Coherent one-way quantum conference key agreement based on twin field
Abstract
Quantum conference key agreement (CKA) enables key sharing among multiple trusted users with information-theoretic security. Currently, the key rates of most quantum CKA protocols suffer from the limit of the total efficiency among quantum channels. Inspired by the coherent one-way and twin-field quantum key distribution (QKD) protocols, we propose a quantum CKA protocol of three users. Exploiting coherent states with intensity 0 and to encode logic bits, our protocol can break the limit. Additionally, the requirements of phase randomization and multiple intensity modulation are removed in our protocol, making its experimental demonstration simple.
I Introduction
The establishment of quantum network is the ultimate goal of quantum communication, where QKD is the most mature subfield for applications. QKD allows secret key sharing between two distant authorized participants with unconditional security Bennett and Brassard (1984); Ekert (1991). But the number of participants in QKD is merely two. In many other scenarios on quantum networks, such as web conference and online courses, there are far more than two users who need to share keys. Quantum CKA Bose et al. (1998); Cabello (2000); Chen and Lo (2007); Matsumoto (2007) gives the solution, which aims to distribute common secret keys among multiple parties. The advantages of quantum CKA over repeating QKD in quantum networks are that quantum CKA requires fewer resource qubits, transmits fewer classical bits and performs fewer rounds of error correction and privacy amplification steps, which have been illustrated by researchers Epping et al. (2017). After more than two decades of development, many quantum CKA protocols have been proposed Fu et al. (2015); Epping et al. (2017); Proietti et al. (2020); Zhu et al. (2015); Wu et al. (2016); Ottaviani et al. (2019); Chen et al. (2016, 2017); Ribeiro et al. (2018); Li et al. (2018); Pivoluska et al. (2018); Jo and Son (2019); Zhao et al. (2020); Yin and Chen (2020), including measurement-device-independent Fu et al. (2015) and device-independent Ribeiro et al. (2018) protocols. Details can be found in the review article Murta et al. (2020).
Nevertheless, the conference key rates in a majority of quantum CKA protocols are rigorously restricted by the total efficiency among quantum channels, which is an upper bound of the conference key rates Das et al. (2019). Although some techniques may be utilized to break this upper bound, such as quantum repeaters Duan et al. (2001), adaptive measurement-device-independence Azuma et al. (2015) and W states with single-photon interference Grasselli et al. (2019), these approaches are difficult to be implemented practically. Recently, a three-party quantum CKA Yin and Chen (2020), inspired by the twin-field QKD Lucamarini et al. (2018); Wang et al. (2018); Yin and Fu (2019), is presented to overcome this limit in a practical way. However, this protocol Yin and Chen (2020) requires to exploit the decoy-state method Wang (2005); Lo et al. (2005), including the active and high precision phase randomization and multiple intensity modulation, which increases the experimental complexity in quantum state preparation.
Here, we propose a simple scheme for three-party quantum CKA protocol to break this limit by combining the methods of coherent one-way QKD Stucki et al. (2005) and twin-field QKD Lucamarini et al. (2018). The simulation results show that this protocol can be demonstrated over 450 km with available technology. Our protocol employs weak coherent states with intensity 0 or to encode logic bits. Therefore, phase randomization and pulse modulation with different intensities are circumvented in our protocol, which results in a much simpler experimental setup and decreased security risks caused by imperfect phase randomization. The security proof of our protocol, surprisingly, can directly utilize the security analysis of coherent one-way QKD Stucki et al. (2005); Branciard et al. (2008); Korzh et al. (2015). Our protocol promotes the practical process of quantum CKA and may have a good application prospect.
II Protocol description
As shown in figure 1, there exist three parties in our protocol, named Alice, Bob and Charlie. Alice and Bob serve as senders while Charlie serves as a receiver. Since participants in our protocol encode logic bits with weak coherent states instead of single-photon states, our scheme features a simple experimental setup where senders only require a laser source and an intensity modulator to generate pulses.
Each sender prepares a pulse with intensity (0) for logic bit 1 (0). They both send pulses with a period of . Charlie measures the received pulses in time-interference bases and applies a passive-basis choice. Bits are encoded in the time basis and coherence is checked in the interference basis. For Charlie, we set that () means 0 and means 1. Charlie employs and to perform passive measurements in the time basis. Specifically, the bit value is 0 when only clicks in the time basis while the bit value is 1 when only clicks. The distance between BS2-BS3 is longer than that between BS1-BS3 so as to delay Bob’s pulses for a fixed time before entering the interferometer, which helps transform Alice’s and Bob’s pulse trains with the period of 2T into pulse trains with the period of T in two arms of the interferometer after BS3. The delay introduced in one arm of the interferometer is used to make the neighboring pulses interfere with each other. Coherence can be quantified through the visibility of the interference. We denote the time slot when Charlie performs interferometric measurements as , with , where is the is the total number of pulses sent by Alice (Bob). And we set is an integer ranging from 1 to N. Visibility can be calculated by Stucki et al. (2005):
(1) |
where is the probability that detector clicks when or clicks at and is the probability that detector clicks at or clicks at . The definition of visibility is similar to that in coherent one-way QKD and we relate the two schemes in Section III. If the coherence of the signals is perfectly preserved, and .

The whole process of our protocol is stated as follows:
1. Preparation. Alice (Bob) randomly prepares weak coherent pulses with probability , and with probability . Bob flips his logic bits after sending his pulses. They send the optical pulses to Charlie through insecure quantum channels.
2. Measurement. Charlie measures the received pulses in time-interference bases. Alice’s (Bob’s) pulse is split into two sub-pulses by BS1 (BS2). For Alice (Bob), one of two sub-pulses is sent to D1 (D2) for measurements in the time basis and the other two bunches of pulses are used for interferometric measurements. Charlie records when and which detector clicks. If different detectors click at the same time in the time basis, Charlie randomly chooses a bit value. If detectors click at the same time in different bases, Charlie discards relevant data.
3. Reconciliation. Charlie announces the moment when detectors click and the corresponding basis information. Alice and Bob publicly announce the intensity information only when detectors in interference basis click. Participants calculate visibility when there exist two neighboring , i.e. or .
4. Parameter estimation. Participants disclose a part of bit values from time basis to estimate the bit error rate and the gain of states, and , which are used to encode logic bits. They evaluate the information Eve gets by calculating the visibility.
5. Key distillation. They extract the common conference key after classical error correction and privacy amplification.
III Security analysis

We discuss the security of our protocol in this section. As depicted in figure 2, we reduce our scheme to previous coherent one-way QKD Stucki et al. (2005). We first present the typical coherent one-way QKD set-up in figure 2(a). Alice sends pulses and Bob detects them. For both of them, logic bits are encoded with two-pulse sequences. As an intermediate step towards our scheme, the common path of coherent one-way QKD is unfolded in figure 2(b). In this case, the two pulses travel on separate channels and are encoded together. The rule of encoding logic bits is similar to above. Blue pulses are one-pulse time later than red ones. After BS3, red and blue pulses with the period of 2T are transformed into pulse trains with the period of T in two arms of the interferometer, respectively. On short arm of the interferometer, the blue pulses have the opposite phase with other pulses, which is the only difference between figure 2(a) and figure 2(b) in the interference basis. Therefore, we calculate visibility according to the parity of pulse’s time slot which can be seen in equation (1). The two schemes are equivalent from a security perspective. In figure 2(c), we present the quantum CKA scheme. The detecting section have been outsourced to Charlie and the users’ stations have been separated. Alice and Bob send pulses at the same time and Bob’s (blue) pulses are postponed before entering the interferometer, which makes no difference in the measurements. Therefore, attacks on two different protocols have same influence. Thus we can take advantage of the security analysis of the existing protocol which is secure against a large class of collective attacks Branciard et al. (2008); Korzh et al. (2015).
IV Key rates
By using the result of coherent one-way QKD (see also in A), the asymptotic conference key rate of our protocol can be written as
(2) | ||||
where Qxy is the gain for the case of Alice choosing intensity x and Bob choosing intensity y, with x, y . is the error rate under time basis and is the binary Shannon entropy. is visibility in the interference basis. is the leaked information during classical error correction. Here, and are the overall gain under time basis and the error correction efficiency, respectively. is the max error rate between X (X ) and Charlie. from Korzh et al. (2015). More simulation details can be seen in B.
0.167 | 1.1 |
Here, we assume that the sources and channels are all symmetric. The distances between Alice-Charlie and Bob-Charlie are L/2. Besides, the detection efficiencies and dark count rates of Charlie’s detectors are the same. The total efficiency of quantum channel is , where is the efficiency of one quantum channel. The repeaterless bound between two users is PLOB bound and its form is Pirandola et al. (2017), where is the channel efficiency between two users. Denote as the total efficiency among quantum channels and as repeaterless bound Pirandola (2020); Takeoka et al. (2019), which is a generalized form of the two-user repeaterless bound Takeoka et al. (2014); Pirandola et al. (2017). We utilize the practical parameters which are presented in table 1 and optimize the conference key rate over the free parameters t and . By applying above-mentioned steps, the performance of our protocol is shown in figure 3. Conference key rates in our protocol can break the limit of the total efficiency among quantum channels when the misalignment rate of interference basis is lower than . Under this circumstance, the transmission distance of our protocol reaches over 450 km theoretically.

V Conclusion
In summary, by employing coherent states, we have proposed a practical quantum CKA protocol that allows three parties to share secure conference keys. Since Charlie encodes logic bits with a nonempty coherent state and a vacuum state, the key feature of our scheme is removing the requirement of coincidence detection, which is similar to the key idea of twin-field QKD. Scaling as O() rather than O(), the conference key rate of our practical protocol can surpass the limit of the overall efficiency among quantum channels when the misalignment rate of the interference basis is lower than . The key rates of existing quantum CKA protocols are lower than that of repeating QKD and our protocol makes a contribution to narrowing the gap. Our protocol can be theoretically demonstrated over 450 km, whose performance is significantly beyond that in most previous works. Furthermore, encoding logic bits with coherent pulses, without the process of phase randomization and multiple intensity modulation, decreases the experimental difficulty and avoids the possible attacks caused by imperfect phase randomization. Besides, a strong reference pulse for synchronization and the phase stabilization are also required in our protocol.
We believe that our practical quantum CKA protocol has wide application prospect and can be widely implemented in the approaching large-scale quantum network. But note that our scheme still fails to beat the repeaterless bound and extending our scheme to N () parties is a nontrivial work. Unlike the twin-field QKD, our protocol is not a measurement-device-independent scheme. We hope evolving technologies can improve our protocol’s performance.
VI Acknowledgments
We gratefully acknowledge support from the National Natural Science Foundation of China (under Grant No. 61801420); the Key Research and Development Program of Guangdong Province (under Grant No. 2020B0303040001); the Fundamental Research Funds for the Central Universities.
Appendix A Coherent one-way QKD
Coherent one-way QKD is one of the most practical protocols in the realm of quantum cryptography. In this section, we present a brief introduction to coherent one-way QKD Stucki et al. (2005).
There are 2 participants, Alice and Bob, in this scheme. Alice sends pulses and Bob detects them. As shown in figure 4, Alice consists of an attenuated laser source followed by an intensity modulator and Bob owns beam splitters and detectors. Alice prepares either a pulse of mean photon number () or a vacuum pulse. The logic bits sent are encoded in the two-pulse sequence consisting of a nonempty and an empty pulse. Bits 0 and 1 are encoded with and . Bob recovers the bit value simply by measuring the arrival time of the laser pulse. To detect attacks on and , Alice randomly sends a decoy state, , to check for phase coherence between any two successive laser pulses. BS2 and BS3 form an asymmetric Mach–Zehnder interferometer. The coherence of both decoy and 1-0 bit sequences can be checked with a single interferometer.
Detailed protocol is summarized as follows:
1. Preparation. Alice sends bit 0 or 1 with probability and the decoy sequence with probability .
2. Measurement. Bob uses to establish the raw key and the other detectors for interfermeotric measurements.
3. Reconciliation. When sufficient data is accumulated, Bob reveals for when detector clicked and the corresponding detector. Alice tells Bob which bits he has to remove from his raw key, since they come from detections of decoy sequences.

4. Parameter estimation. Alice evaluates the information Eve gets by analyzing the time and basis of clicks and calculating the visibility.
5. Key distillation. Alice and Bob run an error correction and a privacy amplification, and then extract the common conference key.
In Branciard et al. (2008), security of coherent one-way QKD against collective attacks has been considered and an upper bound on the secret key rate for this protocol has been derived. From Branciard et al. (2008); Korzh et al. (2015), we can know when comes to infinite key length, the key rate of coherent one-way QKD is
(3) |
where is the gain of pulses that can be used for encoding bits and Q is the quantum bit error rate. and means the leaked information during the process of error correction.
Appendix B Simulation details
The asymptotic conference key rate of the ideal protocol is
(4) | ||||
where Qxy is the gain for the case of Alice choosing intensity x and Bob choosing intensity y, with x, y . is the error rate under time basis and is the binary Shannon entropy. is visibility in the interference basis. and are the overall gain in the time basis and the error correction efficiency, respectively. is the max error rate between X (X ) and Charlie. is the same as that in coherent one-way QKD.
In the following part, we present how to obtain the values of parameters used in equation (4). For coherent states, we take as an example. When sending , the gain can be given by
(5) |
is the error rate when sending corresponding pulses and mainly owing to the misalignment rate of basis, denoted as . Besides, imperfect detectors also contributes to error rate and the error rate of this kind of errors is . It can be given by
(6) |
is the error rate under time basis, which originates from and , while means the error rate under interference basis, which originates from . By , we can get , The process of calculating is similar to above. But the pulses measured in interference basis experience more channel loss and we assume the overall transmission and detection efficiency under interference basis . By , we can get the value of visibility.
The bit error rate between Alice-Bob is almost twice as that between Alice-Charlie or Bob-Charlie. Therefore, we set Charlie’s raw key as reference key. Since Alice and Bob are symmetric, we merely need to work out the error rate of Alice-Charlie. For both Alice-Charlie and Bob-Charlie, as long as Alice and Bob send the same state and Charlie detects it, it will result in an inevitable error. Thus, either of them has half the errors. and also contribute to the error rate. In fact, their error rates here equal to and . Obviously, and , so
(7) |
For free parameters and , we utilize Genetic Algorithm to find their optimal value. Utilizing the practical experimental parameters in Chen et al. (2020) , we can get the relationship between the conference key rate and transmission distance.
References
- Bennett and Brassard (1984) C. H. Bennett and G. Brassard, Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing p. 175 (1984).
- Ekert (1991) A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
- Bose et al. (1998) S. Bose, V. Vedral, and P. L. Knight, Phys. Rev. A 57, 822 (1998).
- Cabello (2000) A. Cabello, arXiv: quant-ph/0009025 (2000).
- Chen and Lo (2007) K. Chen and H.-K. Lo, Quantum Inform. & Compu. 7, 689 (2007).
- Matsumoto (2007) R. Matsumoto, Phys. Rev. A 76, 062316 (2007).
- Epping et al. (2017) M. Epping, H. Kampermann, D. Bruß, et al., New J. Phys. 19, 093012 (2017).
- Fu et al. (2015) Y. Fu, H.-L. Yin, T.-Y. Chen, and Z.-B. Chen, Phys. Rev. Lett. 114, 090501 (2015).
- Proietti et al. (2020) M. Proietti, J. Ho, F. Grasselli, P. Barrow, M. Malik, and A. Fedrizzi, arXiv:2002.01491[quant-ph] (2020).
- Zhu et al. (2015) C. Zhu, F. Xu, and C. Pei, Sci. Rep. 5, 17449 (2015).
- Wu et al. (2016) Y. Wu, J. Zhou, X. Gong, Y. Guo, Z.-M. Zhang, and G. He, Phys. Rev. A 93, 022325 (2016).
- Ottaviani et al. (2019) C. Ottaviani, C. Lupo, R. Laurenza, and S. Pirandola, Commun. Phys. 2, 118 (2019).
- Chen et al. (2016) R. Chen, W. Bao, C. Zhou, H. Li, Y. Wang, and H. Bao, Opt. Express 24, 6594 (2016).
- Chen et al. (2017) R.-K. Chen, W.-S. Bao, H.-Z. Bao, C. Zhou, M.-S. Jiang, and H.-W. Li, Chin. Phys. Lett. 34, 080301 (2017).
- Ribeiro et al. (2018) J. Ribeiro, G. Murta, and S. Wehner, Phys. Rev. A 97, 022307 (2018).
- Li et al. (2018) Z.-H. Li, M. S. Zubairy, and M. Al-Amri, Sci. Rep. 8, 3899 (2018).
- Pivoluska et al. (2018) M. Pivoluska, M. Huber, and M. Malik, Phys. Rev. A 97, 032312 (2018).
- Jo and Son (2019) Y. Jo and W. Son, OSA Continuum 2, 814 (2019).
- Zhao et al. (2020) S. Zhao, P. Zeng, W.-F. Cao, X.-Y. Xu, Y.-Z. Zhen, X. Ma, L. Li, N.-L. Liu, and K. Chen, Phys. Rev. Appl. 14, 024010 (2020).
- Yin and Chen (2020) H.-L. Yin and Z.-B. Chen, arXiv:2006.10230[quant-ph] (2020).
- Murta et al. (2020) G. Murta, F. Grasselli, H. Kampermann, and D. Bruß, Adv. Quantum Technol. 3, 2000025 (2020).
- Das et al. (2019) S. Das, S. Bäuml, M. Winczewski, and K. Horodecki, arXiv:1912.03646[quant-ph] (2019).
- Duan et al. (2001) L.-M. Duan, M. D. Lukin, J. I. Cirac, and P. Zoller, Nature 414, 413 (2001).
- Azuma et al. (2015) K. Azuma, K. Tamaki, and W. J. Munro, Nat. Commun. 6, 10171 (2015).
- Grasselli et al. (2019) F. Grasselli, H. Kampermann, and D. Bruß, New J. Phys. 21, 123002 (2019).
- Lucamarini et al. (2018) M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, Nature 557, 400 (2018).
- Wang et al. (2018) X.-B. Wang, Z.-W. Yu, and X.-L. Hu, Phys. Rev. A 98, 062323 (2018).
- Yin and Fu (2019) H.-L. Yin and Y. Fu, Sci. Rep. 9, 3045 (2019).
- Wang (2005) X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005).
- Lo et al. (2005) H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005).
- Stucki et al. (2005) D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H. Zbinden, Appl. Phys. Lett. 87, 194108 (2005).
- Branciard et al. (2008) C. Branciard, N. Gisin, and V. Scarani, New J. Phys. 10, 013031 (2008).
- Korzh et al. (2015) B. Korzh, C. C. W. Lim, R. Houlmann, N. Gisin, M. J. Li, D. Nolan, B. Sanguinetti, R. Thew, and H. Zbinden, Nat. Photonics 9, 163 (2015).
- Chen et al. (2020) J.-P. Chen, C. Zhang, Y. Liu, C. Jiang, W. Zhang, X.-L. Hu, J.-Y. Guan, Z.-W. Yu, H. Xu, J. Lin, et al., Phys. Rev. Lett. 124, 070501 (2020).
- Pirandola et al. (2017) S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, Nat. Commun. 8, 15043 (2017).
- Pirandola (2020) S. Pirandola, IET Quantum Commun. 1, 22 (2020).
- Takeoka et al. (2019) M. Takeoka, E. Kaur, W. Roga, and M. M. Wilde, arXiv:1912.10658 (2019).
- Takeoka et al. (2014) M. Takeoka, S. Guha, and M. M. Wilde, Nat. Commun. 5, 5235 (2014).