Literature DB >> 35626477

Passive Light Source Monitoring for Sending or Not Sending Twin-Field Quantum Key Distribution.

Xuerui Qian1,2,3, Chunhui Zhang1,2,3, Huawei Yuan1,2,3, Xingyu Zhou1,2,3, Jian Li1,2,3, Qin Wang1,2,3.   

Abstract

Twin-field quantum key distribution (TF-QKD) can break the repeaterless linear bound and possess the measurement-device-independent security, and thus seems very promising in practical applications of quantum secure communication. In most reported TF-QKD protocols, light sources are assumed to possess trusted and fixed photon number distributions (PND), which are unrealistic assumptions in practical applications. Fortunately, the light source monitoring (LSM) method is proposed to circumvent this problem by actively adjusting the attenuation coefficient and monitoring the photon number distribution of light sources. However, the active light source monitoring (ALSM) method may induce additional modulation errors due to imperfect attenuation devices, deteriorating practical performances of TF-QKD systems. In this manuscript, we propose a passive light source monitoring (PLSM) scheme for TF-QKD, and employ the sending-or-not-sending (SNS) TF-QKD as an example for illustration. Simulation results show that our present work can greatly exceed both the original SNS protocol and the ALSM scheme when light source fluctuations and modulation errors are taken into account.

Entities:  

Keywords:  passive light source monitoring; sending-or-not-sending; twin-field quantum

Year:  2022        PMID: 35626477      PMCID: PMC9141106          DOI: 10.3390/e24050592

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.738


1. Introduction

Quantum key distribution (QKD) allows two legitimate parties, Alice and Bob, to share secure keys based on the laws of quantum physics. The security of BB84 protocol was proven in theory by many scientists [1,2,3,4,5,6,7]. However, there are still some loopholes in the measurement devices. To remove those attacks directed on the measurement devices, the measurement-device-independent quantum key distribution (MDI-QKD) [8] was put forward. Thereafter, a lot of related experiments and theories have been done on MDI-QKD, making it more efficient and practical [9,10,11,12,13]—just its key rate is still limited by the fundamental limit of channel capacities without quantum repeaters, e.g., the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound [14,15]. Recently, Lucamarini et al. proposed the twin-field quantum key distribution (TF-QKD) protocol [16], which can break the PLOB bound [14,15] and make the rate distance dependence change from a linear to square root. Up to date, many variants of TFQKD protocols have been proposed and experimentally demonstrated [17,18,19,20,21,22,23,24,25,26,27,28]. However, some assumptions are made for the sources in most reported works, i.e., with a trusted and fixed photon-number distribution (PND), which usually can not be satisfied in practical implementations. Those unreasonable assumptions will inevitably compromise the security of practical QKD systems. To solve the problem, the light source monitoring (LSM) method was put forward and experimentally realized by actively modulating local attenuator into different losses [29,30], hereafter called the active light source monitoring (ALSM) scheme. However, unfortunately, the ALSM scheme will bring new loopholes and then deteriorate practical performances of TF-QKD systems during intensity modulation processes due to imperfections of attenuated devices. In this paper, we propose a passive light source monitoring (PLSM) scheme for TF-QKD, which is accomplished by a passive monitoring module consisting of a beam splitter and two detectors at the source side. Through the PLSM module, we can obtain four monitoring events by two local detectors and then precisely estimate the bounds of source distributions. Specifically, we employ the sending-or-not-sending (SNS) TFQKD [18,31,32,33] as an example for illustration. Compared with the ALSM method, our PLSM method can passively monitor the PND and dramatically exceed the performance of ALSM when modulation errors are considered.

2. PLSM Scheme in SNS−TFQKD

In this section, we describe the SNS−TFQKD scheme [18,31,32,33] with PLSM. The schematic of the setup is shown in Figure 1, where it involves two senders, Alice and Bob, and one untrustworthy third party (UTP), Charlie. The detailed process of the SNS−TFQKD with a four-intensity decoy-state PLSM scheme can be described as follows:
Figure 1

Schematic of the SNS−TFQKD system with PLSM. The PLSM module consists of a beam splitter (BS) and two local single-photon detectors.

Step 1. Alice and Bob do some preparatory work before sending the pulse: they send a reference coherent light to Charlie, and Charlie performs phase compensation. Step 2. The N pulses generated by Alice and Bob are encoded by a modulation module, which contains a phase modulator (PM) and an intensity modulator (IM). During this process, each pulse is randomly chosen as the X (decoy) or Z (signal) window. At any time window i, Alice (Bob) independently determines whether it is a decoy window or a signal window. If the decoy window is chosen, she (he) prepares state and sends it to Charlie, . If the signal window is selected, Alice (Bob) sends states to Charlie with a probability of , and with a probability of for not sending, where the are global phases of the coherent states. Step 3. The pulses are split into two modes, where the idler mode is for performing PLSM and the signal mode is for encoding information and sending it to Charlie. The idler mode is further split by a local beam splitter and then sent into two local detectors. As a result, four detection events can be obtained. For example, in Alice’s PLSM module, these events can be denoted as l: x, neither or clicks; y, only clicks; z, only clicks; w, and both and click. Step 4. Charlie measures all received states with a beam splitter and two detectors ( and ), and then announces the effective measurement outcome, i.e., which detector clicks. Step 5. Alice and Bob announce the local detection events l and the kind of window (X window or Z window) for each pulse. In addition, the intensity and encoding phases (, ) in the X basis should also be disclosed. Step 6. Alice and Bob use the data in the X basis to estimate channel parameters, and they randomly select some bits in the Z basis for the error test and use the remaining bits to extract the final secure keys. In this protocol, Z basis is defined as the time window when both Alice and Bob choose the signal window; X basis is denoted as the time window when both Alice and Bob choose the same decoy window (with intensity ), and, simultaneously, the random phases , prepared in the window satisfy Here, is determined by the size of the phase slice chosen by Alice and Bob. In addition, the effective measurement outcome denotes that only one detector ( or ) clicks. In the PLSM module, when the event l occurs, the idler state is projected into , where denotes the photon number distribution of the weak coherent state (WCS) with mean photon number , , and is the probability of an n-photon state projecting into event l given by [34,35] where and are the dark counting rate and detection efficiency of the local detectors at the sender’s side (Alice and Bob), respectively, and t is the transmittance of and . Here, for simplicity, we assume that two local detectors in PLSM module have the same detection efficiency and dark count rate, which means , . Define as the photon number distribution under different counting events. Then, we estimate the upper and lower bounds of probabilities of different photon-number states, i.e., the vacuum state, the one-photon state and the two-photon state. By measuring the idler mode, the gain of four events can be obtained as According to the derivation presented in Appendix A, the estimations of , are given by where represents the lower or upper bounds on the probability of having the n-photon state given the mean photon number . In the SNS−TFQKD, Alice and Bob simultaneously send photon pulses to the untrustworthy third party (UTP) Charlie. According to Ref. [36], the decoy-state method is still applicable under unknown PND conditions; the lower bound of the single-photon counting rate and the upper bound of the single-photon error rate can be estimated as Here, we set , , and , are the counting rate and the bit error rate of a state with intensity sent in decoy windows, respectively. In addition, the relationships between and are set by [30] Finally, the secure key rate is where represents the probability that Alice (Bob) chooses to send out a signal pulse (it can be preset in the protocol); is the binary Shannon entropy function; is the lower bound of the probability of single photons in the signal state; and refer to the gain and the average quantum bit error of pulses with intensity u sent in signal windows.

3. Numerical Simulations and Analysis

In the following, we perform numerical simulations for the original SNS−TFQKD [18], the SNS−TFQKD with ALSM [30] and the SNS−TFQKD with PLSM. In simulations, the gain and the quantum bit error of decoy states in X basis in Equations (9) and (10) are expressed as where is the counting rate of twin-field states entering into the correct (wrong) detector; denotes the total channel transmittance, where and s are the loss coefficient and the length of channels, respectively; and each refer to the efficiency and the dark count rate of detectors at Charlie’s side, respectively. is the phase difference between the twin-field states prepared by Alice and Bob; is the size of the phase slice and M is the number of phase slices; represents the optical misalignment error, is the counting rate of the vacuum state, and . The average quantum bit error and the counting rate for the signal states can be respectively expressed as:Here, is the 0-order hyperbolic Bessel function of the first kind [31]. In the following, we do comparisons among three schemes, the original SNS−TFQKD, the ALSM SNS−TFQKD, and the present PLSM SNS−TFQKD, by using either ideal light sources without intensity fluctuations or practical light sources with intensity fluctuations. In addition, we also analyze the effect of modulation error on the ALSM scheme. The basic device parameters are shown in Table 1 [30].
Table 1

The basic system parameters used in our numerical simulations. : the loss coefficient of fiber at telecommunication wavelength (dB/km); and are the efficiency and dark count rate of detectors at Charlie’s side; : the misalignment error of the QKD system; f: the error correction efficiency; M: the number of phase slices.

α M ηD Pdc Eopt f
set a0.2 dB/km16 80% 1011 1% 1.1
set b0.2 dB/km16 30% 109 3% 1.15
In ALSM, the attenuation coefficients are set as , , . For a fair comparison, in our scheme, the detection efficiency in PLSM module is set as . In addition, the dark count rate of local detectors in ALSM and PLSM is set with the same value denoted as as listed in row a of Table 1. In addition, we adopt the local search algorithm (LSA) [9] to optimize the parameters . The numerical simulation results are presented in Figure 2, Figure 3 and Figure 4.
Figure 2

The secure key rate of different monitoring method using a set of parameters in row a of Table 1. The blue solid curve represents the original SNS−TFQKD; the red dash curve denotes our present PLSM SNS−TFQKD; and the green dash curve is the ALSM SNS−TFQKD. In addition, the variation trend of the key rate ranging between 780 km and 785 km is illustrated in the inset. It shows that our proposal can offer a key rate comparable to both the original SNS−TFQKD and the ALSM SNS−TFQKD when using photon sources without fluctuations.

Figure 3

The secure key rate of different schemes with intensity fluctuation in (a) and in (b) when intensity modulation errors are not taken into account.

Figure 4

The secure key rate of different monitoring methods when different modulation errors are taken into account. Here, parameters in line b of Table 1 and the intensity fluctuation are used. The blue solid curve represents the original SNS−TFQKD; the green solid curve is the ALSM SNS−TFQKD when ; the red solid curve denotes the PLSM SNS−TFQKD; the orange dotted-dash curve and the black dash curve denote the ALSM SNS−TFQKD with modulation errors and , respectively.

The performance of different monitoring methods with ideal sources without intensity fluctuations are presented in Figure 2. Simulation results show that the performance of our proposed PLSM SNS−TFQKD is comparable to both the original SNS−TFQKD and the ALSM SNS−TFQKD. It is also clear that the maximum transmission distance of all schemes exceeds 800 km. In addition, if actively odd-parity pairing (AOPP) [33] of post data processing is adopted, it can further improve the distance and key rate of SNS−TFQKD significantly. However, in realistic implementations, the fluctuation of light sources is a common phenomenon in QKD systems [37,38]; therefore, it should be taken into account. In general, the signal from light sources can be considered as a coherent state, whose intensity usually possesses a Gaussian distribution: where and represent the mean value and standard deviation, respectively. Define the fluctuation coefficient as , and can be rewritten as After calculating and simplifying, the counting rate of four events can be reformulated as On the other hand, and will change if light fluctuations are considered, which can be expressed as [36] Then, the counting rate and the quantum bit error of decoy states in X basis can be respectively re-expressed as Then, and can be rewritten as [7] In the following, we compare the performance of SNS−TFQKD with various schemes under different fluctuation coefficients . In order to simulate the realistic condition, we use a set of practical system parameters in row b of Table 1 [16]. In the realistic condition, the coefficient of light intensity fluctuation is usually greater than [39]; therefore, we set coefficient of intensity fluctuations as and . As we can see from Figure 3a,b, when intensity fluctuations are taken into account, both ALSM and our present PLSM can show much better performance compared with the original SNS TF-QKD protocol. For example, when or , both ALSM and our present PLSM only slightly decrease its key rate and transmission distance, while the original SNS TF-QKD protocol rapidly drops its key rate and transmission distance. In practice, when switching between different coefficients, it may bring into modulation errors in the ALSM scheme. We define the attenuation coefficients modulation error as , then , , where and are the upper bound and lower bound of attenuation coefficients. Based on [30], in ALSM has been reestimated in Appendix B. The simulation results are shown in Figure 4, and it is obvious that our scheme can show much better performance than the ALSM scheme when the modulation error is accounted. For example, when we reasonably set , the maximum transmission distance drops from 540 km to 435 km for the ALSM scheme, while it still remains constant for our PLSM scheme. Obviously, the ALSM scheme is very susceptible to intensity modulation errors.

4. Conclusions

In this paper, we propose a PLSM scheme for TF-QKD, which is accomplished by implementing a passive monitoring module consisting of a beam splitter and two detectors at the source side. Through the PLSM module, we can obtain four kinds of monitoring events with two local detectors and can then precisely estimate the bounds of source distributions. We build a theoretical model and carry out corresponding numerical simulations. Simulation results show that our present work can outperform the original SNS−TFQKD protocol when there are existing intensity fluctuations in the light sources. Moreover, it shows much better performance than the reported ALSM scheme when modulation errors are taken into account. Therefore, our present work can not only reduce assumptions on the source distribution in former TF-QKD protocols, but also close the additional loopholes existing in the former active monitoring scheme, and thus seems very promising in practical implementations of QKD in the near future.
  15 in total

1.  Simple proof of security of the BB84 quantum key distribution protocol

Authors: 
Journal:  Phys Rev Lett       Date:  2000-07-10       Impact factor: 9.161

2.  Measurement-device-independent quantum key distribution.

Authors:  Hoi-Kwong Lo; Marcos Curty; Bing Qi
Journal:  Phys Rev Lett       Date:  2012-03-30       Impact factor: 9.161

3.  Beating the photon-number-splitting attack in practical quantum cryptography.

Authors:  Xiang-Bin Wang
Journal:  Phys Rev Lett       Date:  2005-06-16       Impact factor: 9.161

4.  Twin-field quantum key distribution with modified coherent states.

Authors:  Chun-Hui Zhang; Chun-Mei Zhang; Qin Wang
Journal:  Opt Lett       Date:  2019-03-15       Impact factor: 3.776

5.  Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.

Authors:  Chun-Hui Zhang; Dong Wang; Xing-Yu Zhou; Shuang Wang; La-Bao Zhang; Zhen-Qiang Yin; Wei Chen; Zheng-Fu Han; Guang-Can Guo; Qin Wang
Journal:  Opt Express       Date:  2018-10-01       Impact factor: 3.894

6.  Finite-key analysis for measurement-device-independent quantum key distribution.

Authors:  Marcos Curty; Feihu Xu; Wei Cui; Charles Ci Wen Lim; Kiyoshi Tamaki; Hoi-Kwong Lo
Journal:  Nat Commun       Date:  2014-04-29       Impact factor: 14.919

7.  Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km.

Authors:  Jiu-Peng Chen; Chi Zhang; Yang Liu; Cong Jiang; Weijun Zhang; Xiao-Long Hu; Jian-Yu Guan; Zong-Wen Yu; Hai Xu; Jin Lin; Ming-Jun Li; Hao Chen; Hao Li; Lixing You; Zhen Wang; Xiang-Bin Wang; Qiang Zhang; Jian-Wei Pan
Journal:  Phys Rev Lett       Date:  2020-02-21       Impact factor: 9.161

8.  Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

Authors:  M Lucamarini; Z L Yuan; J F Dynes; A J Shields
Journal:  Nature       Date:  2018-05-02       Impact factor: 49.962

9.  Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution.

Authors:  Xiaoqing Zhong; Jianyong Hu; Marcos Curty; Li Qian; Hoi-Kwong Lo
Journal:  Phys Rev Lett       Date:  2019-09-06       Impact factor: 9.161

10.  Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit.

Authors:  Kento Maeda; Toshihiko Sasaki; Masato Koashi
Journal:  Nat Commun       Date:  2019-07-17       Impact factor: 14.919

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.