Practical decoy-state method for twin-field quantum key distribution
Twin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IOP Publishing
2019-01-01
|
Series: | New Journal of Physics |
Subjects: | |
Online Access: | https://doi.org/10.1088/1367-2630/ab2b00 |
_version_ | 1827872702867701760 |
---|---|
author | Federico Grasselli Marcos Curty |
author_facet | Federico Grasselli Marcos Curty |
author_sort | Federico Grasselli |
collection | DOAJ |
description | Twin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type protocols have confirmed that the secret key rate of these schemes scales essentially as the square root of the transmittance of the channel. Here, we focus on the TF-QKD protocol introduced by Curty et al , whose secret key rate is nearly an order of magnitude higher than previous solutions. Its security relies on the estimation of the detection probabilities associated to various photon-number states through the decoy-state method. We derive analytical bounds on these quantities assuming that each party uses either two, three or four decoy intensity settings, and we investigate the protocol’s performance in this scenario. Our simulations show that two decoy intensity settings are enough to beat the point-to-point private capacity of the channel, and that the use of four decoys is already basically optimal, in the sense that it almost reproduces the ideal scenario of infinite decoys. We also observe that the protocol seems to be quite robust against intensity fluctuations of the optical pulses prepared by the parties. |
first_indexed | 2024-03-12T16:27:36Z |
format | Article |
id | doaj.art-8a0b92b32e904d83a54ec48642fd5ab4 |
institution | Directory Open Access Journal |
issn | 1367-2630 |
language | English |
last_indexed | 2024-03-12T16:27:36Z |
publishDate | 2019-01-01 |
publisher | IOP Publishing |
record_format | Article |
series | New Journal of Physics |
spelling | doaj.art-8a0b92b32e904d83a54ec48642fd5ab42023-08-08T15:39:09ZengIOP PublishingNew Journal of Physics1367-26302019-01-0121707300110.1088/1367-2630/ab2b00Practical decoy-state method for twin-field quantum key distributionFederico Grasselli0https://orcid.org/0000-0003-2966-7813Marcos Curty1Institut für Theoretische Physik III, Heinrich-Heine-Universität Düsseldorf , Universitätsstraße 1, D-40225 Düsseldorf, GermanyEscuela de Ingeniería de Telecomunicación, Dept. of Signal Theory and Communications, University of Vigo , E-36310 Vigo, SpainTwin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit is to beat the point-to-point private capacity of a lossy quantum channel, thanks to performing single-photon interference in an untrusted node. Indeed, recent security proofs of various TF-QKD type protocols have confirmed that the secret key rate of these schemes scales essentially as the square root of the transmittance of the channel. Here, we focus on the TF-QKD protocol introduced by Curty et al , whose secret key rate is nearly an order of magnitude higher than previous solutions. Its security relies on the estimation of the detection probabilities associated to various photon-number states through the decoy-state method. We derive analytical bounds on these quantities assuming that each party uses either two, three or four decoy intensity settings, and we investigate the protocol’s performance in this scenario. Our simulations show that two decoy intensity settings are enough to beat the point-to-point private capacity of the channel, and that the use of four decoys is already basically optimal, in the sense that it almost reproduces the ideal scenario of infinite decoys. We also observe that the protocol seems to be quite robust against intensity fluctuations of the optical pulses prepared by the parties.https://doi.org/10.1088/1367-2630/ab2b00twin-field quantum key distributiondecoy-state methodsingle-photon interferencemeasurement-device-independent quantum key distribution (MDI-QKD)analytical bounds |
spellingShingle | Federico Grasselli Marcos Curty Practical decoy-state method for twin-field quantum key distribution New Journal of Physics twin-field quantum key distribution decoy-state method single-photon interference measurement-device-independent quantum key distribution (MDI-QKD) analytical bounds |
title | Practical decoy-state method for twin-field quantum key distribution |
title_full | Practical decoy-state method for twin-field quantum key distribution |
title_fullStr | Practical decoy-state method for twin-field quantum key distribution |
title_full_unstemmed | Practical decoy-state method for twin-field quantum key distribution |
title_short | Practical decoy-state method for twin-field quantum key distribution |
title_sort | practical decoy state method for twin field quantum key distribution |
topic | twin-field quantum key distribution decoy-state method single-photon interference measurement-device-independent quantum key distribution (MDI-QKD) analytical bounds |
url | https://doi.org/10.1088/1367-2630/ab2b00 |
work_keys_str_mv | AT federicograsselli practicaldecoystatemethodfortwinfieldquantumkeydistribution AT marcoscurty practicaldecoystatemethodfortwinfieldquantumkeydistribution |