Tight finite-key analysis for mode-pairing quantum key distribution
Ze-Hao Wang
Zhen-Qiang Yin
[email protected]Shuang Wang
[email protected]CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, China
CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China
Rong Wang
Department of Physics, University of Hong Kong, Pokfulam Road, Hong Kong SAR, China
Feng-Yu Lu
Wei Chen
De-Yong He
Guang-Can Guo
Zheng-Fu Han
CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, China
CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China
Abstract
Mode-pairing quantum key distribution (MP-QKD) is a potential protocol that is not only immune to all possible detector side channel attacks, but also breaks the repeaterless rate-transmittance bound without needing global phase locking. Here we analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks. Moreover, we propose a six-state MP-QKD protocol and analyze its finite-key effect. The results show that the original protocol can break the repeaterless rate-transmittance bound with a typical finite number of pulses in practice. And our six-state protocol can improve the secret key rate significantly in long distance cases.
INTRODUCTION
Quantum key distribution (QKD) Bennett and Brassard (1984); Ekert (1991), whose security is guaranteed by the physical law of quantum mechanics, can share private keys between two authorized partners, Alice and Bob. Such keys can encrypt further communications between Alice and Bob by combining the one-time pad, which has been proven to be information-theoretically secure Shannon (1949); Molotkov (2006).
However, in practical implementations, the imperfections of practical equipments will create some security loopholes. An eavesdropper, Eve, can steal key information without introducing any signal disturbance by taking advantage of these loopholes. A close examination of hacking strategies indicates that most loopholes exist in the detection part of QKD systems Makarov et al. (2006); Zhao et al. (2008); Fung et al. (2007); Xu et al. (2010); Lydersen et al. (2010); Gerhardt et al. (2011); Qian et al. (2018); Wei et al. (2019). Considering this situation, measurement-device-independent QKD (MDI-QKD) Lo et al. (2012) (see also Braunstein and Pirandola (2012)) protocol is proposed, which can remove all loopholes on the vulnerable detection side. Various theory improvements Ma and Razavi (2012); Yu et al. (2013); Xu et al. (2014); Curty et al. (2014); Yin et al. (2014a, b); Yu et al. (2015); Wang and Wang (2014); Zhou et al. (2016); Lu et al. (2020); Hu et al. (2021); Jiang et al. (2021); Lu et al. (2022) and experiments Liu et al. (2013); Wang et al. (2015); Yin et al. (2016); Comandar et al. (2016); Wang et al. (2017); Fan-Yuan et al. (2022) are achieved in recent years.
Besides the security, high performance and long transmission distance are the eternal pursuits in the research of QKD. However, because of the inevitable transmission loss in the channel, the MDI-QKD and the other QKD protocols which are point-to-point schemes are upper bounded by the secret key capacity of repeaterless QKD Pirandola et al. (2009); Takeoka et al. (2014); Pirandola et al. (2017). The PLOB (Pirandola, Laurenza, Ottaviani, and Banchi) bound Pirandola et al. (2017), for example, restricts the secret key rate , where is the total channel transmittance between Alice and Bob. This bound is approximately a linear function of , . For breaking this restriction, an interesting work named twin-field QKD (TF-QKD) was proposed Lucamarini et al. (2018), whose secret key rate . Moreover, it is an MDI-like protocol that is immune to all detection attacks. Subsequently, many variants of TF-QKD are proposed Ma et al. (2018); Wang et al. (2018); Curty et al. (2019); Cui et al. (2019); Wang et al. (2020), such as sending-or-not-sending QKD (SNS-QKD) Wang et al. (2018), phase-matching QKD (PM-QKD) Ma et al. (2018) and no phase post-selection QKD (NPP-QKD) Cui et al. (2019). Because of their high performance, they have attracted much attention and remarkable progress has been made not just in the theory Maeda et al. (2019); Jiang et al. (2019); Lu et al. (2019); Xu et al. (2020); Zeng et al. (2020); Currás-Lorenzo et al. (2021), but also in the experimental implementations Minder et al. (2019); Zhong et al. (2019); Wang et al. (2019); Liu et al. (2019); Fang et al. (2020); Chen et al. (2020); Liu et al. (2021); Chen et al. (2021); Clivati et al. (2022); Pittaluga et al. (2021); Chen et al. (2022); Wang et al. (2022). However, because TF-type QKD depends on stable interference between coherent states, phase-tracking is needed for compensating the phase fluctuation on the channels while phase-locking is needed for locking the frequency and phase of Alice and Bob’s lasers. These challenging techniques significantly increase the complexity of experimental systems and may bring extra noise.
Recently, two works named asynchronous-MDI-QKD Xie et al. (2022) and mode-pairing QKD (MP-QKD) Zeng et al. (2022) are proposed almost simultaneously. Surprisingly, while their quantum state preparation and measurement are almost the same as the time-bin-phase coding MDI-QKD Ma and Razavi (2012), the key rate can be increased dramatically just by defining the key bit differently in post processing step. As a result, beating the PLOB bound becomes possible even without the help of phase-locking and phase-tracking.
For ease of understanding, let’s review the MP-QKD in a simple way. Similar with the time-bin-phase coding MDI-QKD Ma and Razavi (2012), in each round, Alice and Bob send weak coherent pulses with different intensities and phases to Charlie. Then, after Charlie announces each round leads to a single click or not by his interference measurement, Alice and Bob may pair two clicked pulses to a key generation event provided the timing interval of the two paired pulses is smaller than the coherent time of the lasers.
Note that this pairing step is missing in the time-bin-phase coding MDI-QKD Ma and Razavi (2012), where only two adjacent and clicked optical pulses, i.e. coincidence detection, can be used to generate key bit, thus its key rate must be proportional to the channel transmittance . Indeed, this subtle pairing strategy leads to a dramatic increment of the key rate.
Although an elegant security proof for MP-QKD has been given in Ref. Zeng et al. (2022), its security and performance in non-asymptotic situations are still unknown. Here, we show a finite-key analysis of the MP-QKD protocol. Our analysis applies to coherent attack and satisfies the definition of composable security, namely the secret keys are perfect keys except a failure probability no larger than . It’s confirmed that PLOB bound can be surpassed in MP-QKD with a moderate number of optical pulses, typically . Moreover, we propose a six-state MP-QKD protocol that can improve the secret key rate, and show its performance in the finite-key regions. Our results can be directly applied in future practical experiments of MP-QKD.
RESULTS
Original protocol
Here we consider a three-intensity decoy-state scheme Zeng et al. (2022). In this scheme, Alice randomly sends the phase-randomized coherent pulses to Charlie. The intensities of the pulses are chosen from with probabilities , and , respectively. Bob takes a similar operation to distribute the pulses. According to the effective detection events announced by Charlie, Alice and Bob take the postprocessing to obtain the secret keys. The schematic diagram is illustrated in Fig. 1. And a detailed description of the scheme is presented as follows.
Figure 1: Schematic diagram of the MP-QKD protocol. Alice (Bob) prepares weak coherent pulses with random intensities chosen from () and random phases (), then they send them to an untrusted measurement site, Charlie. According to the effective detection events announced by Charlie, Alice and Bob take the postprocessing to obtain the secret keys. IM, intensity modulation; PM, phase modulation; BS, beam splitter.
1.State preparation. The first two steps are repeated by Alice and Bob for rounds to obtain sufficient data. In the -th round ( ), Alice prepares a coherent state with probability , where the intensity is chosen randomly from the set () and the phase is chosen uniformly from . Similarly, Bob chooses and then prepares a weak coherent state .
2.Measurement. Alice and Bob send two pulses and to Charlie for interference measurement. After the measurement, Charlie announces the detection results of detectors L and R. If only detector L or R clicks, . And for the other cases.
3.Mode pairing. For all rounds with effective detection (), Alice and Bob employ a strategy to group two effective detection events as a pair. The specific pairing strategy is shown as follows:
Considering that when the time interval between adjacent pulses becomes too large, the key information suffers from phase fluctuation. Alice and Bob define a maximal pairing interval before the pairing, which denotes the maximal interval pulse number in an effective event pair. can be estimated by multiplying the laser coherence time by the system repetition rate in practically. Alice (Bob) calculates the interval between the first and second effective detection event. If the interval is less than or equal to , she (he) records an effective event pair , where and are the round numbers of the first and the second effective detection event, then considers the interval between the third and the fourth effective detection event. Otherwise, the first effective detection event is dropped, then she (he) considers the interval between the second and the third. Until the last effective detection event, she (he) completes the mode pairing. A flow chart of Alice’s pairing strategy is presented in Fig. 2.
Figure 2: Flow chart of Alice’s pairing strategy. At the beginning, Alice inputs the maximal pairing interval , , , and . By employing the pairing strategy, she outputs the data sets
4.Basis sifting. Based on the intensities of two grouped rounds, Alice (Bob) labels the ’basis’ of each as:
(a) -basis: if one of the intensities and is 0 and the other is nonzero;
Then they announce the bases (-basis, -basis, ’0’-basis, or ’discard’), the sum of the intensities and for each pair of and respectively. Let’s denote the pair of and by for simplicity. Then for each , if the announced bases for and are both -basis, -basis or ’0’-basis, they record as -pair, -pair, or ’0’-pair respectively; if one of them is ’0’-basis and the other one is -basis (-basis), they record as -pair (-pair); if both of the announced bases are ’0’, they record it as ’0’-pair; and otherwise, they discard . See also the Tab. 2.
Table 2: The pair assignment.
-basis
-basis
’0’-basis
-basis
-pair
’discard’
-pair
-basis
’discard’
-pair
-pair
’0’-basis
-pair
-pair
’0’-pair
5.Key mapping. For each -pair , if , Alice sets her key to ; if , Alice sets her key to ; and for the condition , she sets her key to either 0 or 1 at random with a probability. The setting of Bob’s key is contrary to Alice’s. If , Bob sets his key to ; if , Bob sets his key to ; and for the condition , he sets his key to either 0 or 1 at random with a probability.
For each -pair , Alice’s key is extracted from the relative phase , where the raw key bit is and the alignment angle is . Bob also calculates his raw key bit and alignment angle in the same way. Then they announce the alignment angles and . If , they keep ; if , Bob flips the raw key bit and they keep ; otherwise, they discard them. Moreover, if Charlie’s clicks are (L,R) or (R,L), Bob flips . It should be noted that if consists of both ’0’-basis and -basis, they retain all the data pairs whatever the value of and are. We define three sets , and here, which include all -pair, -pair, and ’0’-pair respectively.
6.Parameter estimation. Alice and Bob choose satisfying in the set to form the -length raw key bit strings and , respectively. And through the decoy-state method, Alice and Bob estimate the lower bound of the single-photon effective detection number in the raw key, , according to the events in and . The upper bound of the single-photon phase error rate of , , is estimated by the events in and .
7.Error correction. Alice and Bob exploit an information reconciliation scheme to correct , in which Bob acquires an estimation of from Alice. This process reveals at most bits Alice’s raw key. Then, for verifying the success of error correction, Alice employs a random universal hash function to compute a hash of of length , and sends the hash and hash function to Bob. If the hash computed by Bob is the same as Alice’s, , they proceed this protocol. Otherwise, the protocol aborts.
8.Private amplification. Alice and Bob exploit a privacy amplification scheme based on two-universal hashing Renner (2008) to extract two -length bit strings and from and respectively. and are the secret keys.
Then, we show one of the main results of our paper. If the error correction step is passed, the protocol is -correct. And the protocol is -secret if the secret key length
(1)
where is the binary Shannon entropy function, and , , and are the security coefficients which the users may optimize over. is the lower bound of the single-photon effective detection number in the raw key with a failure probability . is the upper bound of the single-photon phase error rate of with a failure probability . and are estimated by the decoy-state method, which is shown in the Supplementary Note C. And is the information revealed in the error correction step, where is the error correction efficiency which is related to the specific error correction scheme, is the length of the raw key and is the bit-flip error rate between strings and .
Six-state MP-QKD protocol
In the original MP-QKD protocol, we bound the Eve’s smooth min-entropy by the error rate of key bits when hypothetical measurements are performed, where is the auxiliary of Eve before error correction, and are the corresponding bit strings due to the single-photon and the other events respectively. It’s well known that if one can additionally obtain the error rate under measurements, the min-entropy will be estimated more tightly and higher key rate is expected, e.g. six-state protocol outperforms the original BB84 in most cases.
Surprisingly, it’s possible to obtain both the error rates under hypothetical and measurements in the MP-QKD. Let’s explain this point intuitively. When the pair happens to be a -basis and also a single-photon event, its hypothetical and measurements just lead to quantum superpositions or respectively. The quantum state () denote that in the i-th and j-th rounds, only single-photon is in the () round. Note that if happens to be an -basis and also a single-photon event, will be prepared, in which ranges from . Equivalently, can be rewritten as if , and if , where . Just as mentioned in Supplemental Note, can be resulted by Alice’s unitary operation on her local qubits, thus has no effect on the security. This implies that for any , the former one and latter may be used to estimate the error rates under and measurements respectively, so -basis is indeed -basis in this sense. Finally, a six-state like MP-QKD is possible.
Following this idea, we present a detailed description of this scheme and the results of security proof as follows:
1.State preparation. Same as the step 1 in the original protocol.
2.Measurement. Same as the step 2 in the original protocol.
3.Mode pairing. Same as the step 3 in the original protocol.
4.Basis sifting. Based on the intensities of two grouped rounds, Alice (Bob) labels the ’basis’ of as:
(a) -basis: if one of the intensities and is 0 and the other is nonzero;
(b) -basis: if ;
(c) ’0’-basis: if ;
(d) ’discard’: if .
Then they announce the basis (-basis, -basis, ’0’-basis or ’discard’) and the sum of the intensities and for each pair of and respectively. Let’s denote the pair of and by for simplicity. Then for each : if the announced bases for and are both -basis, -basis or ’0’-basis, they record as -pair, -pair, or ’0’-pair respectively; if one of them is ’0’-basis and the other one is -basis (-basis), they record as -pair (-pair); if both of the announced bases are ’0’, they record it as ’0’-pair; and otherwise, they discard .
5.Key mapping. The key mapping step of -pair is the same as the step in the original protocol. For each -pair , if , Alice sets her key to ; if , Alice sets her key to ; and for the condition , she sets her key to either 0 or 1 at random with a probability. The setting of Bob’s key is contrary to Alice’s. If , Bob sets his key to ; if , Bob sets his key to ; and for the condition , he sets his key to either 0 or 1 at random with a probability.
Table 3: The rules of the flip operation to Bob’s basis and bit . The word ”flip” means Bob flips the value, and the word ”no” means Bob just keeps the value.
no
no
no
no
flip
flip
flip
no
flip
no
flip
flip
For each -pair , Alice’s key and basis are extracted from the relative phase , where the raw key bit is , the alignment angle is , and , where and denotes - and -bases, respectively. Bob also calculates his raw key bit , alignment angle , and obtains the information of the basis in the same way. Then they announce the alignment angles , and the values and .
If and , they keep and label them as -pair if or -pair if ;
if and , Bob may flip the basis and the raw key bit according to the rules in the Tab. 3, then keep and label them as -pair if or -pair if ; otherwise, they discard them. Moreover, if Charlie’s clicks are (L,R) or (R,L), Bob flips . We define three sets , and here, which include all reserved -pair, -pair, and ’0’-pair respectively.
6.Parameter estimation. Alice and Bob choose satisfying in the set to form the -length raw key bit strings and , respectively. And through the decoy-state method, Alice and Bob estimate the number of effective single-photon events according the events in and .
7.Error correction. Same as the step 7 in the original protocol.
8.Private amplification. Same as the step 8 in the original protocol.
Similar with the analysis of the original protocol, we can bound the secret key length with
(2)
where is the upper bound of the single-photon bit error rate of with a failure probability . is the upper bound of the sum of the single-photon bit error rate of if Alice and Bob take or measurement, with a failure probability .The detailed security proof is shown in Supplementary Note A. And the specific calculation is shown in Supplementary Note C.
Discussion
In this section, we numerically simulate the secret key rate of the original MP-QKD and the six-state MP-QKD protocol in finite-key size cases and analyze the results. Partial experimental parameters which are fixed in the following simulations are listed in Tab. 4. Some other parameters, including the maximal pairing interval, , and the total pulse numbers, , are given in the captions of figures below. It should be noted that in Refs. Xie et al. (2022); Zeng et al. (2022), there are all specific analyses about the misalignment-error. The misalignment-error will increase as increases, and will decrease as the system frequency increases. Here we omit the specific analysis and just take , . As is shown in Ref. Zhu et al. (2023); Zhou et al. (2022), it is realizable to take a key distribution with , , and by employing a 4 GHz system Wang et al. (2022). If we improve the performance of the lasers, is achievable. In the following analysis, we focus on , , and . They correspond to three different performance systems.
Meanwhile, we optimize the intensities and their corresponding sending probabilities for each distance in the simulation. Without loss of generality, we assume that the distance between Alice and Charlie, , and the distance between Bob and Charlie, , are the same. Under this situation, , , , and . Then, there are only five parameters, , , , , and , needed to be optimized.
Table 4: Experimental parameters used in the numerical simulations. Here, is the dark counting rate per pulse of Charlie’s detectors; is the detection efficiency of Charlie’s detectors; is the fiber loss coefficient (dB/km); is the error-correction efficiency; is the total secure coefficient. and are the misalignment-error of the sets and , respectively.
Figure 3: Comparison of the secret key rate (per pulse) of the original protocol among two different total pulse numbers, , and three different maximal pairing intervals, , as a function of transmission distance (the distance between Alice and Bob). The red, blue, and green lines represent the secret key rates of the origin MP-QKD protocol under the condition that , , and , respectively. The solid lines and dash lines represent the secret key rates under the condition and , respectively. The black line is the PLOB bound.Figure 4: Optimized variables evolution over increasing distance when the number of total pulses is . The solid lines and dash lines represent the secret key rates under the condition and , respectively.Figure 5: The secret key rate (per pulse) of the six-state protocol and the ratio of and as a function of transmission distance (the distance between Alice and Bob). Besides the fixed parameters listed in Tab. 4, . The ordinate of red lines is the secret key rate (per pulse), and the ordinate of blue lines is the ratio of and (). The solid, dash-dotted, and dash lines represent the secret key rate of the six-state MP-QKD protocol under the condition that , , and , respectively. The black line is the PLOB bound.
With the experimental parameters and optimized parameters, we simulate observed values first, including effective detection number and bit error number. The specific formulas are shown in Supplementary Note B. Then, with those observed values, we can obtain , , , and by employing the decoy-state method. The specific formulas are shown in Supplementary Note C. Here, we set the same failure probability parameters for simplicity, , , and . For a fair comparison, we compare the secret key rate per sending pulse, .
Figure 3 is the simulation of the original MP-QKD protocol with finite-key size analysis. We compare the secret key rate (per pulse) under different total pulse numbers and different maximal pairing intervals . It indicates that the original protocol can reach up to 446 km under the condition that and . Moreover, when and , this protocol is close to the PLOB bound at a distance about 320 km. That means that it can break the PLOB bound if when , or when . The secret key rate under a short distance is almost invariable with the increase of the maximal pairing interval.
For a better understanding of the MP-QKD protocol, we show the evolution of optimized variables over increasing distance when the number of total pulses is in Fig. 4. It can be shown that for , the intensity and its probability decrease with the increase of the distance. This is because that with the increase of the distance, the quantum bit error rate (QBER) caused by the multiple-photon term will increase, causing the smaller , which is similar to Supplementary Note 5 of Ref. Zeng et al. (2022). And because the statistical fluctuation effect intensifies, the probability should be improved to blunt the effect, causing the bigger and smaller . Different from the other protocols, MP-QKD needs enough intensity to form a -pair, so is high in our optimization. For , the parameters are the same as when the distance is below 210 km. This is because the gain is high enough under this situation, the quantity of successful pairing can’t increase with . Then, with the improvement of the distance, and increase and then decrease. These are two tradeoffs between the coincidence count and the QBER, the coincidence count and the statistical fluctuation, respectively. Moreover, varies between and .
Figure 5 is the simulation of the six-state MP-QKD protocol with finite-key size analysis. We present the secret key rate under three different maximal pairing intervals. Moreover, we compare the secret key rates of the original protocol and the six-state one, the blue lines show the ratio of to . The improvement of our six-state protocol becomes significant in long distance cases.
In conclusion, we prove the composable security of the original MP-QKD protocol in the finite-key regime against general attacks. Methodologically, by employing the uncertainty relation of smooth min- and max-entropy and proving the relation between the single-photon phase error of the -basis and the single-photon bit error of the -basis, the secret key rate was obtained. Moreover, we propose a six-state MP-QKD protocol and analyze its finite-key effect. The six-state one can obtain a higher secret key rate than the original protocol. This improvement is achieved by a subtle analysis of experimental data, thus any modification of experimental system is not necessary. As shown in the numerically simulation, the MP-QKD protocol can break the PLOB bound when the total pulse numbers is and the maximal pairing interval is greater than . It can reach up to km with pairing interval and total pulses. Moreover, the simulation shows that the six-state protocol can obtain higher secret key rate than the original protocol, especially on a long distance. Our work provides theoretical tools for key rate calculation in future MP-QKD implementations.
In this work, our analysis is based on continuous phase randomization , which might be difficult to realize in the real world. For future work, an analysis based on a discrete set is meaningful Cao et al. (2015). And the data of unmatched basis are wasted in our work, the utilization of them may improve the performance or increase the security, similar to some other protocols Laing et al. (2010); Tamaki et al. (2014); Braunstein and Pirandola (2012); Watanabe et al. (2008). This is also a possible direction for future work.
METHODS
Secret key rate of the original protocol
The sketch of the security proof is presented here while the details are given in Supplementary Note A. We employ the universally composable framework Renner (2008); Müller-Quade and Renner (2009) to analyze the security of the protocol.
If the error correction step is passed, the protocol is -correct. And the protocol is -secret if the length of the extracted secret key does not exceed a certain length in the private amplification step. In particular, a protocol is -secure if it is -correct and -secret, .
According to the quantum leftover hash lemma Renner (2008); Tomamichel et al. (2011), an -secret key of length can be extracted from the bit string by applying privacy amplification with two-universal hashing, and
(3)
where is the auxiliary of Eve after error correction, is the conditional smooth min-entropy, which is employed to quantify the average probability that Eve guesses correctly with Konig et al. (2009). Because bits are published in the error correction step, the conditional smooth min-entropy can be bounded by
(4)
where is the auxiliary of Eve before error correction. Moreover, since the phases of coding states in -pair are never revealed, the coding states can be treated as a mixture of Fock states.
This implies can be decomposed into , which are the corresponding bit strings due to the single-photon and the other events. By employing a chain-rule inequality for smooth entropies Vitanov et al. (2013), we have
(5)
where .
The essential of the security proof is how to bound . We give the sketch of the proof and leave the details in Supplementary Note A.
By describing the protocol as an entanglement-based one, Alice (Bob) decides the basis of () and key bit by measuring her (his) local quantum memories. Specifically, can be seen as the results of measurements on Alice’s local qubits of single-photon events. Then according to the uncertainty relation for smooth entropies, can be upper-bounded by the phase error rate, i.e. the error rate of key bits generated by the hypothetical measurements on these local qubits. As an example, when the pair happens to be a -basis and also a single-photon event, measurement on Alice’s local qubits makes this single-photon collapse into the position or , i.e. or respectively. Meanwhile, its hypothetical measurement just leads to quantum super positions . Actually, one can easily imagine that will be prepared if is an -basis event. Intuitively, the phase may be removed without compromising the security, since this phase may be resulted by a unitary operation on Alice’s local qubits. Then the sketch of the security proof is clear.
In Supplementary Note A, we prove that the phase error rate for any individual single-photon -pair must be equal to the error rate if single-photon happens to be -pair. Then in non-asymptotic cases, the phase error rate for the raw key string has been sampled by the error rate between and , where and represent the key strings obtained from single-photon events in . Finally, we have
(6)
where is the lower bound of the length of with a failure probability , is the upper bound of the single-photon phase error rate of with a failure probability . And is the binary Shannon entropy function. Actually, can be estimated by the observed values. And the decoy-state method which is employed to estimated and is shown in Supplementary Note C.
If we choose
(7)
where , is the failure probability of privacy amplification, we can get one of the main results of our paper by combining the equation behind,
(8)
where is the information revealed in the error correction step, is the error correction efficiency which is related to the specific error correction scheme, is the length of the raw key and is the bit error rate between strings and . Moreover, the security coefficient of the whole protocol is , where . is the coefficient while using the chain rules, and is the failure probability of privacy amplification.
Supplemental Note A: Security analysis
Outline of the proof
For ease of understanding, we show the outline of our proof first, which can show the core of this analysis.
Let’s assume is a two-particle system, where and are controlled by Alice and Bob respectively. is spanned by two-qubit states
and . is defined similarly. Let’s further define unitary operation , . is for qubit and defined analogously with . Then we consider a protocol, in which Alice and Bob make Z-basis measurement on A and B to form key bit and after Alice and Bob applying and with probability mass function . This is equivalent to saying that are considered as their system. To evaluate the conditional entropy in which is ancilla of Eve, it’s of course that we can consider is the outcome of Z-basis measurement on rather than . This is because the phases and have no physical effects on the and , the details are shown in the specific proof. In this view, we can just consider , and ignore the phases and if we only want to characterize . Noting that the conjugate -basis measurement is also made on now. It’s well known that can be bounded by , where and is the outcome of X-basis (, ) measurement on and the error rate between and is called phase error rate.
Nevertheless, we can go further by following the logic in last paragraph. It’s not restricted to assume is measured on rather than , and phase error rate is of course defined to accordingly. Here, is another probability mass function, which we can define to make it related to an experimentally observable value. The key point here is that can be adjusted as we wish, since any makes no difference for the Z-basis measurement. The freedom of defining can help us list variant expressions of phase error rate, and then find appropriate one in some particular protocol.
Further, let’s apply above considerations in MP-QKD protocol. is a compound system for two adjacent rounds with successful detections i-th and j-th. is spanned by two-qubit states , , and . is defined similarly. and are quantum registers recording the phases and . Alice and Bob first measure to decide if they are both in the Hilbert space spanned by and . If so, this pair is a Z-pair and Z-basis measurement is followed to form key bit. We are interested in the phase error rate of a Z-pair, which are defined by the outcome of hypothetical X-basis (, ) measurement on a Z-pair. Noting that following the logic in last paragraphs, we have the freedom to redefine the distribution of and in to find some appropriate expression of phase error rate. If Alice and Bob find are both , then also or holds by measuring and , this pair is an X-pair. Then Alice and Bob will calculate the bit error rate of this X-pair following some instructions. We proved that: 1. the ratio of probabilities for a pair happening to be a Z-pair or X-pair is fixed and cannot be affected by Eve; 2. By setting satisfying or . the phase error rate of a Z-pair just equals to the error rate of an X-pair. The two points guarantee that for any Z-pair, we have a fixed probability to test its phase error rate. The phase error rate is not directly measurable on , but it must equal to the bit error rate by measuring .
Original protocol
In this section, we analyze the security of the original MP-QKD protocol. For simplicity, we omit the decoy state here, Alice and Bob prepare quantum states and with the probability and respectively. The phase of the quantum states are uniformly randomly chosen from . In the entanglement-based protocol, Alice and Bob prepare entangled states in each round,
(9)
where and are auxiliary quantum systems that are employed to store the intensity and random phase information, respectively. For the different values of , the quantum states are orthogonal, . Here we assume that the -th round and the -th round are two adjacent events with successful detection, which are recorded as . The joint state of Alice can be written as
(10)
The joint state of Bob is given in a similar way. When collapses into the subspace spanned by and , Alice is sure that -basis is chosen. means this pair is -basis preparation.
In the -basis , the intensities are or . Here we define , the -basis preparation of Alice’s joint state can be written as
(11)
where is the number of the photon, and is the probability of the Poisson distribution.
First, we trace the auxiliary , the density matrix of Alice’s -basis preparation can be written as
(12)
where , and is the mixture components of the zero-photon and multiple-photon in . Because the system is measured and announced in the subsequent steps, the single-photon component of the density matrix can be simplified as a classical-quantum state, i.e.
(13)
Actually, when Alice takes the measurement on , whose eigenstates are and , to the density matrix , the phase plays no roles in the results of the measurement and Eve’s potential system. Therefore, it’s not restrictive to introduce a unitary operation to the auxiliaries before the measurement, defined by , . This operation can keep the specific form of send states and . The density matrix can be simplified as
(14)
Then we consider the single-photon component of the joint density matrix of Alice and Bob, given by
(15)
where is an element in a set of POVM measurements made by Eve, with outputs . It should be noted that operates on the systems , , , and which are sent to Charlie. Here we just care about the reduced density matrix of -th and -th round. For different and , might be different and relate to other rounds, is a more suitable symbol. For simplicity, we omitted the superscript here. In the subsequent proof, we can see that the specific form of is needless. For the -basis preparation, the systems and are independent of the values and , which are never announced. So, we can trace the auxiliaries for simplicity. We have
(16)
For obtaining the single-photon phase error rate of the -basis preparation, we define two measurements and , whose eigenstates are
(17)
respectively. The joint density matrix can be revised by these eigenstates,
(18)
The probability of projection into can be given by
(19)
Similarly,
(20)
Moreover,
(21)
In this way, the single-photon phase error rate of -basis preparation can be obtained by
(22)
The security proof focuses on how to estimate this phase error rate. To solve this problem, we resort to -pair preparation. In -basis , the intensities is . For the case that Alice prepares -basis, the joint states of Alice can be written as
(23)
Just like the operation we did to the -basis preparation, the auxiliary is traced first, the density matrix of Alice’s -basis preparation can be written as
(24)
where and . Indeed corresponds to logical bit with in -basis.
For example, in the original protocol, if Alice finds the phase difference between the -th and -th pulse is , this is equivalent to that his measurement result of is (logical bit ) with in the entanglement-based protocol.
The density matrix of Bob preparing -basis is the same. Then we consider the single-photon component of the joint density matrix of Alice and Bob,
(25)
Here we define two measurements and , whose eigenstates are and , respectively. The preparation of quantum states can be regarded as Alice and Bob taking the above measurements to the auxiliaries and . The joint probability that , Alice and Bob prepare the single-photon component of X-pair and the measurement results are and is
(26)
Similarly,
(27)
For obtaining single-photon bit error rate with and , the sum of is needed, which is given by
(28)
Moreover,
(29)
Then it’s clear that
(30)
which means that Eve’s attacks cannot depend on the phases and , i.e. does not depend on the phases and .
Actually, in the key mapping step, Bob keeps his logical bit if , flips his logical bit if . And he keeps his logical bit if Charlie’s clicks are (L,L) or (R,R), flips his logical bit if (L,R) or (R,L).
In the entanglement-based protocol, Bob operates his auxiliary to implement this reverse.
For X-pair preparation, the single-photon bit error rate under the condition Alice and Bob obtained the results and (, ) is
(31)
And the single-photon bit error rate of X-pair preparation under the condition Alice and Bob obtained the results and (, ) is
(32)
With the relation and given in Eq.(22), it’s easy to verify that
(33)
where , are applied to Alice’s local qubits, is similar. This observation confirms that any corresponds to the phase error rate for key bits generated by measurement on the density matrix or . On the other hand, applying or not will not change the distribution of the measurement and potential information leakage to Eve. Hence, without compromising security, the phase error rate can be assumed to be any or its mean value of some domains of .
Actually, we just calculate satisfying or in the -pair preparation. This probability is
(34)
It should be noted that is independent of and . And we come to the main conclusion:
(35)
In the above proof, we just analyze the relation of -th and -th rounds, we prove that the phase error rate for any individual single-photon -pair must be equal to the error rate if single-photon happens to be -pair. However, it can be expanded to all rounds. It is clear that, for each pairs, this conclusion is satisfied, and the sum of all rounds is also satisfies. In non-asymptotic cases, the phase error rate for the raw key string is sampled by the error rate between and , where and represent the key strings obtained from single-photon events in .
To summarize, is a random sampling without replacement for .
Then we employ the entropic uncertainty relation for smooth entropies Tomamichel and Renner (2011) to get the length of the secret keys. The auxiliary of Eve after error correction is denoted as . Due to the quantum leftover hash lemma Renner (2008); Tomamichel et al. (2011), a -secret key of length can be extracted from the bit string by applying privacy amplification with two-universal hashing,
(36)
where is the conditional smooth min-entropy, which is employed to quantify the average probability that Eve guesses correctly with . In the error-correction step, bits are published. By employing a chain-rule inequality for smooth entropies Vitanov et al. (2013),
(37)
where is the auxiliary of Eve before error correction. Moreover, can be decomposed into , which are the corresponding bit strings due to the single-photon and the other events. We have
(38)
where and . We can set without compromising security. Here the single-photon component prepared in the -basis and -basis are mutually unbiased obviously. We employed the string to denote Alice (Bob) would have obtained if they had measured in the -basis instead of -basis. By employing the uncertainty relation of smooth min- and max-entropy, we have
(39)
where is the lower bound of the length of . And we denote , which is the phase error rate of under the -basis measurement or the bit error rate of under the -basis measurement. Actually, cannot directly observe. As is proved in the above, , is employed to denote the expected value. So, in can be bounded by through Chernoff-Bound, where is the estimated value of . If the probability that is no larger than ,
(40)
If we choose , where , is the probability that the real value of the number of single-photon bits is smaller than , and is the probability that the real value of the phase error rate of single-photon component in is bigger than , is the failure probability of privacy amplification. We have
(41)
Six-state protocol
In this section, we analyze the security of the six-state MP-QKD protocol. Similar to the analysis of the original protocol, we omit the decoy state for simplicity. The single-photon component of the joint density matrix of -pair preparation is the same as the original MP-QKD protocol,
(42)
If Alice and Bob take and measurements, whose eigenstates are
(43)
respectively. The single-photon bit error rate of -pair preparation under these measurements is
(44)
And if Alice and Bob take and measurements, whose eigenstates are
(45)
respectively. The single-photon bit error rate of -pair preparation under these measurements is
(46)
In the original MP-QKD protocol, if the intensities of are , Alice and Bob label the basis as , and they discard the events satisfying , where . In the six-state protocol, when the intensities of are , Alice and Bob label the basis of the pairs as or according to the value and , -basis if and -basis if . And they discard the events satisfying , where .
In the - or -basis preparation of the six-state protocol, the single-photon component of the joint density matrix can be written as
(47)
where , , , and . Actually, corresponds to logical bit 0(1) with in the -basis. And corresponds to logical bit 0(1) with in the -basis. For example, in the six-state protocol, if Alice finds the phase difference between the -th and -th pulse is , this is equivalent to that his measurement result of is (logical bit 0 in -basis) with in the entanglement-based protocol. The definitions of and are similar. And
(48)
The probability of Alice and Bob obtaining the measurement results and is
(49)
The probabilities of obtaining the other measurement results are similar.
In the key mapping step of the six-state protocol, Bob decides whether to reverse his basis and logical bit according to the relation between , and Charlie’s clicks. If , Bob keeps his basis and logical bit; if and the bases of Alice and Bob are - and -basis, Bob reverses his basis and his logical bit; if and the bases of two users are - and -basis, Bob only reverses his basis; if and the bases of two users are - and -basis, Bob reverses his basis and his logical bit; and if and the bases of two users are - and -basis, Bob only reverses his basis. In the entanglement-based protocol, Bob implements this operation by changing the classical information of after the measurement.
After the reverse operation, the yield of the -pair preparation
(50)
where
(51)
And the single-photon bit error rate of -pair preparation is
(52)
As is proved in the original protocol, it’s not restrictive to introduce unitary operations , to the joint density matrix of the -pair preparation. We come to the main conclusion of the six-state protocol:
(53)
Similarly,
(54)
and
(55)
To summarize, and is a random sampling without replacement for and .
Just like the analysis of the original protocol, by employing the the quantum leftover hash lemma, the chain rules, and the uncertainty relation of smooth min- and max-entropy,
(56)
where and . The inequation of is got by the method which is shown in Appendix A of Ref. Wang et al. (2021). Then the secret key length can be given by
(57)
where .
Supplementary Note B: Simulation of observed values
For simulating the secret key rate without doing an experiment, we employ a theoretical model to simulate the observed values of the experiment, which include the effective detection number and bit error number of different intensities. Without loss of generality, we assume that the properties of Charlie’s two detectors are the same. As is defined in the main text, and are Alice and Bob’s preparation intensities of the -th round, , . is the group of the intensities in the -th round and -th round, , and .
In the -th round, the response probability of only L or R detector can be given by Ma and Razavi (2012); Xie et al. (2022)
(58)
where , is the dark count rate, and are the overall efficiency of Alice and Bob, is the detector efficiency, is the attenuation coefficient of the fiber, and , are the distances between Alice, Bob and Charlie. For simplicity, we define and . The responsive probability can be revised as
(59)
As is defined in the main text, is the response of the -th round, is the invalid event and is the effective event. The average response probability during each round, , can be given by a weighted average of conditional probability,
(60)
where the conditional probability can be given by
(61)
represents the zero-order modified Bessel function of the first kind. For a small value of , we can take the first-order approximation .
Considering the specific grouping strategy in this paper, the expected pair number generated during each round can be given by
(62)
where is the average response probability during each round and is the maximal pairing interval. The specific calculation is shown in Ref. Zeng et al. (2022).
In the -pair and ’0’-pair, the number of the effective detections can be given by
(63)
where and . Then we consider the error effective detections. For , the number of the error effective detections without considering is , where is the misalignment-error of the -pair. And for , the number of the error effective detections without considering is
(64)
And when we take into consideration,
(65)
In the -pair of the original protocol, the number of the effective detections before phase postselection can be given by
(66)
where .
In the key mapping step, Alice and Bob take the phase postselection to and . For the events that or (), they retain all the data pairs, the number of the reversed effective detections is , . And for the other events, the number of the reversed effective detections is
(67)
where , .
The quantity without considering can be given by
(68)
When we take into consideration,
(69)
The simulations of the - and -pair of the six-state protocol are in the same way. However, in the six-state protocol, we divided the original protocol’s -pair into two pairs, the number of the reversed error effective detections of -pair (-pair), , are half of .
Supplementary Note C: Simulation formulas
In this section, we show the specific formulas which are employed to get the secret key length. In the -th round, Alice and Bob prepare weak coherent states and . After the mode pairing, basis sifting and key mapping steps, the basis, the key bit and the alignment angle of different pairs are determined. As is proof in the Ref. Zeng et al. (2022), the traditional decoy-state formulas for MDI-QKD can be employed directly by introducing the ’gain’ and ’yield’. It should be noted that the ’gain’ and ’yield’ are analogous values to the MDI’s gain and yield, but not the real gain and yield of MP-QKD. In this study, we analyze the secret key length by employing joint constraints Yu et al. (2015).
Original MP-QKD protocol
The lower bound of the single-photon effective detection number and the upper bound of phase error rate of the single-photon components in the raw key, which are denoted as and , is needed for obtaining the secret key length. Actually, the expected values of the ’yield’ and the phase error rate of the single-photon components in the raw key satisfy
(70)
where is the expected value of the ’yield’ of the -pair, and is the expected value of the single-photon bit error rate in the -pair Jiang et al. (2021). So, we can estimate by employing , by employing with the Chernoff bound
(71)
where . It should be noted that is the expected number of pairs with .
and are defined in Supplementary Note E. For obtaining the bound of expected values and , we employ the decoy-state formulas which are shown in Ref. Yu et al. (2015); Lu et al. (2020). , , , and are employed to denote poisson distribution probabilities of intensities , , , and ,
(72)
respectively.
If , the lower bound of can be estimated by
(73)
where , and
(74)
Here we employ the method of joint study to obtain and , which is proposed in Ref. Yu et al. (2015). The core of this method is to use joint constraints between different measured values to limit the influence of statistical fluctuations. For example, can be simply written as , where is the coefficient behind the expected values, and is the expected value of measured values. In the method of joint study, we not only employ the Chernoff Bound to estimate the lower bound of , but also employ , and to bound the lower bound of . Here different are seen as a same event. The specific descriptions are shown in Supplementary Note D. For simplicity, and are rewrote as
(75)
The functions and are analyzed by employing joint constraints with the Chernoff bound, which is shown in Supplementary Note D. In the case of , the lower bound of can be obtained by making the exchange between and , and the exchange between and , for .
Moreover, the upper bound of satisfies
(76)
where
(77)
Here , , and .
In the universally composable framework, is the probability that the real value of the number of single-photon bits is smaller than , and is the probability that the real value of the phase error rate of single-photon component in is bigger than . With the calculation method above, the failure probability of the estimation of and are
(78)
Six-state MP-QKD protocol
For the six-state MP-QKD protocol, we need , , and to obtain the secret key length. is the upper bound of the bit error rate in the single-photon component of the raw key. is the upper bound of the sum of the bit error rate if Alice and Bob measure the single-photon component of the raw key in and .
The upper bound of satisfies
(79)
where
(80)
The upper bound of is
(81)
where
(82)
Here .
Then we can get , and by Chernoff bound,
(83)
In the universally composable framework, is the probability that the real value of the bit error rate of single-photon component in under -pair measurement is bigger than . is the probability that if Alice and Bob take -pair measurement and -pair measurement to , the real value of the sum of bit error rate is bigger than . With the calculation method above, the failure probability of the estimation of and are
(84)
Supplementary Note D: Analytic results of joint constraints
Here we give the analytic results of joint constraints, which can be write into function and . The problem of obtaining the minimum value of function can be abstracted into
(85)
where all are positive and is Chernoff bound which is presented in Supplementary Note E. In this paper, , , , and are coefficients. , , , and are the expected values of , , , and which are measured in experiments, respectively.
We rearrange in the ascending order, the new sequence is denoted by , as the corresponding rearrange of according to the ascending order of . In this way, the lower bound of can be wrote as:
(86)
And if we want to get the upper bound of , we can just replace by :
(87)
Supplementary Note E: Chernoff bound
The Chernoff bound is useful in estimating the expected values from their observed values or estimating the observed values from their expected values. Let be a set of independent Bernoulli random samples (it can be in different distribution), and let .
The observed value of which denotes is unknown and its expected value is known. In this situation, we have
(88)
(89)
where and can be got by solving the following equations:
(90)
(91)
where is the failure probability.
When the expected value is unknown and its observed value is known, we have
(92)
(93)
where and can be got by solving the following equations:
(94)
(95)
DATA AVAILABILITY
The data that support the findings of this study are available from the corresponding author upon reasonable request.
CODE AVAILABILITY
Source codes of the plots are available from the corresponding authors on request.
ACKNOWLEDGEMENTS
This work has been supported by the National Key Research and Development Program of China (Grant No. 2020YFA0309802), the National Natural Science Foundation of China (Grant Nos. 62171424, 61961136004, 62105318, 62271463), China Postdoctoral Science Foundation (2021M693098, 2022M723064), Prospect and Key Core Technology Projects of Jiangsu provincial key R & D Program (BE2022071), the Fundamental Research Funds for the Central Universities.
COMPETING INTERESTS
The authors declare that they have no competing interests.
AUTHOR CONTRIBUTIONS
Zhen-Qiang Yin, Rong Wang, Ze-Hao Wang conceived the basic idea of the security proof. Zhen-Qiang Yin and Ze-Hao Wang finished the details of the security proof. Ze-Hao Wang performed the numerical simulations. All the authors contributed to discussing the main ideas of the security proof, checking the validity of the results, and writing the paper.
REFERENCES
References
Bennett and Brassard (1984)C. H. Bennett and G. Brassard, “Quantum
cryptography: public key distribution and coin tossing,” in Conf. on Computers, Systems and Signal
Processing (Bangalore, 1984) p. 175.
Ekert (1991)Artur K Ekert, “Quantum
cryptography based on bell’s theorem,” Physical review letters 67, 661 (1991).
Shannon (1949)Claude E Shannon, “Communication theory of secrecy systems,” The Bell system technical journal 28, 656–715 (1949).
Molotkov (2006)S. N. Molotkov, “Conferences
and symposia: Quantum cryptography and v a kotel’nikov’s one-time key and
sampling theorems,” Physics-Uspekhi (2006).
Makarov et al. (2006)V. Makarov, A. Anisimov, and J. Skaar, “Effects of detector efficiency mismatch
on security of quantum cryptosystems,” Physical Review A 74, 022313 (2006).
Zhao et al. (2008)Yi Zhao, Chi Hang Fred Fung, Bing Qi,
Christine Chen, and Hoi-Kwong Lo, “Quantum hacking: Experimental
demonstration of time-shift attack against practical quantum-key-distribution
systems,” Physical Review A 78, 042333 (2008).
Fung et al. (2007)Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, and Hoi-Kwong Lo, “Phase-remapping attack in
practical quantum-key-distribution systems,” Physical Review A 75, 032314 (2007).
Xu et al. (2010)F. Xu, B. Qi, and H. Lo, “Experimental demonstration of
phase-remapping attack in a practical quantum key distribution system,” New Journal of
Physics 12, 113026
(2010).
Lydersen et al. (2010)L. Lydersen, C. Wiechers,
C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by
tailored bright illumination,” Nature Photonics 4, 686–689 (2010).
Gerhardt et al. (2011)I. Gerhardt, Q. Liu,
A. Lamas-Linares, J. Skaar, C. Kurtsiefer, and V. Makarov, “Full-field implementation of a perfect eavesdropper on a
quantum cryptography system.” Nature communications 2, 349 (2011).
Qian et al. (2018)Yong-Jun Qian, De-Yong He, Shuang Wang, Wei Chen,
Zhen-Qiang Yin, Guang-Can Guo, and Zheng-Fu Han, “Hacking the quantum key distribution system by
exploiting the avalanche-transition region of single-photon detectors,” Physical Review
Applied 10, 064062
(2018).
Wei et al. (2019)Kejin Wei, Weijun Zhang,
Yan-Lin Tang, Lixing You, and Feihu Xu, “Implementation security of quantum key
distribution due to polarization-dependent efficiency mismatch,” Physical Review
A 100, 022325 (2019).
Lo et al. (2012)Hoi-Kwong Lo, Marcos Curty, and Bing Qi, “Measurement-device-independent quantum key distribution,” Physical review letters 108, 130503 (2012).
Braunstein and Pirandola (2012)Samuel L Braunstein and Stefano Pirandola, “Side-channel-free quantum key distribution,” Physical review letters 108, 130502 (2012).
Ma and Razavi (2012)Xiongfeng Ma and Mohsen Razavi, “Alternative schemes for measurement-device-independent quantum key
distribution,” Physical Review A 86, 062319 (2012).
Yu et al. (2013)Zong-Wen Yu, Yi-Heng Zhou, and Xiang-Bin Wang, “Three-intensity
decoy-state method for measurement-device-independent quantum key
distribution,” Physical Review A 88, 062339 (2013).
Xu et al. (2014)Feihu Xu, He Xu, and Hoi-Kwong Lo, “Protocol choice and parameter
optimization in decoy-state measurement-device-independent quantum key
distribution,” Physical Review A 89, 052333 (2014).
Curty et al. (2014)Marcos Curty, Feihu Xu,
Wei Cui, Charles Ci Wen Lim, Kiyoshi Tamaki, and Hoi-Kwong Lo, “Finite-key analysis for
measurement-device-independent quantum key distribution,” Nature communications 5, 1–7 (2014).
Yin et al. (2014a)Zhen-Qiang Yin, Chi-Hang Fred Fung, Xiongfeng Ma, Chun-Mei Zhang, Hong-Wei Li,
Wei Chen, Shuang Wang, Guang-Can Guo, and Zheng-Fu Han, “Mismatched-basis statistics enable quantum key
distribution with uncharacterized qubit sources,” Physical Review A 90, 052319 (2014a).
Yin et al. (2014b)Zhen-Qiang Yin, Shuang Wang, Wei Chen,
Hong-Wei Li, Guang-Can Guo, and Zheng-Fu Han, “Reference-free-independent quantum key
distribution immune to detector side channel attacks,” Quantum information processing 13, 1237–1244 (2014b).
Yu et al. (2015)Zong-Wen Yu, Yi-Heng Zhou, and Xiang-Bin Wang, “Statistical
fluctuation analysis for measurement-device-independent quantum key
distribution with three-intensity decoy-state method,” Physical Review A 91, 032318 (2015).
Wang and Wang (2014)Qin Wang and Xiang-Bin Wang, “Simulating of the
measurement-device independent quantum key distribution with phase randomized
general sources,” Scientific reports 4, 1–7 (2014).
Zhou et al. (2016)Yi-Heng Zhou, Zong-Wen Yu, and Xiang-Bin Wang, “Making the decoy-state
measurement-device-independent quantum key distribution practically
useful,” Physical Review A 93, 042324 (2016).
Lu et al. (2020)Feng-Yu Lu, Zhen-Qiang Yin,
Guan-Jie Fan-Yuan,
Rong Wang, Hang Liu, Shuang Wang, Wei Chen, De-Yong He, Wei Huang, Bing-Jie Xu, Guang-Can Guo, and Zheng-Fu Han, “Efficient decoy states for the reference-frame-independent
measurement-device-independent quantum key distribution,” Physical Review A 101, 052318 (2020).
Hu et al. (2021)Xiao-Long Hu, Cong Jiang, Zong-Wen Yu, and Xiang-Bin Wang, “Practical long-distance
measurement-device-independent quantum key distribution by four-intensity
protocol,” Advanced Quantum Technologies 4, 2100069 (2021).
Jiang et al. (2021)Cong Jiang, Zong-Wen Yu,
Xiao-Long Hu, and Xiang-Bin Wang, “Higher key rate of
measurement-device-independent quantum key distribution through joint data
processing,” Physical Review A 103, 012402 (2021).
Lu et al. (2022)Feng-Yu Lu, Ze-Hao Wang,
Zhen-Qiang Yin, Shuang Wang, Rong Wang, Guan-Jie Fan-Yuan, Xiao-Juan Huang, De-Yong He, Wei Chen, Zheng Zhou, Guang-Can Guo, and Zheng-Fu Han, “Unbalanced-basis-misalignment-tolerant measurement-device-independent
quantum key distribution,” Optica 9, 886–893 (2022).
Liu et al. (2013)Yang Liu, Teng-Yun Chen,
Liu-Jun Wang, Hao Liang, Guo-Liang Shentu, Jian Wang, Ke Cui, Hua-Lei Yin, Nai-Le Liu, Li Li, Xiongfeng Ma, Jason S. Pelc, M. M. Fejer, Cheng-Zhi Peng, Qiang Zhang, and Jian-Wei Pan, “Experimental measurement-device-independent
quantum key distribution,” Physical review letters 111, 130502 (2013).
Wang et al. (2015)Chao Wang, Xiao-Tian Song,
Zhen-Qiang Yin, Shuang Wang, Wei Chen, Chun-Mei Zhang, Guang-Can Guo, and Zheng-Fu Han, “Phase-reference-free experiment of measurement-device-independent
quantum key distribution,” Physical review letters 115, 160502 (2015).
Yin et al. (2016)Hua-Lei Yin, Teng-Yun Chen,
Zong-Wen Yu, Hui Liu, Li-Xing You, Yi-Heng Zhou, Si-Jing Chen, Yingqiu Mao, Ming-Qi Huang, Wei-Jun Zhang, Hao Chen, Ming Jun Li, Daniel Nolan, Fei Zhou, Xiao Jiang,
Zhen Wang, Qiang Zhang, Xiang-Bin Wang, and Jian-Wei Pan, “Measurement-device-independent quantum key
distribution over a 404 km optical fiber,” Physical review letters 117, 190501 (2016).
Comandar et al. (2016)LC Comandar, M Lucamarini,
B Fröhlich, JF Dynes, AW Sharpe, SW-B Tam, ZL Yuan, RV Penty, and AJ Shields, “Quantum key
distribution without detector vulnerabilities using optically seeded
lasers,” Nature
Photonics 10, 312–315
(2016).
Wang et al. (2017)Chao Wang, Zhen-Qiang Yin,
Shuang Wang, Wei Chen, Guang-Can Guo, and Zheng-Fu Han, “Measurement-device-independent quantum key
distribution robust against environmental disturbances,” Optica 4, 1016–1023 (2017).
Fan-Yuan et al. (2022)Guan-Jie Fan-Yuan, Feng-Yu Lu, Shuang Wang, Zhen-Qiang Yin,
De-Yong He, Wei Chen, Zheng Zhou, Ze-Hao Wang, Jun Teng, Guang-Can Guo, and Zheng-Fu Han, “Robust and adaptable quantum key distribution network without
trusted nodes,” Optica 9, 812–823
(2022).
Pirandola et al. (2009)Stefano Pirandola, Raul García-Patrón, Samuel L. Braunstein, and Seth Lloyd, “Direct and reverse secret-key capacities of a quantum channel,” Phys. Rev. Lett. 102, 050503 (2009).
Takeoka et al. (2014)Masahiro Takeoka, Saikat Guha, and Mark M Wilde, “Fundamental rate-loss tradeoff for optical quantum key distribution,” Nature
communications 5, 1–7
(2014).
Pirandola et al. (2017)Stefano Pirandola, Riccardo Laurenza, Carlo Ottaviani, and Leonardo Banchi, “Fundamental limits of repeaterless quantum communications,” Nature communications 8, 1–15 (2017).
Lucamarini et al. (2018)Marco Lucamarini, Zhiliang L Yuan, James F Dynes, and Andrew J Shields, “Overcoming the
rate–distance limit of quantum key distribution without quantum
repeaters,” Nature 557, 400–403
(2018).
Ma et al. (2018)Xiongfeng Ma, Pei Zeng, and Hongyi Zhou, “Phase-matching
quantum key distribution,” Physical Review X 8, 031043 (2018).
Wang et al. (2018)Xiang-Bin Wang, Zong-Wen Yu, and Xiao-Long Hu, “Twin-field quantum key distribution with large misalignment error,” Physical Review
A 98, 062323 (2018).
Curty et al. (2019)Marcos Curty, Koji Azuma, and Hoi-Kwong Lo, “Simple security proof of
twin-field type quantum key distribution protocol,” npj Quantum Information 5, 1–6 (2019).
Cui et al. (2019)Chaohan Cui, Zhen-Qiang Yin,
Rong Wang, Wei Chen, Shuang Wang, Guang-Can Guo, and Zheng-Fu Han, “Twin-field quantum key distribution without
phase postselection,” Physical Review Applied 11, 034053 (2019).
Wang et al. (2020)Rong Wang, Zhen-Qiang Yin,
Feng-Yu Lu, Shuang Wang, Wei Chen, Chun-Mei Zhang, Wei Huang, Bing-Jie Xu, Guang-Can Guo, and Zheng-Fu Han, “Optimized protocol for twin-field quantum key distribution,” Communications Physics 3, 1–7 (2020).
Maeda et al. (2019)Kento Maeda, Toshihiko Sasaki, and Masato Koashi, “Repeaterless
quantum key distribution with efficient finite-key analysis overcoming the
rate-distance limit,” Nature communications 10, 1–8 (2019).
Jiang et al. (2019)Cong Jiang, Zong-Wen Yu,
Xiao-Long Hu, and Xiang-Bin Wang, “Unconditional security of
sending or not sending twin-field quantum key distribution with finite
pulses,” Physical Review Applied 12, 024061 (2019).
Lu et al. (2019)Feng-Yu Lu, Zhen-Qiang Yin,
Rong Wang, Guan-Jie Fan-Yuan, Shuang Wang, De-Yong He, Wei Chen, Wei Huang, Bing-Jie Xu, Guang-Can Guo, and Zheng-Fu Han, “Practical issues of twin-field quantum key distribution,” New Journal of Physics 21, 123030 (2019).
Xu et al. (2020)Hai Xu, Zong-Wen Yu,
Cong Jiang, Xiao-Long Hu, and Xiang-Bin Wang, “Sending-or-not-sending twin-field
quantum key distribution: Breaking the direct transmission key rate,” Physical Review
A 101, 042330 (2020).
Zeng et al. (2020)Pei Zeng, Weijie Wu, and Xiongfeng Ma, “Symmetry-protected privacy:
beating the rate-distance linear bound over a noisy channel,” Physical Review Applied 13, 064013 (2020).
Currás-Lorenzo et al. (2021)Guillermo Currás-Lorenzo, Álvaro Navarrete, Koji Azuma, Go Kato, Marcos Curty, and Mohsen Razavi, “Tight finite-key security for twin-field quantum key distribution,” npj Quantum
Information 7, 1–9
(2021).
Minder et al. (2019)Mariella Minder, Mirko Pittaluga, George Lloyd Roberts, Marco Lucamarini, JF Dynes, ZL Yuan, and Andrew J Shields, “Experimental quantum key distribution beyond the repeaterless secret
key capacity,” Nature Photonics 13, 334–338 (2019).
Zhong et al. (2019)Xiaoqing Zhong, Jianyong Hu, Marcos Curty, Li Qian, and Hoi-Kwong Lo, “Proof-of-principle experimental
demonstration of twin-field type quantum key distribution,” Physical Review Letters 123, 100506 (2019).
Wang et al. (2019)Shuang Wang, De-Yong He,
Zhen-Qiang Yin, Feng-Yu Lu, Chao-Han Cui, Wei Chen, Zheng Zhou, Guang-Can Guo, and Zheng-Fu Han, “Beating the fundamental rate-distance limit in a proof-of-principle quantum
key distribution system,” Physical Review X 9, 021046 (2019).
Liu et al. (2019)Yang Liu, Zong-Wen Yu,
Weijun Zhang, Jian-Yu Guan, Jiu-Peng Chen, Chi Zhang, Xiao-Long Hu, Hao Li, Cong Jiang, Jin Lin,
Teng-Yun Chen, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan, “Experimental twin-field quantum key distribution through sending or not
sending,” Physical Review Letters 123, 100505 (2019).
Fang et al. (2020)Xiao-Tian Fang, Pei Zeng, Hui Liu,
Mi Zou, Weijie Wu, Yan-Lin Tang, Ying-Jie Sheng, Yao Xiang, Weijun Zhang,
Hao Li, Zhen Wang, Lixing You, Ming-Jun Li, Hao Chen, Yu-Ao Chen,
Qiang Zhang, Cheng-Zhi Peng, Xiongfeng Ma, Teng-Yun Chen, and Jian-Wei Pan, “Implementation of quantum key distribution
surpassing the linear rate-transmittance bound,” Nature Photonics 14, 422–425 (2020).
Chen et al. (2020)Jiu-Peng Chen, Chi Zhang, Yang Liu,
Cong Jiang, Weijun Zhang, Xiao-Long Hu, Jian-Yu Guan, Zong-Wen Yu, Hai Xu, Jin Lin, Ming-Jun Li, Hao Chen, Hao Li, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan, “Sending-or-not-sending with independent lasers: Secure twin-field quantum
key distribution over 509 km,” Physical review letters 124, 070501 (2020).
Liu et al. (2021)Hui Liu, Cong Jiang,
Hao-Tao Zhu, Mi Zou, Zong-Wen Yu, Xiao-Long Hu, Hai Xu, Shizhao Ma, Zhiyong Han, Jiu-Peng Chen, Yunqi Dai, Shi-Biao Tang,
Weijun Zhang, Hao Li, Lixing You, Zhen Wang, Yong Hua, Hongkun Hu, Hongbo Zhang, Fei Zhou,
Qiang Zhang, Xiang-Bin Wang, Teng-Yun Chen, and Jian-Wei Pan, “Field test of twin-field quantum key
distribution through sending-or-not-sending over 428 km,” Physical Review Letters 126, 250502 (2021).
Chen et al. (2021)Jiu-Peng Chen, Chi Zhang, Yang Liu,
Cong Jiang, Wei-Jun Zhang, Zhi-Yong Han, Shi-Zhao Ma, Xiao-Long Hu, Yu-Huai Li, Hui Liu, Fei Zhou, Hai-Feng Jiang, Teng-Yun Chen, Hao Li, Li-Xing You,
Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan, “Twin-field quantum key distribution over a 511
km optical fibre linking two distant metropolitan areas,” Nature Photonics 15, 570–575 (2021).
Clivati et al. (2022)Cecilia Clivati, Alice Meda,
Simone Donadello,
Salvatore Virzì,
Marco Genovese, Filippo Levi, Alberto Mura, Mirko Pittaluga, Zhiliang Yuan, Andrew J Shields, Marco Lucamarini, Ivo Pietro Degiovanni, and Davide Calonico, “Coherent phase transfer for real-world
twin-field quantum key distribution,” Nature Communications 13, 1–9 (2022).
Pittaluga et al. (2021)Mirko Pittaluga, Mariella Minder, Marco Lucamarini, Mirko Sanzaro, Robert I Woodward, Ming-Jun Li,
Zhiliang Yuan, and Andrew J Shields, “600-km repeater-like quantum
communications with dual-band stabilization,” Nature Photonics 15, 530–535 (2021).
Chen et al. (2022)Jiu-Peng Chen, Chi Zhang, Yang Liu,
Cong Jiang, Dong-Feng Zhao, Wei-Jun Zhang, Fa-Xi Chen, Hao Li, Li-Xing You, Zhen Wang, Yang Chen, Xiang-Bin Wang,
Qiang Zhang, and Jian-Wei Pan, “Quantum key distribution over 658 km
fiber with distributed vibration sensing,” Physical Review Letters 128, 180502 (2022).
Wang et al. (2022)Shuang Wang, Zhen-Qiang Yin,
De-Yong He, Wei Chen, Rui-Qiang Wang, Peng Ye, Yao Zhou, Guan-Jie Fan-Yuan, Fang-Xiang Wang, Yong-Gang Zhu, Pavel V Morozov, Alexander V Divochiy, Zheng Zhou,
Guang-Can Guo, and Zheng-Fu Han, “Twin-field quantum key distribution
over 830-km fibre,” Nature Photonics , 1–8 (2022).
Xie et al. (2022)Yuan-Mei Xie, Yu-Shuo Lu, Chen-Xun Weng,
Xiao-Yu Cao, Zhao-Ying Jia, Yu Bao, Yang Wang, Yao Fu, Hua-Lei Yin, and Zeng-Bing Chen, “Breaking the
rate-loss bound of quantum key distribution with asynchronous two-photon
interference,” PRX Quantum 3, 020315
(2022).
Renner (2008)Renato Renner, “Security of
quantum key distribution,” International Journal of Quantum Information 6, 1–127 (2008).
Zhu et al. (2023)Hao-Tao Zhu, Yizhi Huang,
Hui Liu, Pei Zeng, Mi Zou, Yunqi Dai, Shibiao Tang, Hao Li, Lixing You,
Zhen Wang, Yu-Ao Chen, Xiongfeng Ma, Teng-Yun Chen, and Jian-Wei Pan, “Experimental mode-pairing
measurement-device-independent quantum key distribution without global phase
locking,” Phys. Rev. Lett. 130, 030801 (2023).
Zhou et al. (2022)Lai Zhou, Jinping Lin,
Yuan-Mei Xie, Yu-Shuo Lu, Yumang Jing, Hua-Lei Yin, and Zhiliang Yuan, “Experimental quantum communication overcomes the
rate-loss limit without global phase tracking,” arXiv preprint arXiv:2212.14190 (2022).
Cao et al. (2015)Zhu Cao, Zhen Zhang,
Hoi-Kwong Lo, and Xiongfeng Ma, “Discrete-phase-randomized coherent
state source and its application in quantum key distribution,” New Journal of Physics 17, 053014 (2015).
Laing et al. (2010)Anthony Laing, Valerio Scarani, John G Rarity, and Jeremy L O’Brien, “Reference-frame-independent quantum key distribution,” Physical Review A 82, 012304 (2010).
Tamaki et al. (2014)Kiyoshi Tamaki, Marcos Curty,
Go Kato, Hoi-Kwong Lo, and Koji Azuma, “Loss-tolerant quantum cryptography with imperfect
sources,” Physical Review A 90, 052314 (2014).
Watanabe et al. (2008)Shun Watanabe, Ryutaroh Matsumoto, and Tomohiko Uyematsu, “Tomography increases key rates of quantum-key-distribution protocols,” Phys. Rev. A 78, 042316 (2008).
Müller-Quade and Renner (2009)Jörn Müller-Quade and Renato Renner, “Composability in quantum cryptography,” New Journal of Physics 11, 085006 (2009).
Tomamichel et al. (2011)Marco Tomamichel, Christian Schaffner, Adam Smith,
and Renato Renner, “Leftover hashing against
quantum side information,” IEEE Transactions on Information Theory 57, 5524–5535 (2011).
Konig et al. (2009)Robert Konig, Renato Renner,
and Christian Schaffner, “The
operational meaning of min- and max-entropy,” IEEE Transactions on Information Theory 55, 4337–4347 (2009).
Vitanov et al. (2013)Alexander Vitanov, Frederic Dupuis, Marco Tomamichel, and Renato Renner, “Chain rules for smooth min-and max-entropies,” IEEE Transactions on Information Theory 59, 2603–2612 (2013).
Tomamichel and Renner (2011)Marco Tomamichel and Renato Renner, “Uncertainty
relation for smooth entropies,” Physical review letters 106, 110506 (2011).
Wang et al. (2021)Rong Wang, Zhen-Qiang Yin,
Hang Liu, Shuang Wang, Wei Chen, Guang-Can Guo, and Zheng-Fu Han, “Tight finite-key analysis for generalized high-dimensional quantum
key distribution,” Physical Review Research 3, 023019 (2021).