Content area
Intensity correlations between neighbouring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD). As a solution, we present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect that this phenomenon has on the secret key rate according to existing security analyses. Compared to previous approaches, our method significantly enhances the robustness against correlations, notably improving both the maximum transmission distances and the achievable secret key rates across different scenarios. By relaxing constraints on correlation parameters, our protocol enables practical devices to counter intensity correlations. We experimentally demonstrate this first practical solution that directly overcomes this security vulnerability, establish the feasibility and efficacy of our proposal, taking a major step towards loophole-free and high-performance QKD.
Introduction
Quantum key distribution1 (QKD) stands at the forefront of secure communication protocols2, as it enables two remote users, Alice and Bob, to share secret keys whose security is guaranteed by the principles of quantum mechanics3, 4, 5–6. However, QKD security proofs typically extract secret bits from the raw data originating from single-photons, and on-demand high-quality single-photon sources at telecom wavelengths are not available yet. A popular solution to solve this pressing issue is the decoy-state method7, 8–9, which provides the same secret key rate scaling as single-photon sources by means of using laser sources emitting phase-randomized weak coherent pulses (PRWCPs). Indeed, this technique is a standard tool in current QKD implementations10, 11, 12–13.
An important breakthrough direction for advancing QKD is to increase its secret key rate, for which fast operating QKD systems are being developed10, 11, 12, 13, 14, 15, 16–17. However, the implementation security problem18 brought by high-clock-rate decoy-state QKD systems cannot be ignored. Due to memory effects in the devices and the electronics that control them, high-clock-rate decoy-state QKD systems face a troublesome implementation security problem: intensity correlations16,19, 20, 21, 22, 23, 24–25. This means that the intensity setting of any given round may influence the actual intensity emitted in subsequent rounds, resulting in a partial distinguishability of the intensity settings. This breaks a core assumption of the decoy-state method, posing an underestimated threat to the security of QKD24, 25–26. To address this problem, various security analyses have been proposed21,24,25. However, practical devices27, 28–29 often struggle to meet the criteria set by these analyses (such as the magnitude of the correlations) leading to low or even vanishing secret key rates.
Here, we solve this crucial limitation by proposing an approach that we name intensity-correlation-tolerant QKD, which is capable of mitigating the intensity correlations problem in QKD devices. By adding a local monitor, our protocol enables common devices to achieve notably higher secret key rates and longer transmission distances than previous solutions in the presence of this type of correlations. Importantly, we experimentally demonstrate the feasibility and effectiveness of our approach. This advancement is a significant step towards loophole-free and high-performance QKD.
Results
Assumptions
To characterize intensity correlations and fluctuations, we assume a general model from ref. 24. Precisely, in any given round k, the correlations do not compromise the Poissonian character of the photon-number statistics of the source conditioned on the value of the actual intensity, αk. Nevertheless, the latter does not match the selected intensity setting, say ak, but it is also influenced by the previous ξ settings, ak−ξak−ξ+1…ak−1, for a certain correlation range ξ. That is, we model αk as a random variable, in such a way that every possible record {k, ξ}: = ak−ξak−ξ+1,…,ak determines a conditional probability distribution for αk, with expectation . Here, we describe this randomness using the relative deviation δ{k, ξ} —such that — and assume that the probability density function of δ{k, ξ}, g{k, ξ}, is only nonzero in a certain record-dependent interval . For later convenience, we define and , which denote the magnitude of sequence-dependent random fluctuations and the size of correlation of the average intensity, respectively.
We make the following assumptions on the intensity correlations and fluctuations.
Assumption 1: The intensity correlations do not compromise the Poissonian character of the photon-number statistics of the source16,21,22,27. That is to say, given the actual intensity αk prepared in the k-th round, the conditional photon-number statistics satisfy
1
Assumption 2: The intensity correlations have a finite range ξ, meaning that the intensity setting ak−i of the (k − i)-th round does not influence αk if i > ξ.
Assumption 3: Let us introduce the shorthand notation {i, j} to describe the record of settings ai−jai−j+1. . . ai. Each record {k, ξ} determines a conditional probability distribution for αk, with expectation . For convenience, we describe this randomness using the relative deviation δ{k, ξ}, such that . The probability density function of δ{k, ξ}, which we denote by g{k, ξ}, is only nonzero in the record-dependent interval .
We remark that, by definition,
2
Also, for a given record {k, ξ}, the conditional photon-number statistics of round k satisfy3
Finally, for simplicity, we introduce and .Enhanced decoy-state method
Importantly, in the presence of intensity correlations, the n-photon yield and error rate associated to different intensity settings can be distinct. To address this issue, we introduce an enhanced decoy-state method. Crucially, we consider finer-grained decoy-state constraints by grouping the measurement counts at Bob’s receiver according to the record of settings rather than using the last setting alone as in standard analyses. Specifically, our protocol involves imposing constraints in two key aspects. The first is a photon number constraint. Similar to the standard decoy-state method, we truncate the photon number at ncut to establish upper and lower bounds. However, due to security concerns arising from correlations, we need to classify the detection rates and error rates according to the sequence {k, ξ}. Despite this, the constraints alone are insufficient for parameter estimation, which leads us to introduce a second constraint. Specifically, we employ a mathematical tool called the Cauchy-Schwarz (CS) constraint24,25 to set limits on the bias in detection statistics associated with different intensities.
As originally observed in ref. 24, in the presence of intensity correlations, the yields and error probabilities in any given round may differ for different records of settings. As a consequence, the decoy-state method7, 8–9 alone does not enable a tight parameter estimation, and additional constraints are required. In accordance with ref. 24, we address this problem by using the so-called Cauchy-Schwarz (CS) constraints, a tool previously exploited in refs. 25,26 too. Specifically, the CS constraint restricts the bias between the measurement statistics of two different quantum states when subject to the same measurement. The CS constraint can be stated as follows.
Theorem 1
Let and be two pure states of an arbitrary Hilbert space . For any operator on such that ,
4
where5
with .Proof: See the Supplementary Materials of ref. 26.
Essentially, Eq. (4) allows to set quantitative bounds on the detection statistics arising from different records of settings. However, because of their non-linearity, these bounds cannot be directly plugged into decoy-state linear programmes. Notwithstanding, in virtue of the convexity of the G±(x, y) functions, suitable linearizations of the CS constraints follow. In particular, for any reference value c ∈ [0, 1], we have
6
where7
with . Obviously, although the value of c can be set arbitrarily, it has a direct impact on the tightness of the constraints. In this regard, our preferred choices for these reference parameters are discussed in section ‘Reference values for the linear CS constraints’.One of the key ideas for addressing intensity correlations is that, in the context of general attacks, setting CS constraints on the measurement statistics of a fixed round k requires to compute the inner product between specific quantum states across all N protocol rounds24,25 (although respectively conditioned on the two records of settings whose statistics are to be compared). Define this quantity as the intensity correlation parameter , which satisfies
8
for any given round k, any pair of distinct settings ak and , and any photon number n, where is the lower bond when we estimate pn∣{k, ξ}. The detail proof of the intensity correlation parameter can be seen in section ‘Intensity correlation parameter’. The intensity correlation parameters are calculated in section ‘Calculation of correlation parameters’.In the first place, the standard decoy-state constraints can be stated in the form
9
where the left-hand side is the probability of a click occurring in round k conditioned on a Z-basis match and the record of settings being {k, ξ}, and yn,{k, ξ} denotes the corresponding n-photon yield. As is customary in decoy-state analyses, one can select a threshold photon-number ncut in order to split Eq. (9) into two complementary bounds,10
Analogously, for the error statistics (say, of the X basis) we have11
where is the probability of a click and a bit error occurring in round k conditioned on a X-basis match and the record of settings being {k, ξ}, and hn,{k, ξ} denotes the corresponding n-photon error yield.On the other hand, the linearized CS constraints that arise from Eq. (6), when applied to the yields, can be written as24,25
12
when , with13
where the reference values of the linearization are provided in section ‘Reference values for the linear CS constraints’.In a similar fashion, the resulting linearized CS constraints for the error statistics read
14
when , for15
where the reference values are given in section ‘Reference values for the linear CS constraints’.Putting it all together, Eq. (10) and Eq. (12) plus the boundary constraints 0 ≤ yn,{k, ξ} ≤ 1 compose the round-dependent linear programme of the Z-basis detection statistics, whose objective function is given by
16
Namely, a lower bound on the total probability of a Z-basis match and a signal-setting single-photon click occurring in round k (averaged over all possible records {k − 1, ξ − 1}).Importantly, an equivalent LP for the X-basis detection statistics is obtained by replacing X by Z where convenient. The objective function of such LP, defined analogously as but for the X basis, is denoted as .
Analogously, Eq. (11) and Eq. (14) plus the boundary constraints 0 ≤ hn,{k, ξ} ≤ 1 compose the round-dependent linear programme of the X-basis error statistics, whose objective function is given by
17
Namely, an upper bound on the total probability of an X-basis match and a signal-setting single-photon bit error occurring in round k (averaged over all possible records {k − 1, ξ − 1}).To finish with, the relevant round-independent linear programmes follow by summing over all N protocol rounds and dividing by N in both the objective functions and the constraints.
Calculation of correlation parameters
On the practical side, there are two challenges in implementing the enhanced decoy-state method. First, the photon number constraint requires to accurately estimate tight upper and lower bounds on the photon number statistics. Second, the CS constraints require to determine lower bounds on the squared inner product between suitable quantum states that only differ on the last intensity setting, which we have defined as in Eq. (8). As our solution, by including a local monitor as an integral component of the protocol, Alice can obtain a tight estimation of these parameters. Precisely, she measures a fraction of every PRWCP she sends to the quantum channel. By categorizing the measurement results according to the setting sequences {k, ξ}, Alice obtains the gain for each category. Using this information, together with the accurate relative efficiency ηm between the pulse entering the channel and the pulse entering the detection module in the local monitor, she can estimate the different photon-number probabilities for each category, further determining .
In this section, we elucidate how our protocol calculates these parameters by means of using a local monitor situated at Alice’s side23,30. Remarkably, if compared with the existing analyses24,25, our estimates result in a significant mitigation of the damaging effect that intensity correlations have on the secret key rate.
The working principle of the local monitor is depicted in Fig. 1, although we remark that alternative configurations may fulfil the same purpose as well. By means of a laser diode (LD) and an Encoder, Alice prepares PRWCPs which are then split into two components by a balanced BS. While the transmitted pulses enter the quantum channel after undergoing attenuation by a variable optical attenuator (VOA), the reflected pulses are directed to the local monitor, which consists of a VOA (VOA-2) and a single-photon detector (SPD-M). The relative attenuation of the local monitor is defined as where is the detection efficiency of SPD-M and ηV OA−i is the attenuation of VOA − i. The reason of choosing SPD is mentioned in section ‘Measurement of correlation parameters’.
[See PDF for image]
Fig. 1
Schematic of Alice’s module.
Quan. Mod. quantum module, LD laser diode, Encoder quantum state and decoy-state intensity modulator, BS beam splitter, VOA variable optical attenuator, SPD single-photon detector.
Due to the expression of the correlation parameters, Eq. (8), it is imperative to tightly estimate the conditional photon-number statistics for each possible record of intensity settings. Combining a standard characterization of single-photon detectors with the general assumptions of section ‘Assumptions’, it follows that the detection probability of the local SPD in the kth round conditioned on a record of settings {k, ξ} is given by
18
where pd and pap respectively denote the dark count rate and the afterpulse rate of the local SPD. Defining , it follows that19
Then, employing the Taylor expansion of function ex and combine with the fact that the first-order term of δ vanishes (see Eq. (2)), we can calculate the upper and lower bond of (the detailed derivation is described in section ‘Measurement of correlation parameters’), satisfies20
where .Then we can tightly bound the conditional photon-number statistics, pn∣{k, ξ}. To this end, we re-use the trick of Taylor-expanding around the conditional expectation . Similarly, performing a Taylor expansion on the and terms in Eq. (3) and utilizing the fact that the first-order term of δ is zero (the detailed derivation is described in section ‘Measurement of correlation parameters’), we obtain that
21
where22
On the contrary, invoking the monotonicity of the Poissonian photon-number probabilities in both and δ, it readily follows that23
for n ≥ 1. This latter approach overlooks the fact that the first-order term in δ vanishes upon integration, resulting in looser bounds than those of Eq. (21).Since the tighter bounds of Eq. (21) further rely on explicit numerical optimization, we use these bounds only up to a certain threshold photon number nth, and for n > nth we apply the monotonicity bounds of Eq. (23) directly. In either case, we refer to these lower and upper bounds as and , respectively.
Let us now calculate the lower bounds on the correlation parameters —defined in Eq. (8)— that arise from the of the previous subsection. Splitting into two sums to separately make use of Eqs. (21) and (23) one can readily show that
24
where , , , , , , , , and . Plugging this into Eq. (8) yields25
Asymptotic secret key rate and simulation results
In the simulations, we follow the asymptotic analysis. For large enough N, one can identify the round-averaged observables with their expectations to approximate the secret key rate via
26
where , , , fEC is the error-correction efficiency, H(x) is the binary entropy function, Etol is the expected bit error rate in the Z-basis, and for27
Note that Zμ is the expected ratio of rounds where both parties select the Z-basis, Alice selects the signal setting μ, and a detection event is registered. Also, we remark that incorporates the sifting factor by definition (see Eq. (16)). Of course, alternatively, one could consider a symmetric scenario where the parties extract key from both bases.In the numerical simulations, we use the same channel and detector model deployed in refs. 24,25, which is consistent with the reference parameters derived in section ‘Reference values for the linear CS constraints’. For ease of comparison with prior work, this model does not incorporate intensity correlations. The parameters of the model are (detector efficiency of Bob’s detectors), pd (dark count probability of Bob’s detectors), (channel transmittance for a lab-to-lab distance of L kilometres and an attenuation coefficient of αatt dB/km), and δA (misalignment error in the channel). The model reads
28
for and . Naturally as well, Etol = E{k, ξ}/X{k, ξ} because of the symmetry between the Z and the X bases.In Fig. 2, we present numerical simulations of the asymptotic secret key rate attainable with our enhanced decoy-state method. For ease of comparison with prior work24,25, we consider an asymmetric decoy-state BB84 protocol with an active receiver. The figure reveals that this method offers a great tolerance to variations in the magnitude and range of the correlations when compared to previous studies. In fact, it consistently achieves higher secret key rates for all considered scenarios.
[See PDF for image]
Fig. 2
Simulation of the asymptotic secret key rate in an asymmetric protocol with an active receiver.
a Secret key rate when Bob uses single-photon detectors (SPDs) with detection efficiency and dark count rate pd = 4.2 × 10−6. b Secret key rate when Bob uses superconducting nanowire SPDs (SNSPDs) with detection efficiency and dark count rate pd = 9.5 × 10−8. Solid lines, secret key rate obtained with our method; Dashed lines, secret key rate obtained with the most efficient previous method25. We set for , and contemplate two correlation ranges, ξ ∈ {1, 3}. We focus on the (asymptotically optimal) limit where pμ = 1, pν = 0, pω = 0 and qZ = 1, where in this case qZ determines Bob’s probability to actively select the Z-basis as well. Also, we set the fibre attenuation coefficient to α = 0.2 dB/km, the misalignment to δA = 0.08 and the error correction efficiency to fEC = 1.16.
Note that, in this work, we use the model here presented for the simulations of both Figs. 2 and 4. In this respect, we remark that, although the model is specifically suited to an active BB84 receiver, it can also be used to approximately describe the detection statistics of a passive receiver.
Experimental setup and implementation
The QKD setup consists of three modules. On the source side, as usual, there is a quantum module responsible for the BB84 and decoy-state encoding. Subsequently, the monitor module monitors the quantum module, capturing the intensity correlation information. The third module is Bob’s detection setup. Precisely, in the quantum module, for each protocol round k = 1, 2,…, N, Alice selects an intensity setting ak ∈ A = {μ, ν, ω} with probability , and a bit-and-basis setting rk ∈ R = {Z0, Z1, X0, X1} with probability . The module encodes these settings on PRWCPs that are attenuated by a beam splitter (BS) and a variable optical attenuator (VOA). Due to the effect of intensity correlations, the average photon-number of the k-th PRWCP is not exactly ak, but αk according to the general model described above.
The output of the quantum module consists of two parts, the first one being sent to Bob and the second one being sent to the monitor module. The monitor module contains a VOA and an SPD, and it classifies the detection results according to the record of the previous ξ settings, for the later calculation of (i) the bounds of the conditional n-photon probabilities of the different records, and (ii) the correlation parameters . For this purpose, the method described in the section ‘Calculation of correlation parameters’ is used.
In the detection module, Bob measures the received signals and announces whether a successful result occurs in his measurement unit (MU). He stores the rounds of successful measurements and the corresponding bases and raw key bits. For successful measurements, Alice stores her original key bit and basis, while she stores her decoy settings for all rounds to recognize the records {k, ξ} of every successful measurement. Box 0.1 illustrates the steps of the protocol, where the additional operations introduced to address the intensity correlation problem are highlighted in bold.
To validate our approach, we conducted experiments using the apparatus shown in Fig. 3. We use a polarization coding system where a gain-switched laser diode emits PRWCPs with a pulse width of 50 ps and a repetition rate of 1 GHz. The decoy-state intensity modulator (DS-IM) module includes an isolator, a Sagnac interferometer (SI)20, and a commercial IM made from an integrated LiNbO3 Mach-Zehnder interferometer (MZI). The SI employs a phase modulator (PM) to modulate clockwise and counterclockwise pulses, causing interference that leads to maximum and minimum attenuation when the relative phase is 0 and π, respectively. Due to the SI’s unique characteristics20, it has two stable operating points during constructive and destructive interference, achieving smaller fluctuations and correlations compared to the commercial IM. SI is used to adjust the signal and decoy state, while the vacuum state is modulated using MZI, which also has stable operating points during constructive and destructive interference21,27. By combining the SI and MZI IM, each with two stable operating points at maximum and minimum attenuation, we achieve the three required stable operating points for the DS-IM module. The specific interference combinations are shown in Table 1.
[See PDF for image]
Fig. 3
Depiction of the experimental setup.
LD laser diode, ISO isolator, PM phase modulator, IM intensity modulator, Pol.-Enc. polarization encoder, BS beam splitter, EVOA electronic variable optical attenuator, SPD single-photon detector, PC polarization controller, PBS polarization beam splitter.
Table 1. Relation between the intensity settings and the state of the interferometers
Signal | Decoy | Vacuum | |
|---|---|---|---|
SI | Cons. | Des. | Des. |
MZI | Cons. | Cons. | Des. |
Cons. constructive interference, Des. destructive interference.
The polarization encoder encodes the DS-IM modulated pulses. A BS then divides the encoded states into two pulses, one of them entering the local monitor —composed of an electronic variable optical attenuator (EVOA-2) and a single-photon detector (SPD-M)— and the other one entering the fibre-based quantum channel after being attenuated with EVOA-1.
At the detection side, we opt for a passive BB84 receiver to measure the arriving polarization states. The detection module comprises one symmetric BS and two MUs. Each MU consists of a polarization controller (PC), a polarization BS (PBS), and two SPDs. The SPDs work on gated mode31 at a frequency of 1 GHz, with a dark count rate pd = 4.2 × 10−6 and a detection efficiency . The PC-Z of MU-Z is properly adjusted so that SPD-H (V) measures horizontal (vertical) polarization states. In a similar fashion, MU-X measures the X basis polarization states.
The attenuation of Alice’s local monitor is controlled precisely to achieve the desired value of ηm. In our experiment, we set ηm to 10−3. SPD-M records whether or not each round clicks and categorizes all data into 3ξ+1 types based on the record of settings. To illustrate our method, we have assumed that ξ = 327 for the data analysis, thus calculating the detection rates of 81 records of settings in total (see the Supplementary Note 2 for the specific calibration method).
Before performing the experiment, we conduct simulations to determine the intensities μ, ν and ω and their selection probabilities. We adjust the splitting ratio of the BS within SI to fix the signal-to-decoy intensities constrained to μ/ν = 5. We optimize both the intensities and their probabilities simultaneously in the simulation, while imposing the constraint for all ak to ensure that all data sets are sufficiently large. For consistency with the experiment, Alice’s Z-basis probability is set to qZ = 0.5, and a symmetric passive receiver is considered at Bob’s side. In addition, we estimate the magnitude of the intensity correlations in advance23,27 as , , and , and we set the remaining parameters as in Fig. 2. Notably, prior knowledge of the device’s correlations and fluctuations is not essential for implementing the protocol, but it allows to optimize the secret key rate for each distance. Furthermore, this knowledge can be acquired by Alice’s monitor module before initiating the quantum communication.
The results of the simulation are shown in Fig. 4. We successfully demonstrate the feasibility of our approach at 50 km, 60 km, and 70 km of channel length. As depicted in the figure, the asymptotic key rates are respectively given by 1.82 × 10−4, 8.13 × 10−5, and 1.91 × 10−5, suitably aligned with the corresponding simulation outcomes (see the Supplementary Table 1 to 3 and Supplementary Figs. 1 to 3 in Supplementary Note 1 for detail data).
[See PDF for image]
Fig. 4
Simulation and experimental performance of the intensity-correlation-tolerant QKD protocol in Box 0.1.
Solid lines, secret key rate simulated for the experiment; Dashed lines, secret key rate of the case without correlation and fluctuation. The table inside the figure provides the key parameters of the experiments, where QZ, EZ, y1 and eph correspond, respectively, to the Z basis gain, the Z basis QBER, the Z basis single-photon yield and the phase error rate.
|
Discussion
In summary, we have proposed an efficient solution to the intensity correlation problem in practical QKD. Our approach achieves high tolerance to this imperfection through the addition of a monitor module at Alice’s side at minimal cost, leading to higher secret key rates and extended maximum achievable distances compared to previous proposals. Leveraging a stable DS-IM module, we have conducted the first experiment addressing intensity correlations in a practical QKD setup without requiring hardware-based suppression methods27, or limiting software-based methods restricted to the nearest-neighbours scenario21. Although we have considered a finite correlation range, our results could be promoted to the unbounded range setting using the tools in ref. 32. For future research, it is essential from an experimental perspective to improve the IM module in order to achieve lower levels of fluctuations and correlation. The current design still requires a reduction of fluctuations and correlation magnitude by two to three orders of magnitude to attain a key rate comparable to the ideal case. In addition, developing feedback methods based on low-noise photondiodes to account for time-dependent imperfections is another important research direction. On the theoretical side, analyzing potential security vulnerabilities arising from the source monitoring module would be valuable. Furthermore, it is meaningful to incorporate additional imperfections, such as side-channel effects, into the analysis.
Given that this type of correlation poses a considerable security concern in QKD systems, our work constitutes a significant advance for the practical security of QKD and facilitates the adoption of QKD in large-scale security applications.
Methods
Intensity correlation parameter
In this section, we outline the calculation of these inner products, and for this purpose, we restore the explicit notation of the intensity-setting subscripts for clarity. For further technical explanations, the reader is referred to ref. 24.
In the entanglement-based picture, the global input state of all protocol rounds can be described as
29
where is a virtual ancilla storing the intensity setting in round i, is a virtual ancilla storing the encoded BB84 state in round i (i.e., the bit and basis information), is the probability of choosing the intensity setting ai in round i, is the probability of choosing the BB84 state ri in round i, and is the vacuum state of Eve’s system. Also, for any given round i, we have defined30
where is the conditional ni-photon probability given the record a1…ai, is a virtual ancilla storing the photon number ni, and is a Fock state with ni photons encoding the BB84 state ri. Note that, given the finite range ξ of the correlations, for all i > ξ, we can replace by and by .In principle, for any given round k, one could establish CS constraints between the detection statistics of any two arbitrary records of settings. Nevertheless, this exhaustive approach would result in a number of CS constraints that increase exponentially with the correlation range, which is computationally prohibitive. Instead, we follow the simpler analysis presented in ref. 25, where only the tightest CS constraints are considered. Particularly, for round k, one only relates the yields/error yields of records of intensity settings exclusively differing in ak. Let ak−ξ,…,ak−1ak and be any two such records. As shown in refs. 24,25, it turns out that the relevant overlap to compute in order to evaluate the CS constraints between these two records is
31
where32
for . Explicit calculation of this overlap follows identically as in ref. 25 and yields33
As one would expect, the overlap is dependent on the correlation function g{k−1, ξ−1} through the conditional photon-number statistics. Since g{k−1, ξ−1} is unknown, one must derive correlation-function-independent lower bounds on the photon-number statistics —say, for the specific record ak−ξ,…,ak— in order to possibly lower bound the overlap in Eq. (33). In this respect, we recall that lower bounds on the overlaps are necessary to reach loosened but correlation-function-independent CS constraints25. In fact, such loosened CS constraints rely on lower bounds on the squared overlaps, which we refer to as the intensity correlation parameters,34
for any given round k, any pair of distinct settings ak and , and any photon number n.Reference values for the linear CS constraints
In this section, we present the reference parameters and that we utilize in the CS constraints. As mentioned earlier, although these parameters can be chosen arbitrarily, they have an impact on the tightness of the CS constraints. In accordance with ref. 24, here we select them following a rather typical channel and detection model free of intensity correlations. The model is depicted in Fig. 5, and the main elements involved are described in the caption.
[See PDF for image]
Fig. 5
Illustration of the channel model that we use to compute the reference parameters for the CS constraints.
PRWCP phase-randomized weak coherent pulse, BS beam splitter, η overall transmittance (including channel transmittance and detection efficiency); σa, misalignment; Derr, detector associated to the “error” clicks; Dcor, detector associated to the “correct” (or “no error'') clicks.
The reference n-photon yield in the model is simply given by
35
where pd is the dark count probability of Bob’s detectors and η is the overall transmittance of the system.In order to write down the reference n-photon error probabilities, we average over all four combinations of genuine detection events (i.e., disregarding dark counts for the moment). These have associated probabilities p1 = (1−η)n (no detector clicks), (only Dcor clicks), (only Derr clicks) and p4 = 1 − p1 − p2 − p3 (both detectors click). Assuming that double clicks are randomly assigned to a specific detection outcome, one can readily identify the specific dark count combinations that map each of these four events to a bit error. In doing so, one obtains the following conditional error probabilities for all four events: , , and , and therefore we conclude that
36
Measurement of correlation parameters
The SPD is chosen for the calculation of correlation parameters based on several key reasons. First, Alice’s local monitoring requires security parameters, specifically intensity correlation parameters, which SPDs provide more accurately due to lower noise than conventional PDs. Second, the threshold response model of SPDs can be used for a tighter estimation of the photon-number statistics, which will be shown below. Despite limited detection efficiency, SPDs can still accurately measure intensity correlations by grouping click outcomes based on previous round settings and calculating response rates.
Employing the Taylor expansion ex < 1 + x + x2/2 (−1 < x < 0) in Eq. (19), we obtain
37
and since the first-order term vanishes (see Eq. (2)), we have that38
for . Solving this quadratic equation for we find the upper bound39
Similarly, keeping the third order we have that ex > 1 + x + x2/2 + x3/6 (−1 < x < 0), and considering the practical situation of QKD, we have when . This means that40
Coming next, the second order term can be lower-bounded via —which results from plugging the relation ex > 1 + x (−1 < x < 0) in Eq. (19) — and the third order term can be lower bounded via . Altogether, this yields41
The above discussion leads to the conclusion in Eq. (20).Starting from Eq. (3) and expanding both and in δ yields
42
Since the first-order term vanishes upon integration, one can explicitly suppress it from the definition of pn∣{k, ξ} to obtain43
for44
This methodology, which is also exploited in ref. 23, allows for a more accurate estimation of the photon-number statistics than the monotonicity arguments provided in refs. 24,25. Particularly, it follows from Eq. (43) that45
The above discussion leads to the conclusion in Eq. (21).However, although the analysis in section ‘Calculation of correlation parameters’ and the above analysis assumes that ηm can be accurately characterized, if calibration errors of ηm do occur, we can still analyze and estimate the conditional photon-number statistics and correlation parameters. If the range of ηm can be determined, it can be incorporated into Eq. (20) to estimate new upper and lower bounds for . By combining this with Eq. (25), we can obtain updated intensity correlation parameters. In subsequent analysis, calculations would be based on the worst-case result within the range of ηm. Additionally, we have numerically verified that an exact characterization of ηm is not essential. A relative deviation in ηm only results in a similarly scaled relative deviation in the secret key rate.
Acknowledgements
This work has been supported by the National Natural Science Foundation of China (Grant nos. 62271463, 62301524, 62105318, 61961136004, 62171424), the Fundamental Research Funds for the Central Universities, the China Postdoctoral Science Foundation (Grant nos. 2022M723064), Natural Science Foundation of Anhui (No. 2308085QF216), the Innovation Programme for Quantum Science and Technology (Grant no. 2021ZD0300700), and the Youth Innovation Fund of the University of Science and Technology of China. V.Z. and M.C. acknowledge support from the Galician Regional Government (consolidation of Research Units: AtlantTIC), the Spanish Ministry of Economy and Competitiveness (MINECO), the Fondo Europeo de Desarrollo Regional (FEDER) through the grant No. PID2020-118178RB-C21, MICIN with funding from the European Union NextGenerationEU (PRTR-C17.I1) and the Galician Regional Government with own funding through the “Planes Complementarios de I+D+I con las Comunidades Autónomas” in Quantum Communication, the European Union’s Horizon Europe Framework Programme under the Marie Sklodowska-Curie Grant No. 101072637 (Project QSI) and the project “Quantum Security Networks Partnership” (QSNP, grant agreement no. 101114043). We would also like to express our sincere gratitude to Matej Pivoluska and his team for their attention to detail in our manuscript, which has contributed to improving its rigor.
Author contributions
J.L. and F.L. start the project. J.L., V.Z., F.L. and Z.Y. provide the theoretical analysis. F.L. Z.W. and J.L. design and perform the experiment and complete the data analysis. J.L., V.Z., M.C. and F.L. mainly prepared the manuscript. Z.Y., M.C., S.W., W.C., D.H., G.G. and Z.H. supervise the project.
Data availability
The data that support the findings of this study are available from the corresponding author upon reasonable request. And the detailed experimental data is provided within the Supplementary Material.
Competing interests
The authors declare no competing interests.
Supplementary information
The online version contains supplementary material available at https://doi.org/10.1038/s41534-025-01059-0.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
1. Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. In Conf. on Computers, Systems and Signal Processing, 175 (Bangalore, 1984).
2. Pirandola, S et al. Advances in quantum cryptography. Adv. Opt. Photon.; 2020; 12, pp. 1012-1236. [DOI: https://dx.doi.org/10.1364/AOP.361502]
3. Lo, H-K; Chau, HF. Unconditional security of quantum key distribution over arbitrarily long distances. Science; 1999; 283, pp. 2050-2056. [DOI: https://dx.doi.org/10.1126/science.283.5410.2050]
4. Shor, PW; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett.; 2000; 85, pp. 441-444. [DOI: https://dx.doi.org/10.1103/PhysRevLett.85.441]
5. Scarani, V et al. The security of practical quantum key distribution. Rev. Mod. Phys.; 2009; 81, pp. 1301-1350. [DOI: https://dx.doi.org/10.1103/RevModPhys.81.1301]
6. Renner, R. Security of quantum key distribution. Int. J. Quantum Inf.; 2008; 06, pp. 1-127. [DOI: https://dx.doi.org/10.1142/S0219749908003256]
7. Hwang, W-Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett.; 2003; 91, 057901. [DOI: https://dx.doi.org/10.1103/PhysRevLett.91.057901]
8. Wang, X-B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett.; 2005; 94, 230503. [DOI: https://dx.doi.org/10.1103/PhysRevLett.94.230503]
9. Lo, H-K; Ma, X; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett.; 2005; 94, 230504. [DOI: https://dx.doi.org/10.1103/PhysRevLett.94.230504]
10. Takesue, H et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors. Nat. Photonics; 2007; 1, pp. 343-348. [DOI: https://dx.doi.org/10.1038/nphoton.2007.75]
11. Lucamarini, M et al. Efficient decoy-state quantum key distribution with quantified security. Opt. Express; 2013; 21, pp. 24550-24565. [DOI: https://dx.doi.org/10.1364/OE.21.024550]
12. Yuan, Z et al. 10-Mb/s quantum key distribution. J. Lightw. Technol.; 2018; 36, pp. 3427-3433. [DOI: https://dx.doi.org/10.1109/JLT.2018.2843136]
13. Grünenfelder, F et al. Fast single-photon detectors and real-time key distillation enable high secret-key-rate quantum key distribution systems. Nat. Photonics; 2023; 17, pp. 422-426. [DOI: https://dx.doi.org/10.1038/s41566-023-01168-2]
14. Islam, NT; Lim, CCW; Cahall, C; Kim, J; Gauthier, DJ. Provably secure and high-rate quantum key distribution with time-bin qudits. Sci. Adv.; 2017; 3, e1701491. [DOI: https://dx.doi.org/10.1126/sciadv.1701491]
15. Boaron, A et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett.; 2018; 121, 190502. [DOI: https://dx.doi.org/10.1103/PhysRevLett.121.190502]
16. Grünenfelder, F; Boaron, A; Rusca, D; Martin, A; Zbinden, H. Performance and security of 5 GHz repetition rate polarization-based quantum key distribution. Appl. Phys. Lett.; 2020; 117, 144003. [DOI: https://dx.doi.org/10.1063/5.0021468]
17. Li, W et al. High-rate quantum key distribution exceeding 110 Mb s−1. Nat. Photonics; 2023; 17, pp. 416-421. [DOI: https://dx.doi.org/10.1038/s41566-023-01166-4]
18. Xu, F; Ma, X; Zhang, Q; Lo, H-K; Pan, J-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys.; 2020; 92, 025002.4122934 [DOI: https://dx.doi.org/10.1103/RevModPhys.92.025002]
19. Kobayashi, T; Tomita, A; Okamoto, A. Evaluation of the phase randomness of a light source in quantum-key-distribution systems with an attenuated laser. Phys. Rev. A; 2014; 90, 032320. [DOI: https://dx.doi.org/10.1103/PhysRevA.90.032320]
20. Roberts, GL et al. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution. Opt. Lett.; 2018; 43, pp. 5110-5113. [DOI: https://dx.doi.org/10.1364/OL.43.005110]
21. Yoshino, K-i et al. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses. npj Quantum Inf.; 2018; 4, [DOI: https://dx.doi.org/10.1038/s41534-017-0057-8] 8.
22. Lu, F-Y et al. Intensity modulator for secure, stable, and high-performance decoy-state quantum key distribution. npj Quantum Inf.; 2021; 7, [DOI: https://dx.doi.org/10.1038/s41534-021-00418-x] 75.
23. Lu, F-Y et al. Intensity tomography method for secure and high-performance quantum key distribution. J. Lightw. Technol.; 2023; 41, pp. 4895-4900. [DOI: https://dx.doi.org/10.1109/JLT.2023.3247766]
24. Zapatero, V; Navarrete, Á; Tamaki, K; Curty, M. Security of quantum key distribution with intensity correlations. Quantum; 2021; 5, 602. [DOI: https://dx.doi.org/10.22331/q-2021-12-07-602]
25. Sixto, X; Zapatero, V; Curty, M. Security of decoy-state quantum key distribution with correlated intensity fluctuations. Phys. Rev. Appl.; 2022; 18, 044069. [DOI: https://dx.doi.org/10.1103/PhysRevApplied.18.044069]
26. Pereira, M; Kato, G; Mizutani, A; Curty, M; Tamaki, K. Quantum key distribution with correlated sources. Sci. Adv.; 2020; 6, eaaz4487. [DOI: https://dx.doi.org/10.1126/sciadv.aaz4487]
27. Kang, X et al. Patterning-effect calibration algorithm for secure decoy-state quantum key distribution. J. Lightw. Technol.; 2023; 41, pp. 75-82. [DOI: https://dx.doi.org/10.1109/JLT.2022.3211442]
28. Huang, A; Mizutani, A; Lo, H-K; Makarov, V; Tamaki, K. Characterization of state-preparation uncertainty in quantum key distribution. Phys. Rev. Appl.; 2023; 19, 014048. [DOI: https://dx.doi.org/10.1103/PhysRevApplied.19.014048]
29. Xie, H-B et al. Optically injected intensity-stable pulse source for secure quantum key distribution. Opt. Express; 2019; 27, pp. 12231-12240. [DOI: https://dx.doi.org/10.1364/OE.27.012231]
30. Wang, X-B. Decoy-state quantum key distribution with large random errors of light intensity. Phys. Rev. A; 2007; 75, 052301. [DOI: https://dx.doi.org/10.1103/PhysRevA.75.052301]
31. He, D-Y et al. Sine-wave gating InGaAs/InP single photon detector with ultralow afterpulse. Appl. Phys. Lett.; 2017; 110, 111104. [DOI: https://dx.doi.org/10.1063/1.4978599]
32. Pereira, M. et al. Quantum key distribution with unbounded pulse correlations. Quantum Sci. Technol.10, 015001 (2024).
Copyright Nature Publishing Group 2025