Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation

Authors

  • Sellami Ali Faculty of Science and Technology, University of Tamanghasset, Tamanghasset, Algeria | Materials and Energy Research Laboratory, University of Tamanghasset, Tamanghasset, Algeria
  • Benlahcene Djaouida Faculty of Science and Technology, University of Tamanghasset, Tamanghasset, Algeria
Volume: 14 | Issue: 4 | Pages: 15133-15140 | August 2024 | https://doi.org/10.48084/etasr.7521

Abstract

This paper simulated the operation of vacuum state and single decoy state protocols in the BB84 and SARG04 QKD schemes by utilizing the features of the commercial ID-3000 QKD system. Numerical modeling identified an optimal signal-to-decoy state ratio of 0.95:0.05 and an intensity of μ=0.85 for the signal state and ν1=0.05 for the decoy state, ensuring the highest key generation rate and a secure distance of up to 50 km. These protocols were validated experimentally over various transmission distances with standard telecom fiber, using the ID-3000 QKD system in a conventional bi-directional plug-and-play setup. Simulations predicted secure key rates of 1.2 × 10 5 bits/s for SARG04 and 8.5 × 104 bits/s for BB84 at 10 km, with secure distances of 45 km and 35 km, respectively. The experimental results confirmed these predictions, showing a 30% higher key rate and 20% longer secure distance compared to non-decoy methods. The SARG04 protocol surpassed BB84 in key rate and secure distance, highlighting the two-photon component's role in key generation. This study concludes that the decoy-state method significantly enhances key generation rates and secure distances, optimizing QKD protocols for secure quantum communication.

Keywords:

optical communication, decoy state method, quantum cryptography, quantum key distribution

Downloads

Download data is not yet available.

References

C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in International Conference on Computers, Systems, and Signal Processing, Bangalore, India, Dec. 1984, pp. 175–179.

H. Inamori, N. Lutkenhaus, and D. Mayers, "Unconditional security of practical quantum key distribution," The European Physical Journal D, vol. 41, no. 3, pp. 599–627, Mar. 2007.

B. Huttner, N. Imoto, N. Gisin, and T. Mor, "Quantum cryptography with coherent states," Physical Review A, vol. 51, no. 3, pp. 1863–1869, Mar. 1995.

W.-Y. Hwang, "Quantum Key Distribution with High Loss: Toward Global Secure Communication," Physical Review Letters, vol. 91, no. 5, Aug. 2003, Art. no. 057901.

D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," Quantum Information & Computation, vol. 4, no. 5, pp. 325–360, 2004.

H.-K. Lo, X. Ma, and K. Chen, "Decoy State Quantum Key Distribution," Physical Review Letters, vol. 94, no. 23, Jun. 2005, Art. no. 230504.

X.-B. Wang, "Decoy-state protocol for quantum cryptography with four different intensities of coherent light," Physical Review A, vol. 72, no. 1, Jul. 2005, Art. no. 012322.

X.-B. Wang, "Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography," Physical Review Letters, vol. 94, no. 23, Jun. 2005, Art. no. 230503.

Q. Cai and Y. Tan, "Photon-number-resolving decoy-state quantum key distribution," Physical Review A, vol. 73, no. 3, Mar. 2006, Art. no. 032305.

T. Horikiri and T. Kobayashi, "Decoy state quantum key distribution with a photon number resolved heralded single photon source," Physical Review A, vol. 73, no. 3, Mar. 2006, Art. no. 032331.

Q. Wang et al., "Experimental Decoy-State Quantum Key Distribution with a Sub-Poissionian Heralded Single-Photon Source," Physical Review Letters, vol. 100, no. 9, Mar. 2008, Art. no. 090501.

M. Bortz and J. Stolze, "Exact dynamics in the inhomogeneous central-spin model," Physical Review B, vol. 76, no. 1, Jul. 2007, Art. no. 014304.

X.-B. Wang, C.-Z. Peng, and J.-W. Pan, "Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source," Applied Physics Letters, vol. 90, no. 3, Jan. 2007, Art. no. 031110.

X. B. Wang, "Secure and efficient decoy-state quantum key distribution with inexact pulse intensities," Physical Review A, vol. 75, no. 5, May 2007, Art. no. 052301.

Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, "Experimental Quantum Key Distribution with Decoy States," Physical Review Letters, vol. 96, no. 7, Feb. 2006, Art. no. 070502.

T. Schmitt-Manderbach et al., "Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km," Physical Review Letters, vol. 98, no. 1, Jan. 2007, Art. no. 010504.

A. Boaron et al., "Secure Quantum Key Distribution over 421 km of Optical Fiber," Physical Review Letters, vol. 121, no. 19, Nov. 2018, Art. no. 190502.

S. Ali and M. R. B. Wahiddin, "Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols," The European Physical Journal D, vol. 60, no. 2, pp. 405–410, Nov. 2010.

S. Ali, S. Mohammed, M. S. H. Chowdhury, and A. A. Hasan, "Practical SARG04 quantum key distribution," Optical and Quantum Electronics, vol. 44, no. 10, pp. 471–482, Sep. 2012.

S. Ali, O. Mahmoud, and R. A. Saeed, "Estimation of decoy state parameters for practical QKD," Australian Journal of Basic and Applied Sciences, vol. 5, no. 6, pp. 430–439, Jun. 2011.

J. Teng et al., "Twin-field quantum key distribution with passive-decoy state," New Journal of Physics, vol. 22, no. 10, Jul. 2020, Art. no. 103017.

B. Djaouida and S. Ali, "Theoretical and simulation investigation of practical QKD for both BB84 and SARG04 protocols," International Journal of Quantum Information, Dec. 2023, Art. no. 2350050.

Z. Yuan et al., "10-Mb/s Quantum Key Distribution," Journal of Lightwave Technology, vol. 36, no. 16, pp. 3427–3433, Aug. 2018.

X.-B. Wang, Z.-W. Yu, and X.-L. Hu, "Twin-field quantum key distribution with large misalignment error," Physical Review A, vol. 98, no. 6, Dec. 2018, Art. no. 062323.

S.-K. Liao et al., "Satellite-to-ground quantum key distribution," Nature, vol. 549, no. 7670, pp. 43–47, Sep. 2017.

S. Wang et al., "Field and long-term demonstration of a wide area quantum key distribution network," Optics Express, vol. 22, no. 18, pp. 21739–21756, Sep. 2014.

J. F. Dynes et al., "Cambridge quantum network," npj Quantum Information, vol. 5, no. 1, Nov. 2019, Art. no. 101.

M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, "Overcoming the rate–distance limit of quantum key distribution without quantum repeaters," Nature, vol. 557, no. 7705, pp. 400–403, May 2018.

X. Ma, P. Zeng, and H. Zhou, "Phase-Matching Quantum Key Distribution," Physical Review X, vol. 8, no. 3, Aug. 2018, Art. no. 031043.

X.-T. Fang et al., "Implementation of quantum key distribution surpassing the linear rate-transmittance bound," Nature Photonics, vol. 14, no. 7, pp. 422–425, Jul. 2020.

X. Zhong, J. Hu, M. Curty, L. Qian, and H.-K. Lo, "Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution," Physical Review Letters, vol. 123, no. 10, Sep. 2019, Art. no. 100506.

Z. Tang, Z. Liao, F. Xu, B. Qi, L. Qian, and H.-K. Lo, "Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution," Physical Review Letters, vol. 112, no. 19, May 2014, Art. no. 190503.

K. Wei et al., "High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics," Physical Review X, vol. 10, no. 3, Aug. 2020, Art. no. 031030.

D. Rusca, A. Boaron, F. Grunenfelder, A. Martin, and H. Zbinden, "Finite-key analysis for the 1-decoy state QKD protocol," Applied Physics Letters, vol. 112, no. 17, Apr. 2018, Art. no. 171104.

M. A. A. Humayun, M. A. Rashid, A. Kuwana, and H. Kobayashi, "Improvement of Absorption and Emission Phenomena of 1.55µm Quantum Dot Laser using Indium Nitride," Engineering, Technology & Applied Science Research, vol. 13, no. 1, pp. 10134–10139, Feb. 2023.

B. B. Yousif and E. E. Elsayed, "Performance Enhancement of an Orbital-Angular-Momentum-Multiplexed Free-Space Optical Link Under Atmospheric Turbulence Effects Using Spatial-Mode Multiplexing and Hybrid Diversity Based on Adaptive MIMO Equalization," IEEE Access, vol. 7, pp. 84401–84412, Jan. 2019.

E. E. Elsayed and B. B. Yousif, "Performance evaluation and enhancement of the modified OOK based IM/DD techniques for hybrid fiber/FSO communication over WDM-PON systems," Optical and Quantum Electronics, vol. 52, no. 9, Aug. 2020, Art. no. 385.

E. E. Elsayed, A. G. Alharbi, M. Singh, and A. Grover, "Investigations on wavelength-division multiplexed fibre/FSO PON system employing DPPM scheme," Optical and Quantum Electronics, vol. 54, no. 6, May 2022, Art. no. 358.

F. Xu, H. Xu, and H.-K. Lo, "Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution," Physical Review A, vol. 89, no. 5, May 2014, Art. no. 052333.

X.-L. Hu, Y. Cao, Z.-W. Yu, and X.-B. Wang, "Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel," Scientific Reports, vol. 8, no. 1, Dec. 2018, Art. no. 17634.

W. Wang, F. Xu, and H.-K. Lo, "Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks," Physical Review X, vol. 9, no. 4, Oct. 2019, Art. no. 041012.

W. Wang and H.-K. Lo, "Simple method for asymmetric twin-field quantum key distribution," New Journal of Physics, vol. 22, no. 1, Jan. 2020, Art. no. 013020.

T.-T. Nguyen, N.-Q. Luc, and T. T. Dao, "Developing Secure Messaging Software using Post-Quantum Cryptography," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12440–12445, Dec. 2023.

N. Q. Luc, T. T. Nguyen, D. H. Quach, T. T. Dao, and N. T. Pham, "Building Applications and Developing Digital Signature Devices based on the Falcon Post-Quantum Digital Signature Scheme," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10401–10406, Apr. 2023.

H.-K. Lo, H. F. Chau, and M. Ardehali, "Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security," Journal of Cryptology, vol. 18, no. 2, pp. 133–165, Apr. 2005.

X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, "Practical decoy state for quantum key distribution," Physical Review A, vol. 72, no. 1, Jul. 2005, Art. no. 012326.

D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, "Quantum key distribution over 67 km with a plug&play system," New Journal of Physics, vol. 4, no. 1, Apr. 2002, Art. no. 41.

Downloads

How to Cite

[1]
Ali, S. and Djaouida, B. 2024. Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation. Engineering, Technology & Applied Science Research. 14, 4 (Aug. 2024), 15133–15140. DOI:https://doi.org/10.48084/etasr.7521.

Metrics

Abstract Views: 175
PDF Downloads: 360

Metrics Information

Most read articles by the same author(s)