSs) while the mode S adopts the heralded single-photon source (HSPS). The pulses of mode D are modulated by an intensity modulator (IM) and encoded by a phase modulator (PM). The pulses of mode S are further separated into two parts through the parametric down-conversion (PDC) process of the NC. One part (local detection) consists of a beam splitter and two local detectors, and the pulses of another part are then encoded by a phase modulator (PM).
Step 2: Alice (Bob) passively selects whether it is a signal window or a decoy window based on the local detector events. When it is a decoy window, Alice (Bob) randomly chooses one from a few decoy states μ m e i θ a ( μ m e i θ b ) ( μ m μ , v , 0 ), which are WCSs. When it is a signal window, Alice (Bob) normally decides to send a signal pulse (HSPS) with a random phase shift θ a ( θ b ) by probability ϵ , and she (he) decides to attenuate the pulse by probability 1 ϵ after the detector click.
Note that, as shown in Table 1, the local detection events can be divided into four types, denoted as E i (i = 1, 2, 3, 4), corresponding to (1) no response, (2) only Da1 (Db1) response, (3) only Da2 (Db2) response, (4) both responses. Apparently, Alice (Bob) can use these four detection events to passively select whether it is a decoy window or a signal window. After Alice and Bob select the corresponding window, they will use the VOA to attenuate the pulses of the other window. For example, if Alice (Bob) chooses the signal window, she (he) can attenuate the decoy window pulses with a VOA. Moreover, the operation of ‘not sending’ a pulse in the original SNS-QKD [15] is no longer applicable in our protocol because, if no pulse is sent, there will be no local detection event response. Hence, in order to maintain the security equivalence with the original SNS-QKD, we use VOA to attenuate the pulse to zero output to represent the ‘not sending’ operation so as to maintain the completeness of the protocol.
Step 3: Charlie measures the incoming pulses with a BS and announces the measurement results.
Step 4: After the interference by BS, Alice and Bob announce the local detection events and the extra phase of the decoy window.
Note that successful events are defined as the following two situations: (a) both Alice and Bob select the corresponding signal window, and only one detector clicks on Charlie’s side; (b) when Charlie announces that only one detector clicks, Alice and Bob both select the corresponding decoy window, and phases θ a , θ b satisfy one of the following two equations:
θ a θ b 2 π M , θ a θ b π 2 π M ,
where M refers to the total number of phase slices pre-chosen by Alice and Bob.
Step 5: Alice and Bob take some post-processing measures such as error correction and privacy amplification to extract the secure key.

3. The Security Analysis

It is known that our protocol maintains most parts of the original SNS protocol except that the active decoy-state method is replaced by the passive-decoy state method. Therefore, we only need to analyze the security problems that are caused by this difference from the original SNS-QKD. Here, we discuss them individually as follows.
(i) The HSPS. In order to implement the passive decoy-state method, we use the HSPS to replace the WCSs of the original SNS in the signal window. Compared with WCPs, the HSPS has a larger single-photon component and smaller vacuum component, which has better performance in the QKD protocol. Many experiments have developed their applications [46,47] with HSPS. The SNS-QKD protocol with the HSPS was further discussed in Ref. [30]. Therefore, the replacement of HSPS will not cause security vulnerabilities of our protocol.
(ii) The passive decoy-state method. Many successful implementations of the passive decoy-state technique in QKD experiments show that it is practical and feasible for the passive decoy-state method [7,44]. Compared with the active decoy-state method, the passive decoy-state method selects the signal state and the decoy state according to the local detection events. This approach not only does not have security vulnerabilities but also improves the security of the protocol. Firstly, the passive decoy-state method can also resist PNS attacks as the eavesdropper cannot distinguish whether the pulse is in the decoy state or signal state. Secondly, it can avoid the security vulnerabilities caused by actively modulating the intensity of the source. For example, Jiang et al. proposed an attack called wavelength-selected photon-number-splitting (WSPNS) in 2012. This attack uses the frequency factor introduced by intensity modulation to distinguish the signal state and decoy state. However, the proposed scheme uses local detection events to distinguish the signal states and decoy states. Therefore, we can make the signal state intensity (laser intensity) the same as one of the decoy state. When both the signal-state intensity and the decoy-state intensity are same (for instance, both intensities are μ ), intensity modulation is no longer required. For the vacuum decoy state, the frequency cannot be introduced because there is no pulse. Since there are two decoy states that cannot be distinguished, the WSPNS attack will become ineffective.
(iii) Attenuation of the pulses. In our protocol, the choice of signal state and decoy state needs to be determined according to the response of the local detector. Therefore, we use the VOA to attenuate the pulses instead of not sending pulses. Although the imperfections of the VOA device will decrease the key generation rate of our protocol, it does not leak any information. Thus, attenuation of the pulses has no impact on the security. Additionally, one can reduce the key rate decrease in the post-processing stage.

4. The Key Rate

In this part, we will discuss the key rate of the passive decoy-state method SNS-QKD.

4.1. The Probability Distribution

In this protocol, we need to deduce the corresponding probability distribution of E 1 event to analyze the key rate. Following the previous works on QKD with the passive decoy-state method [41,42], we give a brief overview of the derivation process as follows.
Taking the Alice side as an example, suppose that d 1 and d 2 are the dark counts of the two local detectors. If the photon number state projected to the Da1 and Da2 detectors is s 1 s 2 , the projecting probability P E i | s 1 s 2 corresponding to event E i (i = 1, 2, 3, 4) can be obtained as shown in Table 2.
For any n-photon state, the projecting probability P s 1 s 2 | n projecting into state s 1 s 2 can be written as
P s 1 s 2 | n = k = 0 n s 2 = 0 n k s 1 = 0 k C n k t k ( 1 t ) n k C k s 1 η 1 s 1 ( 1 η 1 ) k s 1 C n k s 2 η 2 s 2 ( 1 η 2 ) n k s 2 = k = 0 n s 2 = 0 n k s 1 = 0 k n ! t k ( 1 t ) n k η 1 s 1 η 2 s 2 ( 1 η 1 ) k s 1 ( 1 η 2 ) n k s 2 s 1 ! s 2 ! ( k s 1 ) ! ( n k s 2 ) ! ,
where t represents the transmittance of BS, and η 1 and η 2 represent the detection efficiency of detector Da1 and detector Da2, respectively.
Therefore, for any n-photon state, the probability of obtaining E i event can be written as
P E i | n = s 1 s 2 P E i | s 1 s 2 P s 1 s 2 | n .
Then, we can obtain the probability distribution of detection events P n E 1 as
P n E i = P n s 1 s 2 P E i | s 1 s 2 P s 1 s 2 | n
where P n is the photon-number distribution of the PDC process and it can be either a thermal or Poisson distribution, as introduced in [48,49].

4.2. The Parameter Estimation

As shown in Table 3, we take E 1 as the signal window event and other events as the decoy window events. According to Ref. [15], we can obtain the key rate of our protocol as
R = 2 ϵ ( 1 ϵ ) P 1 E 1 E 1 Y 1 [ 1 H 2 ( e 1 ) ] Q E 1 E 1 f H 2 ( E E 1 E 1 ) ,
where P 1 E 1 E 1 is the probability distribution of single-photon states in the signal window, i.e., P n E 1 E 1 = k = 0 n P k E 1 P n k E 1 [27]. f is the error correction inefficiency; H 2 ( a ) = x log 2 a ( 1 a ) log 2 ( 1 a ) ; Y 1 and e 1 are the yield and error rate of single-photon states. Q E 1 E 1 and E E 1 E 1 are the total gain and error rate of signal states in the signal window, respectively.
In the decoy window, we still use the WCPs and two weaks + vacuum decoy-state method as the original SNS protocol. According to the previous decoy-state method [7,15,24,27,32,33], we can obtain the lower bound of Y 1 and the upper bound of e 1 as follows:
Y 1 P 2 μ ( Q v P 0 v Y 0 ) P 2 v ( Q μ P 0 μ Y 0 ) P 2 μ P 1 v P 2 v P 1 μ ,
e 1 Q v E v P 0 v Y 0 e 0 P 0 v Y 1 ,
where the subscript 0 indicates that Alice and Bob prepare a vacuum state. P n μ (n = 0, 1, 2) is the probability distribution of intensity μ , and the total photon number is n. Q μ ( Q v ) and E μ ( E v ) are the gain and quantum bit error rate (QBER) of intensity μ (v).

5. Numerical Simulations

In this part, we present some results of the numerical simulation. Here, we focus on the symmetric case, which means that the device parameters at the Alice side and Bob side are identical. To simplify the calculation, we also let d 1 = d 2 = d L and η 1 = η 2 = η L . According to Equation (4), we can obtain the simplified probability distribution P n E 1 for the Alice side and Bob side as
P n E 1 = C μ ( 1 d L ) 2 ( 1 η L ) n P n ,
where P n is a Poissonian distribution, i.e., P n = u n n ! e u . Here, C μ is the normalization factor, which is C μ 1 = n = 0 P n E 1 .
Next, we derive the values that should be observed in the experiment. According to Refs. [24,26], the corresponding gains and the QBERs in the signal window are given by
Q E 1 E 1 =   ( 1 ϵ ) 2 Y 0 + 4 ϵ ( 1 ϵ ) ( 1 d c ) n P n E 1 ( 1 η ) n n P n E 1 ( 1 ( 1 d c ) ( 1 η ) n ) +   2 ϵ 2 ( 1 d c ) n P n E 1 E 1 ( 1 η ) n n P n E 1 E 1 ( 1 ( 1 d c ) ( 1 η ) n ) ,
E E 1 E 1 Q E 1 E 1 = ( 1 ϵ ) 2 Y 0 + 2 ϵ 2 ( 1 d c ) n P n E 1 E 1 ( 1 η ) n n P n E 1 E s ( 1 ( 1 d c ) ( 1 η ) n ) ,
where Y 0 is the yield of the vacuum pulse; d c is the dark count rate of detectors at the Charlie side; η is the total system efficiency, which is η = η d η c ; η d is the detection efficiency in Charlie’s part; η c is the transmittance of the quantum channel, η c = 10 α l 2 10 , α is the fiber loss coefficient and l is the distance between Alice and Bob. The device parameters used in numerical simulations are listed in Table 4.
Figure 2 shows the comparison of the key rates between the passive decoy-state SNS-QKD and the original SNS-QKD. Note that the performance of our scheme is also related to the quality of local detectors, e.g., the dark count rate and the detection efficiency. The simulation results indicate that, with the passive decoy-state scheme, our protocol can have a performance that is close to that of the original SNS protocol. Moreover, they all exceed the PLOB limit when l 300 km.
Figure 3 shows the performance of both the original SNS protocol and passive decoy-state SNS-QKD simulated under misalignment errors e a . The misalignment error rates are set as 0.015, 0.15 and 0.30, respectively. Moreover, we also add an MDI-QKD curve for comparison. For the key rate of MDI-QKD, the misalignment error rate of X-basis is set to 0.015 and Z-basis is set to 0. The numerical results show that passive decoy-state SNS-QKD still performs well under different misalignment errors, as its performance remains close to the original SNS protocol. In addition, compared with the MDI-QKD, our protocol has better key rate performance, even if the misalignment error is as high as 0.25. In other words, the proposed protocol can still tolerate quite high misalignment errors.
Figure 4 shows the comparison of the tolerance of passive decoy SNS-QKD and original SNS-QKD to misalignment errors e a . The simulation distance is set to 300 km. Obviously, the SNS-QKD with the passive decoy-state scheme is very close to the original SNS-QKD protocol. Even if the misalignment error reaches 0.30, the performance of the two protocols is still good. This shows that the proposed protocol still retains the advantages of the original SNS-QKD protocol, indicating that the SNS protocol has a broader prospect in implementing long-distance QKD.

6. Conclusions

In summary, we have proposed the passive decoy-state SNS-QKD protocol to enhance the security of the source of the SNS-QKD protocol. We have presented the framework of the passive decoy-state SNS-QKD protocol and have analyzed the security of the proposed protocol. The numerical simulation results have demonstrated that the key rates of our proposed protocol are close to the original SNS-QKD, which uses the active decoy-state method. Moreover, our protocol can tolerate larger misalignment errors in QKD systems, indicating that the SNS protocol can still have a long transmission distance with a passive decoy-state in real-life QKD systems. Therefore, our protocol represents a further step toward the application of the SNS-QKD.

Author Contributions

Conceptualization, K.X. and Z.S.; investigation, K.X.; writing—review and editing, K.X., S.Z., Z.S. and Q.M.; funding acquisition, Z.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (61871234) and the open research fund of the Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education (JZNY202104).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lo, H.K.; Chau, H.F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 1999, 283, 2050–2056. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Mayers, D. Unconditional security in quantum cryptography. J. ACM 2001, 48, 351–406. [Google Scholar] [CrossRef]
  4. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, 10–12 December 1984; pp. C175–C179. [Google Scholar]
  5. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Ma, X.; Razavi, M. Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 2012, 86, 062319. [Google Scholar] [CrossRef] [Green Version]
  7. Wang, X.B. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors. Phys. Rev. A 2013, 87, 012320. [Google Scholar] [CrossRef] [Green Version]
  8. Zhou, Y.H.; Yu, Z.W.; Wang, X.B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Phys. Rev. A 2016, 93, 042324. [Google Scholar] [CrossRef] [Green Version]
  9. Li, Z.; Zhang, Y.C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef] [Green Version]
  10. Sasaki, T.; Yamamoto, Y.; Koashi, M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature 2014, 509, 475–478. [Google Scholar] [CrossRef]
  11. Wang, L.; Zhao, S. Round-robin diferential-phase-shift quantum key distribution with heralded pair-coherent sources. Quantum Inf. Process. 2017, 16, 100. [Google Scholar] [CrossRef]
  12. Mao, Q.P.; Wang, L.; Zhao, S.M. Plug-and-play round-robin differential phase-shift quantum key distribution. Sci. Rep. 2017, 7, 1–8. [Google Scholar]
  13. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 1–15. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef] [PubMed]
  15. Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef] [Green Version]
  16. Xu, H.; Yu, Z.W.; Jiang, C.; Hu, X.L.; Wang, X.B. Sending-or-not-sending twin-field quantum key distribution: Breaking the direct transmission key rate. Phys. Rev. A 2020, 101, 042330. [Google Scholar] [CrossRef]
  17. Ma, X.; Zeng, P.; Zhou, H. Phase-matching quantum key distribution. Phys. Rev. X 2018, 8, 031043. [Google Scholar] [CrossRef] [Green Version]
  18. Chen, G.; Wang, L.; Li, W.; Zhao, Y.; Zhao, S.M.; Gruska, J. Multiple-pulse phase-matching quantum key distribution. Quantum Inf. Process. 2020, 19, 1–16. [Google Scholar] [CrossRef]
  19. Yu, Y.; Wang, L.; Zhao, S.; Mao, Q. Decoy-state phase-matching quantum key distribution with source errors. Opt. Express 2021, 29, 2227–2243. [Google Scholar] [CrossRef]
  20. Yu, B.; Mao, Q.; Zhu, X.; Yu, Y.; Zhao, S. Phase-matching quantum key distribution based on pulse-position modulation. Phys. Lett. A 2021, 418, 127702. [Google Scholar] [CrossRef]
  21. Lin, J.; Ltkenhaus, N. Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 2018, 98, 042332. [Google Scholar] [CrossRef] [Green Version]
  22. Cui, C.; Yin, Z.Q.; Wang, R.; Chen, W.; Wang, S.; Guo, G.C.; Han, Z.F. Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl. 2019, 11, 034053. [Google Scholar] [CrossRef] [Green Version]
  23. Hu, X.L.; Jiang, C.; Yu, Z.W.; Wang, X.B. Sending-or-not-sending twin-field protocol for quantum key distribution with asymmetric source parameters. Phys. Rev. A 2019, 100, 062337. [Google Scholar] [CrossRef] [Green Version]
  24. Yu, Z.W.; Hu, X.L.; Jiang, C.; Xu, H.; Wang, X.B. Sending-or-not-sending twin-field quantum key distribution in practice. Sci. Rep. 2019, 9, 1–8. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Jiang, C.; Yu, Z.W.; Hu, X.L.; Wang, X.B. Unconditional security of sending or not sending twin-field quantum key distribution with finite pulses. Phys. Rev. Appl. 2019, 12, 024061. [Google Scholar] [CrossRef] [Green Version]
  26. Zhang, C.H.; Zhang, C.M.; Wang, Q. Twin-field quantum key distribution with modified coherent states. Opt. Lett. 2019, 44, 1468–1471. [Google Scholar] [CrossRef]
  27. Qiao, Y.; Chen, Z.; Zhang, Y.; Xu, B.; Guo, H. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with Light Source Monitoring. Entropy 2020, 22, 36. [Google Scholar] [CrossRef] [Green Version]
  28. Xue, K.; Zhao, S.; Mao, Q.; Xu, R. Plug-and-play sending-or-not-sending twin-field quantum key distribution. Quantum Inf. Process. 2021, 20, 1–16. [Google Scholar] [CrossRef]
  29. Lu, Y.-F.; Wang, Y.; Jiang, M.-S.; Zhang, X.-X.; Liu, F.; Li, H.-W.; Zhou, C.; Tang, S.-B.; Wang, J.-Y.; Bao, W.-S. Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources. Entropy 2021, 23, 1103. [Google Scholar] [CrossRef]
  30. Xu, H.; Hu, X.L.; Feng, X.L.; Wang, X.B. Hybrid protocol for sending-or-not-sending twin-field quantum key distribution. Opt. Lett. 2020, 45, 4120–4123. [Google Scholar] [CrossRef]
  31. Hwang, W.Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 2003, 91, 057901. [Google Scholar] [CrossRef] [Green Version]
  32. Ma, X.; Qi, B.; Zhao, Y.; Lo, H.K. Practical decoy state for quantum key distribution. Phys. Rev. A 2005, 72, 012326. [Google Scholar] [CrossRef] [Green Version]
  33. Lo, H.K.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  34. Wang, X.B. Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography. Phys. Rev. Lett. 2005, 94, 230503. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  35. Wang, X.B. Decoy-state protocol for quantum cryptography with four different intensities of coherent light. Phys. Rev. A 2005, 72, 012322. [Google Scholar] [CrossRef] [Green Version]
  36. Zhao, Y.; Qi, B.; Lo, H.K.; Qian, L. Security analysis of an untrusted source for quantum key distribution: Passive approach. New J. Phys. 2010, 12, 023024. [Google Scholar] [CrossRef]
  37. Tang, G.Z.; Sun, S.H.; Xu, F.; Chen, H.; Li, C.Y.; Liang, L.M. Experimental asymmetric plug-and-play measurement-device-independent quantum key distribution. Phys. Rev. A 2016, 94, 032326. [Google Scholar] [CrossRef] [Green Version]
  38. Jiang, M.S.; Sun, S.H.; Li, C.Y.; Liang, L.M. Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states. Phys. Rev. A 2012, 86, 032310. [Google Scholar] [CrossRef] [Green Version]
  39. Mauerer, W.; Silberhorn, C. Quantum key distribution with passive decoy state selection. Phys. Rev. A 2007, 75, 050305. [Google Scholar] [CrossRef] [Green Version]
  40. Adachi, Y.; Yamamoto, T.; Koashi, M.; Imoto, N. Simple and efficient quantum key distribution with parametric down-conversion. Phys. Rev. Lett. 2007, 99, 180503. [Google Scholar] [CrossRef] [Green Version]
  41. Wang, Q.; Zhang, C.H.; Wang, X.B. Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rev. A 2016, 93, 032312. [Google Scholar] [CrossRef]
  42. Zhang, C.H.; Zhang, C.M.; Wang, Q. Efficient passive measurement-device-independent quantum key distribution. Phys. Rev. A 2019, 99, 052325. [Google Scholar] [CrossRef] [Green Version]
  43. Teng, J.; Lu, F.-Y.; Yin, Z.-Q.; Fan-Yuan, G.-J.; Wang, R.; Wang, S.; Chen, W.; Huang, W.; Xu, B.-J.; Guo, G.-C.; et al. Twin-field quantum key distribution with passive-decoy state. New J. Phys. 2020, 22, 103017. [Google Scholar] [CrossRef]
  44. Zhang, C.-H.; Wang, D.; Zhou, X.-Y.; Wang, S.; Zhang, L.-B.; Yin, Z.-Q.; Chen, W.; Han, Z.-F.; Guo, G.-C.; Wang, Q. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss. Opt. Express 2018, 26, 25921–25933. [Google Scholar] [CrossRef] [PubMed]
  45. Yurke, B.; Potasek, M. Obtainment of thermal noise from a pure quantum state. Phys. Rev. A 1987, 36, 3464. [Google Scholar] [CrossRef]
  46. Barreiro, J.T.; Langford, N.K.; Peters, N.A.; Kwiat, P.G. Generation of hyperentangled photon pairs. Phys. Rev. Lett. 2005, 95, 260501. [Google Scholar] [CrossRef] [Green Version]
  47. Li, X.; Voss, P.L.; Sharping, J.E.; Kumar, P. Optical-fiber source of polarization-entangled photons in the 1550 nm telecom band. Phys. Rev. Lett. 2005, 94, 053601. [Google Scholar] [CrossRef] [Green Version]
  48. Ribordy, G.; Brendel, J.; Gautier, J.D.; Gisin, N.; Zbinden, H. Long-distance entanglement-based quantum key distribution. Phys. Rev. A 2000, 63, 012309. [Google Scholar] [CrossRef] [Green Version]
  49. Mori, S.; Söderholm, J.; Namekata, N.; Inoue, S. On the distribution of 1550-nm photon pairs efficiently generated using a periodically poled lithium niobate waveguide. Opt. Commun. 2006, 264, 156–162. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The settings of the passive decoy-state SNS-QKD protcol. BS, beam splitter; IM, intensity modulator; PM, phase modulator; VOA, variable optical attenuator; NC, nonlinear crystal; Local detection, a beam splitter and two local single-photon detectors (Da1 and Da2, Db1 and Db2); D1 and D2, single-photon detectors at Charlie side.
Figure 1. The settings of the passive decoy-state SNS-QKD protcol. BS, beam splitter; IM, intensity modulator; PM, phase modulator; VOA, variable optical attenuator; NC, nonlinear crystal; Local detection, a beam splitter and two local single-photon detectors (Da1 and Da2, Db1 and Db2); D1 and D2, single-photon detectors at Charlie side.
Entropy 24 00662 g001
Figure 2. The performance of the passive decoy-state SNS-QKD compared to original SNS protocol.
Figure 2. The performance of the passive decoy-state SNS-QKD compared to original SNS protocol.
Entropy 24 00662 g002
Figure 3. The performance of both original SNS protocol and passive decoy-state SNS-QKD is simulated under misalignment errors e a . P: Passive decoy-state SNS-QKD. O: Original SNS-QKD. MDI-QKD: MDI-QKD with active decoy-state method in coherent states.
Figure 3. The performance of both original SNS protocol and passive decoy-state SNS-QKD is simulated under misalignment errors e a . P: Passive decoy-state SNS-QKD. O: Original SNS-QKD. MDI-QKD: MDI-QKD with active decoy-state method in coherent states.
Entropy 24 00662 g003
Figure 4. Key rates as a function of the misalignment error when the distance between Alice and Bob is 300 km.
Figure 4. Key rates as a function of the misalignment error when the distance between Alice and Bob is 300 km.
Entropy 24 00662 g004
Table 1. Definition of various detection events. Taking Alice side as an example, 0 indicates that the detector has not clicked, and 1 indicates that the detector has clicked.
Table 1. Definition of various detection events. Taking Alice side as an example, 0 indicates that the detector has not clicked, and 1 indicates that the detector has clicked.
EventsDa1Da2
E 1 00
E 2 10
E 3 01
E 4 11
Table 2. Probability of the E i (i = 1, 2, 3, 4) event occurring.
Table 2. Probability of the E i (i = 1, 2, 3, 4) event occurring.
Case P E 1 | s 1 s 2 P E 2 | s 1 s 2 P E 3 | s 1 s 2 P E 4 | s 1 s 2
s 1 = 0 , s 2 = 0 ( 1 d 1 ) ( 1 d 2 ) d 1 ( 1 d 2 ) ( 1 d 1 ) d 2 d 1 d 2
s 1 0 , s 2 = 0 0 ( 1 d 2 ) 0 d 2
s 1 = 0 , s 2 0 00 ( 1 d 1 ) d 1
s 1 0 , s 2 0 0001
Table 3. Definition of signal window and decoy window based on the detection events.
Table 3. Definition of signal window and decoy window based on the detection events.
SenderSignal WindowDecoy Windows
Alice E 1 other events
Bob E 1 other events
Table 4. Device parameters used in numerical simulations.
Table 4. Device parameters used in numerical simulations.
α e 0 η d η L d c d L f
0.20.50.50.5 10 10 10 10 1.10
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xue, K.; Shen, Z.; Zhao, S.; Mao, Q. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method. Entropy 2022, 24, 662. https://doi.org/10.3390/e24050662

AMA Style

Xue K, Shen Z, Zhao S, Mao Q. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method. Entropy. 2022; 24(5):662. https://doi.org/10.3390/e24050662

Chicago/Turabian Style

Xue, Ke, Zhigang Shen, Shengmei Zhao, and Qianping Mao. 2022. "Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method" Entropy 24, no. 5: 662. https://doi.org/10.3390/e24050662

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop