Experimental composable security decoy-state quantum key distribution using time-phase encoding
Abstract
Quantum key distribution (QKD) promises provably secure communications. In order to improve the secret key rate, combining a biased basis choice with the decoy-state method is proposed. Concomitantly, there is a basis-independent detection efficiency condition, which usually cannot be satisfied in a practical system, such as the time-phase encoding. Fortunately, this flaw has been recently removed theoretically and experimentally using the fact that the expected yields of single-photon states prepared in two bases stay the same for a given measurement basis. However, the security proofs do not fully consider the finite-key effects for general attacks. In this work, we provide the rigorous finite-key security bounds for four-intensity decoy-state BB84 QKD against coherent attacks in the universally composable framework. Furthermore, we build a time-phase encoding system with 200 MHz clocked to implement this protocol, in which the real-time secret key rate is more than 60 kbps over 50 km single-mode fiber.
I Introduction
Encryption is an important foundation for ensuring information security. With the rapid development of quantum computing technology, current public-key encryption systems will be seriously threatened. Quantum key distribution (QKD) allows two remote users to exchange information-theoretic secure key via the quantum laws. Since the first QKD protocol, BB84, was proposed by Bennett and Brassard in 1984 Bennett and Brassard (IEEE Press, New York, 1984). After nearly 40 years of development, BB84 QKD has become the most practical protocol in quantum information science Liao et al. (2018). By exploiting the weak coherent light to replace the single-photon source, the security and feasibility of BB84 QKD have been widely demonstrated experimentally in fiber Tanaka et al. (2008); Yin et al. (2008); Liu et al. (2010); Lucamarini et al. (2013); Fröhlich et al. (2017); Boaron et al. (2018), free space Schmitt-Manderbach et al. (2007); Liao et al. (2017) and chip integration Ma et al. (2016); Sibson et al. (2017); Bunandar et al. (2018) with the help of decoy-state method Wang (2005); Lo et al. (2005a). To implement the qubit encoding of QKD, one usually has three options: polarization, phase and time-phase. Recent years, the time-phase encoding has received increasing favor in practical system due to two advantages. One is that the reference frame is independent in time basis, which leads a stable and low bit error rate in raw key Yin et al. (2016). The other is the polarization disturbance immunity in both time and phase bases, which can be deployed in complex field environment while polarization coding systems cannot.
The original BB84 protocol and its security proof Shor and Preskill (2000) directly provide the phase error rate via the total bit error rate of two bases, which is based on the symmetry of two bases. There are three conditions of this protocol: basis-independent probability selected by Alice, basis-independent probability selected by Bob and the basis-independent detection efficiency, which results in that only half of the raw data can be used to extract key. In order to satisfy the basis-independent detection efficiency condition, one has to reduce the detection efficiency (including intrinsic loss and efficiency of detector at the receiver) of two bases to be consistent Liao et al. (2018); Tanaka et al. (2008); Yin et al. (2008); Liu et al. (2010); Liao et al. (2017), resulting in the lower key rate.
Although QKD can provide fresh secure key in real-time Liao et al. (2018), the low secret key rate is always the Achilles’ heel if one applies the one-time pad encryption. The key rate can be directly doubled at most through the efficient BB84 scheme Lo et al. (2005b) without any new technique requirement. The efficient BB84 scheme exploits the biased basis choice and removes the basis-independent detection efficiency condition. To further increase the key rate, combining a biased basis choice with the decoy-state method is proposed Wei et al. (2013); Jiang et al. (2016); Mao et al. (2017) by an additional basis-independent detection efficiency condition that usually cannot be satisfied and brings security loopholes in the practical system. Recently, a four-intensity decoy-state BB84 QKD Yu et al. (2016) uses a subtle fact, the expected yields of single-photon component prepared in two bases are the same for a given measurement basis, to remove basis-independent detection efficiency condition and provide a higher key rate. A proof-of-principle experiment Liu et al. (2019) with polarization encoding has shown tens of times key rate improvement in the case of large basis detection efficiency asymmetry. However, the security and feasibility of this protocol are acquired in the finite data with an assumption that Eve is restricted to particular types of attacks. Unfortunately, such assumptions cannot be guaranteed in reality.
In this work, we provide the rigorous finite-key analysis for four-intensity decoy-state BB84 QKD protocol. The security analysis is based on a combination of entropy uncertainty relation Tomamichel et al. (2012); Lim et al. (2014) and a finite-key security bounds Yin et al. (2020). We exploit the autonomous time-phase encoding system to experimentally realize this protocol and continuously distribute secret keys for two months, where there is a 1.8 dB difference between the efficiency of two bases at the receiver. The real-time extracted secret key rate is more than 60 kbps over 50 km single-mode fiber and can be secure against coherent attacks in the universally composable framework Müller-Quade and Renner (2009).
II Coherent security
We consider a four-intensity decoy-state BB84 QKD protocol, where the basis and intensity chosen with probabilities that are biased. Specifically, the intensities of basis sent by Alice are and , the intensity of basis is , together with the vacuum state without basis information. The bases and are selected by Bob with probabilities and , respectively. The following is a detailed description of the protocol.
1. Preparation. Alice exploits the laser to prepare weak pulses with intensities and in basis, in basis and the vacuum state given by a random bit . The probability of selecting intensity is with . The weak optical pulses go through the insecure quantum channel to Bob.
2. Measurement. Bob randomly selects basis and with probabilities and to measure the received pulses, respectively. Bob records the effective events and corresponding bit . At least one detector click means an effective event. For multiple detector click, he randomly records a bit value and a basis for passive basis detection.
3. Reconciliation. Alice and Bob exploit the authenticated classical channel to announce the effective event, basis and intensity information. They repeat steps 1 to 3 until and , where the () is set (number) of intensity prepared by Alice and measured in basis by Bob.
4. Parameter estimation. Alice and Bob select a size of in to get a raw key pair . They announce the bit value of set and compute the corresponding number of bit error . All sets are used to compute the observed number of vacuum events and single-photon events and the observed phase error rate of single-photon events in . If , they move on to step 5. Otherwise, they abort the data and start again.
5. Postprocessing. Alice and Bob apply an error correction with leaking at most bits of information. They adopt a universal2 hash function to perform an error-verification by consuming bits of information Wegman and Carter (1981). At last, they use a universal2 hash function to perform privacy amplification on their raw key to get a secret key pair (,) with bits.
The four-intensity decoy-state BB84 QKD protocol is -correct and -secret in the universally composable framework with Lim et al. (2014); Yin et al. (2020)
(1) |
where , and . Thereinto, represents the joint state of and , is the uniform mixture of all possible values of , and is the probability that the protocol aborts. and denote the lower and upper bounds of observed value .

Using the decoy-state method for finite sample sizes Lim et al. (2014), the expected numbers of vacuum event and single-photon event in can be written as
(2) |
and
(3) | ||||
where is the corresponding expected value of given observed value , and the upper and lower bounds can be acquired by using the variant of Chernoff bound Yin et al. (2020)
with . The expected number of single-photon event in can be given by Yu et al. (2016)
(4) |
where one exploits the fact that the expected yield of single-photon prepared in basis is equal to basis given the same measurement basis . Besides, the expected number of bit error associated with the single-photon event in is Yu et al. (2016)
(5) |
with
(6) |
where one utilizes the fact that expected value . For a given expected value, one can use the Chernoff bound to obtain the upper and lower bounds of observed value Yin et al. (2020)
The hypothetically observed phase error rate associated with the single-photon events in can be obtained by using the random sampling without replacement Yin et al. (2020),
(7) |
where
(8) |
with and . The variant of Chernoff bound is used eight times, the Chernoff bound is used four times and the random sampling is used one time. Composing the error terms of finite-sample, we get the factor is 22, including 9 error terms due to the smooth min-entropy estimation Lim et al. (2014).
III Experimental realization
We built a compact and autonomous time-phase encoding QKD system, which continuously distributes secret keys over an optical fiber link using four-intensity decoy-state BB84 protocol secure against coherent attacks. The physical implementation is outlined in Fig. 1. The master laser produces phase-randomized 1.6 ns-wide laser pulses at 1550.12 nm and a repetition rate of 200 MHz. Two pairs of pulses with relative phases 0 and at a 2 ns time delay generated by an asymmetric interferometer are injected into two slave lasers through the optical circulator, respectively. By controlling the trigger electrical signal of two slave lasers, Alice randomly prepares quantum states in (time) and (phase) basis using 400 ps-wide laser pulses. The decoy-state scheme is stably implemented by using an intensity modulator, a biased beam splitter with 1:99 and a PIN diode. A fiber Bragg grating with a 50 GHz nominal bandwidth is aligned to remove extra spurious emission and pre-compensate for the pulse broadening in the fiber transmission. The repetition rates of 100 kHz synchronization pulses with 2 ns-wide at 1310 nm are transmitted from Alice to Bob via the quantum channel by using wavelength division multiplexed. The intensities are set as , and with the corresponding probabilities , and .
After the wavelength division demultiplexer, Bob utilizes a biased beam splitter with 3:7 to implement passive choice measurement basis, where the probability of is detected in time () basis and the probability of is detected in phase () basis. The phase variation of the interferometer is compensated by a phase shifter, where the feedback algorithm is completed in advanced RISC machines (ARM). There is a 1.8 dB inherent loss difference between two bases due to the optical element. Four 200 megahertz-gated InGaAs/InP single-photon detectors with effective gate width 450 ps are exploited to detect quantum signals. The efficiency of detector is at a 120 dark count per second. The dead times of detectors in and are 3 s and 5 s, respectively. The detection counts of and basis will be affected differently due to the dead time, which also introduces the difference in detection efficiency. The secure and efficient synchronization scheme Liu and Yin (2019) is used for four gated-mode single-photon detectors calibration.
We continuously run this QKD system for two months over 50.4 km G.652D single-mode fiber with 9.4 dB loss. The real-time extractable secret key rate is always more than 60 kbps in the universally composable framework with . The Winnow algorithm Buttler et al. (2003) with 1.42 inefficiency of error correction is used to perform the error correction for a block size of 512 kb. An error verification is carried out after each error correction via the LFSR-based Toeplitz matrix construction Krawczyk (1994) with 64 bit. Privacy amplification will be performed by using the concatenation of Toeplitz matrix and the identity matrix Hayashi (2011) after accumulating data about 4 Mb with error correction ten times, where the data excludes the amount of information leaked in error correction. We exploit lasers with 1270 and 1290 nm and PIN diodes to realize classical communication with 8B/10B encoding, which will introduce less noise compared with commercial transceiver if quantum and classic channels share one fiber. In order to reduce the noise of synchronization optical pulses, we discard the count of 100 ns before and after each synchronization optical pulse. Authentication, reconciliation, error correction, error verification and privacy amplification are all carried out in a field-programmable gate array (FPGA) on each side, while the parameter estimation is proceeded in ARM.
IV Conclusion
In summary, we have experimentally realized the four-intensity decoy-state BB84 QKD with time-phase encoding and exploited tight security bounds for finite-key analysis with composable security against coherent attacks. Our experiment demonstrates that the basis-independent detection efficiency condition has been removed with 1.8 dB difference between time and phase basis of receiver. The stability of our system is very well due to the time-phase encoding. The phase randomness and spectral consistency are guaranteed by the pulsed laser seeding technique Comandar et al. (2016). Although the secret key rate of 60 kbps is not very high over 50 km fiber. It’s enough for some encrypted tasks, for example, voice communication. Limiting the secret key generation rate is mainly due to the system repetition frequency and the saturation count rate of the single-photon detector, which will be improved in the future.
V Acknowledgments
We gratefully acknowledge support from the National Natural Science Foundation of China under Grant No. 61801420, the Fundamental Research Funds for the Central Universities.
References
- Bennett and Brassard (IEEE Press, New York, 1984) C. H. Bennett and G. Brassard, in Proceedings of the Conference on Computers, Systems and Signal Processing (IEEE Press, New York, 1984), pp. 175–179.
- Liao et al. (2018) S.-K. Liao, W.-Q. Cai, J. Handsteiner, B. Liu, J. Yin, L. Zhang, D. Rauch, M. Fink, J.-G. Ren, W.-Y. Liu, et al., Phys. Rev. Lett. 120, 030501 (2018).
- Tanaka et al. (2008) A. Tanaka, M. Fujiwara, S. W. Nam, Y. Nambu, S. Takahashi, W. Maeda, K.-i. Yoshino, S. Miki, B. Baek, Z. Wang, et al., Opt. Express 16, 11354 (2008).
- Yin et al. (2008) Z.-Q. Yin, Z.-F. Han, W. Chen, F.-X. Xu, Q.-L. Wu, and G.-C. Guo, Chin. Phys. Lett. 25, 3547 (2008).
- Liu et al. (2010) Y. Liu, T.-Y. Chen, J. Wang, W.-Q. Cai, X. Wan, L.-K. Chen, J.-H. Wang, S.-B. Liu, H. Liang, L. Yang, et al., Opt. Express 18, 8587 (2010).
- Lucamarini et al. (2013) M. Lucamarini, K. Patel, J. Dynes, B. Fröhlich, A. Sharpe, A. Dixon, Z. Yuan, R. Penty, and A. Shields, Opt. Express 21, 24550 (2013).
- Fröhlich et al. (2017) B. Fröhlich, M. Lucamarini, J. F. Dynes, L. C. Comandar, W. W.-S. Tam, A. Plews, A. W. Sharpe, Z. Yuan, and A. J. Shields, Optica 4, 163 (2017).
- Boaron et al. (2018) A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussières, M.-J. Li, et al., Phys. Rev. Lett. 121, 190502 (2018).
- Schmitt-Manderbach et al. (2007) T. Schmitt-Manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J. G. Rarity, et al., Phys. Rev. Lett. 98, 010504 (2007).
- Liao et al. (2017) S.-K. Liao, W.-Q. Cai, W.-Y. Liu, L. Zhang, Y. Li, J.-G. Ren, J. Yin, Q. Shen, Y. Cao, Z.-P. Li, et al., Nature 549, 43 (2017).
- Ma et al. (2016) C. Ma, W. D. Sacher, Z. Tang, J. C. Mikkelsen, Y. Yang, F. Xu, T. Thiessen, H.-K. Lo, and J. K. Poon, Optica 3, 1274 (2016).
- Sibson et al. (2017) P. Sibson, C. Erven, M. Godfrey, S. Miki, T. Yamashita, M. Fujiwara, M. Sasaki, H. Terai, M. G. Tanner, C. M. Natarajan, et al., Nature Commun. 8, 13984 (2017).
- Bunandar et al. (2018) D. Bunandar, A. Lentine, C. Lee, H. Cai, C. M. Long, N. Boynton, N. Martinez, C. DeRose, C. Chen, M. Grein, et al., Phys. Rev. X 8, 021009 (2018).
- Wang (2005) X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005).
- Lo et al. (2005a) H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005a).
- Yin et al. (2016) H.-L. Yin, T.-Y. Chen, Z.-W. Yu, H. Liu, L.-X. You, Y.-H. Zhou, S.-J. Chen, Y. Mao, M.-Q. Huang, W.-J. Zhang, et al., Phys. Rev. Lett. 117, 190501 (2016).
- Shor and Preskill (2000) P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).
- Lo et al. (2005b) H.-K. Lo, H. F. Chau, and M. Ardehali, J. Cryptol. 18, 133 (2005b).
- Wei et al. (2013) Z. Wei, W. Wang, Z. Zhang, M. Gao, Z. Ma, and X. Ma, Sci. Rep. 3, 2453 (2013).
- Jiang et al. (2016) H. Jiang, M. Gao, B. Yan, W. Wang, and Z. Ma, Eur. Phys. J. D 70, 78 (2016).
- Mao et al. (2017) C.-C. Mao, J. Li, J.-R. Zhu, C.-M. Zhang, and Q. Wang, Quantum Inf. Process. 16, 256 (2017).
- Yu et al. (2016) Z.-W. Yu, Y.-H. Zhou, and X.-B. Wang, Phys. Rev. A 93, 032307 (2016).
- Liu et al. (2019) H. Liu, Z.-W. Yu, M. Zou, Y.-L. Tang, Y. Zhao, J. Zhang, X.-B. Wang, T.-Y. Chen, and J.-W. Pan, Phys. Rev. A 100, 042313 (2019).
- Tomamichel et al. (2012) M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, Nature Commun. 3, 634 (2012).
- Lim et al. (2014) C. C. W. Lim, M. Curty, N. Walenta, F. Xu, and H. Zbinden, Phys. Rev. A 89, 022307 (2014).
- Yin et al. (2020) H.-L. Yin, M.-G. Zhou, J. Gu, Y.-M. Xie, Y.-S. Lu, and Z.-B. Chen, arXiv:2002.06530 (2020).
- Müller-Quade and Renner (2009) J. Müller-Quade and R. Renner, New J. Phys. 11, 085006 (2009).
- Wegman and Carter (1981) M. N. Wegman and J. L. Carter, J. Comput. Syst. Sci. 22, 265 (1981).
- Liu and Yin (2019) P. Liu and H.-L. Yin, OSA Continuum 2, 2883 (2019).
- Buttler et al. (2003) W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue, and C. G. Peterson, Phys. Rev. A 67, 052303 (2003).
- Krawczyk (1994) H. Krawczyk, in Advances in Cryptology-CRYPTO’94 (Springer, 1994), pp. 129–139.
- Hayashi (2011) M. Hayashi, IEEE Trans. Inform. Theory 57, 3989 (2011).
- Comandar et al. (2016) L. Comandar, M. Lucamarini, B. Fröhlich, J. Dynes, A. Sharpe, S.-B. Tam, Z. Yuan, R. Penty, and A. Shields, Nature Photon. 10, 312 (2016).