ArticlePDF Available
IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. 21, NO. 3, MAY/JUNE 2015 6600207
Differential Phase-Shift Quantum Key
Distribution Systems
Kyo Inoue
(Invited Paper)
Abstract—Differential phase-shift (DPS) quantum key distri-
bution (QKD) is a unique QKD protocol that is different from
traditional ones, featuring simplicity and practicality. This paper
overviews DPS-QKD systems.
Index Terms—Quantum key distribution, quantum mechanics,
phase shift keying.
I. INTRODUCTION
QUANTUM key distribution (QKD) provides a secret key
to distant parties for ciphering/deciphering a message,
whose security is based on quantum mechanics [1]. The first
QKD protocol called BB84 was proposed in 1984 and has been
widely studied and developed. Differential phase-shift (DPS)
QKD is another QKD scheme proposed about two decades after
BB84 [2], [3], which has a unique structure different from BB84,
featuring simplicity and practicality. This paper overviews DPS-
QKD systems.
II. CONFIGURATION AND OPERATION
The configuration of DPS-QKD is shown in Fig. 1. A trans-
mitter (Alice) sends a highly attenuated coherent pulse train
that is randomly phase-modulated by {0, π}for each pulse. The
transmitted signal power is so small that the average photon
number per pulse is less than one, e.g., 0.2. A receiver (Bob)
receives the transmitted signal with a one-pulse delay Mach–
Zehnder interferometer. In the interferometer, adjacent pulses
interfere with each other, as illustrated in Fig. 1, and photons
are detected according to the phase difference between the in-
terfering pulses such that detector 1 (or 2) clicks for a phase
difference of 0 (or π). Here, photon detection occurs rarely
and randomly because of the small number of photons in the
pulse train. After signal transmission, Bob tells Alice the pho-
ton detection time through a classical channel. With this time
information and her phase modulation data, Alice knows which
detector clicked at Bob. Then, Alice and Bob obtain identical bit
strings, provided that detector 1 (or 2) is assigned to bit 0 (or 1),
which can be a secret key.
The features of this protocol are simplicity and high key cre-
ation efficiency. The traditional QKD protocol BB84 includes
a basis selection procedure, and basis-mismatched photons are
Manuscript received July 15, 2014; revised September 12, 2014; accepted
September 19, 2014.
The author is with Osaka University, Osaka 565-0871, Japan (e-mail:
kyo@comm.eng.osaka-u.ac.jp).
Digital Object Identifier 10.1109/JSTQE.2014.2360362
Fig. 1. Configuration of DPS-QKD. att: optical attenuator, τ: time interval of
pulses.
discarded. On the other hand, the DPS protocol needs no such
process and all detected photons contribute to key bits, result-
ing in a higher key creation efficiency. The fact that there is
no need for the basis selection is also beneficial in terms of
receiver complexity and detectors’ dark count errors. Practical
BB84 systems usually employ a combination of a beam splitter
(BS) and two sets of measurement apparatus for the basis selec-
tion, where four photon detectors are used. On the other hand,
the DPS protocol uses one measurement apparatus with two
detectors, i.e., a simpler receiver configuration. In addition, the
smaller number of detectors causes lower dark counts, resulting
in a larger number of secure key bits after error correction and
privacy amplification.
Using sequential pulses, each of which can contribute to a key
bit, is another feature. The time domain is efficiently utilized,
resulting in a high key creation speed in practice. Robustness
against photon-number splitting attacks, even when using weak
coherent light, is another advantage of the DPS protocol, which
is described in more detail in the following section.
III. SECURITY ISSUES
The security of DPS-QKD is based on the fact that weak
coherent pulse sequences with different {0, π}-phases for each
pulse are utilized, which are nonorthogonal with each other
and thus cannot be perfectly distinguished by an eavesdropper
(Eve). Nevertheless, the security of DPS-QKD has not been fully
analyzed in terms of quantum mechanics, owing to its unique
structure different from that of traditional QKD protocols. This
section describes the security issues of the DPS protocol clarified
for the present.
A. Beam Splitting Attack
The typical and simplest eavesdropping against QKD that
uses coherent light is a beam splitting attack. Eve replaces the
1077-260X © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
6600207 IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. 21, NO. 3, MAY/JUNE 2015
Fig. 2. Bob’s detection during intercept-resend attack.
transmission line by a lossless one, splits and stores Alice’s
signal with a fraction corresponding to the original transmission
loss, and measures the split signal after Bob’s detection time is
disclosed. This strategy does not change Bob’s receiving signal
and cannot be noticed at all.
However, the amount of information leaked to Eve through
this eavesdropping is limited because of the small photon num-
ber in DPS signals. In measuring the split and stored signal, Eve
attempts to identify the phase difference between two neighbor-
ing pulses from which Bob detected a photon and created a key
bit. Here, the corresponding pulses include 2rμphotons on an
average, where μis the mean photon number sent from Alice
per pulse and ris the beam-splitting ratio that is equal to the
original transmission loss. Thus, the information rate leaked to
Eve through the beam split attack is 2rμ, which is small for a
small mean photon number μand can be excluded from the key
bits by privacy amplification [4].
B. Intercept Resend Attack
Another typical eavesdropping strategy is the intercept-resend
attack. Eve intercepts and measures every pulse sent from Alice
and resends a fake signal to Bob according to the measurement
result. However, Eve cannot measure every phase difference
because of the small photon number, and cannot resend a full
replica of Alice’s signal. An imperfect fake signal causes a bit er-
ror in the signal received by Bob, from which the eavesdropping
is revealed.
For example, Eve is supposed to measure Alice’s signal using
apparatus identical to Bob’s shown in Fig. 1. She occasionally
detects a photon and knows the phase difference between two
corresponding pulses. In such a situation, she resends a photon
super-positioned over two pulses with the measured phase dif-
ference, while sending vacuum at unmeasured time slots. Then,
two isolated pulses arrive at Bob, who detects a photon possibly
at three time slots as illustrated in Fig. 2: the first slot when the
first pulse via the short path reaches the detectors, the second
slot when the first pulse via the long path and the second pulse
via the long path reach the detectors, and the third slot when
the second pulse via the long path reaches the detectors. When
a photon is detected at the second time slot, the two pulses in-
terfere with each other, providing a correct bit to Bob. Bob does
not notice the eavesdropping in this case. At the first and third
time slots, on the other hand, there is no interference and a pho-
ton randomly clicks either one of the detectors. This detection
event can cause Bob’s bit error, from which the eavesdropping
is revealed. The probability of a photon being detected at the
Fig. 3. Sequential attack with amplitude modulation. Lossless transmission
line is installed by Eve in order to compensate photon loss resulting from eaves-
dropping where a fake signal is resent only when Eve consecutively measures
pulses.
first or third time slot is 1/2, and thus the bit error rate induced
by the eavesdropping is 1/4.
C. Sequential Attack
A sequential attack [5]–[9] is a kind of intercept-resend at-
tacks. In the example of intercept-resend attacks described in
the previous subsection, a bit error is induced when a photon
is detected at the first or third time slot, i.e., the edge slots, at
which no interference occurs. In order to reduce this bit error
rate, Eve waits for consecutive detections and resends a pulse
sequence with measured phases instead of two isolated pulses
as a fake signal. For this fake signal, the probability of a photon
being detected at the edge slots is smaller than that in the simple
intercept-resend attack described in the previous subsection. In
addition, Eve modulates the envelope of the pulse sequence so
that the amplitudes of the edge pulses is smaller than that of the
middle pulses, as illustrated in Fig. 3. The photon probability
at the edge slots is further reduced with this resending strategy.
Subsequently, Bob’s bit error rate resulting from no interfer-
ing detection at the edge slots becomes smaller than that in the
simple intercept-resend eavesdropping.
Several studies have been reported on sequential attacks. They
include an attack using the same apparatus as Bob’s in the inter-
cepting stage [5], one conducting unambiguous state discrim-
ination (USD) measurement for each pulse [6]–[8], and one
conducting USD for phase differences between adjacent pulses
[9]. Regarding the pulse envelope resent by Eve, the first two
reports [5], [6] assume a rectangular shape, the third one [7]
assumes a Gaussian, and the last two [8], [9] optimize the en-
velope to make Bob’s error rate lowest. The last strategy, that
employs the USD for phase differences and the optimized pulse
envelope, is the most threatening for DPS-QKD systems with
large transmission loss, i.e., long-distance systems, among other
specific eavesdropping.
D. Photon Number Splitting Attack
Photon number splitting (PNS) attacks are known to be seri-
ous eavesdropping against BB84 using weak coherent light [10],
[11]. In order to prevent this eavesdropping, a decoy method
[12]–[14] is usually employed in practical BB84 systems, mak-
ing the key creation process complicated. The DPS protocol,
on the other hand, is robust against PNS attacks [15]. In PNS
attacks, Eve probes the photon number included in a transmitted
signal, and picks up and measures an extra photon when more
than two photons are included. Unfortunately for Eve, the phase
information of a DPS signal collapses when the photon number
is probed, and, as a result, bit errors are induced at Bob. Thus,
INOUE: DIFFERENTIAL PHASE-SHIFT QUANTUM KEY DISTRIBUTION SYSTEMS 6600207
PNS attacks are readily revealed in DPS-QKD systems. This is
one of the advantages of the DPS protocol compared with the
original BB84 protocol.
E. General Individual Attack
General individual attack [5] is conceptual eavesdropping that
attacks each key bit (where “individual” does not mean each
pulse but each single-photon in a pulse train). Eve takes each
single-photon super-positioned over Alice’s pulse sequence
(though it is questionable how to do it for a long sequence
including a lot of photons), makes a unitary interaction with her
probe state, and measures the probe state after Bob’s photon
detection time is announced. The analysis in [5] concludes that
the upper bound of the secure key creation rate Rdetermined by
this eavesdropping is given by
R=pclick[(1 2μ) log2Pc0(e)+f(e)h(e)] (1)
with
Pc0(e)=1e2(1 6e)2
2
where pclick is Bob’s photon detection probability, μis the
mean photon number per pulse, eis the system error rate,
h(e)=elog2e(1 e) log2(1 e), and f(e) is a redun-
dancy factor from the Shannon limit. Many DPS-QKD experi-
ments conducted to date have employed the above equation for
evaluating their system performance.
F. Side-Channel Attack
Recent QKD studies focus on side-channel attacks, which
take advantage of imperfections in actual devices used in practi-
cal QKD systems. Such an attack was also proposed against
a DPS-QKD system equipped with superconducting single-
photon detectors (SSPDs) [16]. Utilizing the operation char-
acteristics of a SSPD, Eve arbitrarily manipulates the SSPD
click by injecting bright blinding light. She can then obtain
the complete key bit information by an intercept-resend at-
tack using bright light as a fake signal. A countermeasure
against this bright illumination attack has also been proposed
[17].
However, this eavesdropping can be noticed by monitoring the
light power received by Bob. Based on [18], the injection light
power should be greater than 30 dBm for Eve to perform the
bright light illumination attack, which can be easily monitored
by a handy optical power meter.
G. Sophisticated Attacks
Collective attacks or coherent attacks are the most sophisti-
cated eavesdropping against QKD systems, where Eve prepares
a probe state and makes it interact with Alice’s signal as a
whole, and then measures the probe state after post information
is exchanged between Alice and Bob. General analysis for such
eavesdropping against DPS-QKD is difficult, because Alice’s
pulses last long (e.g., a 4-h continuous operation with a 1-GHz
pulse repetition rate was demonstrated in [19]) and the length
and the temporal position of one sequence can be arbitrarily
selected by Bob in the signal processing stage after detecting
photons.
Several studies on conditional collective attacks have been re-
ported instead. They include eavesdropping that attacks pairs of
adjacent pulses [20], one assuming that Alice’s pulse sequence
includes just one photon [21], one against noiseless systems
[22], and one attacking blocks of a pulse sequence with a fixed
length where the carrier phase is random for each block [23].
The results in the last report [23] indicate that the system per-
formance of DPS-QKD in terms of the transmission distance is
worse than that of BB84 with a decoy method. The first report
[20] analyses another QKD scheme called the coherent-one-way
(COW) protocol [24] as well as DPS-QKD, which suggests that
the system performances of COW and DPS are similar but DPS
is somewhat better than COW. Nevertheless, it is an open ques-
tion whether to assume a given length of one signal sequence
is appropriate for DPS-QKD systems where Bob can arbitrarily
select one sequence (i.e., a series of pulses from which a key
string is created) from Alice’s consecutive signal and thus Eve
does not know which series of pulses should be interacted with
her probe state.
IV. EXPERIMENTS
Since the first proposal of DPS-QKD, a number of experi-
ments have been performed.
The first experiment over a fiber line was reported in 2004
[25]. The main feature of this experiment was the use of a
waveguide interferometer. In phase-encoded QKD systems in
general, the stability of interferometers used to decode phase in-
formation is an issue for system implementation. A waveguide
interferometer was employed for the first time in this experi-
ment, owing to which the stable QKD operation was achieved
without phase stabilization circuits. A laser source with a narrow
spectral linewidth was also a key device used in this experiment.
In conducting a DPS-QKD experiment, the carrier phase in a
pulse train should be stable for Bob to create correct bits. In
order to achieve this, an external-cavity semiconductor laser
with a spectral linewidth of about 200–300 kHz was employed
for a 1-GHz pulse repetition rate. The requirement for the laser
linewidth used in DPS-QKD systems was quantitatively inves-
tigated in [26].
The benchmark experiment was reported in 2007 [27], us-
ing superconducting single-photon detectors. QKD transmis-
sion over a 200-km fiber was achieved on account of the low
dark count rate of the detectors. A long-distance QKD experi-
ment over 260 km was also reported employing the DPS pro-
tocol [28]. These experiments assume the general individual
attack described in Section III-D, which is less powerful than
the sequential attacks mentioned in Section III-C. Thus, unfor-
tunately, the secret keys created in those experiments are not
perfectly secured [8], [9].
One feature of DPS-QKD is a high key creation rate owing to
efficient usage of the time domain and efficient usage of detected
photons, i.e., no detected photon is discarded. High speed QKD
experiments have been also reported using the DPS protocol,
6600207 IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. 21, NO. 3, MAY/JUNE 2015
Fig. 4. Bob’s setup in delay selected DPS-QKD. SW denotes a Mach–Zehnder
interferometer switch and PS denotes a phase switch.
involving a key creation speed of 1.3-Mbps over 10-km [29]
and that of 24-kb/s over 100-km [30].
Practicality is also a feature of DPS-QKD. Field experiments
have been conducted [19], [31], confirming the feasibility in
practical environments.
V. EXTENDED SCHEMES
In order to improve the system performance or practicality,
several schemes extended from the original DPS protocol have
been proposed. Although the quantitative system performances
of these schemes are not clarified at the present when even
the original DPS protocol is not fully analyzed, this section
introduces such schemes to show potential extensibilities of
DPS-QKD.
A. Delay Selected DPS-QKD
In DPS-QKD, Bob creates a key bit from the phase difference
between neighboring pulses. A one-pulse delay interferometer
is used for measuring the phase difference. An extended version
of DPS-QKD is a delay selected scheme, where Bob arbitrarily
chooses an interfering pulse-pair by selecting the delay time in
an interferometer [32].
Fig. 4 shows an example of Bob’s setup for implementing
this scheme, where the number of selectable time delays is
three. The setup consists of a beam splitter, symmetric Mach–
Zehnder (MZ) interferometer switches in series (SW1, SW2,
and SW3), and delay lines connecting these switches. The delay
time of each delay line is equal to the time interval of incoming
pulses. The MZ switch operates either as a 50:50 beam splitter
(BS) or a through-connector (TC). The mode of the operation
is chosen by a phase switch attached in one arm in the MZ
interferometer such that phases of π/2 and πselect the former
and latter operations, respectively. With this receiver setup, Bob
selects the time interval of interfering pulses from which a key
bit is created, such that the time interval is τ,2τ,or3τwhen
{SW1 =“BS,” SW2 =“TC,” SW3 =“TC”},{SW1 =“TC,
SW2 =“BS,” SW3 =“TC”},or{SW1 =“TC”, SW2 =“TC”,
SW3 =“BS”}, respectively, where τis the time interval of
neighboring pulses in the incoming signal.
This delay-selected DPS protocol improves the security. Bob
randomly selects the delay time, which cannot be predicted
by Eve. Thus, the ambiguity for Eve about which pulse pair
should be attacked is enhanced, and the security is improved as
a result. For example, when Eve tries the simple intercept-resend
Fig. 5. Four-level differential-phase-shift quantum key distribution.
attack described in Section III-B, Bob’s error rate induced by
eavesdropping becomes [32]
Pe=1
211
2M(2)
where Mis the number of candidates of the time delay. For a
large M, this error rate is close to 1/2, meaning that Eve obtains
almost no information.
An ultimate extension of the above idea is a system in which
Bob arbitrarily selects two interfering pulses out of Lpulses
with Lbeing the number of pulses in one sequence of Alice’s
signal. This system was proposed and analyzed in [33], which
shows that the production length of a secure key will be
G=N1h(ebit)hνth
L1 (3)
where Nis the sifted key length (i.e., the number of detected
photons), hdenotes Shannon entropy h(x)=xlog2x(1
x) log2(1 x),νth is the critical photon number satisfying
νth <(L1)/2, and Lis the number of pulses in one sequence.
The second and third terms in (3) represent the key compres-
sion rates caused by error correction and privacy amplification,
respectively. It is noteworthy that the privacy amplification fac-
tor, i.e., the third term, is independent of perturbation caused
by eavesdropping unlike conventional QKD protocols. This is a
unique feature of this system, though its implementation is hard
in practice.
B. Four-Level DPS-QKD
As suggested in Section III, the security issue is a weakness
of DPS-QKD, compared with BB84. With this background, a
scheme introducing a concept of BB84 into the DPS protocol
was proposed [34].
Fig. 5 shows the configuration of the scheme. Alice sends
a weak coherent pulse train in which each pulse is randomly
phase-modulated by {0, π}and {π/2, 3π/2}instead of just by
{0, π}in the original DPS protocol. Bob receives the signal
with two delay interferometers followed by photon detectors,
where the phase differences in the interferometers are 0 and
π/2, respectively. The interferometers with 0 and π/2 phase
differences distinguish the differential phase of {0, π}and {π/2,
3π/2}, respectively.
INOUE: DIFFERENTIAL PHASE-SHIFT QUANTUM KEY DISTRIBUTION SYSTEMS 6600207
Fig. 6. Macroscopic differential-phase-shift quantum key distribution. “th”
denotes threshold.
The two sets of differential phases of {0, π}and {π/2, 3π/2}
form two nonorthogonal bases and the concept of BB84 of
using two nonorthogonal bases is introduced in this scheme.
As a result, the ambiguousness for Eve to identify key bits is
enhanced and the security improvement can be expected. For
example, this scheme is robust against the sequential attacks
described in Section III-C, because the USD performance is
low for nonorthogonal four states. Note that robustness of DPS-
QKD against PNS attacks is still achieved because of the use of
a coherent pulse sequence, though the other feature of simplicity
is lost.
C. Macroscopic DPS-QKD
Continuous variable QKD using conventional photo-
detectors instead of single-photon detectors has been studied [1].
Its security relies on the quantum noise of coherent light, and
post-selection and reverse reconciliation enable QKD transmis-
sion over a lossy channel. DPS-QKD can be also implemented
using conventional photo-detectors.
Fig. 6 shows the configuration of such a system [35]. Alice
sends coherent light randomly phase-modulated by {δ,–δ}.Its
intensity is so high as to be detected by a conventional photo-
detector, and δis so small that the two signal states partially
overlap with each other due to the quantum noise, as illustrated
in Fig. 6. Bob receives the signal by a delay interferometer with a
phase difference of π/2, and the outputs of the interferometer are
coupled into a balanced detector. The detected signal has three
output levels corresponding to differential phases of +2δ,0,and
2δin the incoming signal, accompanied with fluctuations due
to the quantum noise, as illustrated in Fig. 6. For this signal
distribution, Bob sets two thresholds; one at the higher-side
tail of the peak corresponding to +2δ, and the other at the
lower-side tail of the peak corresponding to 2δ,asshownin
Fig. 6. He creates bits “1” and “0” when the signal is larger and
smaller than the upper and lower thresholds, respectively. These
detection events occur occasionally and randomly, and cannot
be predicted by Eve. This situation is equivalent to the photon
detection event in the original DPS-QKD system. Subsequently,
Alice and Bob share a secret key via procedures similar to the
original DPS protocol.
The security of this scheme relies on the fact that the two
signal states of {δ,–δ}are nonorthogonal and thus cannot be
perfectly distinguished by Eve. Reverse reconciliation is also
helpful to enhance security, as in conventional continuous vari-
Fig. 7. DPS quantum secret sharing. PM: phase modulator.
able QKD. The setup of this QKD system is the same as that
of optical differential-phase-shift keying (DPSK) systems well-
developed in conventional optical communication. Therefore,
this scheme is readily implemented with off-the-shelf devices,
whereas conventional continuous variable QKD systems need
homodyne detection with phase-locked local light.
D. DPS Quantum Secret Sharing
Quantum secret sharing (QSS) is a type of QKD, which dis-
tributes a full key to one party (Charlie) and partial keys to two
parties (Alice and Bob). While neither Alice nor Bob can deci-
pher Charlie’s ciphered message with his/her partial key alone,
they can decipher the message only when using their keys to-
gether. This QSS operation can be achieved based on the idea
of the DPS protocol.
Fig. 7 shows the configuration of such a system [36]. Alice
sends a DPS signal, i.e., a weak coherent pulse train phase-
modulated by {0, π}for each pulse, to Bob. Bob addition-
ally imposes {0, π}-phase modulation onto the incoming signal
while monitoring the incident power, and sends the signal to
Charlie. Charlie receives it with a delay interferometer followed
by photon detectors, where detector 1 (or 2) clicks when the
differential phase is 0 (or π). He creates bit “0” and “1” from
the clicks of detectors 1 and 2, respectively.
In this signal transmission, Charlie’s measurement result is
an exclusive OR of Alice’s and Bob’s phase modulation. Thus,
Alice and Bob can know Charlie’s bits only when they collab-
orate, i.e., the secret sharing function is achieved. The security
of shared keys relies on the use of a weak coherent pulse train,
as in DPS-QKD.
A unique function required for QSS is to prohibit one party
from knowing the others’ key by oneself. The monitoring de-
tector in Bob’s site is equipped to prevent Alice from probing
Bob’s key by sending strong pulses and measuring them after
Bob.
E. Entanglement-Based Scheme
Entanglement-based QKD increases the transmission dis-
tance, where an entanglement source positioned at the mid-
dle between Alice and Bob sends quantum-entangled signal
to each of them. Alice and Bob measure the received signals
while selecting measurement basis (in case of BBM92 [37]),
and then create key bits from basis-matched detections. The
feature of DPS-QKD viz., no basis selection is applicable to
entanglement-based QKD.
6600207 IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. 21, NO. 3, MAY/JUNE 2015
Fig. 8. Entanglement based DPS-QKD. WDM coupler: wavelength division
multiplexing coupler, ent.source: time-bin entanglement source.
Fig. 8 shows the configuration of such a system [38]. An en-
tanglement source positioned between Alice and Bob generates
a sequence of time-bin entangled photon pairs by injecting a co-
herent pump pulse train into an optical parametric medium, and
sends each of the photon pair to Alice and Bob, respectively. The
mean photon number in the generated photon sequence is ad-
justed to be small as in DPS-QKD, which is made by the pump
power. Alice and Bob measure the received photon sequence
with delay interferometers followed by photon detectors. Here,
the detection events are correlated between Alice and Bob such
that when both of them detect photons at an identical time slot,
detector 1 (or 2) clicks both at Alice and Bob. From this correla-
tion, secret key bits are created. The security of the transmitted
photon sequence relies on the same mechanism as in DPS-QKD.
VI. SUMMARY
In this paper, DPS quantum key distribution was overviewed.
DPS-QKD has a unique structure different from traditional QKD
protocols, i.e., no basis selection procedure, featuring simplicity
and practicality. Extended schemes based on the idea of the DPS
protocol were also described. The traditional BB84 protocol
has been widely studied and developed both experimentally and
theoretically. The DPS protocol, on the other hand, has not been
well analyzed owing to its unique structure. Further studies are
expected.
REFERENCES
[1] V. Scarani, H. Pasquinucci, N. Cerf, M. Duˇ
sek, and N. L¨
utkenhaus, “The
security of practical quantum key distribution,Rev. Mod. Phys., vol. 81,
no. 3, pp. 1301–1350, Jul.–Sep. 2009.
[2] K. Inoue, E. Waks, and Y. Yamamoto, “Differential-phase-shift quantum
key distribution,Phys. Rev. Lett., vol. 89, no. 3, pp. 037902-1–037902-3,
Jul. 2002.
[3] K. Inoue, E. Waks, and Y. Yamamoto, “Differential-phase-shift quantum
key distribution using coherent light,Phys. Rev. A, vol. 68, pp. 022317-1–
022317-3, Aug. 2003.
[4] C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized
privacy amplification,IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915–
1923, Nov. 1995.
[5] E. Waks, H. Takesue, and Y. Yamamoto, “Security of differential-phase-
shift quantum key distribution against individual attacks,Phys.Rev.A,
vol. 73, no. 7, pp. 012344-1–012344-9, Jan. 2006.
[6]M.Curty,L.L.Zhang,H.-H.Lo,andN.L
¨
utkenhaus, “Sequential
attacks against differential-phase-shift quantum key distribution with
weak coherent states,” Quant. Inf. Comput., vol. 7, no. 7, pp. 665–688,
2007.
[7] T. Tsurumaru, “Sequential attack with intensity modulation on the
differential-phase-shift quantum key distribution protocol,Phys.Rev.A,
vol. 75, no. 6, pp. 062319-1–062319-6, Jun. 2007.
[8] M. Curty, K. Tamaki, and T. Moroder, “Effect of detector dead times on
the security evaluation of differential-phase-shift quantum key distribution
against sequential attacks,” Phys. Rev. A, vol. 71, no. 77, pp. 052321-1–
052321-20, May 2008.
[9] H. Gomez-Sousa and M Curty, “Upper bounds on the performance of
differential-phase-shift quantum key distribution,Quantum Inf. Comput.,
vol. 9, no. 1/2, pp. 62–80, 2009.
[10] B. Huttuner, N. Imoto, N. Gisin, and T. Mor, “Quantum cryptogra-
phy with coherent states,” Phys.Rev.A, vol. 51, no. 3, pp. 1863–1869,
Mar. 1995.
[11] G. Brassard, N. L¨
utkenhaus, T. Mor, and B. C. Sanders, “Limitations on
practical quantum cryptography,” Phys. Rev. Lett., vol. 85, no. 6, pp. 1330–
1333, Aug. 2000.
[12] W.-Y. Hwang, “Quantum key distribution with high loss: Toward global
secure communication,” Phys. Rev. Lett., vol. 91, no. 5, pp. 057901-1–
057901-4, Aug. 2003.
[13] X.-B. Wang, “Beating the photon-number-splitting attack in practical
quantum cryptography,Phys. Rev. Lett., vol. 94, no. 23, pp. 230503-1–
230503-4, Jun. 2005.
[14] H. -H. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,”
Phys. Rev. Lett., vol. 94, no. 23, pp. 230504-1–230504-4, Jun. 2005.
[15] K. Inoue and T. Honjo, “Robustness of differential-phase-shift quantum
key distribution against photon-number-splitting attack,Phys.Rev.A,
vol. 71, no. 4, pp. 042305-1–042305-4, Apr. 2005.
[16] L. Lyderson, J. Skaar, and V. Makarov, “Tailored bright illumination
attack on distributed-phase-reference protocol,” J. Mod. Opt., vol. 58,
no. 8, pp. 680–685, May 2011.
[17] T. Honjo, M. Fujiwara, K. Shimuzu, K. Tamaki, S. Miki, T. Yamashita,
H. Terai, Z. Wang, and M. Sasaki, “Countermeasure against tailored bright
illumination attack for DPS-QKD,” Opt. Exp., vol. 21, no. 3, pp. 2667–
2675, Feb. 2013.
[18] M. Fujiwara, T. Honjo, K. Shimizu, K. Tamaki, and M. Sasaki, “Char-
acteristics of superconducting single photon detector in DSP-QKD sys-
tem under bright illumination blinding attack,” Opt. Exp., vol. 21, no. 5,
pp. 6304–6312, Mar. 2013.
[19] M. Sasaki et al., “Field test of quantum key distribution in the Tokyo QKD
network,” Opt. Exp., vol. 19, no. 11, pp. 10387–10409, May 2011.
[20] C. Branciard, N. Gisin, and V. Scarani, “Upper bounds for the security
of two distributed-phase reference protocols of quantum cryptography,”
New J. Phys., vol. 10, pp. 013031-1–013031-25, Jan. 2008.
[21] K. Wen, K. Tamaki, and Y. Yamamoto, “Unconditional security of single-
photon differential phase shift quantum key distribution,Phys. Rev. Lett.,
vol. 103, pp. 170503-1–170503-4, Oct. 2009.
[22] Y. Zhao, C. F. Fung, Z. Han, and G. Guo, “Security proof of differential
phase shift quantum key distribution in the noiseless case,Phys. Rev. A,
vol. 78, no. 4, pp. 042330-1–042330-13, Oct. 2008.
[23] K. Tamaki, M. Koashi, and G. Kato, “Unconditional security of
coherent-state-based differential phase shift quantum key distribution with
block-wise phase randomization,” [Cornell Univ. Library, e-print serv.]
arxiv.org/abs/1208.1995, 2012.
[24] D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H. Zbinden, “Fast and
simple one-way quantum key distribution,Appl. Phys. Lett., vol. 87,
no. 19, pp. 194108-1–194108-4, Nov. 2005.
[25] T. Honjo, K. Inoue, and H. Takahashi, “Differential-phase-shift quan-
tum key distribution experiment with a planar light-wave circuit Mach–
Zehnder interferometer,Opt. Lett., vol. 29, no. 29, pp. 2797–2799,
Dec. 2004.
[26] T. Honjo, T. Inoue, and K. Inoue, “Influence of light source linewidth in
differential-phase-shift quantum key distributionsystems,” Opt. Commun.,
vol. 284, pp. 5856–5859, Sep. 2011.
[27] H. Takesue, S. W. Nam, Q. Zhang, R. H. Hadfield, T. Honjo, K. Tamaki,
and Y. Yamamoto, “Quantum key distribution over a 40-dB channel loss
using single-photon detector,” Nature Photon., vol. 1, pp. 343–348, Jun.
2007.
[28] S. Wang, W. Chen, J. Guo, Z. Yin, H. Li, Z. Zhou, G. Guo, and Z. Han,
“2 GHz clock quantum key distribution over 260 km of standard telecom
fiber,” Opt. Lett., vol. 37, no. 6, pp. 1008–1010, Mar. 2012.
[29] Q. Zhang et al., “Megabits secure key rate quantum key distribution,” New
J. Phys., vol. 11, pp. 045010-1–045010-9, Apr. 2009.
[30] N. Namekata, H. Takesue, T. Honjo, Y. Tokura, and S. Inoue, “High-
rate quantum key distribution over 100 km using ultra-low-noise, 2-GHz
INOUE: DIFFERENTIAL PHASE-SHIFT QUANTUM KEY DISTRIBUTION SYSTEMS 6600207
sinusoidally gated InGaAs/InP avalanche photodiodes,Opt. Exp., vol. 19,
no. 11, pp. 10632–10639, May 2011.
[31] T. Honjo, S. Yamamoto, T. Yamamoto, H. Kamada, Y. Nishida, O.
Tadanaga, M. Asobe, and K. Inoue, “Field trial of differential-phase-
shift quantum key distribution using polarization independent frequency
up-convertors,Opt. Exp., vol. 15, no. 24, pp. 15920–15927, Nov.
2007.
[32] T. Honjo and K. Inoue, “Differential-phase-shift QKD with an extended
degree of freedom,” Opt. Lett., vol. 31, no. 4, pp. 522–524, Feb. 2006.
[33] T. Sasaki, Y. Yamamoto, and M. Koashi, “Practical quantum key distri-
bution protocol without monitoring signal disturbance,” Nature, vol. 509,
pp. 475–478, May 2014.
[34] K. Inoue and Y. Iwai, “Differential-quadrature-phase-shift quantum key
distribution,” Phys. Rev. A, vol. 79, no. 2, pp. 022319-1–022319-9, Feb.
2009.
[35] T. Kukita, H. Takada, and K. Inoue, “Macroscopic differential phase shift
quantum key distribution using an optical pre-amplified receiver,Jpn. J.
Appl. Phys., vol. 49, pp. 122801-1–122801-11, Dec. 2010.
[36] K. Inoue, T. Ohashi, T. Kukita, K. Watanabe, S. Hayashi, T. Honjo, and
H. Takesue, “Differential-phase-shift quantum secret sharing,” Opt. Exp.,
vol. 16, no. 20, pp. 15469–15476, Sep. 2008.
[37] C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography
without Bell’s theorem,Phys. Rev. Lett., vol. 68, no. 5, pp. 557–559, Feb.
1992.
[38] K. Inoue and H. Takesue, “Quantum key distribution using entangled-
photon trains with no basis selection,” Phys. Rev. A, vol. 73, no. 3,
pp. 032332-1–032332-4, Mar. 2006.
Kyo Inoue was born in Tokyo, Japan, in 1959. He received the B.S. and M.S.
degrees in applied physics in 1982 and 1984, respectively, and the Ph.D. degree
in electrical engineering from Tokyo University, Tokyo, Japan, in 1997.
From 1984 to 2005, he was with Nippon Telegram and Telephone Corpora-
tion, where his work involved optical communications and quantum communi-
cations. He is currently a Professor at Osaka University, Osaka, Japan.
... Since its initial development, QKD has grown to encompass a wide range of protocols [10] and different encoding schemes. Of particular interest here are those employing time-and phasebased encoding rather than polarization [11,12], as this allows manipulation of the polarization degree of freedom while maintaining robust security analyses [10,13]. Thus far, SatQKD has used polarization encoding for prepare-and-measure systems [8] due to its technological maturity and stability in the atmosphere. ...
... Time-and phase-based QKD receivers use an unbalanced interferometer [11,12] (see Fig. 6 for an example using a Michelson interferometer) to measure coherence (time based) or decode the QKD signal (phase based). An unbalanced interferometer requires the choice of a path difference L, to satisfy two objectives, one on a long and one on a short time scale: Fig. 6. ...
... Reference [59] follows the key rate estimate used in Ref. [66], which implements the key rate of Ref. [67]. The same methodology could be applied to phase-based protocols, such as the phase-based BB84 protocol [68], differential-phase-shift (DPS) [12,69], or the round-robin differential-phase-shift (RRDPS) [70]. ...
Article
Full-text available
Free-space optical communication links promise better security and increase bandwidths but can suffer from noise in daylight. This is particularly detrimental in quantum communications where current mitigation techniques, such as spectral, temporal, and spatial filtering, are not yet sufficient to make daylight tolerable for satellite quantum key distribution (SatQKD). As all current SatQKD systems are polarization-encoded, polarization filtering has not been investigated. However, by using time- and phase-encoded SatQKD, it is possible to filter in polarization in addition to existing domains. Scattered daylight can be more than 90% polarized in the visible band, yielding a reduction in detected daylight between 3 dB and 13 dB, such that polarization filtering can reduce the brightness of 780 nm daylight to below the unfiltered equivalent at 1550 nm. Simulations indicate that polarization filtering increases the secure key rate and allows for SatQKD to be performed at dawn and dusk. This could open the way for daylight SatQKD utilizing shorter near-infrared wavelengths and retaining their benefits.
... 7 The probability amplitude of another photon instantly collapses to exhibit non-reproducibility over a distance by observing one of the paired photons used for distributing the quantum key in optical communication networks. Typically, there are several protocols selectable for implementing the DPS-QKD scheme, including BB84, 8 E91, 9 BBM92, 10 B92, 11 SSP, 12 DPS, 13 SARG04, 14 COW, 15 DECOY, 16 and S13. 17 Among these selections, the DPS protocol proposed since 2003 is classified as a popular and unconditional entanglement QKD scheme with the most ARTICLE pubs.aip.org/aip/app simplified systematic configuration, the highest domain-time-usage efficiency, and the best protocol against the photon number splitting (PNS) attack. ...
Article
Full-text available
An adaptive differential-phase-shifting (DPS) quantum key distribution (QKD) protocol improved by encoding asynchronous-bit-rate with harmonic clock tunability, decoded by shortened delay-line interferometer (DLI) with enhancing stability, and received by single-photon detection with long hold-off is demonstrated to realize low-erroneous transmission. To achieve long-term stabilized visibility with a maintained quantum bit-error-ratio (QBER) and secure key rate, the shortened and polarized DLI enlarges its free-spectral range (FSR) and reduces its power-to-wavelength slope (δP/δλ) to suppress its sensitivity to thermal gradient, channel leakage, and wavelength disturbance. Extremely low power and wavelength drifts of ΔP/P < ±0.02% and Δλ/λ = ±6.45 × 10⁻⁸ can be achieved, even when using a single-mode QKD carrier with a relatively broadened 300-kHz linewidth. Flexibly expanding the 1-bit-delay FSR of the polarized DLI from 0.04 to 1.00 GHz improves its immunity to environmental disturbances, enabling the DPS-QKD decoding with 2¹⁰–2¹³ patterns, 3.2% QBER, and 17.46-kbit/s under 0.22 photon/pulse in average. The asynchronous-bit-rate DPS-QKD protocol enables harmonic expansion of DLI’s FSR at limited single-photon avalanche detector’s bit rate, which lengthens the duration of stable visibility to support long-pattern DPS-QKD.
... This setup is bulky and would require stabilisation routines to ensure the AMZI delay line is matched to that in Bob's receiver for a real-world implementation. Another drawback is that the transmitter is not versatile, requiring modifications if one wishes to implement another QKD protocol, for example differential phase shift [17,18], coherent one way [19,20] or differential quadrature phase shift [21,22]. ...
Preprint
Full-text available
Quantum key distribution (QKD), a technology that enables perfectly secure communication, has evolved to the stage where many different protocols are being used in real-world implementations. Each protocol has its own advantages, meaning that users can choose the one best-suited to their application, however each often requires different hardware. This complicates multi-user networks, in which users may need multiple transmitters to communicate with one another. Here, we demonstrate a direct-modulation based transmitter that can be used to implement most weak coherent pulse based QKD protocols with simple changes to the driving signals. This also has the potential to extend to classical communications, providing a low chirp transmitter with simple driving requirements that combines phase shift keying with amplitude shift keying. We perform QKD with concurrent time-bin and phase modulation, alongside phase randomisation. The acquired data is used to evaluate secure key rates for time-bin encoded BB84 with decoy states and a finite key-size analysis, giving megabit per second secure key rates, 1.60 times higher than if purely phase-encoded BB84 was used.
... For instance, only recently has the efficient BB84 protocol [38] implemented with decoy-states been proven secure against coherent attacks [39][40]. Other common protocols, such as the coherent-one-way (COW) protocol [41], are still lacking a rigorous security proof, while the differential-phase-shift (DPS) protocol has been implemented only under the assumption of individual attacks [42]. In these cases the gap between coherent and non-coherent attacks appears to be greater than in other protocols, and the maximum achievable transmission distance and key rate can be severely reduced when general attacks are considered [43,44]. ...
Preprint
Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted. Remarkably, no assumptions have to be made on the capabilities of an eavesdropper other than that she is bounded by the laws of Nature, thus making the security of QKD "unconditional". However, unconditional security is hard to achieve in practice. For example, any experimental realisation can only collect finite data samples, leading to vulnerabilities against coherent attacks, the most general class of attacks, and for some protocols the theoretical proof of robustness against these attacks is still missing. For these reasons, in the past many QKD experiments have fallen short of implementing an unconditionally secure protocol and have instead considered limited attacking capabilities by the eavesdropper. Here, we explore the security of QKD against coherent attacks in the most challenging environment: the long-distance transmission of keys. We demonstrate that the BB84 protocol can provide positive key rates for distances up to 240 km without multiplexing of conventional signals, and up to 200 km with multiplexing. Useful key rates can be achieved even for the longest distances, using practical thermo-electrically cooled single-photon detectors.
... The Decoy State protocol, proposed by Hwang and further developed by Lo, introduces additional decoy states to mitigate photon number splitting attacks [7,8]. The DSP protocol, introduced by Inoue, Waks, and Shimizu, enhances key distribution efficiency using phaseencoded pulses [9]. ...
Preprint
Full-text available
Quantum Key Distribution (QKD) stands as a ground breaking approach to secure communication, exploiting the principles of quantum mechanics to achieve theoretically unbreakable encryption. Despite substantial progress, challenges in optimizing key rates and ensuring robustness, particularly in high-loss environments, persist. This research proposes an advanced QKD method that integrates multiple decoy states with optimized intensity levels and pulse probabilities, advanced bit recovery techniques, and adaptive machine learning (ML) filtering to enhance signal-to-noise ratio (SNR). The proposed framework leverages ML-driven adaptive filtering to dynamically reduce noise, thereby improving the accuracy of gain and error rate calculations for decoy states and enhancing the efficiency of bit recovery. The bit recovery process incorporates permutation-based enhancement techniques, optimizing the recovery of unused quantum bits (RUQB). The proposed method is thoroughly evaluated through comparative analysis against leading QKD protocols, including E91, BBM92, B92, Six-state, Decoy State, and DSP protocols. The results demonstrate significant improvements in secure key rates, the percentage of correctly recovered bits, and overall system robustness, especially in challenging conditions. This research contributes to the advancement of QKD by providing a more resilient and efficient approach, addressing key limitations of existing methods, and paving the way for enhanced secure quantum communication systems.
Article
Full-text available
We consider how the theory of optimal quantum measurements determines the maximum information available to the receiving party of a quantum key distribution (QKD) system employing linearly independent but nonorthogonal quantum states. Such a setting is characteristic of several practical QKD protocols. Due to nonorthogonality, the receiver is not able to discriminate unambiguously between the signals. To understand the fundamental limits that this imposes, the quantity of interest is the maximum mutual information between the transmitter (Alice) and the receiver, whether legitimate (Bob) or an eavesdropper (Eve). To find the optimal measurement—taken individually or collectively—we use a framework based on operator algebra and general results derived from singular-value decomposition, achieving optimal solutions for von Neumann measurements and positive operator-valued measures (POVMs). The formal proof and quantitative analysis elaborated for two signals allow us to conclude that optimal von Neumann measurements are uniquely defined and provide a higher information gain compared to POVMs. Interestingly, collective measurements not only do not provide additional information gain with respect to individual ones but also suffer from a gain reduction in the case of POVMs. ©2024 American Physical Society 2024 American Physical Society
Article
Full-text available
Supervisory Control and Data Acquisition (SCADA) systems are vulnerable to traditional cyber-attacks, such as man-in-the-middle, denial of service, eavesdropping, and masquerade attacks, as well as future attacks based on Grover's and Shor's algorithm implemented in quantum hardware. This paper proposes a quantum-robust scheme based on entanglement and supersingular isogeny-based cryptography. The scheme employs a modified Supersingular Isogeny Key Encapsulation (SIKE) to generate shared secret keys, also authenticating BBM92, a quantum key distribution protocol to generate a symmetric key. The paper uses ASCON-128 and SHA-3 to encrypt and authenticate messages, and provides a comparative analysis of two entanglement-based quantum key distribution protocols. The proposed scheme is compared to the current SCADA standard, AGA-12, and is shown to provide confidentiality, integrity, intrusion resistance, message authentication, and scalability. The randomness of key pairs generated by our algorithm and RSA key pairs is 87.5% and 84.37%, respectively, addressing confidentiality and integrity. Using the BBM92 protocol, our proposed algorithm detects the presence of an adversary by generating an average error rate of 26.07% and information leakage of 76.01%. AGA-12 relies on SHA-1 hash function that Google has cracked recently. However, our algorithm includes SHA-3, a collision and quantum-resistant hash that provides message authentication.
Article
Full-text available
Since it was noted that quantum computers could break public key cryptosystems based on number theory, extensive studies have been undertaken on quantum cryptography, which offers unconditionally secure communication based on quantum mechanics. We investigate a quantum key distribution (QKD) scheme using macroscopic coherent light with optically pre-amplified direct differential detection. A transmitter ``Alice'' sends a series of two macroscopic nonorthogonal coherent states that partially overlap due to quantum noise. A receiver ``Bob'' amplifies and receives it with direct differential detection followed by a thresholding process. To avoid difficulties in detection, our scheme uses conventional direct differential photodetection, not single-photon detection or homodyne detection as in previous QKD protocols. System performance assuming some eavesdropping is evaluated, the results of which suggest that our scheme is usable for short or medium distance.
Article
Full-text available
Differential-phase-shift (DPS) quantum key distribution (QKD) is one of the QKD protocols, featuring simplicity for practical implementation. It uses a coherent pulse train whose phase should be stable at least within the pulse interval. This paper quantitatively investigates the phase stability required for DPS-QKD systems. The phase stability is characterized by the spectral linewidth of the light source. A theoretical model and experiments are presented, the results of which indicate that the linewidth should be, for example, less than 0.35% of the free-spectral-range of an asymmetric Mach–Zehnder interferometer in a receiver to achieve quantum bit error rate of less than 0.5% due to linewidth broadening of the light source.
Article
Full-text available
We derive the time-dependent photo-detection probability equation of a superconducting single photon detector (SSPD) to study the responsive property for a pulse train at high repetition rate. Using this equation, we analyze the characteristics of SSPDs when illuminated by bright pulses in blinding attack on a quantum key distribution (QKD). We obtain good agreement between expected values based on our equation and actual experimental values. Such a time-dependent probability analysis contributes to security analysis.
Article
Full-text available
We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob’s Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also experimentally confirmed the feasibility of this countermeasure using our 1 GHz-clocked DPS-QKD system. In the emulation of the attack, we achieved much lower power of the bright illumination light compared with the original demonstration by using a pulse stream instead of broad pulses.
Article
Full-text available
Differential-phase-shift quantum key distribution based on two nonorthogonal states is described. A weak coherent pulse train is sent from Alice to Bob, in which the phase of each pulse is randomly modulated by {0,π}. Bob measures the differential phase by a one-bit delay circuit. The system has a simple configuration without the need for an interferometer and a bright reference pulse in Alice’s site, unlike the conventional QKD system based on two nonorthogonal states, and has an advantage of improved communication efficiency. The principle of the operation is successfully demonstrated in experiments.
Article
Full-text available
A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light, the PNS attacks, which involve installing a lossless transmission line and blocking pulses from which extra photons cannot be picked up, impose a limit on the transmission distance. In contrast, use of a coherent pulse train in DPS QKD prevents the PNS attack and removes the distance limitation imposed by it. We carried out a DPS QKD experiment that simulated the situation where some pulses are blocked. The result showed that extra bit errors are induced in an eavesdropped condition, indicating the robustness of DPS QKD against PNS attacks.
Article
Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.
Article
Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation. However, its unconditional security proof is still missing, even though it has been proposed for many years. Here, we prove its security against collective attacks with a weak coherent light source in the noiseless case (i.e., no bit error). The only assumptions are that quantum theory is correct, the devices are perfect and trusted and the key size is infinite. Our proof works on threshold detectors. We compute the lower bound of the secret key generation rate using the information-theoretical security proof method. Our final result shows that the lower bound of the secret key generation rate per pulse is linearly proportional to the channel transmission probability if Bob’s detection counts obey the binomial distribution.
Article
Conventional quantum key distribution (QKD) protocols include a basis selection process for providing a secure secret key. In contrast, this paper proposes an entanglement-based QKD with no basis selection procedure. Entangled-photon pulse trains with an average photon number less than one per pulse are sent to two legitimate parties, from which a secret key is created utilizing the entanglement nature. Eavesdropping on a transmission line is prevented by a condition of less than one photon per pulse, and sending classically correlated coherent pulses instead of quantum correlated ones is revealed by monitoring coincident count rates.