Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Enhancing the performance of mode-pairing quantum key distribution by wavelength division multiplexing

Open Access Open Access

Abstract

Mode-pairing quantum key distribution (MP-QKD) holds great promise for the practical implementation of QKD in the near future. It combines the security advantages of measurement device independence while still being capable of breaking the Pirandola–Laurenza–Ottaviani–Banchi bound without the need for highly demanding phase-locking and phase-tracking technologies for deployment. In this work, we explore optimization strategies for MP-QKD in a wavelength-division multiplexing scenario. The simulation results reveal that incorporation of multiple wavelengths not only leads to a direct increase in key rate but also enhances the pairing efficiency by employing our novel pairing strategies among different wavelengths. As a result, our work provides a new avenue for the future application and development of MP-QKD.

© 2024 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

Quantum key distribution (QKD) [1] enables secure sharing of private keys between authorized users guranteed by the quantum mechanics [2,3]. By incorporating the one-time pad method, it can provide communication with information-theoretic security, even in the presence of a malicious eavesdropper. Over the past four decades, QKD has transitioned from theory to practical applications and has been advancing towards high-speed, miniaturized, and networked deployments [49].

Among the numerous developments in recent years, measurement-device-independent QKD (MDI-QKD) [10,11] has stood out for its notable advantages in terms of both security and practicality. With the detection part controlled by an untrusted third party, MDI-QKD can be immune to detection side-channel attacks and has been successfully verified in proof-of-principle demonstrations and practical systems [1219]. However, the performance of BB84 and MDI-QKD protocols is limited by the fundamental rate-distance bound of QKD without quantum repeaters [20,21] (Pirandola-Laurenza-Ottaviani-Banchi bound, PLOB bound). Extending the transmission distance beyond 450 km presents a considerable challenge. Fortunately, in 2018, twin-field (TF) QKD [2226] was introduced as a breakthrough solution to surpass this limit without a full-working repeater. To validate the feasibility of TF-QKD, numerous indoor and outdoor experimental demonstrations have been conducted [2737], which utilized various techniques for both phase locking and phase tracking. Although researchers have reduced the requirements for phase calibration and stability [38,39], it has inevitably resulted in increased time and system complexity.

Recently, mode-pairing (MP) QKD [40], also known as asynchronous MDI-QKD [41], has been proposed as a means to alleviate the technological demands of TF-QKD [4248]. Instead of pairing only adjacent time slots, MP-QKD recycles the unpaired events in MDI-QKD by actively postselects coincidence events within a suitable pairing interval ($l$). More specifically, when $l$ is set to 1, the relationship between the key rate ($R$) and channel transmittance ($\eta$) follows $R=O(\eta )$, and as $l$ tends to infinity, it becomes $R=O(\sqrt \eta )$. Although achieving an infinite $l$ is not feasible, increasing the value of $l$ can indeed enhance the performance of MP-QKD and, to a certain degree, surpass the PLOB bound. However, the maximum pairing interval is generally constrained by the number of emitted pulses within the laser’s coherent time. Nonetheless, improving the system frequency and laser performance presents demanding and costly challenges during system upgrades.

In this work, we propose a wavelength division multiplexing (WDM) scheme to improve the pairing efficiency of the MP-QKD. By employing this method, we can pair the effective events between different wavelengths within the pairing interval, and thus events that previously failed to be paired can be re-utilized across different wavelengths. A general formula for pairing an arbitrary number of wavelengths is presented. In addition, we validate the effectiveness of our proposed method through simulation and subsequently provide a summary and outlook.

2. WDM MP-QKD

In this section, we begin by reviewing the original procedures of MP-QKD. Subsequently, we introduce MP-QKD with WDM, focusing on its pairing strategy. Additionally, corresponding simulation formulas are provided.

2.1 MP-QKD

For time-bin phase-encoding MDI-QKD, a successful Bell state measurement requires the simultaneous clicks of counting events in two adjacent time slots. In contrast, TF-QKD only requires a single counting event. MP-QKD, through the utilization of a post-selection pairing strategy, enables the reutilization of single counting events that would be discarded in MDI-QKD. A schematic setup of MP-QKD is shown in Fig. 1(a) and the specific protocol flow is as follows.

1. State preparation: In $k$-th round ($k \in \{ 1,2,\ldots,N\}$), Alice (Bob) randomly prepares weak coherent pulses $\sqrt {\mu _k^a} {e^{i\phi _k^a}}$ ($\sqrt {\mu _k^b} {e^{i\phi _k^b}}$) with $\mu _k^a(\mu _k^b) \in \{ 0, u \}$ and $\phi _k^a(\phi _k^b) \in [0,2 \pi )$, and further sends to the detection side.

 figure: Fig. 1.

Fig. 1. (a)The schematic diagram of MP-QKD. (b) WDM MP-QKD with m channels. $D_m$ denotes the $m$-th detection component, which possesses an identical setup to $D_1$. (c) Schematic representation of the pairing strategy between different wavelength.

Download Full Size | PDF

2. Measurement: Upon the pulses interfering at the beam splitter, Charlie records the clicking events of the two detectors: $R(L)=1$ to indicate clicking of the right (left) detector, $R(L)=0$ to indicate non-clicking of the right (left) detector, and ${C^k} = R \cap L$. A successful event is defined as ${C^k} = 1$.

3. Mode-pairing: After collecting enough data for $N$ rounds, Alice and Bob pairing two successful events with a specific strategy as follows [40]: First, a maximum pairing length, denoted as $l$, is predetermined by Alice and Bob based on the stability of the laser source and the system repetition rate. Let the index of the first slot of successful event be denoted as $i$, and the second as $j$. If the time interval between them is less than or equal to $l$, these two events are successfully paired as a coincidence event. Otherwise, the first successful event is discarded, and the attention is redirected to the time interval between the second and third events, and so on.

4. Basis sifting: Based on the intensities of the coincidence events (assuming the time slots are denoted as $i$ and $j$), Alice and Bob classify the data pairs in the $Z$ basis if the intensities $(\mu _i^a,\mu _j^a)$ are (0, $u$) or ($u$, 0), in the $X$ basis if the intensities are ($u$, $u$), or define it as ’0’ if the intensities are (0, 0). Subsequently, they publicly announce the post-defined bases and retain the $ZZ$ and $XX$, along with the ’0’ cases.

5. Key mapping: For the Z-basis, Alice classifies the key to ${\kappa ^a} = 0$ if $(\mu _i^a,\mu _j^a) = (0,u)$, and ${\kappa ^a} = 1$ if $(\mu _i^a,\mu _j^a) = (u,0)$; on the contrary, Bob classifies the key to ${\kappa ^b} = 0$ if $(\mu _i^b,\mu _j^b) = (u,0)$, and ${\kappa ^b} = 1$ if $(\mu _i^b,\mu _j^b) = (0,u)$; for the X-basis, the key of Alice is determined by the relative phase $(\phi _i^a - \phi _j^a) = {\theta ^a} + \pi {\kappa ^a}$ with ${\kappa ^a} = \left \lfloor {((\phi _i^a - \phi _j^a)/\pi )\bmod 2} \right \rfloor$, and ${\theta ^a} = (\phi _i^a - \phi _j^a)\bmod \pi$. Similarly, Bob determines his keys ${\kappa ^b}$ and alignment angle ${\theta ^b}$ in the same way, with the exception of performing a bit-flip when Charlie detects either $(L, R)$ or $(R, L)$ events. Then, they both announce the alignment angle, and keep the events when ${\theta ^a}={\theta ^b}$.

6. Parameter estimation and key generation: Slightly different from other protocols, MP-QKD should estimate the paring rate $r_p$ and probability of post-selected $ZZ$ basis $r_s$. Also, the fraction of the clicked signals ($q_{11}$) and single-photon phase error rate ($e_{11}^{XX}$) should be estimated. Finally, the secure keys can be generated after error correction and privacy amplification. Key rate of MP-QKD can be calculated as follows:

$$R = {r_p}{r_s}\left\{ {{q_{11}}\left[ {1 - H(e_{11}^{XX})} \right] - fH(E_{uu}^{ZZ})} \right\},$$
where $H(x) = - x{\log _2}(x) - (1 - x){\log _2}(1 - x)$ is the binary Shannon entropy function, ${E_{uu}^{ZZ}}$ is the quantum bit error rate in $ZZ$ basis, and $f$ is the error correction efficiency.

2.2 WDM scheme

In this part, we will introduce the WDM MP-QKD protocol especially its paring strategy. WDM technology is widely employed in optical communications and network scenarios to enhance data transmission bandwidth and speed. Likewise, WDM technology can also be employed in QKD system to increase the key generation rate [49,50]. Different from previous studies, the application of WDM in this work not only leads to improvement in multiple wavelengths, but also allows for optimization of the pairing strategy in MP-QKD. This optimization enhances the pairing success probability and ultimately improves the key rate. Specific process of WDM MPQKD is as follows:

1. State preparation: Suppose Alice and Bob possess an MP-QKD system with $M$ distinct wavelengths. In $k$-th round, ($k \in \{ 1,2,\ldots,N\}$), Alice (Bob) randomly prepares weak coherent pulses $\sqrt {\mu _{k,m}^a} {e^{i\phi _{k,m}^a}}(\sqrt {\mu _{k,m}^b} {e^{i\phi _{k,m}^b}})$ with $m$-th wavelength ($m \in \{1, 2,\ldots, M\}$). Similarly, $\mu _{k,m}^a(\mu _{k,m}^b) \in \{ 0, u \}$ and $\phi _{k,m}^a(\phi _{k,m}^b) \in [0,2 \pi )$. As depicted in the Fig. 1(b), the pulses of all wavelengths are combined and sent to the Charlie through a wavelength-division multiplexer.

2. Measurement: At the measurement terminal, Charlie interferes the pulses from the same wavelengths and records the results of the $k$-th time slot and $m$-th wavelength as ${C^{k,m}}$.

3. Mode-pairing: Assume that the first two events are ${C^{i,m_1}}$ and ${C^{j,m_2}}$. As long as the time slot interval ($j-i$) between the two is smaller than the maximum pairing length $l$, regardless of which wavelength ($m_1$ and $m_2$) they originate from, Alice and Bob will successfully pair the two events as a coincidence. Otherwise, ${C^{i,m_1}}$ will be discarded and the attention is turn to the time interval between the ${C^{j,m_2}}$ and the next event, and so on. A simple schematic diagram is depicted in Fig. 1(c). Detailed pairing strategy are shown in Box 1.

4. Basis sifting and key mapping: As the encoding of different wavelengths is independent, the two steps remain almost the same as in the original MP-QKD. A slight difference arises during the X-basis key mapping process. Specifically, the relative phase between the two pulses from $m_1$ and $m_2$ channels can be denoted as $(\phi _{i,m_1}^a - \phi _{j,m_2}^a) = {\theta ^a} +{\delta _{m_1,m_2}} +\pi {\kappa ^a}$. ${\delta _{m_1,m_2}}$ is the phase difference introduced by different wavelengths traveling through the same optical fiber and this variation can be mitigated in practical applications through prior estimation [35,37].

5. Parameter estimation and key generation: This step remains identical to the original protocol. In the following section, we will mainly focus on the derivation of the parameter estimation formulas for WDM MP-QKD.

oe-32-10-18366-i001

3. Simulation model for WDM MP-QKD

In this section, we will present the formulas for WDM MP-QKD, with a particular focus on the calculation of the efficiency for the new pairing strategy. In this work, we mainly consider the simulation model in the asymptotic case where Alice and Bob randomly emit pulses with intensity ${0,u}$, and the decoy-state part is also prepared for perfect parameter estimation. For the ease of presenting the simulation formulas, the emitted pulses by Alice (Bob) in $k$-th round is denoted as $\left |\sqrt {z_{k,m}^{a} u} \exp \left (i \phi _{k,m}^{a}\right )\right \rangle$ ($\left |\sqrt {z_{k,m}^{b} u} \exp \left (i \phi _{k,m}^{b}\right )\right \rangle$) with $z_{k,m}^{a}$ ($z_{k,m}^{b}$) $\in \{0,1\}$ and $\phi _{k,m}^{a}$($\phi _{k,m}^{b}$) is the random phase. In $k$-th round and $m$-th channel, the intensity setting is expressed as $z_{k,m}:=[z_{k,m}^a, z_{k,m}^b]$. Without loss of generality, we assume that Alice and Bob are equidistant from Charlie, and the channels follows the i.i.d assumption. By following the pairing strategy in Box 1, the $F_k$-th pulse from $m_{1k}$ channel and $R_k$-th pulse from $m_{2k}$ channel are paired. Define ${\tau _{{F_k},m_{1k},{R_k},m_{2k}}} = [\tau ^a_{{F_k},m_{1k},{R_k},m_{2k}},\tau ^b_{{F_k},m_{1k},{R_k},m_{2k}}]: = [z ^a_{{F_k},m_{1k}} \oplus z ^a_{{R_k},m_{2k}},z^b_{{F_k},m_{1k}} \oplus z^b_{{R_k},m_{2k}}]$, where $\oplus$ is the bit-wise modulo-2 addition. When ${\tau _{{F_k},m_{1k},{R_k},m_{2k}}} =[1,1]$, this pair is defined as Z-pair.

First, the successful detection probability of the each pulse-pair is

$$p: = \Pr (C^{k,m} = 1) = \sum_{{z_{k,m}}} {P(C^{k,m} = 1|{z_{k,m}})\Pr ({z_{k,m}})} = \frac{1}{4}\sum_{{z_{k,m}}} {P(C^{k,m}= 1|{z_{k,m}})}.$$

Specifically, in $k$-th round and $m$-th channel, the successful event probability $P(C_m^k =1|z_{k,m})$ can be expressed as

$$P(C^{k,m}=1|{z _{k,m}}) = 1 - (1 - 2{p_d})\exp [ - {\eta _s}u(z^a_{{k},m} + z^b_{{k},m})],$$
where $p_d$ is the dark count rate, and ${\eta _s}$ is the overall transmission efficiency including the detector.

Moreover, the weak coherent pulses with random phase can be treat as a mix of the photon-number state, and the detection probability when Alice and Bob send $n^{k,m}$ photons ($n_A^{k,m}$ from Alice and $n_B^{k,m}$ from Bob) is

$$\Pr (C^{k,m}= 1|{n^{k,m}}) = 1 - (1 - 2{p_d}){(1 - {\eta _s})^{(n_A^{k,m} + n_B^{k,m})}}.$$

According to Ref. [40], the signal-pair ratio $r_s$ is

$$r_s=\dfrac{1}{16}\dfrac{1}{p^2}\sum_{z_{F_k}\oplus z_{R_k}=11} Pr(C^{F_k,m1}=1|z_{F_k,m1})Pr(C^{R_k,m2}=1|z_{R_k,m2}),$$
and the quantum bit error rate of the Z basis can be denote as
$$E^{ZZ}_{uu}=\dfrac{1}{16}\dfrac{1}{r_s p^2}\sum_{[z_{F_k}, z_{R_k}] \in \{[00,11],[11,00]\}} Pr(C^{F_k,m1}=1|z_{F_k,m1})Pr(C^{R_k,m2}=1|z_{R_k,m2}).$$

Besides, the single-photon ratio $q_{11}$ in the effective signal-pairs is

$$q_{11}=\dfrac{1}{16}\dfrac{P_u(1)^2}{r_s p^2}\sum_{z_{F_k} \oplus z_{R_k}=11} Pr(C^{F_k,m1}=1|n_A^{k,m}=z_{F_k,m1})Pr(C^{R_k,m2}=1|n_B^{k,m}=z_{R_k,m2}),$$
where $P_u(1)=u e^{-u}$ is the probability of single photon pulses in a weak coherent source with intensity $u$.

By using decoy-state method, we can perfectly estimate the single-photon yield and phase error rate by using the following formulas [40]:

$$Y_{11}=(1-p_d)^2[\dfrac{\eta_a\eta_b}{2}+(2\eta_a+2\eta_b-3\eta_a\eta_b)p_d+4(1-\eta_a)(1-\eta_b)p_d^2],$$
$$e_{11}^{XX}=\dfrac{e_0 Y_{11}-(e_0-e_d)(1-p_d^2)\dfrac{\eta_a\eta_b}{2}}{Y_{11}},$$
where $e_0$ is the error rate of random noise and set to be 1/2, $e_d$ is the misalignment error of the system, and $\eta _a$ ($\eta _b$) is the overall transmission efficiency from Alice (Bob) to Charlie.

The general expression for the expected pair number with $M$ wavelengths per pulse is

$$r_p=\dfrac{Mp}{1 + \dfrac{1}{1-(1-p)^{Ml}}}.$$

Detailed formula derivations can be found in Appendix A.

Finally, by employing Eq. (1) and the aforementioned formulas, the ultimate key rate can be computed.

4. Simulation results

In the previous section, we provided the simulation formulas and a general expression for the success rate of pairing. In this part, we will present corresponding simulation results to demonstrate the effectiveness of our proposed scheme. The simulation parameters are listed in the following Table 1.

Tables Icon

Table 1. Simulation parameters. $\eta _d$ and $p_d$ are the efficiency and dark counting rate per pulse of the detectors. $\alpha$ is the standard fiber loss coefficient. $f$ is the error correction efficiency.

First, we undertake a direct comparison of the key rates following the integration of the WDM scheme with $l=1000$. In Fig. 2, it is evident that adopting the multiplexing approach significantly enhances the key rate. As the number of multiplexed channels increases, the key rate improvement becomes more pronounced, making it easier to surpass the PLOB bound. It is worth to note that regardless of the number of multiplexed channels, the maximum transmission distance remains unchanged. This is attributed to the dominant influence of long-distance noise.

Furthermore, to provide a clearer illustration of the advantages of WDM in MPQKD, we computed the ratio of the key rates ($M$=2, 3, 4, 5) to the original scenario($M$=1). As shown in Fig. 3, within the initial 200 km, the ratio is approximately equal to the number of channels M. This indicates that the enhancement at this term is from the expansion of wavelengths. Remarkably, a substantial enhancement follows, with the ratio increasing rapidly. For example, when $M$ equals 5, the ratio increases to 25 at a distance of 500 km, demonstrating an improvement by a factor of $M^2$. This highlights the efficacy of the WDM method in MPQKD, where it elevates the pairing success rate and enhances the ultimate key rate at long distance. In Appendix B, we discuss in detail the reasons behind the enhancements brought about by the WDM approach.

 figure: Fig. 2.

Fig. 2. Key rate of WDM MP-QKD with M=1, 2, 3, 4, 5 and $l =1000$. PLOB bound is also plotted.

Download Full Size | PDF

 figure: Fig. 3.

Fig. 3. Ratio of WDM MPQKD’s key rate with respect to the original scheme.

Download Full Size | PDF

Lastly, we conducted a comparative analysis of the benefits derived from increasing the pairing interval $l$ and the number of multiplexed channels $M$. Increasing the pairing interval without compromising system performance implies a requirement for higher repetition rates or improved laser sources. Implementation of WDM demands lasers with different wavelengths which could be realized with optical frequency comb [51]. In Fig. 4, it is evident that for $M=1$, doubling or quintupling the pairing interval yields lower improvement in key rates compared to the enhancements achieved through adding multiplexing channels with the same factor. This phenomenon is more distinctly observable in the comparison chart of key rates (right-hand coordinate system). For instance, increasing $M$ by a factor of 5 ultimately results in an enhancement close to 25 times, whereas a 5-fold increase in $l$ only results in a 5 times improvement.

 figure: Fig. 4.

Fig. 4. Comparison of key rates among different $M$ and $l$. Left axis represents absolute key rate and PLOB bound is also plotted; right axis represents the relative key rate value with respect to $M=1$ and $l=1000$.

Download Full Size | PDF

Hence, WDM scheme can lead to a more substantial enhancement of the key rate than the improvement of the pairing interval. This results provides valuable insights for future system upgrades in MPQKD.

In real-life scenarios, the finite-intensity decoy-state method are much more practical. As an illustrative addition, Fig. 5 depicts the key rate corresponding to Fig. 2, following the application of a three-intensity decoy-state method that incorporates statistical fluctuations [40,47]. The result in Fig. 5 suggests that the WDM scheme can enhance both the key rate performance and the maximum transmission distance when more complex practical factors are considered. Furthermore, when $M$ exceeds 2, the key rate can surpass the PLOB bound, demonstrating superior practical performance.

 figure: Fig. 5.

Fig. 5. Key rate of three-intensity decoy-state WDM MP-QKD with statistical fluctuation considered. Parameters taking from Ref. [47] are listed below. Total pulse number $N=10^{12}$; dark count rate $p_d=10^{-8}$; detection efficiency $\eta _d=70{\% }$; fiber loss coefficient $\alpha =0.2 dB/km$; error correction efficiency $f=1.1$; secure coefficient $\varepsilon =4.8\times 10^{-23}$; Z-basis misalignment error $e_d^Z=0.5{\% }$; X-basis misalignment error $e_d^X=5{\% }$. Key rate for $l =1000$ with $M$=1, 2, 3, 4, 5 are displayed, and also PLOB bound is presented for comparison.

Download Full Size | PDF

5. Conclusion and outlook

In this work, we present a WDM-based MPQKD scheme that leverages an improved pairing strategy to enhance key rates. Our approach involves pairing events across different wavelengths, leading to gains in key rates not only through wavelength multiplexing but also by optimizing pairing efficiency. Furthermore, we derive a general expression for the arbitrary number of channel multiplexing. Simulation results demonstrate the substantial enhancement in key rates achieved by our scheme, particularly over longer distances. This offers valuable insights for future system upgrades in MPQKD.

In future research, particularly in the realm of experimental implementations, several areas merit attention. Firstly, when employing WDM scheme, it is essential that different wavelengths maintain a stable phase correlation in practical applications. One potential solution to achieve this stability is utilizing a frequency comb as the light source. Secondly, when light sources with different wavelengths are transmitted over the same fiber, additional phase variations can still be introduced. These variations can be measured and estimated during the experiment, and then compensated for in principle . Additionally, WDM may lead to channel crosstalk, introducing extra noise. These aspects represent potential challenges in experimental implementations that need to be validated.

Appendix A: Pairing efficiency of $M$ wavelengths

Here, we will focus on the derivation of the pairing efficiency $r_p$ which represents the pairing number of each pulse. According to the definition, it can be written as

$$r_p=\dfrac{n_{tot}}{N},$$
where $n_{tot}$ is the total number of pairs during $N$ pulses.

Firstly, we will revisit the derivation of $r_p$ in the original MPQKD protocol. According to the pairing strategy, two clicks should be found within the maximal pairing length $l$ to pair a successful event. For a given click event, the probability of encountering at least one additional click within the subsequent $l$ time slots is described by

$$q=1-(1-p)^{l}.$$

As a result, it takes an average of $1 + \dfrac {1}{q}$ clicks for a successful event. Therefore, $n_{tot}$ can be given by

$$n_{tot}=\dfrac{Np}{1 + 1/q}.$$

Consequently, $r_p$ can be rewritten as

$$r_p=\dfrac{p}{1 + 1/q}=\dfrac{p}{1 + \dfrac{1}{1-(1-p)^{l}}}.$$

In WDM scenarios where the wavelengths are expanded to $M$, the potential for click events increases correspondingly, scaling up by a factor of $M$. Also, this expansion necessitates a recalibration of the pairing pulses, modified to $Ml$. Consequently, $n_{tot}$ can be expressed as follows:

$$n_{tot} = \dfrac{MNp}{1 + \dfrac{1}{1 - (1 - p)^{Ml}}}.$$

Finally, general expression for the expected pair number with $M$ wavelengths per pulse is

$$r_p = \dfrac{Mp}{1 + \dfrac{1}{1 - (1 - p)^{Ml}}}.$$

Appendix B: Analysis of improvement in WDM

In this part, we will discuss in detail the reasons behind the enhancements brought about by the WDM approach. The updated formula for $r_p$ is presented by Eq. (16), where we can see that $r_p$ is affected by the channel number $M$ and the successful detection probability of the each pulse-pair $p$. We remark that, when ${\eta _s}u \ll 1$, $p \approx {\eta _s}u$. Therefore, at close distances,

$$\begin{aligned} r_p &= \dfrac{Mp}{1 + \dfrac{1}{1 - (1 - p)^{Ml}}}\\ &\approx \dfrac{M {\eta _s}u}{1 + \dfrac{1}{1 - (1 - {\eta _s}u)^{Ml}}}\\ &\approx\dfrac{M {\eta _s}u}{2}.\\ \end{aligned}$$

Consequently, $r_p \propto M$. Based on the key rate formula Eq. (1), it becomes evident that at close distances, the key rate increases $M$-fold, driven by an $M$-fold improvement in $r_p$.

 figure: Fig. 6.

Fig. 6. Ratio of $r_p$ (M=2, 3,4 and 5)with respect to M=1 versus $p$

Download Full Size | PDF

Conversely, at longer distances, as $\eta _s$ tends to 0, $r_p$ can be reformulated as

$$\begin{aligned}r_p &\approx \dfrac{M {\eta _s}u}{1 + \dfrac{1}{1 - (1 - {\eta _s}u)^{Ml}}}\\ & \approx\dfrac{M {\eta _s}u}{1 + \dfrac{1}{1 - (1 - {\eta _s}uMl)}}\\ & =\dfrac{M^2l{\eta _s}^2u^2}{1+{\eta _s}uMl}\\ & \approx M^2l{\eta _s}^2u^2, \end{aligned}$$
where we take the first-order Taylor expansion approximation $(1-x)^{n} \approx 1-xn$. Therefore, at long distance, $r_p \propto M^2$.

To further clarify the relationship, we have added a new figure to illustrate the phenomenon.

It is clear from Fig. 6 that, when $p$ is relatively large, it follows a ratio of $M$ times. Conversely, for smaller $p$ values, it adheres to a multiple relationship of $M^2$.

Funding

National Natural Science Foundation of China (62101285, 12074194, 12104240, 62201276); Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key Research and Development Program (BE2022071); Leading-Edge Technology Program of Natural Science Foundation of Jiangsu Province (BK20192001, BK20210582); Major Basic Research Project of the Natural Science Foundation of the Jiangsu Higher Education Institutions (21KJB140014, 22KJB510007).

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Theoretical Computer Science 560, 7–11 (2014). [CrossRef]  

2. H.-K. Lo and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” Science 283(5410), 2050–2056 (1999). [CrossRef]  

3. P. W. Shor and J. Preskill, “Simple proof of security of the bb84 quantum key distribution protocol,” Phys. Rev. Lett. 85(2), 441–444 (2000). [CrossRef]  

4. X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. Lett. 94(23), 230503 (2005). [CrossRef]  

5. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94(23), 230504 (2005). [CrossRef]  

6. S. Pirandola, U. L. Andersen, L. Banchi, et al., “Advances in quantum cryptography,” Adv. Opt. Photonics 12(4), 1012–1236 (2020). [CrossRef]  

7. F. Xu, X. Ma, Q. Zhang, et al., “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys. 92(2), 025002 (2020). [CrossRef]  

8. Y. Cao, Y. Zhao, Q. Wang, et al., “The evolution of quantum key distribution networks: On the road to the qinternet,” IEEE Commun. Surv. Tutorials 24(2), 839–894 (2022). [CrossRef]  

9. K. Azuma, S. E. Economou, D. Elkouss, et al., “Quantum repeaters: From quantum networks to the quantum internet,” Rev. Mod. Phys. 95(4), 045006 (2023). [CrossRef]  

10. S. L. Braunstein and S. Pirandola, “Side-channel-free quantum key distribution,” Phys. Rev. Lett. 108(13), 130502 (2012). [CrossRef]  

11. H.-K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108(13), 130503 (2012). [CrossRef]  

12. S. Pirandola, C. Ottaviani, G. Spedalieri, et al., “High-rate measurement-device-independent quantum cryptography,” Nat. Photonics 9(6), 397–402 (2015). [CrossRef]  

13. Y.-L. Tang, H.-L. Yin, Q. Zhao, et al., “Measurement-device-independent quantum key distribution over untrustful metropolitan network,” Phys. Rev. X 6(1), 011024 (2016). [CrossRef]  

14. H. Semenenko, P. Sibson, A. Hart, et al., “Chip-based measurement-device-independent quantum key distribution,” Optica 7(3), 238–242 (2020). [CrossRef]  

15. Y. Cao, Y.-H. Li, K.-X. Yang, et al., “Long-distance free-space measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 125(26), 260503 (2020). [CrossRef]  

16. R. I. Woodward, Y. S. Lo, M. Pittaluga, et al., “Gigahertz measurement-device-independent quantum key distribution using directly modulated lasers,” npj Quantum Inf. 7(1), 58 (2021). [CrossRef]  

17. G.-J. Fan-Yuan, F.-Y. Lu, S. Wang, et al., “Robust and adaptable quantum key distribution network without trusted nodes,” Optica 9(7), 812–823 (2022). [CrossRef]  

18. Y.-P. Chen, J.-Y. Liu, M.-S. Sun, et al., “Experimental measurement-device-independent quantum key distribution with the double-scanning method,” Opt. Lett. 46(15), 3729–3732 (2021). [CrossRef]  

19. J.-Y. Liu, X. Ma, H.-J. Ding, et al., “Experimental demonstration of five-intensity measurement-device-independent quantum key distribution over 442 km,” Phys. Rev. A 108(2), 022605 (2023). [CrossRef]  

20. S. Pirandola, R. Laurenza, C. Ottaviani, et al., “Fundamental limits of repeaterless quantum communications,” Nat. Commun. 8(1), 15043 (2017). [CrossRef]  

21. S. Pirandola, “End-to-end capacities of a quantum communication network,” Commun. Phys. 2(1), 51 (2019). [CrossRef]  

22. M. Lucamarini, Z. L. Yuan, J. F. Dynes, et al., “Overcoming the rate–distance limit of quantum key distribution without quantum repeaters,” Nature 557(7705), 400–403 (2018). [CrossRef]  

23. X.-B. Wang, Z.-W. Yu, and X.-L. Hu, “Twin-field quantum key distribution with large misalignment error,” Phys. Rev. A 98(6), 062323 (2018). [CrossRef]  

24. X. Ma, P. Zeng, and H. Zhou, “Phase-matching quantum key distribution,” Phys. Rev. X 8(3), 031043 (2018). [CrossRef]  

25. C. Cui, Z.-Q. Yin, R. Wang, et al., “Twin-field quantum key distribution without phase postselection,” Phys. Rev. Appl. 11(3), 034053 (2019). [CrossRef]  

26. M. Curty, K. Azuma, and H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol,” npj Quantum Inf. 5(1), 64 (2019). [CrossRef]  

27. M. Minder, M. Pittaluga, G. L. Roberts, et al., “Experimental quantum key distribution beyond the repeaterless secret key capacity,” Nat. Photonics 13(5), 334–338 (2019). [CrossRef]  

28. S. Wang, D.-Y. He, Z.-Q. Yin, et al., “Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system,” Phys. Rev. X 9(2), 021046 (2019). [CrossRef]  

29. Y. Liu, Z.-W. Yu, W. Zhang, et al., “Experimental twin-field quantum key distribution through sending or not sending,” Phys. Rev. Lett. 123(10), 100505 (2019). [CrossRef]  

30. X. Zhong, J. Hu, M. Curty, et al., “Proof-of-principle experimental demonstration of twin-field type quantum key distribution,” Phys. Rev. Lett. 123(10), 100506 (2019). [CrossRef]  

31. X.-T. Fang, P. Zeng, H. Liu, et al., “Implementation of quantum key distribution surpassing the linear rate-transmittance bound,” Nat. Photonics 14(7), 422–425 (2020). [CrossRef]  

32. J.-P. Chen, C. Zhang, Y. Liu, et al., “Sending-or-not-sending with independent lasers: Secure twin-field quantum key distribution over 509 km,” Phys. Rev. Lett. 124(7), 070501 (2020). [CrossRef]  

33. J.-P. Chen, C. Zhang, Y. Liu, et al., “Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas,” Nat. Photonics 15(8), 570–575 (2021). [CrossRef]  

34. H. Liu, C. Jiang, H.-T. Zhu, et al., “Field test of twin-field quantum key distribution through sending-or-not-sending over 428 km,” Phys. Rev. Lett. 126(25), 250502 (2021). [CrossRef]  

35. M. Pittaluga, M. Minder, M. Lucamarini, et al., “600-km repeater-like quantum communications with dual-band stabilization,” Nat. Photonics 15(7), 530–535 (2021). [CrossRef]  

36. S. Wang, Z. Yin, D.-Y. He, et al., “Twin-field quantum key distribution over 830-km fibre,” Nat. Photonics 16(2), 154–161 (2022). [CrossRef]  

37. Y. Liu, W.-J. Zhang, C. Jiang, et al., “Experimental twin-field quantum key distribution over 1000 km fiber distance,” Phys. Rev. Lett. 130(21), 210801 (2023). [CrossRef]  

38. W. Li, L. Zhang, Y. Lu, et al., “Twin-field quantum key distribution without phase locking,” Phys. Rev. Lett. 130(25), 250802 (2023). [CrossRef]  

39. J. Liu, Q. Jiang, H. Ding, et al., “Highly efficient twin-field quantum key distribution with neural networks,” Sci. China Inf. Sci. 66(8), 189402 (2023). [CrossRef]  

40. P. Zeng, H. Zhou, W. Wu, et al., “Mode-pairing quantum key distribution,” Nat. Commun. 13(1), 3903 (2022). [CrossRef]  

41. Y.-M. Xie, Y.-S. Lu, C.-X. Weng, et al., “Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference,” PRX Quantum 3(2), 020315 (2022). [CrossRef]  

42. H.-T. Zhu, Y. Huang, H. Liu, et al., “Experimental mode-pairing measurement-device-independent quantum key distribution without global phase locking,” Phys. Rev. Lett. 130(3), 030801 (2023). [CrossRef]  

43. L. Zhou, J. Lin, Y.-M. Xie, et al., “Experimental quantum communication overcomes the rate-loss limit without global phase tracking,” Phys. Rev. Lett. 130(25), 250801 (2023). [CrossRef]  

44. Y.-M. Xie, J.-L. Bai, Y.-S. Lu, et al., “Advantages of asynchronous measurement-device-independent quantum key distribution in intercity networks,” Phys. Rev. Appl. 19(5), 054070 (2023). [CrossRef]  

45. X. Liu, D. Luo, Z. Zhang, et al., “Mode-pairing quantum key distribution with advantage distillation,” Phys. Rev. A 107(6), 062613 (2023). [CrossRef]  

46. J.-L. Bai, Y.-M. Xie, Y. Fu, et al., “Asynchronous measurement-device-independent quantum key distribution with hybrid source,” Opt. Lett. 48(13), 3551–3554 (2023). [CrossRef]  

47. Z.-H. Wang, Z.-Q. Yin, S. Wang, et al., “Tight finite-key analysis for mode-pairing quantum key distribution,” arXiv, arXiv:2302.13481, (2023). [CrossRef]  

48. Y.-F. Lu, Y. Wang, H.-W. Li, et al., “Simple security proof of mode-pairing quantum key distribution,” arXiv, arXiv:2304.09621, (2023). [CrossRef]  

49. K. ichiro Yoshino, T. Ochi, M. Fujiwara, et al., “Maintenance-free operation of wdm quantum key distribution system through a field fiber over 30 days,” Opt. Express 21(25), 31395–31401 (2013). [CrossRef]  

50. F. Beutel, F. Brückerhoff-Plückelmann, H. Gehring, et al., “Fully integrated four-channel wavelength-division multiplexed qkd receiver,” Optica 9(10), 1121–1130 (2022). [CrossRef]  

51. L. Zhou, J. Lin, Y. Jing, et al., “Twin-field quantum key distribution without optical frequency dissemination,” Nat. Commun. 14(1), 928 (2023). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (6)

Fig. 1.
Fig. 1. (a)The schematic diagram of MP-QKD. (b) WDM MP-QKD with m channels. $D_m$ denotes the $m$-th detection component, which possesses an identical setup to $D_1$. (c) Schematic representation of the pairing strategy between different wavelength.
Fig. 2.
Fig. 2. Key rate of WDM MP-QKD with M=1, 2, 3, 4, 5 and $l =1000$. PLOB bound is also plotted.
Fig. 3.
Fig. 3. Ratio of WDM MPQKD’s key rate with respect to the original scheme.
Fig. 4.
Fig. 4. Comparison of key rates among different $M$ and $l$. Left axis represents absolute key rate and PLOB bound is also plotted; right axis represents the relative key rate value with respect to $M=1$ and $l=1000$.
Fig. 5.
Fig. 5. Key rate of three-intensity decoy-state WDM MP-QKD with statistical fluctuation considered. Parameters taking from Ref. [47] are listed below. Total pulse number $N=10^{12}$; dark count rate $p_d=10^{-8}$; detection efficiency $\eta _d=70{\% }$; fiber loss coefficient $\alpha =0.2 dB/km$; error correction efficiency $f=1.1$; secure coefficient $\varepsilon =4.8\times 10^{-23}$; Z-basis misalignment error $e_d^Z=0.5{\% }$; X-basis misalignment error $e_d^X=5{\% }$. Key rate for $l =1000$ with $M$=1, 2, 3, 4, 5 are displayed, and also PLOB bound is presented for comparison.
Fig. 6.
Fig. 6. Ratio of $r_p$ (M=2, 3,4 and 5)with respect to M=1 versus $p$

Tables (1)

Tables Icon

Table 1. Simulation parameters. η d and p d are the efficiency and dark counting rate per pulse of the detectors. α is the standard fiber loss coefficient. f is the error correction efficiency.

Equations (18)

Equations on this page are rendered with MathJax. Learn more.

R = r p r s { q 11 [ 1 H ( e 11 X X ) ] f H ( E u u Z Z ) } ,
p := Pr ( C k , m = 1 ) = z k , m P ( C k , m = 1 | z k , m ) Pr ( z k , m ) = 1 4 z k , m P ( C k , m = 1 | z k , m ) .
P ( C k , m = 1 | z k , m ) = 1 ( 1 2 p d ) exp [ η s u ( z k , m a + z k , m b ) ] ,
Pr ( C k , m = 1 | n k , m ) = 1 ( 1 2 p d ) ( 1 η s ) ( n A k , m + n B k , m ) .
r s = 1 16 1 p 2 z F k z R k = 11 P r ( C F k , m 1 = 1 | z F k , m 1 ) P r ( C R k , m 2 = 1 | z R k , m 2 ) ,
E u u Z Z = 1 16 1 r s p 2 [ z F k , z R k ] { [ 00 , 11 ] , [ 11 , 00 ] } P r ( C F k , m 1 = 1 | z F k , m 1 ) P r ( C R k , m 2 = 1 | z R k , m 2 ) .
q 11 = 1 16 P u ( 1 ) 2 r s p 2 z F k z R k = 11 P r ( C F k , m 1 = 1 | n A k , m = z F k , m 1 ) P r ( C R k , m 2 = 1 | n B k , m = z R k , m 2 ) ,
Y 11 = ( 1 p d ) 2 [ η a η b 2 + ( 2 η a + 2 η b 3 η a η b ) p d + 4 ( 1 η a ) ( 1 η b ) p d 2 ] ,
e 11 X X = e 0 Y 11 ( e 0 e d ) ( 1 p d 2 ) η a η b 2 Y 11 ,
r p = M p 1 + 1 1 ( 1 p ) M l .
r p = n t o t N ,
q = 1 ( 1 p ) l .
n t o t = N p 1 + 1 / q .
r p = p 1 + 1 / q = p 1 + 1 1 ( 1 p ) l .
n t o t = M N p 1 + 1 1 ( 1 p ) M l .
r p = M p 1 + 1 1 ( 1 p ) M l .
r p = M p 1 + 1 1 ( 1 p ) M l M η s u 1 + 1 1 ( 1 η s u ) M l M η s u 2 .
r p M η s u 1 + 1 1 ( 1 η s u ) M l M η s u 1 + 1 1 ( 1 η s u M l ) = M 2 l η s 2 u 2 1 + η s u M l M 2 l η s 2 u 2 ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.