Decoy-state reference-frame-independent quantum key distribution with both source errors and statistical fluctuations
Liu Kang1, 2, Li Jian1, 3, Zhu Jian-Rong1, 2, Zhang Chun-Mei1, 2, ‡, Wang Qin1, 2, §
Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of the Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Department of Physics, Southeast University, Nanjing 211189, China

 

† Corresponding author. E-mail: cmz@njupt.edu.cn qinw@njupt.edu.cn

Abstract

Reference-frame-independent quantum key distribution (RFI QKD) can generate secret keys without the alignment of reference frames, which is very robust in real-life implementations of QKD systems. However, the performance of decoy-state RFI QKD with both source errors and statistical fluctuations is still missing until now. In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source (HSPS) and the weak coherent source (WCS), and also give clear comparison results of decoy-state RFI QKD with WCS and HSPS. Simulation results show that the secret key rates of decoy-state RFI QKD with WCS are higher than those with HSPS in short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in long distance range.

1. Introduction

Based on the laws of quantum physics, quantum key distribution (QKD)[1] allows two distant legitimate parties (typically called Alice and Bob) to share unconditionally secure keys, in the presence of the eavesdropper (Eve).[2] Since the first Bennett–Brassard-1984 (BB84) QKD protocol was proposed,[1] many successful QKD works have been achieved during the past decades.[315] In most of these experiments, a feedback setup is needed to align the reference frames between Alice and Bob, which will undoubtedly increase the complexity and time cost of QKD systems. Otherwise, the high quantum bit error rate (QBER) will prevent the generation of net secret keys.

Fortunately, reference-frame-independent QKD (RFI QKD) was proposed by Laing et al.[16] to avoid the active alignment of reference frames, which can obviously increase the whole communication efficiency between Alice and Bob. After that, a series of theoretical[1719] and experimental[2023] works on RFI QKD have been reported. However, none of them considered the practical scenarios including both source errors and statistical fluctuations.

In this paper, we investigate the performance of decoy-state RFI QKD in practical scenarios with two kinds of light sources, the heralded single photon source (HSPS) and the weak coherent source (WCS). The widely used vacuum + weak decoy-state method[2428] is adopted to combat the photon-number-splitting (PNS) attack[29,30] caused by the multi-photons in the practical sources. Moreover, clear comparison results of decoy-state RFI QKD with WCS and HSPS are given, and simulation results show that the decoy-state RFI QKD even with both source errors and statistical fluctuations is very practical and robust.

2. Decoy-state RFI QKD with both source errors and statistical fluctuations

RFI QKD employs three mutually unbiased bases (Z, X, and Y) to encode the information,[16] which is very similar to the six-state protocol.[31] During the quantum communication phase, Alice randomly prepares quantum states with her local bases XA, YA, and ZA, and sends them to Bob. Bob randomly measures the received states with his local bases XB, YB, and ZB. In RFI QKD, the stability of the Z basis can be well maintained, which is also the case in most other QKD systems, while the X and Y bases are allowed to vary slowly. That is, Alice and Bob’s Z, X, and Y bases satisfy ZB = ZA, XB = cosβXA + sinβYA, and YB = cosβYA − sinβXA, where β is the relative rotation between Alice and Bob’s reference frames and may drift with time slowly. After the quantum communication phase, Alice and Bob can distill secret keys from the data in ZAZB basis, and estimate Eve’s information from the data in XAXB, XAYB, YAXB, and YAYB bases. According to the decoy-state method,[26] the total gain and quantum bit error rate (QBER) that Alice sends in ξA (ξA ∈ {XA, YA, ZA}) and Bob measures them in ξB (ξB ∈ {XB, YB, ZB}) in the decoy-state RFI QKD can be calculated by where ε refers to the signal states μ, the decoy states ν, or the vacuum states ω, i denotes the i-photon states, Pε(i) corresponds to the photon-number distribution for the ε intensity. ( ) denotes the QBER (the yield) of the i-photon states. According to Eqs. (1) and (2), Alice and Bob can estimate the yields (error rates) of single-photon contributions , , , , and ( , , , , and ) with the three-intensity decoy-state method. Then, they can estimate the quantity . Finally, Eve’s information can be bounded by where and After the post-processing phase, the final key generation rate in the case of phase-randomized light sources with three-intensity decoy-state method can be calculated by[20] where ( ) represents the gain (QBER) of the signal states in ZAZB basis, denotes the counting rate of the single-photon pulses from the signal states, h is the binary Shannon information function, and f is the error correction efficiency.

In practice, source errors and statistical fluctuations are inevitable issues in the security analysis of practical decoy-state RFI QKD systems. When considering source errors (for simplicity, we assume the vacuum source is precise which has no source errors), due to the imperfection of practical sources, the intensity of the pulses is not stable. That is to say, ε ranges from εL(δ) to εU(δ), where δ refers to the intensity fluctuations. Then, we can obtain the upper bound ( ) and the lower bound ( ) of the i-photon number distribution with intensity fluctuations. Take the WCS for example, Then, the upper bounds (the lower bounds) of the total gain and QBER can be obtained respectively as follows: {EξAξB,UεQξAξB,Uε=i=1eξAξBiYξAξBiPεU(i)+eξAξB0YξAξB0PεU(0),EξAξB,LεQξAξB,Lε=i=1eξAξBiYξAξBiPεL(i)+eξAξB0YξAξB0PεL(0). Finally, according to Ref. [32], the yield (error rate) of single-photon contributions in ZAZB can be estimated by

The other parameters , , , and ( , , , and ) can be obtained analogously by applying the same method. According to the statistical fluctuations analysis theory,[3335] the total gain and quantum bit error should be modified as follows: EξAξBν,UQξAξBν,U=EξAξBνQξAξBν.(1+γEξAξBνQξAξBνNPεPξA|εPξB),  where Pε represents the probability that Alice randomly modulates pulses into the ε intensity, PξA denotes the conditional probability that Alice sends the states to Bob in ξA basis with the ε intensity, PξB refers to the probability that Bob chooses the ξB basis for his measurement, γ is the number of standard deviation, and N refers to the total number of pulses.

3. Numerical simulations

In order to explore the performance of the above decoy-state RFI-QKD scheme under practical experimental conditions, we use two kinds of light sources, e.g., WCS[3,4] and HSPS,[27,28] as examples and carry out the corresponding numerical simulations.

For the WCS, it has a Poisson distribution: , (i ∈ (1,2,3,…)), while for the HSPS, it follows a sub-Poisson distribution: , where ηA and dA each correspond to the detection efficiency and the dark count rate of the local detector at Alice’s side.

In all the simulation results presented below, we use the following parameters: ν = 0.01, ω = 0, Pμ = 1/2, Pν = Pω = 1/4, and PXA = PYA = PZA = PXB = PYB = PZB = 1/3. Moreover, we set the misalignment of the reference frames as β = π/7 (in fact, β is unknown and we just use it to simulate a practical RFI-QKD system). Other parameters used in the simulation are listed in Table 1. For each line, the intensity of the signal states is optimized at each distance to maximize the final key rate.

Table 1.

Simulation parameters for the three-intensity decoy-state RFI QKD with both source errors and statistical fluctuations. ηd (Y0) is the detection efficiency (the dark count rate) of Bob’s single photon detectors, ed is the probability that Bob’s single-photon detector is clicked incorrectly. α denotes the loss coefficient of the standard fiber link, γ is the number of the standard deviation when considering statistical fluctuations (here 5.3 corresponds to a failure probability of 10−7), and f is the error correction efficiency. ηA (dA) is the detection efficiency (the dark count rate) of Alice’s single photon detector with HSPS.

.

First, we study the performance of the decoy-state RFI QKD with standard statistical fluctuations, and the corresponding results are shown in Fig. 1. In Fig. 1, W (H) denotes WCS (HSPS), and the solid (dashed) curves from left to right correspond to the secret key rates of the decoy-state RFI QKD with WCS (HSPS) at N = 109, 1010, and 1011, respectively. From Fig. 1, it can be easily seen that the secret key rates of WCS are higher than those of HSPS in short distance range, but the key rates of HSPS outperform WCS in long distance range.

Fig. 1. (color online) Comparison results of the decoy-state RFI QKD with WCS and HSPS when considering statistical fluctuations. The solid (dashed) curves from left to right refer to the secret key rates of the decoy-state RFI QKD using WCS (HSPS) with N = 109, 1010, and 1011, respectively.

Then, we consider the effect of different source errors in the decoy-state RFI QKD with statistical fluctuations (N = 1010), and the simulation results are shown in Fig. 2. Here, W (H) denotes WCS (HSPS), and the solid (dashed) curves from left to right in Fig. 2 denote the key rates of WCS (HSPS) with source errors δ = 0.04, 0.02, and 0, individually. From Fig. 2, we find that the secret key rate declines with the increasing of source errors for both HSPS and WCS. Moreover, RFI QKD with WCS shows better performance than the one using HSPS at short distance range (< 80 km), and presents lower secret key rate than the one using HSPS at long distance range (> 110 km).

Fig. 2. (color online) Comparison results of the decoy-state RFI QKD with source errors when the number of sent pulses is N = 1010. The solid (dashed) curves from left to right denote the secret key rates of the decoy-state RFI QKD with WCS (HSPS) with δ = 0.04, 0.02, and 0, respectively.

Finally, the optimal intensities of signal states and the corresponding key rates at 60 km with statistical fluctuations and with both statistical fluctuations and source errors are shown in Table 2 and Table 3.

Table 2.

The optimal intensities of signal states and corresponding key rates at 60 km with statistical fluctuations.

.
Table 3.

The optimal intensities of signal states and corresponding key rates at 60 km with both statistical fluctuations and source errors.

.
4. Conclusions

In conclusion, RFI QKD can generate secret keys without alignment of reference frames, which exhibits obvious superiority in real-life QKD systems. Considering both source errors and statistical fluctuations, we studied the performance of the decoy-state RFI QKD with two kinds of practical sources, e.g., WCS and HSPS. Simulation results demonstrate that the secret key rates of the decoy-state RFI QKD with WCS are higher than those with HSPS in a short distance range, but the secret key rates of RFI QKD with HSPS outperform those with WCS in a long distance range. Our work will provide useful guidance in practical implementations of RFI QKD systems.

Reference
[1] Bennett C H Brassard G 1984 Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing 175 79
[2] Shor P W Preskill J 2000 Phys. Rev. Lett. 85 441
[3] Zhao Y Qi B Ma X Lo H K Qian L 2006 Phys. Rev. Lett. 96 070502
[4] Peng C Z Zhang J Yang D Gao W B Ma H X Yin H Pan J W 2007 Phys. Rev. Lett. 98 010505
[5] Rosenberg D Harrington J W Rice P R Hiskett P A Peterson C G Hughes R J Nordholt J E 2007 Phys. Rev. Lett. 98 010503
[6] Schmitt M T Weier H Fürst M Ursin R Tiefenbacher F Scheidl T Zeilinger A 2007 Phys. Rev. Lett. 98 010504
[7] Zhao Y Qi B Ma X Lo H K Qian L 2006 Phys. Rev. Lett. 96 070502
[8] Yuan Z L Sharpe A W Shields A J 2007 Appl. Phys. Lett. 90 011118
[9] Yin Z Q Han Z F Chen W Xu F X Wu Q L Guo G C 2008 Chin. Phys. Lett. 25 3547
[10] Fröhlich B Yuan Z L 2015 Nat. Photon. 9 781
[11] Wang S Chen W Yin Z Q 2014 Opt. Express 22 21739
[12] Wang S Chen W Guo J F 2012 Opt. Lett. 37 1008
[13] Li F Y Wang D Wang S Li M Yin Z Q Li H W Chen W Han Z F 2014 Chin. Phys. B. 23 124201
[14] Zhang Y Wang S Yin Z Q Chen W Liang W Y Li H W Guo G C Han Z F 2012 Chin. Phys. 21 100307
[15] He D Y Wang S Chen W 2017 Appl. Phys. Lett. 110 111104
[16] Laing A Scarani V Rarity J G O’Brien J L 2010 Phys. Rev. 82 012304
[17] Wang C Sun S H Ma X C Tang G Z Liang L M 2015 Phys. Rev. 92 042319
[18] Yin Z Q Wang S Chen W Li H W Guo G C Han Z F 2014 Quantum Inf. Process 13 1237
[19] Zhang C M Zhu J R Wang Q 2017 Phys. Rev. A. 95 032309
[20] Liang W Y Wang S Li H W Yin Z Q Chen W Yao Y Han Z F 2014 Sci. Rep. 4 3617
[21] Wang C Song X T Yin Z Q Wang S Chen W Zhang C M Guo G C Han Z F 2015 Phys. Rev. Lett. 115 160502
[22] Zhang P Aungskunsiri K Martín-López E Wabnig J Lobino M Nock R W Laing A 2014 Phys. Rev. Lett. 112 130501
[23] Wabnig J Bitauld D Li H W Laing A O'Brien J L Niskanen A O 2013 New J. Phys. 15 073001
[24] Hwang W Y 2003 Phys. Rev. Lett. 91 057901
[25] Wang X B 2005 Phys. Rev. Lett. 94 230503
[26] Lo H K Ma X Chen K 2005 Phys. Rev. Lett. 94 230504
[27] Wang Q Wang X B Guo G C 2007 Phys. Rev. 75 012312
[28] Wang Q Wang X B Björk G Karlsson A 2007 Europhys. Lett. 79 40001
[29] Huttner B Imoto N Gisin N Mor T 1995 Phys. Rev. 51 1863
[30] Brassard G Lütkenhaus N Mor T Sanders B C 2000 Phys. Rev. Lett. 85 1330
[31] Bruss D 1998 Phys. Rev. Lett. 81 3018
[32] Zhou Y H Yu Z W Wang X B 2014 Phys. Rev. 89 052325
[33] Wang X B Peng C Z Zhang J 2008 Phys. Rev. 77 042311
[34] Wang X B Yang L Peng C Z Pan J C 2009 New J. Phys. 11 075006
[35] Wang S Zhang S L Li H W Yin Z Q Zhao Y B Chen W Han Z F Guo G C 2009 Phys. Rev. 79 062309