Practical decoy-state method for twin-field quantum key distribution

Twin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type...

Full description

Bibliographic Details
Main Authors: Federico Grasselli, Marcos Curty
Format: Article
Language:English
Published: IOP Publishing 2019-01-01
Series:New Journal of Physics
Subjects:
Online Access:https://doi.org/10.1088/1367-2630/ab2b00
_version_ 1827872702867701760
author Federico Grasselli
Marcos Curty
author_facet Federico Grasselli
Marcos Curty
author_sort Federico Grasselli
collection DOAJ
description Twin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type protocols have confirmed that the secret key rate of these schemes scales essentially as the square root of the transmittance of the channel. Here, we focus on the TF-QKD protocol introduced by Curty et al , whose secret key rate is nearly an order of magnitude higher than previous solutions. Its security relies on the estimation of the detection probabilities associated to various photon-number states through the decoy-state method. We derive analytical bounds on these quantities assuming that each party uses either two, three or four decoy intensity settings, and we investigate the protocol’s performance in this scenario. Our simulations show that two decoy intensity settings are enough to beat the point-to-point private capacity of the channel, and that the use of four decoys is already basically optimal, in the sense that it almost reproduces the ideal scenario of infinite decoys. We also observe that the protocol seems to be quite robust against intensity fluctuations of the optical pulses prepared by the parties.
first_indexed 2024-03-12T16:27:36Z
format Article
id doaj.art-8a0b92b32e904d83a54ec48642fd5ab4
institution Directory Open Access Journal
issn 1367-2630
language English
last_indexed 2024-03-12T16:27:36Z
publishDate 2019-01-01
publisher IOP Publishing
record_format Article
series New Journal of Physics
spelling doaj.art-8a0b92b32e904d83a54ec48642fd5ab42023-08-08T15:39:09ZengIOP PublishingNew Journal of Physics1367-26302019-01-0121707300110.1088/1367-2630/ab2b00Practical decoy-state method for twin-field quantum key distributionFederico Grasselli0https://orcid.org/0000-0003-2966-7813Marcos Curty1Institut für Theoretische Physik III, Heinrich-Heine-Universität Düsseldorf , Universitätsstraße 1, D-40225 Düsseldorf, GermanyEscuela de Ingeniería de Telecomunicación, Dept. of Signal Theory and Communications, University of Vigo , E-36310 Vigo, SpainTwin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type protocols have confirmed that the secret key rate of these schemes scales essentially as the square root of the transmittance of the channel. Here, we focus on the TF-QKD protocol introduced by Curty et al , whose secret key rate is nearly an order of magnitude higher than previous solutions. Its security relies on the estimation of the detection probabilities associated to various photon-number states through the decoy-state method. We derive analytical bounds on these quantities assuming that each party uses either two, three or four decoy intensity settings, and we investigate the protocol’s performance in this scenario. Our simulations show that two decoy intensity settings are enough to beat the point-to-point private capacity of the channel, and that the use of four decoys is already basically optimal, in the sense that it almost reproduces the ideal scenario of infinite decoys. We also observe that the protocol seems to be quite robust against intensity fluctuations of the optical pulses prepared by the parties.https://doi.org/10.1088/1367-2630/ab2b00twin-field quantum key distributiondecoy-state methodsingle-photon interferencemeasurement-device-independent quantum key distribution (MDI-QKD)analytical bounds
spellingShingle Federico Grasselli
Marcos Curty
Practical decoy-state method for twin-field quantum key distribution
New Journal of Physics
twin-field quantum key distribution
decoy-state method
single-photon interference
measurement-device-independent quantum key distribution (MDI-QKD)
analytical bounds
title Practical decoy-state method for twin-field quantum key distribution
title_full Practical decoy-state method for twin-field quantum key distribution
title_fullStr Practical decoy-state method for twin-field quantum key distribution
title_full_unstemmed Practical decoy-state method for twin-field quantum key distribution
title_short Practical decoy-state method for twin-field quantum key distribution
title_sort practical decoy state method for twin field quantum key distribution
topic twin-field quantum key distribution
decoy-state method
single-photon interference
measurement-device-independent quantum key distribution (MDI-QKD)
analytical bounds
url https://doi.org/10.1088/1367-2630/ab2b00
work_keys_str_mv AT federicograsselli practicaldecoystatemethodfortwinfieldquantumkeydistribution
AT marcoscurty practicaldecoystatemethodfortwinfieldquantumkeydistribution