Abstract
Quantum key distribution (QKD) provides a promising solution for sharing information-theoretic secret keys between two remote legitimate parties. To improve the maximal transmission distance and the maximal error rate tolerance, we apply the advantage distillation technology to analyze the security of practical decoy-state QKD systems. Based on the practical experimental parameters, the device-dependent QKD protocols and the measurement-device-independent QKD protocols have been respectively analyzed, and our analysis results demonstrate that the advantage distillation technology can significantly improve the performance of various QKD protocols. In the four-state and six-state device-dependent QKD protocols, we prove that the maximal transmission distance can be improved from 142 km to 180 km and from 146 km to 187 km respectively. In the four-state and six-state measurement-device-independent QKD protocols, we prove that the maximal transmission distance can be improved from 195 km to 273 km and from 200 km to 282 km respectively.
Similar content being viewed by others
Introduction
Quantum key distribution (QKD)1,2 is the art of sharing the information-theoretic secure key between two different remote parties Alice and Bob, while the eavesdropper Eve cannot get the secret key information even if she has unlimited computation and storage power3,4,5. The practical QKD system includes four steps to generate the final secret key. In the first step, Alice randomly chooses two classical bits to modulate a single-photon quantum state in two bases, which will be sent to Bob through a public quantum channel. In Bob’s side, he randomly chooses a basis to measure the received quantum states. In the second step, Alice and Bob publicly exchange the basis information with an authenticated classical channel, and they only retain those events with the same basis, which is called the raw key. In the third step, they apply the advantage distillation technology to increase the correlation between their raw key, thus they can get an advantage over Eve. In the fourth step, they perform the error correction and privacy amplification to generate the final secret key. Note that the third step may be omitted if the quantum bit error rate (QBER) is small in practical QKD systems, where the advantage distillation technology may have no advantage to increase the correlation. However, in the case of eavesdropping or long transmission distance, QBER will become higher, which will severely reduce the final secret key. Luckily, the advantage distillation technology can be adopted to improve the secret key rate in QKD.
The advantage distillation technology was firstly proposed in the classical cryptography theory6, which was then utilized in the device-dependent QKD (DD-QKD) protocol7,8,9 and device-independent (DI) QKD protocol10 respectively. By considering the single-photon state modulation, the security of different QKD protocols has been proved with and without the advantage distillation technology respectively7,8,11,12, and the analysis results demonstrate that the advantage distillation technology can improve the error tolerance of different QKD protocols. However, practical QKD systems are usually based on weak coherent sources, the multi-photon events of which may introduce the photon number splitting attack13,14. Fortunately, the decoy-state method15,16,17 can be applied to detect this attack, which has been a routine in practical QKD systems. More recently, some statistical fluctuation analysis methods have been proposed to account for the finite-size key effects on the achievable secret key generation rate18,19,20,21.
In practical decoy-state QKD implementations, there are two important questions to be solved. One is how to increase the transmission distance without quantum repeaters, and the other is how to increase the tolerable background error rate. Since the practical quantum repeater technology is still immature until now, measurement-device-independent-QKD (MDI-QKD) protocols22,23 have been proposed to increase the transmission distance, which require the optical interference device in the middle of the quantum channel. More recently, to beat the Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound24, twin-field QKD25 was proposed. However, new QKD protocols usually need to change the hardware devices in the first step, which cannot be directly applied in the established QKD systems.
In this paper, to solve these questions, we apply the repetition-code based advantage distillation technology in decoy-state DD-QKD and MDI-QKD protocols respectively. By applying the practical DD-QKD experimental parameters26, we prove that, for the four-state and six-state DD-QKD protocols, the maximal transmission distance can be improved from 142 km to 180 km and from 146 km to 187 km respectively, and the maximal tolerable background error rate can be improved from 6.2% to 16.4% and from 7% to 21.8% respectively. By applying the practical MDI-QKD experimental parameters18,27, we prove that, for the four-state and six-state MDI-QKD protocols, the maximal transmission distance can be improved from 195 km to 273 km and from 200 km to 282 km respectively, and the maximal tolerable background error rate can be improved from 4.5% to 14% and from 4.9% to 18% respectively. The analysis results demonstrate that the advantage distillation technology can significantly improve the maximal transmission distance and the maximal tolerable background error rate in different QKD systems. More importantly, the advantage distillation technology does not change the hardware devices about the quantum state preparation and measurement, which can be directly applied to current QKD systems28,29,30.
Results
Decoy-state device-dependent QKD with advantage distillation
In practical DD-QKD systems, phase-randomized weak coherent sources, which can be seen as a mixture of photon-number states, are usually applied to modulate quantum states. However, the multi-photon states can be utilized by Eve to launch the photon number splitting attack. Fortunately, the decoy-state method can be applied to estimate the single-photon counting rate and error rate. By considering the weak coherent pulse with the mean photon number μ, the secret key rate can be estimated with the GLLP (Gottesman-Lo-Lütkenhaus-Preskill)31 formula
where P1 is the single-photon probability in Alice’s signal states, Y1 is the single-photon counting rate and Qμ is the total counting rate of signal states. E is Eve’s ancillary state, S(A∣E) = S(A, E) − S(E), H(A∣B) = H(A, B) − H(B), \(H(x)=-x\log (x)-(1-x)\log (1-x)\) and \(S(\rho )=-\,{{\mbox{tr}}}\,(\rho \log \rho )\) are the entropy functions. S(A∣E)single photon is the conditional entropy by considering the single-photon state preparation in Alice’s side.
Based on the entanglement distillation and purification technology, S(A∣E)single photon can be restricted by S(A∣E)single photon ≥ 1 − H(e1), where e1 is the single-photon error rate. Note that S(A∣E)single photon can also be analyzed with the information-theoretical security analysis method, where the detailed explanation is given in the Methods section. Since only the single-photon pulses can be used to generate the final secret key, we can apply the entanglement based QKD protocol to analyze the final secret key rate. In the entanglement based QKD protocol, Alice prepares quantum state \(\frac{1}{\sqrt{2}}(\left|00\right\rangle +\left|11\right\rangle )\) and sends the second particle to Bob. After quantum channel transmission, Alice and Bob share quantum state \({\sigma }_{AB}={\sum }_{i=0}^{3}{\lambda }_{i}\left|{{{\Phi }}}_{i}\right\rangle \left\langle {{{\Phi }}}_{i}\right|\) (\({\sum }{i=0}^{3}{\lambda }_{i}=1\)), where \(\left|{{{\Phi }}}_{0}\right\rangle \!=\!\frac{1}{\sqrt{2}}(\left|00\right\rangle +\left|11\right\rangle ),\left|{{{\Phi }}}_{1}\right\rangle \!=\!\frac{1}{\sqrt{2}}(\left|00\right\rangle -\left|11\right\rangle ),\left|{{{\Phi }}}_{2}\right\rangle =\frac{1}{\sqrt{2}}(\left|01\right\rangle +\left|10\right\rangle ),\left|{{{\Phi }}}_{3}\right\rangle \!=\!\frac{1}{\sqrt{2}}(\left|01\right\rangle -\left|10\right\rangle )\) (see the Methods section for details). Correspondingly, the relationship between λi(i = 0, 1, 2, 3) and the single-photon error rate in different bases can be analyzed, where the four-state DD-QKD protocol satisfies \({\lambda }_{1}+{\lambda }_{3}={e}_{1}^{x},{\lambda }_{2}+{\lambda }_{3}={e}_{1}^{z}\), and the six-state DD-QKD protocol satisfies \({\lambda }_{1}+{\lambda }_{3}={e}_{1}^{x},\,{\lambda }_{2}+{\lambda }_{3}={e}_{1}^{z},\,{\lambda }_{1}+{\lambda }_{2}={e}_{1}^{y}\). \({e}_{1}^{z}\), \({e}_{1}^{x}\) and \({e}_{1}^{y}\) are the single-photon error rates in the Z basis \(\{\left|0\right\rangle \langle 0| ,| 1\rangle \left\langle 1\right|\}\), the X basis \(\{\left|0\right\rangle {\left\langle 0\right|}_{x},\left|1\right\rangle {\left\langle 1\right|}_{x}\}\), and the Y basis \(\{\left|0\right\rangle {\left\langle 0\right|}_{y},\left|1\right\rangle {\left\langle 1\right|}_{y}\}\), where \({\left|0\right\rangle }_{x}=\frac{1}{\sqrt{2}}(\left|0\right\rangle +\left|1\right\rangle ),{\left|1\right\rangle }_{x}=\frac{1}{\sqrt{2}}(\left|0\right\rangle -\left|1\right\rangle ),{\left|0\right\rangle }_{y}=\frac{1}{\sqrt{2}}(\left|0\right\rangle +i\left|1\right\rangle )\), and \({\left|1\right\rangle }_{y}=\frac{1}{\sqrt{2}}(\left|0\right\rangle -i\left|1\right\rangle )\). Based on decoy-state technology, \({e}_{1}^{z}\), \({e}_{1}^{x}\) and \({e}_{1}^{y}\) can be accurately estimated, so that the constraints of λi(i = 0, 1, 2, 3) can be obtained.
In the advantage distillation protocol5, Alice and Bob split their raw key into blocks of b bits {x0, x1, . . . xb−1} and {y0, y1, . . . yb−1} respectively. Alice privately generates a random bit c ∈ {0, 1}, and sends the message m = {m0, m1, . . . , mb−1} = {x0 ⊕ c, x1 ⊕ c, . . . xb−1 ⊕ c} to Bob through an authenticated classical channel. They accept the block if and only if {m0 ⊕ y0, m1 ⊕ y1, . . . , mb−1 ⊕ yb−1} equals {0, 0, . . . , 0} or {1, 1, . . . , 1}, and then keep the first bit x0 and y0 as the raw key. Note that if Eve knows any measurement outcome mi(0 ≤ i ≤ b − 1), she can get all of the b measurement outcomes. Thus, only the events that all of the b pulses are single-photon states can be used to generate the final secret key, the probability of which is given by \({\left(\frac{{Y}_{1}{P}_{1}}{{Q}_{\mu }}\right)}^{b}\). Combining this advantage distillation technology with the information-theoretical security analysis method, the GLLP secret key rate formula can be modified with the following inequality
where \({q}_{{{\mbox{succ}}}}={E}_{\mu }^{b}+{(1-{E}_{\mu })}^{b}\) is the successful probability of the advantage distillation protocol, Eμ is the error rate of signal states, S(A∣E)single photon can be estimated with the following inequality
where \(\tilde{{\lambda }_{0}}=\frac{{({\lambda }_{0}+{\lambda }_{1})}^{b}+{({\lambda }_{0}-{\lambda }_{1})}^{b}}{2{p}_{{{\mbox{succ}}}}},\tilde{{\lambda }_{1}}=\frac{{({\lambda }_{0}+{\lambda }_{1})}^{b}-{({\lambda }_{0}-{\lambda }_{1})}^{b}}{2{p}_{{{\mbox{succ}}}}},\tilde{{\lambda }_{2}}=\frac{{({\lambda }_{2}+{\lambda }_{3})}^{b}+{({\lambda }_{2}-{\lambda }_{3})}^{b}}{2{p}_{{{\mbox{succ}}}}},\tilde{{\lambda }_{3}}=\frac{{({\lambda }_{2}+{\lambda }_{3})}^{b}-{({\lambda }_{2}-{\lambda }_{3})}^{b}}{2{p}_{{{\mbox{succ}}}}},{p}_{{{\mbox{succ}}}}={({\lambda }_{0}+{\lambda }_{1})}^{b}+{({\lambda }_{2}+{\lambda }_{3})}^{b}\) (see the Methods section for details). The modified key rate formula can be explained from two aspects. First, since the quantum channel can be controlled by Eve, she can choose the optimal parameters λi(i = 0, 1, 2, 3) to reduce the key rate. Secondly, the advantage distillation protocol can be controlled by Alice and Bob, so they can choose the optimal advantage distillation parameter b to increase the key rate.
In the error correction step, all of errors should be corrected by Alice and Bob, thus H(A∣B) can be estimated by the following inequality
where \(\tilde{{E}_{\mu }}=\frac{{E}_{\mu }^{b}}{{E}_{\mu }^{b}+{(1-{E}_{\mu })}^{b}}\) is the error rate value after the advantage distillation step, f > 1 is the error correction efficiency. Since Eve can get all of the classical information transmitted in the classical channel, \(fH(\tilde{{E}_{\mu }})\) demonstrates the maximal key information leaked to Eve in the error correction step. Finally, the final secret key rate can be estimated with the following optimization method
where Y1, \({e}_{1}^{x}\), \({e}_{1}^{y}\) and \({e}_{1}^{z}\) can be estimated with the decoy-state method (see the Methods section for details). By applying the DD-QKD experimental parameters26 listed in Table 1,
we analyze the secret key rate of the four-state DD-QKD protocol with and without advantage distillation technology, and the corresponding results are shown in Fig. 1.
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), while the red line is the secret key rate with the advantage distillation technology (b > 1). b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 132 km.
As shown in Fig. 1, when the optimal b value satisfies b > 1, the advantage distillation technology can significantly improve the performance of practical QKD systems, which extends the maximal transmission distance from 142 km to 180 km. On the other side, the calculation results demonstrate that the maximal tolerable background error rate eDet can be improved from 6.2% to 16.4% by adopting the advantage distillation technology. In particular, the maximal transmission distance can be improved from 0 km to 175 km when eDet = 6.3%.
At the same time, we adopt the DD-QKD parameters26 listed in Table 1 to analyze the six-state DD-QKD protocol with and without advantage distillation technology, and the corresponding results are shown in Fig. 2.
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), while the red line is the secret key rate with the advantage distillation technology (b > 1). b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 134 km.
From the calculation results, we find that the maximal transmission distance can be improved from 146 km to 187 km, the maximal tolerable background error rate eDet can be improved from 7% to 21.8%, and the maximal transmission distance can be improved from 0 km to 182 km if the background error rate is eDet = 7.1%. The analysis results demonstrate that the advantage distillation technology can efficiently improve the transmission distance and error tolerance compared with the no advantage distillation case. Moreover, compared with the four-state DD-QKD protocol, the six-state DD-QKD protocol has more superiority both in the transmission distance and the background error rate tolerance.
Decoy-state measurement-device-dependent QKD with advantage distillation
More interestingly, the advantage distillation technology can also be applied to the MDI-QKD protocol. Different from the DD-QKD protocol, the MDI-QKD protocol requires both Alice and Bob to prepare the single-photon state to generate the secret key, and the secret key rate can be estimated with the following optimization method
where P11 is the probability of both Alice and Bob’s signal states emitting single-photon events, Y11 is the counting rate of both Alice and Bob transmitting single-photon states, Qμμ (Eμμ) is the counting rate (error rate) of Alice and Bob’s signal states, \({e}_{11}^{z}\), \({e}_{11}^{x}\) and \({e}_{11}^{y}\) are the single-photon error rate in the Z, X and Y bases respectively. Note that, Y11, \({e}_{11}^{x}\), \({e}_{11}^{y}\) and \({e}_{11}^{z}\) can be estimated with the decoy-state method (see the Methods section for details). By applying the MDI-QKD experimental parameters18,27 listed in Table 1, we analyze the secret key rate of the four-state MDI-QKD protocol with and without advantage distillation technology, and the corresponding results are shown in Fig. 3.
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), while the red line is the secret key rate with the advantage distillation technology (b > 1). b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 185 km.
As illustrated in Fig. 3, we find that the maximal transmission distance can be improved from 195 km to 273 km, the maximal tolerable background error rate eDet can be improved from 4.5% to 14%, and the maximal transmission distance can be improved from 0 km to 260 km when eDet = 4.6%. The analysis results demonstrate that the advantage distillation technology can significantly improve the transmission distance and error tolerance compared with the no advantage distillation case.
Similarly, we adopt the MDI-QKD experimental parameters18,27 listed in Table 1 to analyze the six-state MDI-QKD protocol with and without advantage distillation technology, and the corresponding results are shown in Fig. 4.
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), the red line is the secret key rate with the advantage distillation technology (b > 1), and the green line is the Pirandola- Laurenza-Ottaviani-Banchi (PLOB) bound. b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 189 km.
From the calculation results, we find that the maximal transmission distance can be improved from 200 km to 282 km, and the maximal tolerable background error rate eDet can be improved from 4.9% to 18%, and the maximal transmission distance can be improved from 0 km to 270 km when eDet = 5%. Compared with the four-state MDI-QKD protocol, the six-state MDI-QKD protocol has more advantage both in the transmission distance and the background error rate tolerance. Moreover, we also plot the PLOB bound24 in Fig. 4, and the performance of six-state MDI-QKD with advantage distillation is obviously lower than the PLOB bound. Fortunately, the twin-field QKD protocol25 proposed recently can surpass the PLOB bound. The advantage distillation method developed in this paper can also be extended to twin-field QKD25 to further improve its performance, and we will leave this as future research.
Finite key security analysis
In practical QKD systems, the generated secret key is finite, thus how to prove security of QKD with the advantage distillation technology in finite-key scenarios is an important question. Since the advantage distillation technology only modifies the classical post-processing step, we can simply analyze the finite key length with the existed methods. More precisely, based on the quantum asymptotic equipartition property32,33 and the leftover hash lemma5,34, the secret key rate with the DD-QKD protocol can be given by
where
n is the raw key length before the advantage distillation step, \({H}_{\max }(A| E)\) is the conditional max-entropy function5, \({H}_{\min }^{{\varepsilon }_{\min }}(A| E)={\max }_{{\sigma }_{AE}\in {{{{{{\mathcal{B}}}}}}}^{{\varepsilon }_{\min }}({\rho }_{AE})}{H}_{\min }(A| E)\), \({{{{{{\mathcal{B}}}}}}}^{{\varepsilon }_{\min }}({\rho }_{AE})\) is the set of sub-normalized states σAE with \(D({\sigma }_{AE},{\rho }_{AE})\le {\varepsilon }_{\min }\), and the final secret parameter can be given by \(\varepsilon \equiv {\varepsilon }_{{{\mbox{pa}}}}+2{\varepsilon }_{\min }\). Note that the the secret key rate with the MDI-QKD protocol can be analyzed similarly. In the practical experimental realization, the QBER value and the count rate value also have statistical fluctuations, which can be analyzed by applying the Chernoff bound and the Hoeffding inequality20,21. However, we should emphasize that the advantage distillation technology reduces the length of the raw key when b > 1, thus it has larger statistical error to analyze the security of QKD protocols with finite resources.
Conclusions
Improvements on the maximal transmission distance and the maximal error rate tolerance are two important topics of analyzing the security of practical QKD systems. By combining the advantage distillation technology with the decoy-state method, we prove that both the maximal transmission distance and the maximal tolerable error rate can be sharply improved in different DD-QKD and MDI-QKD protocols. More importantly, the advantage distillation technology does not change the quantum step of a practical QKD system. It only modifies the classical post-processing step, so it can be conveniently applied to various practical QKD systems. In the future research, it will be interesting to experimentally realize the advantage distillation technology in different QKD systems.
Methods
Single-photon QKD with advantage distillation
In the four-state or six-state DD-QKD protocol, Alice and Bob randomly prepare and measure the quantum state in the two-dimensional Hilbert spaces. By applying the entanglement based protocol, we assume that Alice prepares the quantum state \(\frac{1}{\sqrt{2}}(\left|00\right\rangle +\left|11\right\rangle )\) and sends the second particle to Bob, then Alice and Bob take inputs from four-dimensional Hilbert spaces HA ⊗ HB to apply binary measurements. By considering the four-state and six-state QKD protocols, it has been proved that Eve’s general attack can be reduced to the Pauli attack5,11, which can be described by the classical probability theory. After quantum channel transmission, Alice and Bob share the following quantum state
where
Obviously, the single-photon error rates in the Z basis \(\{\left|0\right\rangle \langle 0| ,| 1\rangle \left\langle 1\right|\}\), the X basis \(\{\left|0\right\rangle \langle 0{| }_{x},| 1\rangle {\left\langle 1\right|}_{x}\}\), and the Y basis \(\{\left|0\right\rangle \langle 0{| }_{y},| 1\rangle {\left\langle 1\right|}_{y}\}\) are constrained by \({\lambda }_{2}+{\lambda }_{3}={e}_{1}^{z}\), \({\lambda }_{1}+{\lambda }_{3}={e}_{1}^{x}\), and \({\lambda }_{1}+{\lambda }_{2}={e}_{1}^{y}\) respectively. Since Eve holds the purified system of σAB, we have the following pure state σABE on HA ⊗ HB ⊗ HE
where the reduced density operator σAE and σE can be respectively given by
Note that the quantum channel can be controlled by Eve, she can choose the optimal parameters λi(i = 0, 1, 2, 3) to reduce the secret key rate as long as λi is constrained by the QBER in different bases. Based on the this state preparation, the secret key rate can be given by5
where H(A∣B) = H(λ0 + λ1) demonstrates that Z basis is used for generating the final secret key.
To improve the maximal tolerable QBER, the advantage distillation technology based on the repetition code protocol has been proposed5. In the repetition code protocol, Alice and Bob split their raw key into blocks of b bits {x0, x1, . . . xb−1} and {y0, y1, . . . yb−1} respectively. Alice privately generates a random bit c ∈ {0, 1}, and sends the message m = {m0, m1, . . . , mb−1} = {x0 ⊕ c, x1 ⊕ c, . . . xb−1 ⊕ c} to Bob through an authenticated classical channel. They accept the block if and only if {m0 ⊕ y0, m1 ⊕ y1, . . . , mb−1 ⊕ yb−1} equals {0, 0, . . . , 0} or {1, 1, . . . , 1}, and then keep the first bit x0 and y0 as the raw key. That is, if all bits in {x0, x1, . . . xb−1} and {y0, y1, . . . yb−1} are completely the same or different, Alice and Bob will obtain a raw key bit, the corresponding successful probability of which is given by
We emphasize that the successful probability psucc can be further improved if Alice and Bob iteratively repeat the advantage distillation protocol on very small blocks. Consequently, the practical QBER value in the Z basis can be reduced from λ2 + λ3 to \(\frac{{({\lambda }_{2}+{\lambda }_{3})}^{b}}{{p}_{{{\mbox{succ}}}}}\), and the quantum state shared between Alice and Bob can be given by5
where
Based on the state preparation \({\tilde{\sigma }}_{AB}\) and the advantage distillation parameter b, the secret key rate \(\tilde{R}\) can be modified as the following inequality
Note that the advantage distillation protocol can be controlled by Alice and Bob, so they can choose the optimal advantage distillation parameter b to improve the secret key rate.
Security analysis of decoy-state QKD
Firstly, we consider the security analysis of decoy-state QKD without advantage distillation. Combining Eq. (13) with the decoy-state method15,16,17, the secret key rate with DD-QKD system can be given by
where P1 is the single-photon probability in Alice’s signal states, Y1 is the single-photon counting rate, Qμ and Eμ denote the counting rate and error rate of signal states, Inspired by the information-theoretical security analysis method given by5, S(A∣E)single photon can be estimated with the following inequality
where λi(i = 0, 1, 2, 3) can be characterized with the following equations
where \({e}_{1}^{z}\), \({e}_{1}^{x}\) and \({e}_{1}^{y}\) are the single-photon error rates in the Z, X and Y bases, which can be estimated with the decoy-state method.
Similarly, by considering the Bell state measurement outcome \(\frac{1}{\sqrt{2}}(\left|00\right\rangle +\left|11\right\rangle )\) in Charlie’s side, the secret key rate with decoy-state MDI-QKD system can be given by
where P11 is the probability of both Alice and Bob’s signal states emitting single-photon events, Y11 is the counting rate of both Alice and Bob transmitting single-photon states, and Qμμ (Eμμ) is the counting rate (error rate) of Alice and Bob’s signal states. Similarly, λi(i = 0, 1, 2, 3) can be characterized with the following equations
where \({e}_{11}^{z}\), \({e}_{11}^{x}\) and \({e}_{11}^{y}\) are the single-photon error rates in the Z, X and Y bases, which can be estimated with decoy-state method. Note that the other three Bell states measurement outcomes can be analyzed similarly.
As for the security analysis of decoy-state with advantage distillation which has been given in Section II, we will not repeated it here.
Simulation method of decoy-state QKD with advantage distillation
To simulate the performance of decoy-state QKD with advantage distillation, we adopt infinite decoy states to precisely estimate channel parameters. Briefly, combining Eq. (18) with the advantage distillation method7,8,9, the secret key rate with the DD-QKD system can be given in Eq. (5). Combining Eq. (21) with the advantage distillation method7,8,9, the secret key rate with the MDI-QKD system can be given in Eq. (6). Compared with the secret key rate without advantage distillation, only the events that all of the b pulses are single-photon states can be used to generate the final secret key, thus the advantage distillation parameter b should be optimized to maximize the final secret key.
For the decoy-state DD-QKD with advantage distillation, the corresponding parameters Y1, P1, \({e}_{1}^{x}\), \({e}_{1}^{y}\), \({e}_{1}^{z}\), Qμ and Eμ are given as P1 = μe−μ, \(\eta =1{0}^{\frac{-\alpha l}{10}}{\eta }_{D}\), Y1 = Y0 + η, \({e}_{1}^{x}={e}_{1}^{y}={e}_{1}^{z}=\frac{0.5{Y}_{0}+{e}_{{{\mbox{Det}}}}\eta }{{Y}_{1}}\), Qμ = Y0 + 1 − e−ημ, \({E}_{\mu }=\frac{0.5{Y}_{0}+{e}_{{{\mbox{Det}}}}(1-{e}^{-\eta \mu })}{{Q}_{\mu }}\) 35. By applying the practical DD-QKD experimental parameters26 listed in Table 1, the secret key rate of decoy-state DD-QKD with advantage distillation can be easily estimated. Similarly, by adopting the simulation model in36 (see Eqs. (2)–(7) in36 for details), the secret key rate of decoy-state MDI-QKD with advantage distillation can be easily estimated.
Data availability
The data that support the findings of this study are available from the corresponding authors on request.
Code availability
Source codes of the plots are available from the corresponding authors on request.
References
Charles H, B. & Gilles, B. Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014).
Dagmar, Bruß Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998).
Hoi-Kwong, L. & Hoi Fung, C. Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999).
Peter W, S. & John, P. Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000).
Renato, R. Security of quantum key distribution. Int. J. Quant. Inform. 6, 1–127 (2008).
Ueli M, M. Secret key agreement by public discussion from common information. IEEE Trans Inform Theory 39, 733–742 (1993).
Barbara, K., Cyril, B. & Renato, R. Security of quantum-key-distribution protocols using two-way classical communication or weak coherent pulses. Phys. Rev. A 75, 012316 (2007).
Joonwoo, B. & Antonio, A. Key distillation from quantum channels using two-way communication protocols. Phys. Rev. A 75, 012334 (2007).
Glaucia, M., Filip, R., Jeremy, R., David, E. & Stephanie, W. Key rates for quantum key distribution protocols with asymmetric noise. Phys. Rev. A 101, 062321 (2020).
Ernest Y-Z, T., Charles C-W, L. & Renato, R. Advantage distillation for device-independent quantum key distribution. Phys. Rev. Lett. 124, 020502 (2020).
Daniel, G. & Hoi-Kwong, L. Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inform. Theory 49, 457–475 (2003).
Hoi Fung, C. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate. Phys. Rev. A 66, 060302 (2002).
Bruno, H., Nobuyuki, I., Nicolas, G. & Tsafrir, M. Quantum cryptography with coherent states. Phys. Rev. A 51, 1863 (1995).
Norbert, L. ütkenhaus & Mika, J. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. N. J. Phys. 4, 44 (2002).
Won-Young, H. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).
Xiang-Bin, W. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).
Hoi-Kwong, L., Xiongfeng, M. & Kai, C. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
Feihu, X., He, X. & Hoi-Kwong, L. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052333 (2014).
Geng, C. et al. Parameter estimation of atmospheric continuous-variable quantum key distribution. Phys. Rev. A 99, 032326 (2019).
Marcos, C. et al. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5, 1–7 (2014).
Charles Ci Wen, L., Marcos, C., Nino, W., Feihu, X. & Hugo, Z. Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014).
Samuel L, B. & Stefano, P. Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012).
Hoi-Kwong, L., Marcos, C. & Bing, Q. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
Stefano, P., Riccardo, L., Carlo, O. & Leonardo, B. Fundamental limits of repeaterless quantum communications. Nat. Commun. 8, 1–15 (2017).
Marco, L., Zhiliang L, Y., James F, D. & Andrew J, S. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 557, 400–403 (2018).
C, G., aZL, Y. & AJ, S. Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84, 3762–3764 (2004).
Rupert, U. et al. Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481–486 (2007).
Guan-Jie, Fan-Yuan et al. A universal simulating framework for quantum key distribution systems. Sci. China Inf. Sci. 63, 1–15 (2020).
Liao, Sheng-K. et al. Satellite-to-ground quantum key distribution. Nature 549, 43–47 (2017).
Chen, Yu-A. et al. An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature 589, 214–219 (2021).
Daniel, G., Hoi-Kwong, L., Norbert, L. ütkenhaus & John, P. Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325–360 (2004).
Marco, T., A framework for non-asymptotic quantum information theory. Preprint https://arxiv.org/abs/1203.2142 (2012).
Rotem, Arnon-Friedman, Reductions to iid in device-independent quantum information processing. Preprint at https://arxiv.org/abs/1812.10922 (2018).
Jaikumar, R. & Amnon, Ta-Shma Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM J Discrete Math. 13, 2–24 (2000).
Xiongfeng, M., Bing, Q., Yi, Z. & Hoi-Kwong, L. Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005).
Xiongfeng, M., Chi-Hang Fred, F. & Mohsen, R. Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 052305 (2012).
Acknowledgements
The authors would like to thank Zhen-Qiang Yin for his helpful discussion. This work is supported by National Key Research and Development Program of China (Grant no. 2020YFA0309702), NSAF (Grant no. U2130205), National Natural Science Foundation of China (Grant no. 11725524), Natural Science Foundation of Henan (Grant no. 202300410532), and China Postdoctoral Science Foundation (2019T120446, 2018M642281).
Author information
Authors and Affiliations
Contributions
H.-W.L. and Q.-Y.C. conceived the project. H.-W.L., C.-M.Z. and M.-S.J. performed the calculation and analysis. H.-W.L. and C.-M.Z. wrote the paper.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Peer review
Peer review information
Communications Physics thanks Yichen Zhang and the other, anonymous, reviewer(s) for their contribution to the peer review of this work. Peer reviewer reports are available.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Li, HW., Zhang, CM., Jiang, MS. et al. Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology. Commun Phys 5, 53 (2022). https://doi.org/10.1038/s42005-022-00831-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s42005-022-00831-4
This article is cited by
-
Interfering-or-not-interfering quantum key distribution with advantage distillation
Quantum Information Processing (2025)
-
Novel quantum voting protocol for four-particle entangled states based on superdense coding
Quantum Information Processing (2025)
-
Improving the performance of practical reference-frame-independent quantum key distribution under the afterpulse effect
Quantum Information Processing (2025)
-
Quantum conference key agreement with classical advantage distillation
Discover Networks (2025)
-
Improving the security of quantum key distribution with multi-step advantage distillation
Quantum Information Processing (2024)