High key rate quantum conference key agreement with unconditional security
Abstract
Quantum cryptography is a major ingredient of the future quantum internet that promises various secure communication tasks. Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography, which provides the conference key among multiple users simultaneously. However, quantum CKA is currently far from practical application due to the low conference key rate. Here, we propose a quantum CKA protocol of three users with information-theoretic security. Our protocol only requires phase-randomized weak coherent sources and threshold single-photon detectors, and is anticipated to be experimentally demonstrated over 600 km under current technology. Our scheme can be widely implemented in the approaching large-scale quantum network.
I INTRODUCTION
Security of various communication tasks can be guaranteed by quantum internet, which consists of numerous quantum cryptographic networks. Quantum key distribution (QKD) allows two remote users to share unconditionally secure key based on quantum laws [1, 2], which has stepped into a stage where an integrated network from satellite to ground is waiting to be built. Nevertheless, there are kinds of multiparty cryptographic primitives beyond two users, e.g., conference key agreement (CKA) [3, 4]. Quantum CKA aims to allow at least three users to share the conference key with unconditional security, which can be applied in various practical situations, such as netmeeting, online education and telemedicine. The conference key promises group encryption for legitimate users, in which any member of that group can decipher the message. As it generalizes the QKD to multiple users, it is also called multipartite QKD [5].
Quantum CKA has been a research hot topic [6]. At the very beginning, it enables multiple users to share the conference key with information-theoretic security by employing multipartite entanglement [7, 8, 9]. Besides, the measurement-device-independent CKA protocol [10] has been proposed via post-selected Greenberger-Horne-Zeilinger (GHZ) entanglement [11, 12]. It has been generalized extensively to various cases including finite size [13, 14], continuous variables [15, 16] and four users with state [17]. Moreover, the finite-key analysis with composable security [18], device independence [19, 20] and other special cases [21, 22, 23] are also considered in quantum CKA. The experimental demonstration of quantum CKA has been implemented recently over 50 km fiber using the state-of-the-art four-photon GHZ entanglement source [24]. By directly distributing GHZ entanglement states, quantum CKA has been proved to drastically outperform QKD in resource expense for group communication [25].
Although progress on quantum CKA has been made, the low conference key rate, short transmission distance, and excessive resource cost seriously restrict its real life applications. It has been shown recently that the conference key rate is rigorously limited by the entanglement state distribution capacity of quantum networks [26, 27, 28]. In order to increase the conference key rate, one may utilize quantum repeaters [29] and multi-user scheme [10] of adaptive measurement-device-independence [30]. However, these approaches remain difficult to be implemented.
Introducing an intermediate node to perform a single-photon interference, twin-field QKD [31] and its variants [32, 33, 34, 35, 36, 37, 38, 39, 40] are able to break the limit of the secret key capacity of quantum channels [41, 42], specifically, the Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound [42]. Exploiting the twin-field theory [31], some new quantum CKA protocols [43, 44, 45] are proposed to improve the conference key rate and transmission distance. However, the scheme of Ref. [43] can not be experimentally demonstrated with current technology and the key rate of Ref. [44] is relatively low. In addition, zero-error attack on coherent one-way QKD has been proposed [46], therefore the security of Ref. [45] employing the idea of coherent one-way QKD [47], can not be guaranteed.
Here, we propose a three-party quantum CKA protocol inspired by the twin-field theory with vacuum state and single-photon encoding [32, 35], i.e., the sending-or-not-sending scheme [32]. The conference key rate of our protocol scales with the square-root of the total channel transmittance, which enables our scheme to break the limit of entanglement state distribution capacity of quantum networks, and our protocol can be experimentally demonstrated over 600 km with developed technology in twin-field QKD [48, 49, 50, 51, 52, 53]. The key rate of our protocol is three orders of magnitude higher than that of Ref. [44] within a range of 600 km and can remain at a high level even with a large misalignment rate of quantum channels.

II Protocol description
As depicted in Fig. 1, our scheme employs the same devices as twin-field QKD [31, 48, 52, 53]. We choose the decoy-state quantum CKA with three intensities to simplify the experiment. Hereafter, and form the photon number Hilbert space for vacuum and single photon. We exploit the post-selected phase-matching method to acquire the effective events with , where (for Alice) and (for Bob) are the random global phases and . is a selected value and is the phase difference between the reference frames of Alice and Bob, which can be obtained by strong light reference [52, 53]. The successful probability of post-selected phase-matching is under the assumption of continuous phase randomization. Our protocol has three legitimate users, Alice, Bob and Charlie. Here, we consider a symmetric case. The detailed protocol is described as follows.
1. Preparation. Alice and Bob independently and randomly choose the and bases. Alice prepares phase-randomized weak coherent pulses using intensities 0 and , with probability and , for logic bit and in the basis. Bob does the same. Alice (Bob) generates phase-randomized weak coherent pulses () for logic bit () in the basis, with , and . They send the optical pulses to Charlie through the insecure quantum channels.
2. Measurement. Charlie randomly measures the received pulse pairs in the and bases. For the basis, one and only one click between detectors D1 and D2 reveals a successful event. For the basis, one and only one click between detectors D3 and D4 indicates a successful outcome.
3. Reconciliation. For each successful measurement event, Alice, Bob, and Charlie announce the basis information. Alice and Bob publish the intensity information unless Alice, Bob, and Charlie all select the basis. Alice and Bob disclose the global phase and perform post-selected phase-matching when they both choose intensity and Charlie selects the basis. All classical communications among Alice, Bob, and Charlie are transmitted via the authenticated classical channels. Alice always flips her logic bit if choosing the basis. She will flip her logic bit if selecting the basis and .
4. Parameter estimation. Alice, Bob, and Charlie adopt the data of the basis as the raw key. The data of the basis is exploited to estimate the leaked information. They exploit the decoy-state method [54, 55] to the yield and phase error rate of joint single-photon state .
5. Postprocessing. They extract the common conference key using classical error correction, error verification and privacy amplification.
III Security analysis
For the case of the basis, the joint quantum states and form the joint single-photon state with probability , which can be utilized to extract key [56] since the coherent states prepared by Alice and Bob are phase-randomized. The joint quantum state () can be acquired by Alice sending vacuum (single-photon) state and Bob sending single-photon (vacuum) state.
For the case of basis, Alice and Bob implement post-selected phase-matching and only consider the case of single photon component [35], such as
(1) |
where . The joint quantum states can also form the joint single-photon state .
Here, we will exploit the entanglement distillation argument of the GHZ state [11, 12, 10] to provide security against coherent attacks. We introduce a virtual protocol to prove the security of practical protocol as shown in Fig. 1. For the joint single-photon state case, no one can distinguish the practical protocol and the virtual protocol P1, which is similar to the twin-field QKD [32, 35].
Virtual protocol P1. Let P1 represent a virtual entanglement-based protocol. (i) Alice prepares an entangled state
(2) | ||||
where and are the qubit system and optical mode, respectively. Note that . Likewise, Bob does the same. A sifting step is needed to be performed, i.e., Alice and Bob only reserve the case that the total photon number is one between optical modes and . After this step, the normalized joint state is
(3) | ||||
Then, Alice (Bob) sends optical mode () to Charlie and keeps the qubit system (). Let optical modes and denote the qubit system and . Therefore, the joint quantum state among Alice, Bob and Charlie can be written as a GHZ state, . (ii) Alice, Bob and Charlie independently and randomly choose the basis or the basis to measure the received optical modes or kept qubit system. (iii) They disclose the basis information. (iv) They utilize data of the basis as raw key while data of the basis are used to estimate Eve’s eavesdropping [10]. (v) They generate final key with classical post-processing.
Practical protocol. The asymptotic conference key rate of the practical protocol, as shown in Fig. 1, can be written as [32, 35, 40]
(4) |
where is the yield when both Alice and Bob choose the basis and send vacuum state. is the revealed information in classical error correction. The gain and quantum bit error rate of the basis can be directly acquired in experiment, where is the maximum value between the marginal bit error rates of Alice-Charlie and Bob-Charlie when the raw key of Charlie is set as the reference key. The yields and can be estimated by exploiting the decoy-state method [54, 55],
(5) |
where we define . is the gain of Charlie selecting the basis given that Alice and Bob send intensities and and can be given by
(6) | ||||
Besides, the gain can be written as
(7) | ||||
where is the modified Bessel function of the first kind.
For , we employ the fact that . The bit error rate can be bounded by
(8) |
where and are the bit error rate and gain of Charlie selecting the basis when Alice and Bob both send intensity and they successfully perform the post-selected phase-matching.
Note that quantum bit error rate is the maximum value between the marginal error rates of Alice-Charlie and Bob-Charlie as Charlie’s raw key is the reference key in the error correction step. For the case of our practical protocol, we have the gain and quantum bit error rate . Therein, and are the correct and incorrect gains between Alice and Bob,
(9) | ||||
For the case of Alice and Bob both choosing intensity , they should perform the post-selected phase-matching. The corresponding gain and error rate can be written as and . Therein, the correct gain and incorrect gain are
(10) | ||||
and
(11) | ||||
where the approximate results are always true for . Therein, and are the error function and imaginary error function.
Single-photon protocol. Here, we also present an ideal protocol, called the single-photon protocol, where ideal single-photon sources are required to replace the phase-randomized weak coherent pulses in the basis. Alice (Bob) randomly sends optical modes and by using the vacuum and single-photon source with probabilities and in the basis.
Following the entanglement distillation argument [10], the asymptotic conference key rate of the single-photon protocol is given by
(12) |
where and are the yield and bit error rate of the joint single-photon state given that all users choose the basis, with . For example, is the probability that Charlie has a successful detection in the basis given that Alice and Bob send the state . Let denote the bit error of the basis, where is the logic bit value of Charlie in the basis. is the leaked information in classical error correction. is the binary Shannon entropy. There is always a marginal bit error rate in the basis between every two users. Taking the raw key of Charlie as the reference key, the basis bit error rate of this protocol is the maximum value between the marginal bit error rates of Alice-Charlie and Bob-Charlie.
For the case of the scheme with single-photon source, Alice and Bob directly prepare optical mode with single photon. We also have the gain and quantum bit error rate . Therein, and are the correct and incorrect gains between Alice and Bob,
(13) | ||||
where these yields can be expressed as
(14) | ||||
and . Thereby, the revealed information in classical error correction is . Besides, we have the yields . Note that due to , where and can be given by
(15) |

IV Performance
We assume that the efficiencies and dark count rates of Charlie’s detectors are the same and the distances of Alice-Charlie and Bob-Charlie are both . We numerically optimize the conference key rate over the free parameters , and by utilizing Genetic Algorithm. To display the conference key rate of our protocol scaling with the square-root of the total channel transmittance, we define , where is the detector efficiency. In order to show the performance of our quantum CKA protocol, we utilize the practical parameters in Table 1 for simulation, which has been recently realized over 500 km fiber in twin-field QKD [52]. The conference key rate of our practical quantum CKA protocol as a function of the total transmission distance among three users is shown in Fig. 2. The transmission distance of our practical protocol reaches over 600 km and its key rate can surpass that of distributing GHZ states among 3 parties [25] at the distance of 160 km. For the case of distributing GHZ states [25], we set the misalignment rate of its channels is 0 and only dark counts contribute to its error rate, which aims to make its key rate close to the GHZ entanglement distribution capacity. Compared with the scheme of Ref. [44], although our scheme is not a measurement-device-independent protocol, unlike Ref. [44], the key rate of our protocol has improved significantly and is three orders of magnitude higher within 600 km. Additionally, the single-photon protocol can be theoretically demonstrated over 800 km, which also shows the importance to develop ideal single-photon source.
Besides, the bit error rate can be bounded by adjusting probability , which is irrelevant to the misalignment of channel. Therefore, our practical protocol can always extract conference key as long as the misalignment rate of basis in principle. As shown in Fig. 3, the secure transmission distance is larger than 500 km in the case of . Besides, the conference key rate of the practical protocol can surpass that of distributing GHZ states over the networks [25] even when the misalignment rate is larger than . These results indicate that our quantum CKA is practical and feasible even in the field environment.

V Conclusion
In summary, by employing a special GHZ-class state, we have proposed a practical quantum CKA protocol that allows three users to share the information-theoretically secure conference key. Its conference key rate scales as rather than the total transmittance, which can beat the fundamental linear limit on the private capacity of quantum network [26]. This protocol exploits the same devices and technology as twin-field QKD [31, 48, 52, 53] and as such, it can be demonstrated over 600 km. New results are significantly beyond what one could expect for quantum CKA in previous works, whose key rate is three orders of magnitude higher within 600 km compared to Ref. [44] and keeps at a high level even with large misalignment rate. We believe that this quantum CKA protocol can be widely implemented to build the large-scale quantum cryptographic network.
Here, we would like to clarify that our quantum CKA is not a measurement-device-independent scheme and will suffer from the standard quantum hacking attacks, including blinding attack [57]. In order to treat double-click attack, one should exploit the squashing model [56], i.e., random basis and random measurement outcomes should be assigned. Our protocol also requires the phase stability of two independent pulses, which can be circumvented by using active phase stabilisation [49, 48], phase tracking and post-selection [51]. Different from the scheme with post-selected W state [43], our scheme with arbitrary parties is an interesting and nontrivial work.
Acknowledgments
We gratefully acknowledge support from the National Natural Science Foundation of China (under Grant No. 61801420); the Key-Area Research and Development Program of Guangdong Province (under Grant No. 2020B0303040001); the Fundamental Research Funds for the Central Universities (under Grant No. 020414380182).
Disclosures
The authors declare no conflicts of interest.
References
- Bennett and Brassard [1984] C. H. Bennett and G. Brassard, in Proceedings of the Conference on Computers, Systems and Signal Processing (IEEE Press, New York, 1984) pp. 175–179.
- Ekert [1991] A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
- Diffie and Hellman [1976] W. Diffie and M. Hellman, IEEE Trans. Inf. Theory 22, 644 (1976).
- Burmester and Desmedt [1994] M. Burmester and Y. Desmedt, in Workshop on the Theory and Application of of Cryptographic Techniques (Springer, 1994) pp. 275–286.
- Matsumoto [2007] R. Matsumoto, Phys. Rev. A 76, 062316 (2007).
- Murta et al. [2020] G. Murta, F. Grasselli, H. Kampermann, and D. Bruß, Adv. Quantum Technol. 3, 2000025 (2020).
- Bose et al. [1998] S. Bose, V. Vedral, and P. L. Knight, Phys. Rev. A 57, 822 (1998).
- Cabello [2000] A. Cabello, arXiv:quant-ph/0009025 (2000).
- Chen and Lo [2007] K. Chen and H.-K. Lo, Quantum Inf. Comput. 7, 689 (2007).
- Fu et al. [2015] Y. Fu, H.-L. Yin, T.-Y. Chen, and Z.-B. Chen, Phys. Rev. Lett. 114, 090501 (2015).
- Lo and Chau [1999] H.-K. Lo and H. F. Chau, Science 283, 2050 (1999).
- Shor and Preskill [2000] P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).
- Chen et al. [2016] R. Chen, W. Bao, C. Zhou, H. Li, Y. Wang, and H. Bao, Opt. Express 24, 6594 (2016).
- Chen et al. [2017] R.-K. Chen, W.-S. Bao, H.-Z. Bao, C. Zhou, M.-S. Jiang, and H.-W. Li, Chin. Phys. Lett. 34, 080301 (2017).
- Wu et al. [2016] Y. Wu, J. Zhou, X. Gong, Y. Guo, Z.-M. Zhang, and G. He, Phys. Rev. A 93, 022325 (2016).
- Ottaviani et al. [2019] C. Ottaviani, C. Lupo, R. Laurenza, and S. Pirandola, Commun. Phys. 2, 118 (2019).
- Zhu et al. [2015] C. Zhu, F. Xu, and C. Pei, Sci. Rep. 5, 17449 (2015).
- Grasselli et al. [2018] F. Grasselli, H. Kampermann, and D. Bruß, New J. Phys. 20, 113014 (2018).
- Ribeiro et al. [2018] J. Ribeiro, G. Murta, and S. Wehner, Phys. Rev. A 97, 022307 (2018).
- Holz et al. [2020] T. Holz, H. Kampermann, and D. Bruß, Phys. Rev. Research 2, 023251 (2020).
- Li et al. [2018] Z.-H. Li, M. S. Zubairy, and M. Al-Amri, Sci. Rep. 8, 3899 (2018).
- Pivoluska et al. [2018] M. Pivoluska, M. Huber, and M. Malik, Phys. Rev. A 97, 032312 (2018).
- Jo and Son [2019] Y. Jo and W. Son, OSA Continuum 2, 814 (2019).
- Proietti et al. [2021] M. Proietti, J. Ho, F. Grasselli, P. Barrow, M. Malik, and A. Fedrizzi, Sci. Adv. 7, eabe0395 (2021).
- Epping et al. [2017] M. Epping, H. Kampermann, and D. Bruß, New J. Phys. 19, 093012 (2017).
- Das et al. [2019] S. Das, S. Bäuml, M. Winczewski, and K. Horodecki, arXiv:1912.03646 (2019).
- Takeoka et al. [2019] M. Takeoka, E. Kaur, W. Roga, and M. M. Wilde, arXiv:1912.10658 (2019).
- Pirandola [2020] S. Pirandola, IET Quantum Commun. 1, 22 (2020).
- Duan et al. [2001] L.-M. Duan, M. Lukin, J. I. Cirac, and P. Zoller, Nature 414, 413 (2001).
- Azuma et al. [2015] K. Azuma, K. Tamaki, and W. J. Munro, Nat. Commun. 6, 10171 (2015).
- Lucamarini et al. [2018] M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, Nature 557, 400 (2018).
- Wang et al. [2018] X.-B. Wang, Z.-W. Yu, and X.-L. Hu, Phys. Rev. A 98, 062323 (2018).
- Lin and Lütkenhaus [2018] J. Lin and N. Lütkenhaus, Phys. Rev. A 98, 042332 (2018).
- Ma et al. [2018] X. Ma, P. Zeng, and H. Zhou, Phys. Rev. X 8, 031043 (2018).
- Yin and Fu [2019] H.-L. Yin and Y. Fu, Sci. Rep. 9, 3045 (2019).
- Cui et al. [2019] C. Cui, Z.-Q. Yin, R. Wang, W. Chen, S. Wang, G.-C. Guo, and Z.-F. Han, Phys. Rev. Appl. 11, 034053 (2019).
- Curty et al. [2019] M. Curty, K. Azuma, and H.-K. Lo, npj Quantum Inform. 5, 64 (2019).
- Maeda et al. [2019] K. Maeda, T. Sasaki, and M. Koashi, Nat. Commun. 10, 3190 (2019).
- Yin and Chen [2019] H.-L. Yin and Z.-B. Chen, Sci. Rep. 9, 14918 (2019).
- Xu et al. [2020] H. Xu, Z.-W. Yu, C. Jiang, X.-L. Hu, and X.-B. Wang, Phys. Rev. A 101, 042330 (2020).
- Takeoka et al. [2014] M. Takeoka, S. Guha, and M. M. Wilde, Nat. Commun. 5, 5235 (2014).
- Pirandola et al. [2017] S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, Nat. Commun. 8, 15043 (2017).
- Grasselli et al. [2019] F. Grasselli, H. Kampermann, and D. Bruß, New J. Phys. 21, 123002 (2019).
- Zhao et al. [2020] S. Zhao, P. Zeng, W.-F. Cao, X.-Y. Xu, Y.-Z. Zhen, X. Ma, L. Li, N.-L. Liu, and K. Chen, Phys. Rev. Appl. 14, 024010 (2020).
- Cao et al. [2021] X.-Y. Cao, J. Gu, Y.-S. Lu, H.-L. Yin, and Z.-B. Chen, New J. Phys. 23, 043002 (2021).
- González-Payo et al. [2020] J. González-Payo, R. Trényi, W. Wang, and M. Curty, Phys. Rev. Lett. 125, 260510 (2020).
- Stucki et al. [2005] D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H. Zbinden, Appl. Phys. Lett. 87, 194108 (2005).
- Minder et al. [2019] M. Minder, M. Pittaluga, G. Roberts, M. Lucamarini, J. Dynes, Z. Yuan, and A. Shields, Nat. Photonics 13, 334 (2019).
- Wang et al. [2019] S. Wang, D.-Y. He, Z.-Q. Yin, F.-Y. Lu, C.-H. Cui, W. Chen, Z. Zhou, G.-C. Guo, and Z.-F. Han, Phys. Rev. X 9, 021046 (2019).
- Zhong et al. [2019] X. Zhong, J. Hu, M. Curty, L. Qian, and H.-K. Lo, Phys. Rev. Lett. 123, 100506 (2019).
- Liu et al. [2019] Y. Liu, Z.-W. Yu, W. Zhang, J.-Y. Guan, J.-P. Chen, C. Zhang, X.-L. Hu, H. Li, C. Jiang, J. Lin, T.-Y. Chen, L. You, Z. Wang, X.-B. Wang, Q. Zhang, and J.-W. Pan, Phys. Rev. Lett. 123, 100505 (2019).
- Chen et al. [2020] J.-P. Chen, C. Zhang, Y. Liu, C. Jiang, W. Zhang, X.-L. Hu, J.-Y. Guan, Z.-W. Yu, H. Xu, J. Lin, M.-J. Li, H. Chen, H. Li, L. You, Z. Wang, X.-B. Wang, Q. Zhang, and J.-W. Pan, Phys. Rev. Lett. 124, 070501 (2020).
- Fang et al. [2020] X.-T. Fang, P. Zeng, H. Liu, M. Zou, W. Wu, Y.-L. Tang, Y.-J. Sheng, Y. Xiang, W. Zhang, H. Li, Z. Wang, L. You, M.-J. Li, H. Chen, Y.-A. Chen, Q. Zhang, C.-Z. Peng, X.-F. Ma, T.-Y. Chen, and J.-W. Pan, Nat. Photonics 14, 422 (2020).
- Wang [2005] X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005).
- Lo et al. [2005] H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005).
- Gottesman et al. [2004] D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, Quantum Inf. Comput. 4, 325 (2004).
- Lydersen et al. [2010] L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, Nat. Photonics 4, 686 (2010).