Practical decoy-state method for twin-field quantum key distribution

Twin-Field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type protocols have confirmed that the secret key rate of these schemes scales essentially as the square root of the transmittance of the channel. Here, we focus on the TF-QKD protocol introduced by Curty et al, whose secret key rate is nearly an order of magnitude higher than previous solutions. Its security relies on the estimation of the detection probabilities associated to various photon-number states through the decoy-state method. We derive analytical bounds on these quantities assuming that each party uses either two, three or four decoy intensity settings, and we investigate the protocol's performance in this scenario. Our simulations show that two decoy intensity settings are enough to beat the point-to-point private capacity of the channel, and that the use of four decoys is already basically optimal, in the sense that it almost reproduces the ideal scenario of infinite decoys. We also observe that the protocol seems to be quite robust against intensity fluctuations of the optical pulses prepared by the parties.

[1]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[2]  Umesh Vazirani,et al.  Fully device-independent quantum key distribution. , 2012, 1210.1810.

[3]  H. J. Kimble,et al.  The quantum internet , 2008, Nature.

[4]  Rong Wang,et al.  Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.

[5]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[6]  Hermann Kampermann,et al.  Measurement-device-independent quantum key distribution with quantum memories , 2013, 1306.3095.

[7]  Kae Nemoto,et al.  Quantum communication without the necessity of quantum memories , 2012, Nature Photonics.

[8]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[9]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[10]  Richard J. Hughes,et al.  Practical long-distance quantum key distribution system using decoy levels , 2008, 0806.3085.

[11]  Nicolas Gisin,et al.  Quantum communication , 2017, 2017 Optical Fiber Communications Conference and Exhibition (OFC).

[12]  J. F. Dynes,et al.  Overcoming the rate-distance barrier of quantum key distribution without using quantum repeaters , 2018 .

[13]  Hoi-Kwong Lo,et al.  Enabling a Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Network , 2018 .

[14]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[15]  Rong Wang,et al.  Phase-matching Quantum Key Distribution without Phase Post-Selection , 2018 .

[16]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[17]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[18]  Hermann Kampermann,et al.  Finite-key effects in multipartite quantum key distribution protocols , 2018, New Journal of Physics.

[19]  S. Guha,et al.  Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.

[20]  Bing Qi,et al.  Practical challenges in quantum key distribution , 2016, npj Quantum Information.

[21]  Li Qian,et al.  Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. , 2019, Physical review letters.

[22]  Nicolas Gisin,et al.  Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.

[23]  Hui Liu,et al.  Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.

[24]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[25]  Koji Azuma,et al.  All-photonic intercity quantum key distribution , 2015, Nature Communications.

[26]  Yongmei Huang,et al.  Satellite-to-ground quantum key distribution , 2017, Nature.

[27]  L. Banchi,et al.  Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.

[28]  Karol Horodecki,et al.  Free randomness amplification using bipartite chain correlations , 2013, 1303.5591.

[29]  M. Toyoshima,et al.  Satellite-to-ground quantum-limited communication using a 50-kg-class microsatellite , 2017, 1707.08154.

[30]  Marco Lucamarini,et al.  Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.

[31]  Michael Epping,et al.  Multi-partite entanglement can speed up quantum key distribution in networks , 2016, 1612.05585.

[32]  Hoi-Kwong Lo,et al.  Simple security proof of twin-field type quantum key distribution protocol , 2018, npj Quantum Information.

[33]  Marco Lucamarini,et al.  Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound , 2018, 1805.05511.

[34]  Jie Lin,et al.  Simple security analysis of phase-matching measurement-device-independent quantum key distribution , 2018, Physical Review A.

[35]  F. Bussières,et al.  Secure Quantum Key Distribution over 421 km of Optical Fiber. , 2018, Physical review letters.

[36]  Mohsen Razavi,et al.  Memory-assisted measurement-device-independent quantum key distribution , 2013, 1309.3406.

[37]  J. Cirac,et al.  Long-distance quantum communication with atomic ensembles and linear optics , 2001, Nature.

[38]  Xiongfeng Ma,et al.  Phase-Matching Quantum Key Distribution , 2018, Physical Review X.

[39]  S. Wehner,et al.  Fully device-independent conference key agreement , 2017, 1708.00798.

[40]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.

[41]  Hoi-Kwong Lo,et al.  All-photonic quantum repeaters , 2013, Nature Communications.

[42]  Qiang Zhang,et al.  Experimental Twin-Field Quantum Key Distribution Through Sending-or-Not-Sending , 2019, Physical review letters.

[43]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[44]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[45]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .