Literature DB >> 23948999

Decoy-state quantum key distribution with biased basis choice.

Zhengchao Wei1, Weilong Wang, Zhen Zhang, Ming Gao, Zhi Ma, Xiongfeng Ma.   

Abstract

We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states.

Entities:  

Mesh:

Year:  2013        PMID: 23948999      PMCID: PMC3744800          DOI: 10.1038/srep02453

Source DB:  PubMed          Journal:  Sci Rep        ISSN: 2045-2322            Impact factor:   4.379


Quantum key distribution (QKD)12 is one of the most realistic applications in quantum information. It aims at extending a secret key between two distant parties, commonly noted as Alice and Bob. The unconditional security has been proven even when an eavesdropper, Eve, has unlimited computation power permitted by quantum mechanics3456. The best known protocol of QKD is the BB84 protocol1 presented by Bennett and Brassard in 1984. In BB84, Alice encodes the key information randomly into the X and Z bases and sends quantum pulses to Bob. Bob measures the received pulses in two bases randomly. After that, they compare the basis through an authenticated classical channel. The key can only be extracted from the pulses where they use the same basis and this results in that on average half of the raw data is discarded. That is, the basis-sift factor is 1/2 in the original BB84 protocol. This factor can be improved by the efficient BB84 scheme proposed by Lo et al.7. In the efficient scheme, Alice and Bob put a bias in the probabilities of choosing the Z basis and X basis, which can make the basis sift-factor close to 100% in the infinitely long key limit. The efficient BB84 scheme is experimentally demonstrated in 20098. In practical QKD systems, a highly attenuated laser or a weak coherent state source is widely used to substitute for a perfect single-photon source which is beyond state-of-the-art technology. A weak coherent state source contains multi-photon components (details shown in Methods). When multi-photon states are used for QKD, Eve can launch attacks, like the photon-number-splitting (PNS) attack910, to break the security. Since Eve could have a full control of the quantum channel, she can make the transmittance of multi-photon states to be 100% in the PNS attack. In a conventional security analysis11, Alice and Bob have to assume all the losses and errors come from the single-photon components in the worst scenario case. As a result, the performance of QKD is very poor. To improve the performance of the weak coherent state QKD, Hwang proposed the decoy-state method12. Instead of sending one coherent state, Alice sends pulses with different intensities, so that she can obtain more information to monitor the quantum channel. To maintain the detection statistics of coherent states with different intensities, Eve is not able to change the transmittances of single-photon and multi-photon state freely without being noticed by Alice and Bob. The security of the decoy-state method is proven13, along with various practical schemes1415. Follow-up experimental demonstrations show that the decoy-state method is a very effective way to improve QKD performance1617181920. Naturally, we can improve the decoy-state method by applying the biased-basis idea of the efficient BB84 protocol. There are a few observations. First, Alice does not need to choose basis when she chooses the vacuum decoy state. Second, if Alice and Bob mainly choose one basis, say Z basis, for key generation, they effectively treat X basis as for quantum channel testing. In this sense, the functionality of X basis is similar to the decoy states. Intuitively, one may expect to combine decoy states and X basis together. Here, we propose a new decoy-state method with biased basis choice, following the widely used decoy-state scheme, vacuum + weak decoy-state method15 (a quick review is shown in Methods), where Alice sends out pulses with three different intensities, vacuum (with an intensity of 0), weak decoy (with an intensity of ν) and signal (with an intensity of μ) states. Alice prepares all the signal pulses (μ) in the Z basis, where the final secure key is extracted from. She prepares weak decoy pulses (ν) in the X and Z with certain probabilities. If she chooses the vacuum decoy state, she does not need to set any basis. Bob measures the received pulses in the X basis and Z basis with probabilities p and p, respectively. The scheme is summarized in Table 1. In the new scheme, only 4 sets of preparations are used by Alice. Compared to the original vacuum + weak decoy-state method, where 6 sets are used, the proposed scheme can simplify the system and reduce the cost of random numbers. Later in the simulation, we will show that this scheme can also improve the QKD performance.
Table 1

List of Alice and Bob's operations. Alice prepares and sends N pulses, with . Bob measures the received pulses with certain probabilities, p + p = 1

Alice prepares and sendsBob measures
signal pulses in the Z basiswith probability pz in the Z basis
decoy pulses in the Z basis 
decoy pulses in the X basiswith probability px in the X basis
vacuum pulses 
Following the GLLP security analysis11, the key generation rate1321 is given by where q is the raw data sift factor, including basis-sift factor and signal-state ratio; I is the cost of error correction and the rest terms in the bracket is the rate of privacy amplification; f is the error correction inefficiency; Q and E are the overall gain and quantum bit error rate (QBER); is the gain of the single-photon components and is its corresponding phase error rate; Q0 is the background gain; H(x) = −x log2(x) − (1 − x) log2(1 − x) is the binary Shannon entropy function. Note that in our scheme, the final key is extracted from Z-basis measurement results, so all the variables in equation (1) should be measured in the Z basis. The phase error rate cannot be measured directly, which, instead, can be inferred from the error rate in the X basis22. The gain and QBER, Q and E, can be measured from the experiment directly. Alice and Bob need to estimate and for privacy amplification. According to the model reviewed in Methods, we have and Q0 = Y0e−, where and Y0 are the yield of single-photon components measured in the Z basis and background rate, respectively. In order to lower bound the key rate equation (1), one can lower bound , Y0 and upper bound . Since that both the vacuum state and the single-photon state are basis independent, the yields of vacuum states and single-photon states in different bases are equal While a multi-photon state is basis dependent, whose basis information may be revealed to Eve by, for example, PNS attack9, so for any i-photon state (i ≥ 2), in general, That is, depending on the basis information, Eve may set the yield of i-photon state different for the X and Z bases. As for the error rates, the phase error probability in the Z basis equals to the bit error probability in the X basis Then, in the finite-key-size situation where statistical fluctuations should be taken into account2223, we have Given , we can upper bound by the random sampling argument (details shown in Methods). We need to point out that even though the single-photon state is basis independent, the error rates in two basis may not be the same This can be easily seen by considering a simple intercept-and-resend attack where Eve measures all the pulses in the Z basis, and then she will not introduce any additional error in the Z basis , but .

Results

In our simulation, the parameters of the experimental setup are listed in Table 2. Statistical fluctuations are taken into account in the simulation (details shown in Methods). We compare the key generation rate in our scheme with that in the standard BB84 protocol with the vacuum + weak decoy-state scheme. The result is shown in Fig. 1.
Table 2

List of experimental parameters for simulation

NtotalfedY0
6 × 1091.163.3%1.7 × 10−6
Figure 1

Plot of key rate versus total transmittance.

The solid line shows the result of our scheme and the red line shows the result of the standard BB84 with the vacuum + weak decoy-state method. The simulation parameters are shown in Table 2. The confidence interval for statistical fluctuation is 5 standard deviations (i.e., 1–5.73 × 10−7). The expected photon number of signal state μ is 0.479. For each transmission loss, we optimize all the parameters, ν, N, , , N0, p, and p.

As one can see from Fig. 1, the key rate of the proposed biased scheme is larger than that of the standard BB84 with vacuum + weak decoy states by at least 45%. When the transmission loss is 0, the key rate improvement can go up to 80%. As the transmission loss increases, the improvement of the biased scheme decreases. This is because at a larger transmission loss, more pulses for decoy states are needed and Bob also needs a larger p to estimate the privacy amplification part in Eq. (1). The improvement comes from the fact that p is less than 1/2. As p approaches to 1/2, the biased scheme becomes similar to the original scheme, where p = p = 1/2. It is an interesting prospective question how to apply our scheme to QKD systems with high channel losses24. For a practical QKD system, one needs to optimize the bias p for the key rate. The dependence of the optimal bias on the transmission loss is shown in Fig. 2, from which we can see that the optimal p is about 0.95 when the transmission loss is below 3 dB and decreases as the transmission loss increases. The minimal optimal p is about 0.6, which is close to 1/2. That is why our scheme approaches the standard BB84 with the vacuum + weak decoy-state scheme as the transmission loss increases.
Figure 2

Plot of optimal p versus transmission loss.

Discussion

In conclusion, we combine the decoy-state QKD with a biased basis choice to enhance the system performance. The key point of our scheme is increasing the raw data sift factor by setting all signal states in one (Z) basis. We take statistical fluctuations into account and use a rigorous method to upper bound the phase error rate of the single-photon components of the signal state. Comparing the result with that in the standard decoy-state BB84 protocol, we find an improvement in the key generation rate. Meanwhile, we reduce the complexity of the QKD system by assigning all signal states in the Z basis.

Methods

Model

The weak coherent state source is equivalent to a photon-number channel model and its photon number follows a Poisson distribution15: Define Y as the yield of an i-photon state; η as the transmittance of the channel measured in dB; Y0 as the background count rate. Then, in a normal channel when there is no Eve's intervention, Y is given by: The gain of i-photon states Q is given by: The overall gain which means the probability for Bob to obtain a detection event in one pulse with intensity μ is: The error rate of i-photon states e is given by where e is the probability that a photon hits the erroneous detector and e0 = 1/2. The overall QBER is given by Without Eve changing Y and e, the gain and QBER are given by

Upper bound of

Here, we review the random sampling argument23: using the bit error rate measured in the X basis, , to estimate the phase error rate in the Z basis, , for privacy amplification. If the key size is infinite, we know that . Otherwise, given , n (the number of decoy states that Alice sends and Bob measures in the X basis), and n (the number of signal states that Alice sends and Bob measures in the Z basis), we can give a probabilistic upper bound of such that it is lower than with a small probability P where θ is the deviation of the phase error rate from the tested value. Here, P is a controllable variable and is equal to 10−7 in the simulation. We have where the function ξ(θ) is given by and q = n/(n + n). Given P, we compute the value of ξ and find the value θ which is the root of equation (16). We get the probabilistic upper bound

Vacuum + weak decoy state

In this protocol, Alice and Bob use two decoy states to estimate the low bound of Y1 and the upper bound of e1. First, they implement a vacuum decoy state to estimate the background counts in signal states Secondly, they perform a weak decoy state where Alice uses a weaker intensity ν (ν < μ) for the decoy state to estimate Y1 and e1. We have: and Note that in our scheme all the parameters for estimating are measured in the Z basis and the parameters for estimating are measured in the X basis. And we must lower bound Y0 to obtain the lower bound of the key rate15. The we get here will substitute e in equation (14).

Statistical fluctuation

Here, we consider statistical fluctuations for the decoy-sate method15. We need to modify the estimation of Y1, equation (19), and e1, equation (20). The total number of pulses sent by Alice is composed of four cases Since that Alice sends all signal states in the Z basis and the final key is only extracted from the data measured in the Z basis, the parameter q in equation (1) is given by We follow the statistical fluctuation analysis proposed by Ma et al.25. where , and are measurement outcomes which means that they are rates instead of probabilities. If we follow the standard error analysis assumption, u is the number of standard deviations one chooses for the statistical fluctuation analysis. Note that and are used to estimate , so they should be measured in the Z basis. Here we use equation (14) to estimate the upper bound of with

Author Contributions

Z.W., W.W., Z.Z., M.G., Z.M. and X.M. all contributed equally to this paper.
  11 in total

1.  Unconditional security of quantum key distribution over arbitrarily long distances

Authors: 
Journal:  Science       Date:  1999-03-26       Impact factor: 47.728

2.  Limitations on practical quantum cryptography

Authors: 
Journal:  Phys Rev Lett       Date:  2000-08-07       Impact factor: 9.161

3.  Quantum key distribution with high loss: toward global secure communication.

Authors:  Won-Young Hwang
Journal:  Phys Rev Lett       Date:  2003-08-01       Impact factor: 9.161

4.  Quantum cryptography based on Bell's theorem.

Authors: 
Journal:  Phys Rev Lett       Date:  1991-08-05       Impact factor: 9.161

5.  Experimental quantum key distribution with decoy states.

Authors:  Yi Zhao; Bing Qi; Xiongfeng Ma; Hoi-Kwong Lo; Li Qian
Journal:  Phys Rev Lett       Date:  2006-02-22       Impact factor: 9.161

6.  Decoy state quantum key distribution.

Authors:  Hoi-Kwong Lo; Xiongfeng Ma; Kai Chen
Journal:  Phys Rev Lett       Date:  2005-06-16       Impact factor: 9.161

7.  Beating the photon-number-splitting attack in practical quantum cryptography.

Authors:  Xiang-Bin Wang
Journal:  Phys Rev Lett       Date:  2005-06-16       Impact factor: 9.161

8.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding.

Authors:  Cheng-Zhi Peng; Jun Zhang; Dong Yang; Wei-Bo Gao; Huai-Xin Ma; Hao Yin; He-Ping Zeng; Tao Yang; Xiang-Bin Wang; Jian-Wei Pan
Journal:  Phys Rev Lett       Date:  2007-01-05       Impact factor: 9.161

9.  Long-distance decoy-state quantum key distribution in optical fiber.

Authors:  Danna Rosenberg; Jim W Harrington; Patrick R Rice; Philip A Hiskett; Charles G Peterson; Richard J Hughes; Adriana E Lita; Sae Woo Nam; Jane E Nordholt
Journal:  Phys Rev Lett       Date:  2007-01-05       Impact factor: 9.161

10.  Experimental demonstration of free-space decoy-state quantum key distribution over 144 km.

Authors:  Tobias Schmitt-Manderbach; Henning Weier; Martin Fürst; Rupert Ursin; Felix Tiefenbacher; Thomas Scheidl; Josep Perdigues; Zoran Sodnik; Christian Kurtsiefer; John G Rarity; Anton Zeilinger; Harald Weinfurter
Journal:  Phys Rev Lett       Date:  2007-01-05       Impact factor: 9.161

View more
  2 in total

1.  An integrated space-to-ground quantum communication network over 4,600 kilometres.

Authors:  Yu-Ao Chen; Qiang Zhang; Teng-Yun Chen; Wen-Qi Cai; Sheng-Kai Liao; Jun Zhang; Kai Chen; Juan Yin; Ji-Gang Ren; Zhu Chen; Sheng-Long Han; Qing Yu; Ken Liang; Fei Zhou; Xiao Yuan; Mei-Sheng Zhao; Tian-Yin Wang; Xiao Jiang; Liang Zhang; Wei-Yue Liu; Yang Li; Qi Shen; Yuan Cao; Chao-Yang Lu; Rong Shu; Jian-Yu Wang; Li Li; Nai-Le Liu; Feihu Xu; Xiang-Bin Wang; Cheng-Zhi Peng; Jian-Wei Pan
Journal:  Nature       Date:  2021-01-06       Impact factor: 49.962

2.  Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

Authors:  Wei Yang; Liusheng Huang; Fang Song
Journal:  Sci Rep       Date:  2016-06-01       Impact factor: 4.379

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.