Научная статья на тему 'PHASE-TIME-ENCODING MDI QKD TOLERANT TO DETECTOR IMPERFECTIONS'

PHASE-TIME-ENCODING MDI QKD TOLERANT TO DETECTOR IMPERFECTIONS Текст научной статьи по специальности «Математика»

CC BY
19
7
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
QUANTUM CRYPTOGRAPHY / MDI QKD / SINGLE-PHOTON DETECTOR / DEAD TIME

Аннотация научной статьи по математике, автор научной работы — Petrov I.V., Menskoy D.D., Tayduganov A.S.

Measurement-device-independent quantum key distribution (MDI QKD) allows to eliminate the single-photon detector (SPD) vulnerabilities, increase the communication distance limits, and construct a multiple users key distribution network. Nevertheless, detector imperfections are able to decrease the secret key rate and maximum distance by orders of magnitude. In this work we propose a model of large SPD’s dead time for the phase-time-encoding MDI QKD. We also propose a modified measurement device (Charlie) scheme with four detectors which is able to partially restore the sifted key loss caused by dead time.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «PHASE-TIME-ENCODING MDI QKD TOLERANT TO DETECTOR IMPERFECTIONS»

Conference materials UDC 530.145

DOI: https://doi.org/10.18721/JPM.153.372

Phase-time-encoding MDI QKD tolerant to detector imperfections

I. V. Petrov 1H, D. D. Menskoy \ A. S. Tayduganov 1 1 National University of Science and Technology MISiS, Moscow, Russia H i.petrov@goqrate.com

Abstract. Measurement-device-independent quantum key distribution (MDI QKD) allows to eliminate the single-photon detector (SPD) vulnerabilities, increase the communication distance limits, and construct a multiple users key distribution network. Nevertheless, detector imperfections are able to decrease the secret key rate and maximum distance by orders of magnitude. In this work we propose a model of large SPD's dead time for the phase-time-encoding MDI QKD. We also propose a modified measurement device (Charlie) scheme with four detectors which is able to partially restore the sifted key loss caused by dead time.

Keywords: quantum cryptography, MDI QKD, single-photon detector, dead time

Funding: This research was ordered by JSCo "RZD".

Citation: Petrov I. V., Menskoy D. D., Tayduganov A. S., Phase-time-encoding MDI QKD tolerant to detector imperfections. St. Petersburg State Polytechnical University Journal. Physics and Mathematics, 15 (3.3) (2022) 365-370. DOI: https://doi.org/10.18721/JPM.153.372

This is an open access article under the CC BY-NC 4.0 license (https://creativecommons. org/licenses/by-nc/4.0/)

Материалы конференции УДК 530.145

DOI: https://doi.org/10.18721/JPM.153.372

Протокол КРК с НЦУ с фазово-временным кодированием, устойчивый к неидеальности детекторов

И. В. Петров 1Н, Д. Д. Менской 1, А. С. Тайдуганов 1

1 Национальный исследовательский технологический университет МИСиС, Москва, Россия

н i.petrov@goqrate.com

Аннотация. Квантовое распределение ключа с независимым центральным узлом (КРК с НЦУ), позволяет устранить уязвимости детектора одиночных фотонов (ДОФ). Тем не менее, несовершенство детектора может снизить скорость секретного ключа и максимальное расстояние на порядки. В этой работе мы предлагаем модель большого мертвого времени ДОФ для фазово-временного кодирования КРК с НЦУ. Мы также предлагаем модифицированную схему измерительного устройства (Чарли) с четырьмя детекторами, которая способна частично восстановить потерю просеянного ключа, вызванную мертвым временем.

Ключевые слова: квантовая криптография, КРК с НЦУ, MDI QKD, однофотонный детектор, мeртвое время

Финансирование: Исследовательская работа выполнена по заказу ОАО «РЖД».

Ссылка при цитировании: Петров И. В., Менской Д. Д., Тайдуганов А. С. Протокол КРК с НЦУ с фазово-временным кодированием, устойчивый к неидеальности детекторов // Научно-технические ведомости СПбГПУ. Физико-математические науки. 2022. Т. 15. № 3.3. C. 365-370. DOI: https://doi.org/10.18721/JPM.153.372

Статья открытого доступа, распространяемая по лицензии CC BY-NC 4.0 (https:// creativecommons.org/licenses/by-nc/4.0/)

© Petrov I. V., Menskoy D. D., Tayduganov A. S., 2022. Published by Peter the Great St.Petersburg Polytechnic University.

Introduction

Similar to conventional prepare-and-measure QKD, dead time t of a single-photon detectors (SPD) do not affect on the MDI QKD performance as long as t is less than pulse-to-pulse time interval in a quantum channel. This condition imposes a severe limitation on the secret key rate: dead time limits the detection frequency from above by the 1/t value. Meanwhile, widely used gated-mode single-photon avalanche photodiodes (SPAD) are characterized by the large dead time t ~ 0.1—10 ^s [1]. For typical pulse preparation frequency f = 108 Hz this means decrease in detection frequency by the 3 orders of magnitude (1/ t ~ 105). This indicates the problem of practical MDI QKD with imperfect detectors, which we attempt to solve. In this work we consider the phase-time-encoding MDI QKD protocol with decoy-state technique and propose slight modifications to the measurement device, which improves the protocol performance. First, we explain how detectors' dead time affects the Bell state measurement. Second, we provide a theoretical model for the sifted key rate, which is useful for the optimal parameters search, and analyze the protocol performance.

Influence on Bell measurement output

In MDI QKD the untrusted node Charlie performs Bell measurement of the Alice-Bob joint quantum state and declares the result [2]. Events of the form A. 0 Aj are considered successful, where A. and Aj denote detector's click in the corresponding time and space mode i e {cE, dE}, j e {cL, dL} (c and d stand for space modes, E and L stand for time modes — see Fig. 1, a). As far as standard measurement scheme (see Fig. 1, a) contains only one SPD at each beam splitter (BS) output, the events Ac 0 Ac and Ad 0 Ad cannot be detected in the case, when dead time overlaps the second pulse in a time-encoded pair, i.e. t > 1/f Using the theoretical formula of signal gain from [3], one can draw a simple conclusion: the loss of half of the events leads to double decrease in the gain, and hence the speed of the sifted key.

Alternative schemes:

1. We propose the scheme with four detectors (see Fig. 1, b) which contains two detectors at every BS output (c, d). As a result, one half of the previously discarded successful events can be detected, which for infinite key limit gives 25% restore of the sifted key rate in comparison with the two-detector scheme.

2. The scheme with four detectors can be upgraded in order to detect all the successful events with equal probabilities (see Fig. 1, c). One can send a pulse in each half of the time slots from previous schemes, provided that in each pair of detectors there is one that is gated in the first half of the time slot, while another is gated in the second half. Further we refer to this scheme as a scheme with time-divided measurement. Unfortunately, using passive beam splitters results in no profit in sifted key rate.

Fig. 1. Measurement schemes for phase-time-encoding MDI QKD: (a) — two detectors [3], (b) — four detectors, (c) — time-divided measurement. BS — beam splitter, (c, d) — output channels of BS, E, L — time slots of pulse preparation and detection gates

© Петров И. В., Менской Д. Д., Тайдуганов А. С., 2022. Издатель: Санкт-Петербургский политехнический университет Петра Великого.

Sifted key rate model

The above result is valid for the sifted key rate estimation only in the case when the dead time overlaps every second pulse (t ^ 1//). Otherwise, the result obtained in the limit t >> 1// and under conditions of synchronous dead time and infinite statistics is additionally applied [4]:

RT=0 nT*0 sift

= \-(1)

f 1 + TRtot

where Rf = fp2zpM QM M is sifted key rate for zero dead time (drawn out of signal gain QZM M estimated in Z-basis for P(a(bW Alice (Bob) intensities [3]), p = 0.5 and pz = 0.5 are signal pulse and basis choice probabilities respectively, RM is the overall signal gain for BB84 protocol. In the case of MDI QKD, we have to estimate overall count rate when at least one detector clicks considering t = 0.

The simple estimation of Rtot that considers the two-detectors Charlie scheme, dark counts and multi-photon pulses is

= f (Pr(«ph > 0) + 2pdc) (2)

where

Pr(nph > 0) = (l - e~Man-) + (l - e-Mn ) - (l - e~Man-) (l - e^ ) - 4№ (3)

is a probability of nonzero-photon pulses pass through the channel, p is mean photon number per pulse, r[ch is quantum channel transmittance. This prediction does not take into account Hong-Ou-Mandel interference on the beam splitter. Such a 'naive' estimation close to the one from [4]. Note, when the decoy-state technique is used, the probability above must be summarized over all intensity pairs.

In general, for the decoy-state MDI protocol all detection events must be taken into account, and one has to sum up all click probabilities. We consider clicks from two incoming coherent states, prepared in different bases and of different intensities, and clicks due to dark counts. This estimation is referred to as Rt(o2t) :

№ = f Z Pr (nclick > 1I ¥ab . Ma . Mb ) • p(¥ab )

blAJ. j .Ma .Mb

( ^ 1 (4)

p(Wab ) = p,,p,«pbaSIS = 4 pMapMbpbipb2 .

args: bi,b2 e{X,z};U j g{0,1 };Ma,Mb e{M,v,®} Here every joint Alice-Bob quantum state yab is defined by the basis {pb^,pb^} and intensity {pm , pMb} choice probabilities. General formula for Pr(ncUck > 1 | yab, pa, pb) can be derived from a detector independent click probabilities D,, averaged over the global phase:

Pr(nclick > 11 ¥ a .b. Ma. Mb ) = 1 - f nn (1 - A ) = 1 - pnbOb2 (5)

where i e {cE, cL, dE, dL}, b1, b2 e {Z, X}. One can consider p^2 as a probability of 'no clicks' on the detector. In the case of XX and ZZ basis choice (Dzz. DX are defined in [3])

pfo = (1 - pc )4 e-21'.

(6)

pZZ = (1 - Pc )4 e M •

Here p' = Pa^a + Pb^b.

It is left to calculate the probabilities for the cases XZ and ZX (it is worth noting that these

cases are connected through the replacing ^ to and vice versa). One has to consider a state

J "a +Sa )

e «

After passing through the channel and beam splitter this state becomes

" 1a«a

ei"a +ea ) In a« a + ei" 1h«h

"a 11 a«a

ei"a +ea) la«a _ ei" 1h«h

In this case the detection probabilities are equal to

DCe = Ddß = 1 - (1 - pdc) e 2 ,

D =1 _ (1- p )e'll2^1a«a +1h«h +2V 1a«a1h«h cOS(A" + ea)) D — 1 _ (1 _ p ) e~l'2(lVa«a +1h«h _2\/ 1a«a1h«h cos( ))

As a result, we derive that

pfo = (1 _ pd )4 e~«ae~«', pZX = (1 _ pd )4 e-«he-«.

(7)

(8)

(9)

(10)

Thus, we can accurately estimate Rf for a two-detector measurement scheme. To compare sifted key rate with proposed alternatives, consider Rf = r (nd ) as a function of an SPD quantum efficiency

Alternative schemes:

1. In the scheme with four detectors, when one detector in an arm of the first BS clicks, the left detector in the same arm and the second BS can be regarded together as a detector with r|/2 efficiency. In order to predict the sifted key rate, we can use the same equations, but instead

of = r(n ) we consider Rf = r ) + r /2);

2. In the scheme with time-divided measurement one doesn't have to throw away the half of successful events in the Bell measurement, but all the detectors always have constant decrease in efficiency (n/2). Therefore, we consider Rf = r(nd / 2) and Rtot = r'(nd / 2) .

We note that Rf formulas for alternative schemes are numerically accurate only in singlephoton approximation and the limit of t >> 0. Otherwise, they provide estimative results.

Simulation

In Fig. 2 we compare the computed secret key generation rate Rf for three presented detection schemes as a function of detector's dead time t. Other model parameters are listed in Tab. 1. Four-detector scheme shows only partial restore, which is about 1.25 times of the measurement scheme with two detectors. Meanwhile, even considering double preparation frequency, time-divided scheme shows no restore of the key rate loss due to undetected successful events, as expected. Nevertheless, the dead time t < 10 ^s slows down MDI QKD by up to 3 times, regardless of the measurement scheme. One can also note the significant difference between 'naive' sifted key rate estimation ^(1) and accurate model R(2).

Table 1

Key model parameters

v Pz P Pv L ,, km n, f

0.3 p/50 p/100 0.5 0.5 0.25 160 10% 10-6 3x108

Notations: {p,v,ra} are signal, week decoy and vacuum intensities (average number of photons per pulse), {pz, p , pv} are basis and pulse intensity choice probabilities, Lab — total line length (0.2 dB/km fiber loss), Pdc — detector quantum efficiency and dark count probability, f — pulse

repetition frequency.

20 15

0 2 4 1 8 To

X, u.s

Fig. 2. Dependence of sifted key rate Rsift from dead time t of a single photon detector (SPD). Three measurement schemes are compared (see Fig. 1). R(1) — 'naïve' estimation, R(2) — our general

theoretical result

Conclusion

Dead time of a single-photon avalanche photodiode causes the dramatic decrease in the sifted key rate of a QKD setup. Phase-time-encoding MDI protocol is even more vulnerable for dead time t > 1/f because it leads to the loss of a half of successful events in the Bell measurement. We proposed the theoretical model in order to predict the total number of detection events in the measurement scheme. We also proposed and compared measurement schemes with four detectors and with time-divided measurement, where the former is able to compensate for 25% of losses due to previously undetected events. This theoretical result needs further confirmation either by numerical or natural experiment. Meanwhile, the proposed sifted key model is applicable to accurate parameter optimization [5], compared to often used 'naïve' estimations of the total number of events.

Acknowledgments

This research was ordered by JSCo «RZD». The authors would also like to acknowledge Aleksander Duplinsky for thoughtful and productive discussions.

REFERENCES

1. Hadfield R. H., Single-photon detectors for optical quantum information applications. Nature Photonics, 3 (12) (2009) 696-705.

2. Lo H. K., Curty M., Qi B., Measurement-device-independent quantum key distribution. Physical review letters, 108 (13) (2012) 130503.

3. Ma X., Razavi M., Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A, 86 (2012) 062319.

4. Burenkov V., Qi B., Fortescue B., Lo H.-K., Security of high-speed quantum key distribution with finite detector dead time, 2010. D0I:10.48550/ARXIV.1005.0272

5. Xu, F., Curty M., Qi B., Lo H.-K., Practical aspects of measurement-device-independent quantum key distribution. New Journal of Physics, 15 (11) (2013) 113007.

THE AUTHORS

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

PETROV Ivan V. TAYDUGANOV Andrey S.

i.petrov@goqrate.com a.tayduganov@goqrate.com

ORCID: 0000-0002-5422-2886

MENSKOY Daniil D.

d.meskoy@goqrate.com

Received 19.08.2022. Approved after reviewing 24.08.2022. Accepted 08.09.2022.

© Peter the Great St. Petersburg Polytechnic University, 2022

i Надоели баннеры? Вы всегда можете отключить рекламу.