This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

]These authors contribute equally to this work. ]These authors contribute equally to this work.

Twin-field quantum key distribution with passive-decoy state

Jun Teng [    Feng-Yu Lu [    Zhen-Qiang Yin yinzq@ustc.edu.cn    Guan-Jie Fan-Yuan    Rong Wang    Shuang Wang    Wei Chen CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, P. R. China Synergetic Innovation Center of Quantum Information &\& Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, P. R. China State Key Laboratory of Cryptography, P. O. Box 5159, Beijing 100878, P. R. China    Wei Huang    Bing-Jie Xu Science and Technology on Communication Security Laboratory, Institute of Southwestern Communication, Chengdu, Sichuan 610041, China    Guang-Can Guo    Zheng-Fu Han CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, P. R. China Synergetic Innovation Center of Quantum Information &\& Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, P. R. China State Key Laboratory of Cryptography, P. O. Box 5159, Beijing 100878, P. R. China
Abstract

Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater. The security proof of these protocols are based on decoy-state method, which is usually performed by actively modulating a variable optical attenuator together with a random number generator in practical experiments, however, active-decoy schemes like this may lead to side channel and could open a security loophole. To enhance the source security of TF-QKD, in this paper, we propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method. And we present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. This shows our work is meaningful in practice.

pacs:
Valid PACS appear here
preprint: APS/123-QED

I INTRODUCTION

With the help of quantum key distribution (QKD), distant agents (Alice and Bob) are able to share secret keys with information-theoretic security which is guaranteed by quantum physics Bennett and Brassard (1984); Ekert (1991); Lo and Chau (1999). QKD has been developed rapidly both in theory and experiment over the decades Inoue et al. (2002); Gobby et al. (2004); Zhao et al. (2006); Lo et al. (2012); Wang et al. (2015); Zhou et al. (2016); Yin et al. (2016); Liao et al. (2017); Wang et al. (2020). However, a fundamental limit is that the secret key rate (SKR) is scaled by the transmittance η\eta Takeoka et al. (2014); Pirandola et al. (2017); Wilde et al. (2017), which is finally revealed as the linear key rate bound: Rlog2(1η)R\leq-\rm log_{2}(1-\eta) Pirandola et al. (2017). Fortunately, the Twin-Field quantum key distribution (TF-QKD) protocol made a difference Lucamarini et al. (2018), in TF-QKD protocol, pairs of phase-randomized optical pulses are generated at Alice and Bob and then combined at a central measuring station Charlie, single-photon interference is produced at Charlie, this lets TF-QKD gain the square-root of the channel transmittance, which is the same as it with a quantum repeater. The Ref. Tamaki et al. (2018) enhanced the security proof of that given in Ref. Lucamarini et al. (2018), it proposed a novel way to use decoy states by switching between decoy mode and code mode, by doing this, it confirmed the scaling properties of the original scheme and overcame the linear key bound at long distances.

Inspired by the original TF-QKD, many variants are proposed including Phase-matching protocol Ma et al. (2018), Sending-or-not-sending protocol Wang et al. (2018). And Ref. Cui et al. (2019); Curty et al. (2019); Lin and Lütkenhaus (2018) removed active phase randomization and phase postselection in code mode, this proved to reach a higher final key rate. Yet, the security proof of all these protocols are based on decoy-state method Hwang (2003); Lo et al. (2005); Wang (2005), the essential idea behind decoy-state method in TF-QKD is simple, the sender (Alice and Bob) varies the mean photon number of each pulse she transmits to the central station (Charlie), users can obtain a better estimation of the behavior of the quantum channel from the measurement results corresponding to different intensity settings, this helps to enhance the achievable SKR and communicating distance. In practical experiments, decoy-state method is usually performed by actively modulating a variable optical attenuator together with a random number generator Schmitt-Manderbach et al. (2007). However, these approaches may lead to side channel and can even break the security of the system Jiang et al. (2012), if the VOA, which changes the intensity of Alice’s (Bob’s) pulses, is not properly designed, it may happen that some physical parameters (for example frequency spectrum) of the pulses emitted by the sender depend on the particular setting selected, which could open a security loophole in the active schemes. Fortunately, passive-decoy protocol Mauerer and Silberhorn (2007); Adachi et al. (2007); Ma and Lo (2008) is able to remove certain side channel caused by actively modulating intensity of the source. Specifically, in our proposed scheme, this kind of side channel can be removed provided that Alice and Bob have perfect local detectors and there is no Trojan horse attack. Even though perfect detectors are not available in practical experiments, the side channel may still be significantly reduced when high-detection-efficiency local detectors are equipped. The original passive-decoy protocol utilizes a parametric downconversion source in conjunction with a photon number resolving detector to substitute an idealized single-photon source, the passive-decoy state selection can be accomplished without the need for any active optical elements. Besides, the Refs.Curty et al. (2009, 2010); Zhang et al. (2018) implemented passive-decoy method by using weak coherent pulses (WCPs), in which Alice and Bob treat click and no click of the detectors separately and distill a secret key from both of them.

Refer to caption
(a) System of passive-decoy TF-QKD scheme
Refer to caption
(b) Two-intensity setup
Refer to caption
(c) Four-intensity setup
Figure 1: (a) Schematic diagram of the passive-decoy TF-QKD: PDS, passive-decoy setup; BS, beam splitter; PM, phase modulator; IM, intensity modulator. Alice and Bob have the same setup, BS1\rm BS_{1} splits the pulse into path s and path r, when code mode is selected, IM blocks the pulse on path s. when decoy mode is selected, PM1\rm PM_{1} and PM2\rm PM_{2} randomize the phase of the pulses on each path and leave the IM unmodulated. (b) Two-intensity setup of passive-decoy TF-QKD scheme. D1\rm D_{1}, single-photon detector. (c) Four-intensity setup of passive-decoy TF-QKD scheme.

To enhance the source security of TF-QKD, in this paper we propose passive-decoy TF-QKD, in our scheme, different decoy states are generated passively according to the mode of photon detectors. Our passive scheme can eliminate the side channel generated by active modulation of source intensities, simultaneously, it provides a performance as good as the active decoy method when the setup with four-intensity settings is applied. In Sec.II, we introduce our scheme and the setups. In Sec.III, we give the method to calculate SKR with two-intensity decoy setups and four-intensity setups. The conclusion and a discussion are given in Sec.IV.

II PASSIVE-DECOY TF-QKD PROTOCOL

The system of our passive-decoy TF-QKD scheme is given in Fig.1(a). The setups on Alice have no difference from that on Bob, thus we take Alice as an example. Weak coherent pulse (WCP) is generated at Alice side, BS1\rm BS_{1} splits the pulses into two paths (path r and path s), the transmittance of BS1\rm BS_{1} is t1t_{1}. Path r and path s are the same in length so the pulses at these two paths will interfere in the passive-decoy setup (PDS). After interference, the outcome mode a1a_{1} is sent to untrusted party Charlie. The PDS is the setup we designed to implement our passive-decoy scheme, it mainly consists of BSs and photon detectors, specifically, Fig.1(b) and Fig.1(c) are two PDSs with two-intensity settings and four-intensity settings. the specific steps of our passive-decoy TF-QKD scheme can be described as follows Cui et al. (2019):

step 1. Alice and Bob randomly choose code mode or decoy mode in each trial.

step 2.a. When Alice (Bob) chooses code mode, The intensity modulator (IM) blocks the pulses on path s, here we choose Lithium Niobate-based Mach-Zehnder (LNMZ) intensity modulator for its advantages of low driving voltage, high bandwidth, adjustable chirp. The phase modular (PM1\rm PM_{1}) on path r modulates the signal phase according to the random classical key bit 0 or 1. By doing these, Alice (Bob) prepares a weak coherent state |±μA|\pm\sqrt{\mu}\rangle_{A} (|±μB|\pm\sqrt{\mu}\rangle_{B}) mentioned in Ref. Cui et al. (2019).

step 2.b. When Alice (Bob) chooses decoy mode, PM1\rm PM_{1} and PM2\rm PM_{2} randomize the phase of the pulses on each path and leave the IM on path s unmodulated, the randomized phase will never be publicly announced. By doing these, mixed state in Fock space is generated on path r and path s, and the photon distribution of the mixed state is depending on the mode of photon detectors in PDS.

step 3. For each trial, Charlie publicly announces which detector (L or R) clicks or is a no click event.

step 4. After repeating steps 1 to 3 for sufficient times, Alice and Bob publicly announce which trials are code modes and which trials are decoy modes. For the trials in which Alice and Bob both select the code mode and Charlie announces a click event, the raw key bits are generated. For the trials in which Alice and Bob both select decoy mode, Alice and Bob can estimate the yield YnmY_{nm}, YnmY_{nm} is the probability of Charlie announcing click event provided Alice emits an nn-photon state and Bob emits an mm-photon state in a decoy mode.

In step 2, the IM we choose is LNMZ intensity modulator. Since the only purpose of the IM is blocking the pulses on path s in code mode with no information encoded, thus it won’t lead to side channel attacks. On the other hand, LNMZ intensity modulator has high bandwidth (usually GHz), making it suitable for systems with high repetition rate like ours. Besides, the extinction ratio of LNMZ intensity modulator is usually more than 25 dB, which means the error rate caused by the IM could be neglected compared with the code rate of our system (see detailed derivation in appendix A).

In the scheme, the secret key rate per trial in a code mode is given as follow

R=Qμ[1fh(erμ,1erμ)IAEu].R=Q_{\mu}[1-fh(er_{\mu},1-er_{\mu})-I^{u}_{AE}]. (1)

Here h(x,y)=xlog2xylog2y+(x+y)log2(x+y)h(x,y)=-xlog_{2}x-ylog_{2}y+(x+y)log_{2}(x+y), QμQ_{\mu} is the counting rate in code mode, erμer_{\mu} is the error rate of raw key bits, QμQ_{\mu} and erμer_{\mu} can be directly observed experimentally. IAEuI^{u}_{AE} is the upper bound of the information leakage, and IAEuI^{u}_{AE} can be solved by the following optimization problem

IAEu=maxh(x00Qμ,x10Qμ)+h(x11Qμ,x01Qμ),I^{u}_{AE}={\rm max}\,h(\frac{x_{00}}{Q_{\mu}},\frac{x_{10}}{Q_{\mu}})+h(\frac{x_{11}}{Q_{\mu}},\frac{x_{01}}{Q_{\mu}}),
{0x00|n,m=0P2nP2mY2n,2m|2,0x10|n,m=0P2n+1P2mY2n+1,2m|2,0x11|n,m=0P2n+1P2m+1Y2n+1,2m+1|2,0x01|n,m=0P2nP2m+1Y2n,2m+1|2,x00+x10+x11+x01=Qμ,\begin{cases}0\leq x_{00}\leq|\sum_{n,m=0}\sqrt{P_{2n}P_{2m}Y_{2n,2m}}|^{2},\\ 0\leq x_{10}\leq|\sum_{n,m=0}\sqrt{P_{2n+1}P_{2m}Y_{2n+1,2m}}|^{2},\\ 0\leq x_{11}\leq|\sum_{n,m=0}\sqrt{P_{2n+1}P_{2m+1}Y_{2n+1,2m+1}}|^{2},\\ 0\leq x_{01}\leq|\sum_{n,m=0}\sqrt{P_{2n}P_{2m+1}Y_{2n,2m+1}}|^{2},\\ x_{00}+x_{10}+x_{11}+x_{01}=Q_{\mu},\end{cases} (2)

in which Pk=eμμk/k!P_{k}=e^{-\mu}\mu^{k}/k! is Poissonian distribution. PnP_{n} (Pm)(P_{m}) is determined by the input parameter μ\mu, which is chosen by the parties prior to initiating the experiment.

III Calculation of the key rates

To get the secret key rate R in code mode, we need to know the information leakage IAEuI^{u}_{AE} in Eq.(2). For that Pn,PmP_{n},P_{m} and QμQ_{\mu} in Eq.(2) can be observed in practical experiments, thus it is necessary to estimate Yn,mY_{n,m}. In our scheme, Yn,mY_{n,m} can be bounded with the passive-decoy state method. The gain of the decoy states satisfies

Qd=n,mPra(n)Prb(m)Yn,m.Q_{d}=\sum_{n,m}Pr_{a}(n)Pr_{b}(m)Y_{n,m}. (3)

Here QdQ_{d} is the counting rate in decoy mode, Pra(n)Pr_{a}(n) (Prb(m)Pr_{b}(m)) is the nn-photon (mm-photon) distribution of the state on Alice (Bob) in decoy mode, which depends on the mode of photon detectors on PSD in our passive-decoy scheme. In ideal case with infinite decoy states, we can list infinite linear equations like Eq.(3) to calculate Yn,mY_{n,m} accurately. On the other hand, finite decoy states can also help to estimate the lower bound for yields and it is more feasible in practical system.

In our scheme, when the two-intensity setup is implemented in PDS as shown in Fig.1(b), pulses on path r and path s will interfere at BS2\rm BS_{2} with two outcomes a1a_{1} and a2a_{2}, a1a_{1} is sent to Charlie and a2a_{2} is detected by D1\rm D_{1}. Denote the detect efficiency of D1\rm D_{1} is η\eta, the darkcount rate is ηd\eta_{d}, we can get

{Pu(n)=(1η)n(1ηd),Pc(n)=1Pu(n),\begin{cases}P_{u}(n)={(1-\eta)}^{n}(1-\eta_{d}),\\ P_{c}(n)=1-P_{u}(n),\end{cases} (4)

in which Pc(n)P_{c}(n) and Pu(n)P_{u}(n) are probabilities that detector click or not when nn photons come. With these two probabilities, we have two different conditional photon number distributions according to the mode of D1\rm D_{1} (see the details in the appendix B)

Pr1(k)=q=0P(q,k|μ1,μ2)Pc(q)q,k=0P(q,k|μ1,μ2)Pc(q),Pr^{1}(k)=\frac{\sum\limits_{q=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{c}(q)}{\sum\limits_{q,k=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{c}(q)}, (5)

and

Pr0(k)=q=0P(q,k|μ1,μ2)Pu(q)q,k=0P(q,k|μ1,μ2)Pu(q).Pr^{0}(k)=\frac{\sum\limits_{q=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{u}(q)}{\sum\limits_{q,k=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{u}(q)}. (6)

Here Pr1(k)Pr^{1}(k) is the probability of finding kk photons in a1a_{1} when D1\rm D_{1} produces a click, Pr0(k)Pr^{0}(k) is the probability of that when D1\rm D_{1} doesn’t click, P(q,k|μ1,μ2)P(q,k|\mu_{1},\mu_{2}) is the conditional probability of finding kk photons in a1a_{1} and qq photons in a2a_{2} when the mean photon numbers of pulses in path s and path r are μ1\mu_{1} and μ2\mu_{2}, P(q,k|μ1,μ2)P(q,k|\mu_{1},\mu_{2}) is derived in appendix. Then substituting Pr1(k)Pr^{1}(k) and Pr0(k)Pr^{0}(k) into Eq.(3), we can have:

{Qd0,0=n,mPra0(n)Prb0(m)Yn,m,Qd0,1=n,mPra0(n)Prb1(m)Yn,m,Qd1,0=n,mPra1(n)Prb0(m)Yn,m,Qd1,1=n,mPra1(n)Prb1(m)Yn,m,\begin{cases}Q_{d}^{0,0}=\sum_{n,m}Pr_{a}^{0}(n)Pr_{b}^{0}(m)Y_{n,m},\\ Q_{d}^{0,1}=\sum_{n,m}Pr_{a}^{0}(n)Pr_{b}^{1}(m)Y_{n,m},\\ Q_{d}^{1,0}=\sum_{n,m}Pr_{a}^{1}(n)Pr_{b}^{0}(m)Y_{n,m},\\ Q_{d}^{1,1}=\sum_{n,m}Pr_{a}^{1}(n)Pr_{b}^{1}(m)Y_{n,m},\\ \end{cases} (7)

in which Qd0,0Q_{d}^{0,0}, Qd0,1Q_{d}^{0,1}, Qd1,0Q_{d}^{1,0} and Qd1,1Q_{d}^{1,1} are counting rates on different detector modes in decoy mode . For example, in Eq.(7) Qd0,1Q_{d}^{0,1} is the counting rate when the detector on Alice doesn’t click and the detector on Bob produces a click, Pra0(n)Pr^{0}_{a}(n) and Prb0(n)Pr^{0}_{b}(n) are defined as same as Pr0(n)Pr^{0}{(n)} while the subscripts aa and bb denote the distributions on Alice’s and Bob’s sides respectively.

In practice, after observing Qd0,0Q_{d}^{0,0}, Qd0,1Q_{d}^{0,1}, Qd1,0Q_{d}^{1,0} and Qd1,1Q_{d}^{1,1}, we can give approximations to Y0,0Y_{0,0}, Y0,1Y_{0,1}, Y1,0Y_{1,0}, Y2,0Y_{2,0}, Y0,2Y_{0,2} and Y2Y_{2} by linear programming using Eq.(7), where Y2Y_{2} denots the yields that are from decoy trials in which Alice and Bob share two photons in total, which means n+m=2n+m=2. Then following the same technique in Sec.V of Ref. Cui et al. (2019), we substitute these yields into Eq.(2) to bound the information leakage IAEuI^{u}_{AE} and calculate the final key rate RR in Eq.(1).

After presenting the scheme of generating two-intensity decoy state passively, we decide to go further, thus we add BS3\rm BS_{3} and two photon detectors at the end, as shown in Fig.1(c). There are four different modes with two photon detectors in the setup, thus we can get four different conditional photon distributions according to the modes of detector D1\rm D_{1} and D2\rm D_{2}, which means four-intensity decoy states (see the details in the appendix B)

Pr00(k)=j,l=0P(k,j,l|μ1,μ2)Pu(j)Pu(l)k,j,l=0P(k,j,l|μ1,μ2)Pu(j)Pu(l),Pr^{00}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{u}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{u}(l)}, (8)
Pr10(k)=j,l=0P(k,j,l|μ1,μ2)Pc(j)Pu(l)k,j,l=0P(k,j,l|μ1,μ2)Pc(j)Pu(l),Pr^{10}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(j)P_{u}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(j)P_{u}(l)}, (9)
Pr01(k)=j,l=0P(k,j,l|μ1,μ2)Pu(j)Pc(l)k,j,l=0P(k,j,l|μ1,μ2)Pu(j)Pc(l),Pr^{01}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{c}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{c}(l)}, (10)
Pr11(k)=j,l=0P(k,j,l|μ1,μ2)Pc(j)Pc(l)k,j,l=0P(k,j,l|μ1,μ2)Pc(j)Pc(l),Pr^{11}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(j)P_{c}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(j)P_{c}(l)}, (11)

in which Pr00(k)Pr^{00}(k), Pr10(k)Pr^{10}(k), Pr01(k)Pr^{01}(k) and Pr11(k)Pr^{11}(k) are the photon distributions in a1a_{1} given that D1\rm D_{1} and D2\rm D_{2} are in different modes. For example, Pr10(k)Pr^{10}(k) is the probability of finding kk photons in a1\rm a_{1} when D1\rm D_{1} produces a click and D2\rm D_{2} doesn’t. Note that when the transmittance of BS3\rm BS_{3} is t3=0.5t_{3}=0.5, we will get Pr10(k)=Pr01(k)Pr^{10}(k)=Pr^{01}(k), which means Pr10(k)Pr^{10}(k) and Pr01(k)Pr^{01}(k) are not independent. To get more useful constraints in linear program, we let 0.5<t3<10.5<t_{3}<1. For readability we write Pr00Pr^{00}, Pr10Pr^{10}, Pr01Pr^{01}, Pr11Pr^{11} as Pr1Pr^{1}, Pr2Pr^{2}, Pr3Pr^{3}, Pr4Pr^{4}, and define the following gains: Qd4,4Q_{d}^{4,4}, Qd1,4Q_{d}^{1,4}, Qd2,4Q_{d}^{2,4}, Qd3,4Q_{d}^{3,4}, Qd4,1Q_{d}^{4,1}, Qd4,2Q_{d}^{4,2}, Qd4,3Q_{d}^{4,3}, Qd1,1Q_{d}^{1,1}, Qd2,2Q_{d}^{2,2} and Qd3,3Q_{d}^{3,3}. For example, Qd1,4Q_{d}^{1,4} is the counting rate when both D1\rm D_{1} and D2\rm D_{2} on Alice don’t click and the both D1\rm D_{1} and D2\rm D_{2} on Bob produce click, then like what we do in two-intensity cases, after observing these gains, we can give approximations to Y0,0Y_{0,0}, Y0,1Y_{0,1}, Y1,0Y_{1,0}, Y2,0Y_{2,0}, Y0,2Y_{0,2} and Y2Y_{2} by linear programming, and we can get the final key rate RR using Eq.(1,2). This’s the passive scheme of generating four-intensity decoy state with two BS and two photon detectors.

Comparing Fig.1(b) with Fig.1(c), we can know that Alice could increase the mode of the detectors by adding a BS at the end to get more constrains in linear programing and improve key rates. Following this idea, we can actually generalize our setup to infinite passive-decoy case. we denote the joint photon number distribution of the passive setup with nn (nn=1,2,3…) intensity settings is pnp^{n}, we can get a recursive formula

pn=pn1p(n,m|μ1,μ2)p^{n}=p^{n-1}p{(n,m|\mu_{1},\mu_{2})} (12)

From Eq.(12), we can get the conditional probabilities of photon number distribution in a1a_{1} on each mode of the detectors, one may refer to the appendix for detailed derivations.

Now we carry out a numerical simulation to evaluate the performance of our two-intensity and four-intensity protocols. We focus on the symmetric case, which means that Charlie is at the middle of Alice and Bob and all other device parameters on Alice’s side and Bob’s side are identical. The simulation model can be found in the appendix of Ref.Cui et al. (2019), the parameters in our simulation are listed in Table.1.

Table 1: Experimental parameters used in the numerical simulation. η\eta is the detect efficiency of single photon detectors, ηd\eta_{d} is darkcount rate, ff is the correction efficiency, ede_{d} is the misalignment error probability.
η\eta ηd\eta_{d} fiber loss ff ede_{d}
20% 11071*10^{-7} 0.2 dB/km 1.15 0.03

Our results are shown in Fig.2. It shows that, in two-decoy settings, there is a gap between active decoy scheme and passive-decoy scheme, while in four-decoy settings, our passive-decoy scheme performs as good as the active one and even slightly better at a long distance. This shows that our passive-decoy state method can perform as good as the active one. Furthermore, our method can eliminate side channels on sources which may be caused by active modulation. Thus our scheme is very promising for applications of practical systems.

Besides, we also add a simulation of the passive setup with eight decoys, and compare it with the infinite decoy states.The result shows that the secret key rate of passive setup with the eight decoys surpasses that of the four decoys at a long range of distance. More importantly, the gap between the passive setup with the eight decoys and the infinite decoy states is narrow, which shows our protocol can present satisfactory performance with just a few detectors.

Refer to caption
Figure 2: Secret key rate in logarithmic scale of two-intensity, four-intensity, eight-intensity in passive decoy scheme and two-intensity, four-intensity in active decoy scheme. The infinite case in active decoy scheme and linear key rate bound are also shown in the figure.

IV Conclusion And Discussion

We have proposed the scheme of passive-decoy state TF-QKD, in which different decoy states are generated passively according to the modes of photon detectors. In this way, our scheme can eliminate side channel on source caused by actively modulating of the source intensity. Moreover we presented a simulation comparing the key generation rate with that in active-decoy, it shows our result can performs as good as that in active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. Thus our work provides a useful approach to improve the performance of TF-QKD in practical implementation.

Nevertheless, although our scheme can remove certain side channel caused by actively modulating intensity of the source, we can not remove all side channels, there are still further work to do. For example, the scheme is still threatened by Trojan horse attack although it’s not easy in practice, and an imperfect real-life source may emit imperfect states with varied frequency spectra, which will also lead to side channel. Fortunately, imperfect states preparation may be remedied by Ref. Wang et al. (2019), which proposed that an imperfect source SS and a perfect source PP are identical in side-channel space if there exists a quantum process that can map the SS to PP. Besides, the intensities of the photon pulses could be unstable. To solve this issue, Refs. Wang et al. (2009); Hu and Wang (2010) have discussed these issues. Ref. Wang et al. (2009) bounded the fraction of single-photon counts in the decoy-state QKD, while Ref. Hu and Wang (2010) proposed a theory that decoy-state QKD with an unstable source can work as if the source were stable provided the condition: maxj(pjakjpjakj)maxj(pja2jpja2j)<maxj(pja1jpja1j)\max\limits_{j}(\frac{p_{j}a_{kj}}{p^{\prime}_{j}a^{\prime}_{kj}})\leq\max\limits_{j}(\frac{p_{j}a_{2j}}{p^{\prime}_{j}a^{\prime}_{2j}})<\max\limits_{j}(\frac{p_{j}a_{1j}}{p^{\prime}_{j}a^{\prime}_{1j}}), for all k2k\geq 2 hold. In our scheme, this condition still holds by optimizing the transmittance of BS(s), therefore, our scheme can work under unstable source in principle. Moreover, there are still side channels in our scheme due to bases switching, i.e., different values in phase modulation in the code mode. It would be interesting to study this issue in the future.

Acknowledgements

This work has been supported by the National Key Research and Development Program of China (Grant No. 2016YFA0302600), the National Natural Science Foundation of China (Grant Nos. 61822115,61961136004, 61775207, 61702469, 61771439, 61627820,61675189), National Cryptography Development Fund (Grant No. MMJJ20170120) and Anhui Initiative in Quantum Information Technologies.

appendix A:THE AFFECTION OF IM IN THE SYSTEM

We take Alice as an example, for simplicity, we let the extinction ratio of the IM be 20 dB, the intensity of the weak coherent pulses from laser be μ\mu, the transmittance of BS1\rm BS_{1} is t1t_{1}, thus we have

{μs=(1t1)μ,μr=t1μ,\begin{cases}\mu_{s}=(1-t_{1})\mu,\\ \mu_{r}=t_{1}\mu,\end{cases} (1)

in which μs\mu_{s}, μr\mu_{r} are the intensity of the pulses at the two outputs of BS1\rm BS_{1}, then pulses on path s will be blocked by the IM, the intensity of the output pulses is μs=μs/100\mu_{s}^{\prime}=\mu_{s}/100, thus we can get the probability

{P(μs,n=0)=eμs,P(μs,n0)=1eμs.\begin{cases}P(\mu_{s}^{\prime},n=0)=e^{-\mu_{s}^{\prime}},\\ P(\mu_{s}^{\prime},n\neq 0)=1-e^{-\mu_{s}^{\prime}}.\\ \end{cases} (2)

Where P(n=0,μs)P(n=0,\mu_{s}^{\prime}) is the probability of finding no photons from the output of path s after blocking of the IM, P(n0,μs)=1eμsP(n\neq 0,\mu_{s}^{\prime})=1-e^{-\mu_{s}^{\prime}} is the probability of finding at least one photon from the output of path s.

For simplicity, we take the error rate er=0.5er=0.5 on a1a_{1} as long as there are photons come from path s, thus we have the total error rate

ertotal=0.5P(μs,n0)=0.5(1eμs).er_{total}=0.5P(\mu_{s}^{\prime},n\neq 0)=0.5(1-e^{-\mu_{s}^{\prime}}). (3)

Since μs=μs/100\mu_{s}^{\prime}=\mu_{s}/100, thus ertotaler_{total} is a small value, we take μs=0.1\mu_{s}=0.1 for example, we get ertotal=0.00005er_{total}=0.00005, it’s a small value that it won’t affect the performance of our system.

appendix B:passively generate different photon number statistics

Here we focus on the PDS in the whole passive-decoy TF-QKD system, as shown in Fig.1. Let us first consider the interference with two pure coherent states |n=an|0{|n\rangle}={a^{\dagger}}^{n}|0\rangle and |m=bm|0{|m\rangle}={b^{\dagger}}^{m}|0\rangle, where aa^{\dagger} and bb^{\dagger} are creation operators, nn and mm are photon numbers. For aa^{\dagger} and bb^{\dagger} at a BS:

{a=tc+1td,b=1tctd,\begin{cases}a^{\dagger}=\sqrt{t}c^{\dagger}+\sqrt{1-t}d^{\dagger},\\ b^{\dagger}=\sqrt{1-t}c^{\dagger}-\sqrt{t}d^{\dagger},\end{cases} (1)

Here tt is the transmittance of the BS2\rm BS_{2}, cc^{\dagger} and dd^{\dagger} are creation operators of the quantum state of output a1a_{1} and a2a_{2}. Denote UBS2U_{BS_{2}} is the unitary operator of BS2\rm BS_{2}, thus we have

UBS2|nm\displaystyle{U_{BS_{2}}|nm\rangle} (2)
=(tc+1td)n(1tctd)m|00.\displaystyle={(\sqrt{t}c^{\dagger}+\sqrt{1-t}d^{\dagger})}^{n}{(\sqrt{1-t}c^{\dagger}-\sqrt{t}d^{\dagger})}^{m}|00\rangle.

from Eq.(2) we can get the probability of finding kk photons at mode a1a_{1}, it’s a problem of statistics.

P(k|n,m)\displaystyle P{(k|n,m)}
=max(0,km)min(k,n)CniCm(ki)tn(1t)mm!n!k!(n+mx)!.\displaystyle=\sum_{\max(0,k-m)}^{\min(k,n)}C_{n}^{i}C_{m}^{(k-i)}\frac{\sqrt{t^{n}{(1-t)}^{m}}}{\sqrt{m!n!}}\sqrt{k!(n+m-x)!}.

Here P(k|n,m)P{(k|n,m)} is the probability of finding kk photons on a1a_{1} given the coherent states on path s and path r containing nn and mm photons respectively. With P(k|n,m)P{(k|n,m)} we can then get the joint probability P(k,n,m|μ1,μ2)P{(k,n,m|\mu_{1},\mu_{2})}

P(k,n,m|μ1,μ2)=P(μ1,n)P(μ2,m)P(k|n,m),P{(k,n,m|\mu_{1},\mu_{2})}={P}{(\mu_{1},n)}{P}{(\mu_{2},m)}P{(k|n,m)}, (3)

where P(k,n,m|μ1,μ2)P{(k,n,m|\mu_{1},\mu_{2})} means the pulses in path r, s are phase-randomized weak coherent states with mean photon number μ1\mu_{1} and μ2\mu_{2}, P(μ,n)=eμμn/n!{P}(\mu,n)=e^{-\mu}\mu^{n}/n! is Poissonian distribution. Summing up nn and mm and we can get

P(k|μ1,μ2)=n,m=0P(μ1,n)P(μ2,m)P(k|n,m),P{(k|\mu_{1},\mu_{2})}=\sum_{n,m=0}{P}{(\mu_{1},n)}{P}{(\mu_{2},m)}P{(k|n,m)}, (4)

where P(k|μ1,μ2)P{(k|\mu_{1},\mu_{2})} is the photon distribution on mode a1a_{1} given two phase-randomized weak coherent states interfere at BS2\rm BS_{2}. In Fig.1, the photon distribution on mode a2a_{2} is the same as mode a1a_{1}.

P(q|μ1,μ2)=n,m=0P(μ1,n)P(μ2,m)P(q|n,m),P{(q|\mu_{1},\mu_{2})}=\sum_{n,m=0}{P}{(\mu_{1},n)}{P}{(\mu_{2},m)}P{(q|n,m)}, (5)

thus we can get P(k,q|μ1,μ2)P{(k,q|\mu_{1},\mu_{2})}

P(k,q|μ1,μ2)=P(k|μ1,μ2)P(q|μ1,μ2).P{(k,q|\mu_{1},\mu_{2})}=P{(k|\mu_{1},\mu_{2})}P{(q|\mu_{1},\mu_{2})}. (6)

Here P(k,q|μ1,μ2)P{(k,q|\mu_{1},\mu_{2})} is the joint probability of finding kk photons on mode a1a_{1} and qq photons on mode a2a_{2}. Denote η\eta is detect efficiency, ηd\eta_{d} is darkcount rate of photon detector D1\rm D_{1}, we have

{Pu(n)=(1η)n(1ηd),Pc(n)=1Pu(n),\begin{cases}P_{u}(n)={(1-\eta)}^{n}(1-\eta_{d}),\\ P_{c}(n)=1-P_{u}(n),\end{cases}

in which Pc(n)P_{c}(n) and Pu(n)P_{u}(n) are probabilities that the detector D1\rm D_{1} produces a click and no click when nn photons come, thus there are two modes of the detector D1\rm D_{1} according to its click event and no click event. consequently, there are two different conditional photon distribution on a1a_{1} according to the mode of D1\rm D_{1}

Pr1(k)=q=0P(q,k|μ1,μ2)Pc(q)q,k=0P(q,k|μ1,μ2)Pc(q),Pr^{1}(k)=\frac{\sum\limits_{q=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{c}(q)}{\sum\limits_{q,k=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{c}(q)}, (7)
Pr0(k)=q=0P(q,k|μ1,μ2)Pu(q)q,k=0P(q,k|μ1,μ2)Pu(q),Pr^{0}(k)=\frac{\sum\limits_{q=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{u}(q)}{\sum\limits_{q,k=0}^{\infty}P{(q,k|\mu_{1},\mu_{2})}P_{u}(q)}, (8)

where the subscripts ’1’ and ’0’ of Pr1(k)Pr^{1}(k) and Pr0(k)Pr^{0}(k) means the detector clicks or not when pulses come.

Refer to caption
Figure 1: Passive-decoy state setup with two intensity settings

The derivation above clarifies our passive setup with two-intensity settings, and we also investigate the four-intensity settings, the approach is to add a BS3\rm BS_{3} at the end and two detectors for the outcome signals as shown in Fig.2. Thus there are four different conditional photon distributions on a1a_{1}, Pr00(y)Pr^{00}(y), Pr01(y)Pr^{01}(y), Pr10(y)Pr^{10}(y), Pr11(y)Pr^{11}(y), according to the mode of the two detectors, We have get the probability of finding qq photons on a2a_{2} in Eq.(5), denote the transmittance of BS3\rm BS_{3} is t3t_{3}, we can get the probability of finding jj, ll photons at the two output of BS3\rm BS_{3} with qq photons be splitted at BS3\rm BS_{3}

P(j,l|q)=Cqjt3l(1t3)l,P{(j,l|q)}=C_{q}^{j}t_{3}^{l}(1-t_{3})^{l}, (9)

thus we can get

P(j,l|μ1,μ2)=q=0P(j,l|q)P(q|μ1,μ2).P{(j,l|\mu_{1},\mu_{2})}=\sum\limits_{q=0}P{(j,l|q)}P{(q|\mu_{1},\mu_{2})}. (10)

Here P(j,l|μ1,μ2)P{(j,l|\mu_{1},\mu_{2})} is the probability of finding jj photons on D1\rm D_{1} and ll photons on D2\rm D_{2}, when there are two weak coherent states with the mean photon number of μ1\mu_{1} and μ2\mu_{2} on path s and path r. Then we have the joint probability

P(k,j,l|μ1,μ2)=P(j,l|μ1,μ2)P(k|μ1,μ2).P{(k,j,l|\mu_{1},\mu_{2})}=P{(j,l|\mu_{1},\mu_{2})}P{(k|\mu_{1},\mu_{2})}. (11)

Here P(k,j,l|μ1,μ2)P{(k,j,l|\mu_{1},\mu_{2})} is the joint probability of finding kk on a1a_{1}, jj photons on D1\rm D_{1} and ll photons on D2\rm D_{2}, then we can get the conditional probabilities of photon number distribution on a1a_{1} according to the mode of the detectors D1\rm D_{1} and D2\rm D_{2}

Pr00(k)=j,l=0P(k,j,l|μ1,μ2)Pu(j)Pu(l)k,j,l=0P(k,j,l|μ1,μ2)Pu(j)Pu(l),Pr^{00}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{u}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{u}(l)}, (12)
Pr10(k)=j,l=0P(k,j,l|μ1,μ2)Pc(j)Pu(l)k,j,l=0P(k,j,l|μ1,μ2)Pc(d1)Pu(l),Pr^{10}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(j)P_{u}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(d_{1})P_{u}(l)}, (13)
Pr01(k)=j,l=0P(k,j,l|μ1,μ2)Pu(j)Pc(l)k,j,l=0P(k,j,l|μ1,μ2)Pu(j)Pc(l),Pr^{01}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{c}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{u}(j)P_{c}(l)}, (14)
Pr11(k)=j,l=0P(k,j,l|μ1,μ2)Pc(j)Pc(l)k,j,l=0P(k,j,l|μ1,μ2)Pc(d1)Pc(l).Pr^{11}(k)=\frac{\sum\limits_{j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(j)P_{c}(l)}{\sum\limits_{k,j,l=0}^{\infty}P{(k,j,l|\mu_{1},\mu_{2})}P_{c}(d_{1})P_{c}(l)}. (15)
Refer to caption
Figure 2: Passive-decoy state setup with four intensity settings

The derivation above clarifies our passive-decoy setup with four-intensity settings, the main idea is adding a BS\rm BS at the end of the setup with two-intensity settings and two detectors detecting the output pulses. Thus the modes of detectors have increased from two to four, which means we increased the number of passive decoy intensities from two to four.

Following this idea, we can generalize the setup to infinite passive-decoy case. First, we denote the joint probability of the passive-decoy setup with n1n-1 (nn=1,2,3…) intensity settings is P(k,d1,d2dn1|μ1,μ2))P{(k,d_{1},d_{2}...d_{n-1}|\mu_{1},\mu_{2}))}, which means we add n1n-1 photon detectors at the end and the joint probability of finding kk photons on mode a1a_{1} and finding dnd_{n} photons on the corresponding photon detector Dn{\rm D}_{n} is P(k,d1,d2dn1|μ1,μ2)P{(k,d_{1},d_{2}...d_{n-1}|\mu_{1},\mu_{2})}. Then if we add another BS at the end and two photon detectors at the output mode, the setup becomes a setup with nn intensity settings, this means in the setup with n1n-1 settings, the pulse on the Dn1{\rm D}_{n-1} is splitted by the added BS and detected by the add photons detectors, denote the transmittance of this BS is tt, we can get

P(n,m|dn1)=Cqntm(1t)m,P{(n,m|d_{n-1})}=C_{q}^{n}t^{m}(1-t)^{m}, (16)

this is the same as given in Eq.(9), and in P(k,d1,d2dn1|μ1,μ2)P{(k,d_{1},d_{2}...d_{n-1}|\mu_{1},\mu_{2})}, we have

P(dn1|μ1,μ2)=k,d1,d2dn2=0P(k,d1,d2dn1|μ1,μ2).P{(d_{n-1}|\mu_{1},\mu_{2})}=\sum\limits_{k,d_{1},d_{2}...d_{n-2}=0}P{(k,d_{1},d_{2}...d_{n-1}|\mu_{1},\mu_{2})}. (17)

Here P(dn1|μ1,μ2)P{(d_{n-1}|\mu_{1},\mu_{2})} is the probability of finding dn1d_{n-1} photons on detector Dn1{\rm D}_{n-1} in the setup with n1n-1 intensity settings. Thus we can get

P(n,m|μ1,μ2)=dn1=0P(n,m|dn1)P(dn1|μ1,μ2).P{(n,m|\mu_{1},\mu_{2})}=\sum\limits_{d_{n-1}=0}P{(n,m|d_{n-1})}P{(d_{n-1}|\mu_{1},\mu_{2})}. (18)

Here P(n,m|μ1,μ2)P{(n,m|\mu_{1},\mu_{2})} is the probability of finding n and m photons on the two output mode given two phase randomized weak coherent states on path s and path r, and the mean photon number of these two phase randomized WCP is μ1\mu_{1} and μ2\mu_{2}

With the probability on Eq.(18), we can get the joint probability of the passive setup with nn (nn=1,2,3…) intensity settings

P(k,d1dn2,n,m|μ1,μ2)\displaystyle P{(k,d_{1}...d_{n-2},n,m|\mu_{1},\mu_{2})} (19)
=P(k,d1dn1|μ1,μ2)P(n,m|μ1,μ2).\displaystyle=P{(k,d_{1}...d_{n-1}|\mu_{1},\mu_{2})}P{(n,m|\mu_{1},\mu_{2})}.

For readability, we substitute nn, mm with dn1d_{n-1} and dnd_{n}, thus P(k,d1dn2,dn1,dn|μ1,μ2))=P(k,d1dn2,n,m|μ1,μ2)P{(k,d_{1}...d_{n-2},d_{n-1},d_{n}|\mu_{1},\mu_{2}))}=P{(k,d_{1}...d_{n-2},n,m|\mu_{1},\mu_{2})}. And we denote Pn=P(k,d1dn2,dn1,dn|μ1,μ2)P^{n}=P{(k,d_{1}...d_{n-2},d_{n-1},d_{n}|\mu_{1},\mu_{2})} is the joint probability on passive setup with n intensity settings, Pn1=P(k,d1dn1,n,m|μ1,μ2)P^{n-1}=P{(k,d_{1}...d_{n-1},n,m|\mu_{1},\mu_{2})} is the joint probability on passive setup with n1n-1 intensity settings, thus we have

Pn=Pn1P(n,m|μ1,μ2).P^{n}=P^{n-1}P{(n,m|\mu_{1},\mu_{2})}. (20)

Eq.(20) is a recursive formula. In the setup with nn intensity settings, there are nn photon detectors, thus there are M=m=0nCnm{\rm M}=\sum\limits_{m=0}^{n}C_{n}^{m} modes according to whether the detectors click or not, which means there are M=m=0nCnm{\rm M}=\sum\limits_{m=0}^{n}C_{n}^{m} conditional probabilities of photon number distribution on a1a_{1} on each mode of detectors. We take Pr100000(k)Pr_{100...000}(k) in Eq.(21) for example

Pr100000(k)=d1,d2dn=0P(k,d1,,dn|μ1,μ2)Pc(d1)Pu(d2,,dn)k,d1,d2,,dn=0P(k,d1,,dn|μ1,μ2)Pc(d1)Pu(d2,..,dn).Pr_{100...000}(k)=\frac{\sum\limits_{d_{1},d_{2}...d_{n}=0}^{\infty}P{(k,d_{1},...,d_{n}|\mu_{1},\mu_{2})}P_{c}(d_{1})P_{u}(d_{2},...,d_{n})}{\sum\limits_{k,d_{1},d_{2},...,d_{n}=0}^{\infty}P{(k,d_{1},...,d_{n}|\mu_{1},\mu_{2})}P_{c}(d_{1})P_{u}(d_{2},..,d_{n})}. (21)

Pr100000(k)Pr_{100...000}(k) is the conditional probability of photon number distribution on a1a_{1} in the mode that only the detector D1\rm D_{1} clicks and the rest don’t among the nn detectors added. For other modes of the detectors, the conditional probability of photon number distribution is similar to Eq.(21).

References

  • Bennett and Brassard (1984) C. H. Bennett and G. Brassard, “Proceedings of the ieee international conference on computers, systems and signal processing,”  (1984).
  • Ekert (1991) A. K. Ekert, Physical review letters 67, 661 (1991).
  • Lo and Chau (1999) H.-K. Lo and H. F. Chau, science 283, 2050 (1999).
  • Inoue et al. (2002) K. Inoue, E. Waks,  and Y. Yamamoto, Physical review letters 89, 037902 (2002).
  • Gobby et al. (2004) C. Gobby, Z. Yuan,  and A. Shields, Applied Physics Letters 84, 3762 (2004).
  • Zhao et al. (2006) Y. Zhao, B. Qi, X. Ma, H.-K. Lo,  and L. Qian, Physical review letters 96, 070502 (2006).
  • Lo et al. (2012) H.-K. Lo, M. Curty,  and B. Qi, Physical review letters 108, 130503 (2012).
  • Wang et al. (2015) C. Wang, X.-T. Song, Z.-Q. Yin, S. Wang, W. Chen, C.-M. Zhang, G.-C. Guo,  and Z.-F. Han, Physical review letters 115, 160502 (2015).
  • Zhou et al. (2016) Y.-H. Zhou, Z.-W. Yu,  and X.-B. Wang, Physical Review A 93, 042324 (2016).
  • Yin et al. (2016) H.-L. Yin, T.-Y. Chen, Z.-W. Yu, H. Liu, L.-X. You, Y.-H. Zhou, S.-J. Chen, Y. Mao, M.-Q. Huang, W.-J. Zhang, et al., Physical review letters 117, 190501 (2016).
  • Liao et al. (2017) S.-K. Liao, W.-Q. Cai, W.-Y. Liu, L. Zhang, Y. Li, J.-G. Ren, J. Yin, Q. Shen, Y. Cao, Z.-P. Li, et al., Nature 549, 43 (2017).
  • Wang et al. (2020) R. Wang, Z.-Q. Yin, F.-Y. Lu, S. Wang, W. Chen, C.-M. Zhang, W. Huang, B.-J. Xu, G.-C. Guo,  and Z.-F. Han, Communications Physics 3, 1 (2020).
  • Takeoka et al. (2014) M. Takeoka, S. Guha,  and M. M. Wilde, Nature communications 5, 1 (2014).
  • Pirandola et al. (2017) S. Pirandola, R. Laurenza, C. Ottaviani,  and L. Banchi, Nature communications 8, 1 (2017).
  • Wilde et al. (2017) M. M. Wilde, M. Tomamichel,  and M. Berta, IEEE Transactions on Information Theory 63, 1792 (2017).
  • Lucamarini et al. (2018) M. Lucamarini, Z. L. Yuan, J. F. Dynes,  and A. J. Shields, Nature 557, 400 (2018).
  • Tamaki et al. (2018) K. Tamaki, H.-K. Lo, W. Wang,  and M. Lucamarini, arXiv preprint arXiv:1805.05511  (2018).
  • Ma et al. (2018) X. Ma, P. Zeng,  and H. Zhou, Physical Review X 8, 031043 (2018).
  • Wang et al. (2018) X.-B. Wang, Z.-W. Yu,  and X.-L. Hu, Physical Review A 98, 062323 (2018).
  • Cui et al. (2019) C. Cui, Z.-Q. Yin, R. Wang, W. Chen, S. Wang, G.-C. Guo,  and Z.-F. Han, Physical Review Applied 11, 034053 (2019).
  • Curty et al. (2019) M. Curty, K. Azuma,  and H.-K. Lo, npj Quantum Information 5, 1 (2019).
  • Lin and Lütkenhaus (2018) J. Lin and N. Lütkenhaus, Physical Review A 98, 042332 (2018).
  • Hwang (2003) W.-Y. Hwang, Physical Review Letters 91, 057901 (2003).
  • Lo et al. (2005) H.-K. Lo, X. Ma,  and K. Chen, Physical review letters 94, 230504 (2005).
  • Wang (2005) X.-B. Wang, Physical review letters 94, 230503 (2005).
  • Schmitt-Manderbach et al. (2007) T. Schmitt-Manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J. G. Rarity, et al., Physical Review Letters 98, 010504 (2007).
  • Jiang et al. (2012) M.-S. Jiang, S.-H. Sun, C.-Y. Li,  and L.-M. Liang, Physical Review A 86, 032310 (2012).
  • Mauerer and Silberhorn (2007) W. Mauerer and C. Silberhorn, Physical Review A 75, 050305 (2007).
  • Adachi et al. (2007) Y. Adachi, T. Yamamoto, M. Koashi,  and N. Imoto, Physical review letters 99, 180503 (2007).
  • Ma and Lo (2008) X. Ma and H.-K. Lo, New Journal of Physics 10, 073018 (2008).
  • Curty et al. (2009) M. Curty, T. Moroder, X. Ma,  and N. Lütkenhaus, Optics letters 34, 3238 (2009).
  • Curty et al. (2010) M. Curty, X. Ma, B. Qi,  and T. Moroder, Physical Review A 81, 022310 (2010).
  • Zhang et al. (2018) C.-H. Zhang, D. Wang, C.-M. Zhang,  and Q. Wang, Journal of Lightwave Technology 36, 2868 (2018).
  • Wang et al. (2019) X.-B. Wang, X.-L. Hu,  and Z.-W. Yu, Physical Review Applied 12, 054034 (2019).
  • Wang et al. (2009) X.-B. Wang, L. Yang, C.-Z. Peng,  and J.-W. Pan, New Journal of Physics 11, 075006 (2009).
  • Hu and Wang (2010) J.-Z. Hu and X.-B. Wang, Physical Review A 82, 012331 (2010).