Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Time-bin phase-encoding quantum key distribution using Sagnac-based optics and compatible electronics

Open Access Open Access

Abstract

In this work, we present a new time-bin phase-encoding quantum key distribution (QKD), where the transmitter utilizes an inherently stable Sagnac-type interferometer, and has comparable electrical requirements to existing polarization or phase encoding schemes. This approach does not require intensity calibration and is insensitive to environmental disturbances, making it both flexible and high-performing. We conducted experiments with a compact QKD system to demonstrate the stability and secure key rate performance of the presented scheme. The results show a typical secure key rate of 6.2 kbps@20 dB and 0.4 kbps@30 dB with channel loss emulated by variable optical attenuators. A continuous test of 120-km fiber spool shows a stable quantum bit error rate of the time-bin basis within 0.4%∼0.6% over a consecutive 9-day period without any adjustment. This intrinsically stable and compatible scheme of time-bin phase encoding is extensively applicable in various QKD experiments, including BB84 and measurement-device-independent QKD.

© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

Quantum key distribution (QKD) allows two distant parties, Alice and Bob, to communicate with information-theoretic security guaranteed by rules of quantum mechanics [1]. Unlike conventional public key cryptography schemes, which are vulnerable to decryption with increasing computational power, QKD is an ideal way to settle the problem regarding cipher text transfer. Legal communication entities, Alice and Bob, can evaluate the secrecy of the channel from the transmission bit error and can distill final secure keys from a set of received bits by post-processing. Since the introduction of the first QKD protocol by Bennett and Brassard in 1984 (BB84) [2], QKD has achieved considerable progress in both theoretical and experimental aspects [1,35]. Among various QKD protocols, the BB84 protocol is widely used in practical QKD systems due to its high performance, simple structure, and ease of maintenance. Several implementations of QKD systems exploiting various photonic degrees of freedom have been reported in recent years, including polarization encoding [6,7], phase encoding [8,9], and time-bin phase encoding [10,11]. Among these, the time-bin phase-encoding scheme exhibits advantages such as high key rates, long distances, and immunity to channel disturbance. Moreover, the time-bin basis is intrinsically stable in the receiver without requiring feedback, as opposed to the other two schemes that rely on polarization feedback [1214] or phase feedback [8]. This inherent stability makes the system more reliable than the other two. Therefore, the time-bin phase-encoding scheme has gained increasing attention and is preferred for QKD systems.

The practical implementations of different encoding schemes can vary significantly. For a typical time-bin phase encoding implementation, two modulators are required: one phase modulator (PM) for phase encoding and one intensity modulation (IM) for time-bin encoding [10]. These modulators are often operated at twice the system frequency, and the time-bin states require an active feedback strategy to maintain stability due to the Mach–Zehnder interferometer structure. These requirements render the encoding setup either complex or unstable. A recent work [15] improves the stability with a Sagnac-type IM in a time-bin phase encoding structure. However, it still requires additional PM for X/Y phase basis. Another type of implementation employs the optical injection locking (OIL) technique [16,17] without the need of high-speed modulators. Instead, the driving pattern of master and slave lasers are modulated. However, the phase modulation is based on the amplitude modulate in the interval between the onsets of two slave pulses, which has higher requirement on the laser modulation. In comparison, polarization or phase encoding implementations typically generate a 4-level voltage loaded on single phase modulator [69] within a symmetric or asymmetric interferometer, allowing them to share the same electrical hardware.

In this work, we propose a novel scheme of time-bin phase encoding in QKD, based on Sagnac-type optical structure and compatible electrical hardware that reduces the requirement for high-operation-frequency modulation electronics for lasers or modulators. This new scheme allows for an intrinsically stable encoding of time-bin basis with the assistance of Sagnac-type optical structure. Furthermore, the modulation electronics only need to generate a 4-level voltage to obtain {0, π, π/2, 3π/2} phases, which also meets the requirement of polarization encoding or phase encoding. This means that the transmitter can be converted to the other two encoding schemes using the corresponding optical modules and configurable software. Based on this scheme, we have developed a compact QKD system and perform an experiment, demonstrating its secure key rate and attainable distance. We obtained a typical secure key rate of 6.2 kbps@20 dB and 0.4 kbps@30 dB. We have also demonstrated the system's stability by operating it for a long duration of 9 days, obtaining a stable quantum bit error rate (QBER) of approximately 0.4%∼0.6% in the time-bin basis, and a QBER of 2.0%–3.6% in the phase basis using an active phase-stabilization strategy. Our system can be applied to establish QKD networks between different cities, even different countries [18].

2. Scheme and setup

The time-bin phase-encoding scheme is based on the structure of a Sagnac interferometer and an asymmetric M-Z interferometer (AMZI). The schematic structure is shown in Fig. 1.

 figure: Fig. 1.

Fig. 1. Experimental setup of the transmitter based on the proposed time-bin phase-encoding scheme and the receiver based on the Michelson interferometer. LD: laser Diode; PM: phase modulator; CIR: circulator; BS: beam splitter; VOA: variable optical attenuator; ISO: isolator; FBG: fiber Bragg grating; DWDM: dense wavelength division multiplexer; PS: phase shifter; FM: faraday mirror; FDL: fiber delay line; APD: InGaAs/InP avalanche photodiode.

Download Full Size | PDF

We adopted a Sagnac-based intensity modulation unit (S-IM) [1922], including a beam splitter (BS) and a phase modulator (PM) in the Sagnac loop. The BS splits the signal pulse into two coherent parts, traveling in the Sagnac loop in opposite directions, i.e., the clockwise and anti-clockwise directions. The two parts can be modulated with different phases $\Delta \emptyset $ when traveling through the PM at different time slots, such as PM modulates the phase of the unit-clockwise pulse to introduce this phase difference, as shown in Fig. 2(a). The time difference is set to be optimal 1.6 ns, and its accuracy relies on the precision of the fiber length in the Sagnac loop and can be controlled at a level of <5 ps. Thus, they interfere at the BS with this phase difference and could generate two interference pulses outputted by ports 0 and 1 of the BS, with the complex amplitudes ${\alpha _0},{\alpha _1}$ as follows:

$${\alpha _0} = \frac{{1 + {e^{i\Delta \emptyset }}}}{2} = {e^{i\frac{{\Delta \emptyset }}{2}}}cos\frac{{\Delta \emptyset }}{2},{\; }{\alpha _1} = \frac{{1 - {e^{i\Delta \emptyset }}}}{2}{e^{i\frac{{\Delta \emptyset - \mathrm{\pi }}}{2}}}sin\frac{{\Delta \emptyset }}{2}$$
The intensities of the two pulses this S-IM output, ${|{{\alpha_0}} |^2},{|{{\alpha_1}} |^2}$, are determined only by the phase difference experienced between two parts traveling the paths in opposite directions within the S-IM. The paths experience the same loop and are completely equal in length. Therefore, the phase disturbance on the loop can be totally cancelled, which results in a high intensity extinction ratio and intensity stability of the two pulses output by S-IM.

 figure: Fig. 2.

Fig. 2. (a) Relationship between optical pulses and electrical signals in S-IM2 and AMZI. (b) Intensity correlation and phase correlation between the two pulses.

Download Full Size | PDF

Moreover, the two pulses the S-IM1 outputs exhibit both intensity and phase correlations, as depicted in Fig. 2(b). In terms of intensity correlation, the two pulses demonstrate complementary intensity correlation, particularly when the phase difference $\Delta \emptyset $ is 0 or π, resulting in a single output pulse. When $\Delta \emptyset $ is π/2 or 3π/2, both pulses output half the intensity. In terms of phase correlation, comparing the two scenarios of Δ∅︀ within the ranges of 0∼π and π∼2π, a stable π difference (noted as geometric phase [23,24]) exists between the relative phases of two pulses. Notably, we consider the situations of $\Delta \emptyset $ set to π/2 and 3π/2, although both pulses output the same half intensity, there is a stable π disparity between their respective relative phases.

With these correlations, we ultilize S-IM1 and cascaded passive AMZI to prepare the time-bin phase states for BB84 protocol, as shown in Fig. 2(a). We apply four phase settings: {0, π/2, π, or 3π/2} of $\Delta \emptyset $ on the PM within S-IM1. Its two output pulses are then transmitted to the following AMZI through two different optical paths with a time difference ${t_1} - {t_0}$, and are then coupled by the BS in AMZI to obtain the four BB84 states:

$$\left. {\left. {\left| \varphi \right.} \right\rangle } \right| = \left( {\left. {{\alpha _0}\left| {{t_0}} \right.} \right\rangle + \left. {{\alpha _1}\left| {{t_1}} \right.} \right\rangle } \right)/\sqrt {{{\left| {{\alpha _0}} \right|}^2} + {{\left| {{\alpha _1}} \right|}^2}} $$
As listed in Table 1, phases 0 and π correspond to the time-bin basis, while phases π/2 and 3π/2 correspond to the phase basis. Here, we ignore the global phase between $\left. {\left| {{t_0}} \right.} \right\rangle $ and $\left. {\left| {{t_1}} \right.} \right\rangle $, without loss of generality. Based on intrinsic interference characteristics, this apparatus exploits both the intensity and phase relationship between two interference outputs, and can simultaneously generate the time-bin basis and the phase basis to obtain four BB84 states with only one PM rather than two. Furthermore, the intensities of the two interference pulses are inherently stable without DC drift and can maintain a high extinction ratio.

Tables Icon

Table 1. Relationship between phase $\Delta \emptyset $ and the corresponding quantum state

Based on this time-bin phase-encoding scheme, we develop a QKD transmitter clocked at a system repetition rate of 312.5-MHz. This transmitter includes a signal laser source that generates phase-randomized light pulses. S-IM2 is used to modulate the pulse intensity for the decoy-state method [2528], which ultilizes the same modulation mechanism of S-IM1. Then, the time-bin phase-encoding apparatus is used to prepare four BB84 states. We consider an asymmetric BB84 protocol [29] with the “signal + vacuum + weak” decoy-state scheme [28]. The pulses are then attenuated by two variable optical attenuators (VOA) to the single-photon level, with the photon numbers of the signal, decoy, and vacuum states set to $\mu $ = 0.4, $v$ = 0.1, $\rho \ll 0.001$. A true random number generator (Model: QCTWNG from QuantumCTek) [30] sets the probabilities of sending the signal, decoy, and vacuum states to ${p_\mu }$= 0.5, ${p_\nu }$= 3/8, and ${p_\rho }$= 1/8, respectively. The basis probabilities for the signal state (decoy or vacuum states) are set to ${p_{z|\mu }}$= 7/8, ${p_{x|\mu }}$= 1/8 (${p_{z|v}}$ = 2/8, ${p_{x|v}}$= 6/8, ${p_{z|\rho }} = {p_{x|\rho }} = 1/2$). A 99:1 BS and a monitor are used to measure the signal intensity for stabilization. Before the transmitter outputs the quantum signal, an isolator, a Fiber Bragg Grating filter with a circulator, and another monitor are used for better isolation and monitoring of any injected attacking light.

The receiver employs an asymmetric Michelson interferometer design. A single beam splitter (BS) determines the measurement basis, with the Z:X basis split at a ratio of 70%:30%. In the Z basis, the BS output port directly links to an InGaAs/InP avalanche photodiode (APD0). Detection of the former or latter time position in one period maps to bit 0 or 1 in the Z basis. For the X basis, the other BS output port connects to a Michelson interferometer, followed by APD1 and APD2. Detection at APD1 or APD2 translates to bit 0 or 1 in the X basis. The three detectors operate at a 1.25-GHz gate frequency, with a detection efficiency of approximately 15% and a dark count rate below 800 Hz. A 600-ps time window within a system period of 3.2 ns reduces the effective dark count rate to below 200 Hz.

With the scheme of the high-speed QKD transmitter and receiver, we develop a compact QKD system based on the electrical structure of a field-programmable gate array (FPGA) and CPU for real-time operation. As shown in Fig. 1, the transmitter/receiver is housed in a 4U 19-inch rack unit containing the optical module and the custom-made electrical modules. The electrical modules include the pulse modulation electrical boards for time-bin phase encoding, the APD module for time-bin phase decoding, and the main control electrical board for system control altogether with data sifting, error correction and privacy amplification. Standard 1 G Ethernet interfaces are used for classical communication between the transmitter and receiver. It is worth noting that, with the same electrical modules, we could only modify the optical module and the corresponding configuration parameters to implement the other QKD systems, such as for phase or polarization encoding.

3. Experiment results

To demonstrate the feasibility and stability of this compact QKD system, we firstly adopt VOA with different loss conditions to emulate the channel losses and measure the specifications in a lab environment, with the results shown in Fig. 3. The maximal loss can be extended to 30 dB, and a typical secure key rate of 6.2 kbps@20 dB and 0.4 kbps@30 dB are obtained. In the experiment, a block size of approximately 0.5Mbits is used for link loss of 0-25 dB, while 1 Mbit for 30 dB. Thus, simulated secure key rate for block sizes of 0.5 Mbits and 1 Mbits are both presented in Fig. 2. The QBER in the time-bin basis can be kept very stable and low within 1%. Meanwhile, the QBERs in the phase basis can be maintained within (1.0%–3%) below 25 dB, while increased up to 6.0% in 30-dB case. Here we adopt a phase-feedback strategy [31] to minimize the QBERs in the phase basis, using a feedback frame time-multiplexed with the quantum frame by 20% time consumption.

 figure: Fig. 3.

Fig. 3. The measured secure key rate and the QBER (Z/X basis) under different attenuation conditions using VOA.

Download Full Size | PDF

In the case of a 30-dB loss, all the relevant parameters are listed in Table 2 for a typical running duration of $t = 256\;\textrm{ s}$ in our experiment to accumulate approximately 1-M bits sifted key. A final key rate $R = L/t$ of approximately 0.4 kbps. Details can be found in Appendix.

Tables Icon

Table 2. Measured parameters and calculated results in the 30-dB case

To demonstrate the stabilization performance of this system, we implement a continuous test for 9 days with 120-km-fiber of 24 dB. As shown in Fig. 4, the QBER of the signal state of the Z basis remains very stable within (0.4%–0.6%), and the QBER of X basis can be maintained within (2.0%–3.6%) based on the aforementioned phase-feedback strategy [31].

 figure: Fig. 4.

Fig. 4. Measured secure key rate and QBER of the 9-day 120-km-fiber continuous test.

Download Full Size | PDF

4. Conclusion and discussion

In this work, we present a new time-bin phase-encoding transmitter for QKD based on a Sagnac-type optical structure and compatible electrical hardware. Using this transmitter, we implemented the QKD experiment in laboratory, obtaining a typical secure key rate of 6.2 kbps @20 dB and 0.4 kbps @30 dB. Furthermore, a 9-day continuous test demonstrated its stabilization performance, achieving a stable QBER of approximately 0.4%∼0.6% in the time-bin basis and a QBER of 2.0%–3.6% in the phase basis by an active phase-stabilization strategy.

Using this transmitter, we can easily extend the applications for polarization or phase encoding in diversified situations, based on a compatible modulation electronics, flexible optical modules, and configurable software. It is because the modulation electronics of this transmitter generates a 4-level voltage, which also meets the polarization or phase encoding requirement. Moreover, the Sagnac-type optical structure of the transmitter ensures intrinsic stability of time-bin phase encoding and a very low encoding error, resulting in high stability and a high secure key rate. Last but not least, the traditional scheme using PM for phase encoding is not convenient to monitor the phase fluctuation of phase encoding in the transmitter. In this scheme, the geometric phase characteristics of S-IM structure are utilized to achieve stable phase encoding, and the phase fluctuation on the phase modulator in S-IM is transformed to intensity variation. Therefore, it is easier to design an intensity monitoring scheme rather than a direct phase monitoring one to stabilize the phase modulator status. Consequently, this scheme can better serve the needs of flexibility in encoding schemes while maintaining high performance. It offers a preferred approach contributed to the development of quantum communications toward diverse and complex environment.

Appendix

Based on the theory of asymmetric decoy-state QKD, we developed data postprocessing algorithms using an FPGA implementation to finish both error correction and privacy amplification. We consider the statistical fluctuation with a finite key length of 1 Mbits of ${M_{\mu zz}} + {M_{\mu xx}}$, the measured detection counts of Z and X bases after basis sift in signal state. We obtain the following formula to calculate the secure key length:

$$L = M_{1zz}^L[{1 - {H_2}({e_{1zz}^{pU}} )} ]+ M_{1xx}^L[{1 - {H_2}({e_{1xx}^{pU}} )} ]- lea{k_{EC}} $$
where $M_{1zz}^L$ ($M_{1xx}^L$) is the lower bound of single-photon event counts of the Z (X) basis after basis sift in the signal state. $e_{1zz}^{pU}$ ($e_{1xx}^{pU}$) is the upper bound of the single-photon phase error rate of the Z (X) basis after basis sift in the signal state. ${H_2}(\textrm{x} )$ is the binary entropy function: ${H_2}(\textrm{x} )$ = −xlog2(x)− (1−x) log2(1−x). $lea{k_{EC}}$ is the information leakage in the process of error correction.

$M_{1zz}^L$ and $\textrm{e}_{1\textrm{z}z}^{pU}$ (similar for $M_{1xx}^L$ and $\textrm{e}_{1xx}^{pU}$) are calculated using the following formulas:

$$\textrm{M}_{1zz}^L = {g^L}({\textrm{M}_{1zz}^{L\mathrm{\ast }}} ) $$
$$\textrm{e}_{1\textrm{z}z}^{pU} = \frac{{{g^U}({ME_{1xx}^{U\mathrm{\ast }}} )}}{{M_{1xx}^L}} + {\gamma _x} $$
where ${g^L}({{x^\mathrm{\ast }}} )= \max \left\{ {{x^\mathrm{\ast }} - \sqrt {2\beta {x^\mathrm{\ast }}} \textrm{, }0} \right\}$, ${g^U}({{x^\mathrm{\ast }}} )= {x^\mathrm{\ast }} + \frac{\beta }{2} + \sqrt {2\beta {x^\mathrm{\ast }} + \frac{{{\beta ^2}}}{4}} $ with $\beta ={-} ln\frac{{{\varepsilon _{sec}}}}{{23}}$ are the lower and upper bounds of observed value for a given expected value ${x^\mathrm{\ast }}$, respectively, by considering the statistical fluctuation using Chernoff bound [32,33] with a failure probability $\varepsilon = \frac{{{\; }{\varepsilon _{sec}}}}{{23}}$. $\textrm{M}_{1zz}^{L\mathrm{\ast }}$ is the lower bound of the expected value of single-photon event counts for the Z basis, and $ME_{1xx}^{U\mathrm{\ast }}$ is the upper bound of the expected value of single-photon error event counts for the X basis. They are calculated using the following formula:
$$\textrm{M}_{1zz}^{L\mathrm{\ast }} = \frac{{{\mu ^2}{e^{ - \mu }}{p_\mu }{p_{z|\mu }}}}{{\mu ({v - \rho } )- {v^2} + {\rho ^2}}}\left( {\frac{{{e^v}M_{\nu zz}^{L\mathrm{\ast }}}}{{{p_v}{p_{z|v}}}} - \frac{{{v^2}{e^\mu }M_{\mu zz}^{U\mathrm{\ast }}}}{{{\mu^2}{p_\mu }{p_{z|\mu }}}} - \frac{{({{\mu^2} - {v^2}} ){e^\rho }M_{\rho zz}^{U\mathrm{\ast }}}}{{{\mu^2}{p_\rho }{p_{z|\rho }}}}} \right) $$
$$ME_{1xx}^{U\mathrm{\ast }} = min\left( {\frac{{\mu {e^{ - \mu }}{p_\mu }{p_{x|\mu }}}}{{v - \rho }}\left( {\frac{{{e^v}ME_{\nu xx}^{U\mathrm{\ast }}}}{{{p_v}{p_{x|v}}}} - \frac{{{e^\rho }ME_{\rho xx}^{L\mathrm{\ast }}}}{{{p_\rho }{p_{x|\rho }}}}} \right),{\; }\frac{{\mu {e^{ - \mu }}{p_\mu }}}{{\mu - \rho }}\left( {\frac{{{e^\mu }ME_{\mu xx}^{U\mathrm{\ast }}}}{{{p_\mu }{p_{x|\mu }}}} - \frac{{{e^\rho }ME_{\rho xx}^{L\mathrm{\ast }}}}{{{p_\rho }{p_{x|\rho }}}}} \right)} \right) $$

Here

$$M_{\mu zz}^{U\mathrm{\ast }} = {f^U}({{M_{\mu zz}}} ),M_{\nu zz}^{L\mathrm{\ast }} = {f^L}({{M_{\nu zz}}} ),M_{\rho zz}^{U\mathrm{\ast }} = {f^U}({{M_{\rho zz}}} ) $$
$$ME_{\mu xx}^{U\mathrm{\ast }} = {f^U}({M{E_{\mu xx}}} ),ME_{\nu xx}^{U\mathrm{\ast }} = {f^U}({M{E_{\nu xx}}} ),M_{\rho xx}^{U\mathrm{\ast }} = {f^U}({M{E_{\rho xx}}} )= \frac{{{f^L}({{M_{\rho xx}}} )}}{2} $$

${f^U}(x )= x + \beta + \sqrt {2\beta x + {\beta ^2}} ,{f^L}(x )= x - \frac{\beta }{2} - \sqrt {2\beta x + \frac{{{\beta ^2}}}{4}} $ with $\beta ={-} ln\frac{{{\varepsilon _{sec}}}}{{23}}$ are the lower and upper bounds of expected value for a given observed value x, respectively, by considering the statistical fluctuations using the variant of Chernoff bound with a failure probability $\varepsilon = {\varepsilon _{sec}}/23$. ${p_{z/x}}$ is the probability of choosing the Z/X basis in the transmitter. ${M_{\mu (\nu, \rho )zz}}$ is the measured detection count corresponding to choosing $\mu ({\nu ,\rho } )$ intensity in the transmitter and Z basis after basis sift. $M{E_{\mu (\nu )xx}}$ is the measured error detection count corresponding to choosing $\mu (\nu )\;\textrm{the }$ intensity in the transmitter and X basis after basis sift.

${\theta _x}$ is calculated according to Ref. [34,35] via a random-sampling theory without replacement:

$${\theta _x} = {\gamma ^U}\left( {\frac{{{\varepsilon_{sec}}}}{{23}},\frac{{ME_{1xx}^U}}{{M_{1xx}^L}},\textrm{M}_{1xx}^L,\textrm{M}_{1zz}^L} \right). $$
Here ${\gamma ^U}({a,\textrm{b},\textrm{c},\textrm{d}} )= \sqrt {\frac{{({c + d} )({1 - \textrm{b}} )\textrm{b}}}{{\textrm{cd log}(2 )}}lo{g_2}\frac{{({\textrm{c} + \textrm{d}} )}}{{{a^2}\textrm{b}({1 - \textrm{b}} )\textrm{cd}}}} $.

The factor $\frac{1}{{23}}$ is due to ${\varepsilon _{\textrm{sec}}} = n\varepsilon + 2({2{\alpha_1} + {\alpha_2} + {\alpha_3}} )+ \bar{\nu } = 23\varepsilon $ [35], when ${\alpha _1} = {\alpha _2} = {\alpha _3} = \bar{\nu } \buildrel \Delta \over = \varepsilon $ and $n = 14$ ($n$ means the times to use the function g or f for parameter estimation). Thus, the secure parameter for each parameter estimation is ${\varepsilon _{\textrm{sec}}}/23$.

The error correction is realized using the Winnow algorithm, with CRC-64 for verification. The initial fragment length is set to 15, resulting in an error correction efficiency of approximately 1.8 for 1% error rate. The fragment length can be optimized to improve the error correction efficiency. Toeplitz matrix is employed for privacy amplification. The failure probability is set to ${\varepsilon _{\textrm{sec}}}\; = \; {10^{ - 9}}$.

Funding

Major Scientific and Technological Special Project of Anhui Province (202103a13010004); Major Scientific and Technological Special Project of Hefei City (2021DX007); Key R&D Plan of Shandong province (2020CXGC010105); China Postdoctoral Science Foundation (2021M700315).

Acknowledgments

We thank Enago for its linguistic assistance during the preparation of this paper.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74(1), 145–195 (2002). [CrossRef]  

2. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in IEEE International Conference on Computers, Systems and Signal Processing (IEEE, 1984), Vol. 175 (1984).

3. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81(3), 1301–1350 (2009). [CrossRef]  

4. F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys. 92(2), 025002 (2020). [CrossRef]  

5. C.-Y. Lu, Y. Cao, C.-Z. Peng, and J.-W. Pan, “Micius quantum experiments in space,” Rev. Mod. Phys. 94(3), 035001 (2022). [CrossRef]  

6. T.-Y. Chen, X. Jiang, S.-B. Tang, et al., “Implementation of a 46-node quantum metropolitan area network,” npj Quantum Inf 7(1), 134 (2021). [CrossRef]  

7. D. Ma, X. Liu, C. Huang, H. Chen, H. Lin, and K. Wei, “Simple quantum key distribution using a stable transmitter-receiver scheme,” Opt. Lett. 46(9), 2152 (2021). [CrossRef]  

8. A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, “Continuous operation of high bit rate quantum key distribution,” Appl. Phys. Lett. 96(16), 175–179 (2010). [CrossRef]  

9. Z. Yuan, A. Plews, R. Takahashi, K. Doi, W. Tam, A. W. Sharpe, A. R. Dixon, E. Lavelle, J. F. Dynes, A. Murakami, M. Kujiraoka, M. Lucamarini, Y. Tanizawa, H. Sato, and A. J. Shields, “10-Mb/s quantum key distribution,” J. Lightwave Technol. 36(16), 3427–3433 (2018). [CrossRef]  

10. A. Tanaka, M. Fujiwara, K. I. Yoshino, S. Takahashi, Y. Nambu, A. Tomita, S. Miki, T. Yamashita, Z. Wang, M. Sasaki, and A. Tajima, “High-speed quantum key distribution system for 1-mbps real-time key generation,” IEEE J. Quantum Electron. 48(4), 542–550 (2012). [CrossRef]  

11. A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussières, M. J. Li, D. Nolan, A. Martin, and H. Zbinden, “Secure Quantum Key Distribution over 421 km of Optical Fiber,” Phys. Rev. Lett. 121(19), 190502 (2018). [CrossRef]  

12. I. Lucio-Martinez, P. Chan, X. Mo, S. Hosier, and W. Tittel, “Proof-of-concept of real-world quantum key distribution with quantum frames,” New J. Phys. 11(9), 095001 (2009). [CrossRef]  

13. A. Duplinskiy, V. Ustimchik, A. Kanapin, V. Kurochkin, and Y. Kurochkin, “Low loss QKD optical scheme for fast polarization encoding,” Opt. Express 25(23), 28886–28897 (2017). [CrossRef]  

14. D.-D. Li, S. Gao, G.-C. Li, L. Xue, L.-W. Wang, C.-B. Lu, Y. Xiang, Z.-Y. Zhao, L.-C. Yan, Z.-Y. Chen, G. Yu, and J.-H. Liu, “Field implementation of long-distance quantum key distribution over aerial fiber with fast polarization feedback,” Opt. Express 26(18), 22793–22800 (2018). [CrossRef]  

15. G.-J. Fan-Yuan, F.-Y. Lu, S. Wang, Z.-Q. Yin, D.-Y. He, W. Chen, Z. Zhou, Z.-H. Wang, J. Teng, G.-C. Guo, and Z.-F. Han, “Robust and adaptable quantum key distribution network without trusted nodes,” Optica 9(7), 812 (2022). [CrossRef]  

16. T. K. Paraïso, T. Roger, D. G. Marangon, I. D. De Marco, M. Sanzaro, R. I. Woodward, J. F. Dynes, Z. L. Yuan, and A. J. Shields, “A photonic integrated quantum secure communication system,” Nat. Photonics 15(11), 850–856 (2021). [CrossRef]  

17. Y. S. Lo, R. I. Woodward, N. Walk, M. Lucamarini, I. De Marco, T. K. Paraïso, M. Pittaluga, T. Roger, M. Sanzaro, Z. L. Yuan, and A. J. Shields, “Simplified intensity- and phase-modulated transmitter for modulator-free decoy-state quantum key distribution,” APL Photonics 8(3), 036111 (2023). [CrossRef]  

18. D. Ribezzo, M. Zahidy, I. Vagniluca, et al., “Deploying an Inter-European Quantum Network,” Adv. Quantum Technol. 6(2), 2200061 (2023). [CrossRef]  

19. Y.-L. Tang and Z. Zhu, “Intensity modulation device, intensity modulation method, and application thereof in quantum key distribution system,” Chinese Patent CN108667519A (28 March, 2017).

20. X.-T. Fang, P. Zeng, H. Liu, et al., “Implementation of quantum key distribution surpassing the linear rate-transmittance bound,” Nat. Photonics 14(7), 422–425 (2020). [CrossRef]  

21. G. L. Roberts, M. Pittaluga, M. Minder, M. Lucamarini, J. F. Dynes, Z. L. Yuan, and A. J. Shields, “Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution,” Opt. Lett. 43(20), 5110 (2018). [CrossRef]  

22. C. Agnesi, M. Avesani, A. Stanco, P. Villoresi, and G. Vallone, “All-fiber self-compensating polarization encoder for quantum key distribution,” Opt. Lett. 44(10), 2398–2401 (2019). [CrossRef]  

23. M. V. Berry, “Quantal Phase Factors Accompanying Adiabatic Changes,” Proc. R. Soc. A 392(1802), 45–57 (1984). [CrossRef]  

24. B. Simon, “Holonomy, the Quantum Adiabatic Theorem, and Berry's Phase,” Phys. Rev. Lett. 51(24), 2167–2170 (1983). [CrossRef]  

25. W.-Y. Hwang, “Quantum key distribution with high loss: toward global secure communication,” Phys. Rev. Lett. 91(5), 057901 (2003). [CrossRef]  

26. X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. Lett. 94(23), 230503 (2005). [CrossRef]  

27. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94(23), 230504 (2005). [CrossRef]  

28. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72(1), 012326 (2005). [CrossRef]  

29. H.-K. Lo, H. F. Chau, and M. Ardehali, “Efficient quantum key distribution scheme and proof of its unconditional security,” J. Cryptology 18(2), 133–165 (2005). [CrossRef]  

30. Instead of quantum random number generators, we use a high-speed multi-channel physical random number generator (6 mm x 6 mm 48-pin QFN package), developed based on the clock jitter scheme. This 10-channel random number generator can provide maximum output of 6.25Gbps. See http://www.quantum-info.com/English/product/pfour/hexinqijian/2017/0831/310.html.

31. Y.-L. Tang, Z.-L. Xie, C. Zhou, et al., “Field test of quantum key distribution over aerial fiber based on simple and stable modulation,” Optica Open, 105684 (2023). [CrossRef]  

32. Z. Zhang, Q. Zhao, M. Razavi, and X. Ma, “Improved key rate bounds for practical decoy-state quantum-key-distribution systems,” Phys. Rev. A 95(1), 012333 (2017). [CrossRef]  

33. H.-L. Yin, M.-G. Zhou, J. Gu, Y.-M. Xie, Y.-S. Lu, and Z.-B. Chen, “Tight security bounds for decoy-state quantum key distribution,” Sci. Rep. 10(1), 14312 (2020). [CrossRef]  

34. C.-H. F. Fung, X. Ma, and H. F. Chau, “Practical issues in quantum-key-distribution post-processing,” Phys. Rev. A 81(1), 012318 (2010). [CrossRef]  

35. C.-C. W. Lim, M. Curty, Ni. Walenta, F. Xu, and H. Zbinden, “Concise Security Bounds for Practical Decoy-State Quantum Key Distribution,” Phys. Rev. A 89(2), 022307 (2014). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1.
Fig. 1. Experimental setup of the transmitter based on the proposed time-bin phase-encoding scheme and the receiver based on the Michelson interferometer. LD: laser Diode; PM: phase modulator; CIR: circulator; BS: beam splitter; VOA: variable optical attenuator; ISO: isolator; FBG: fiber Bragg grating; DWDM: dense wavelength division multiplexer; PS: phase shifter; FM: faraday mirror; FDL: fiber delay line; APD: InGaAs/InP avalanche photodiode.
Fig. 2.
Fig. 2. (a) Relationship between optical pulses and electrical signals in S-IM2 and AMZI. (b) Intensity correlation and phase correlation between the two pulses.
Fig. 3.
Fig. 3. The measured secure key rate and the QBER (Z/X basis) under different attenuation conditions using VOA.
Fig. 4.
Fig. 4. Measured secure key rate and QBER of the 9-day 120-km-fiber continuous test.

Tables (2)

Tables Icon

Table 1. Relationship between phase Δ and the corresponding quantum state

Tables Icon

Table 2. Measured parameters and calculated results in the 30-dB case

Equations (10)

Equations on this page are rendered with MathJax. Learn more.

α 0 = 1 + e i Δ 2 = e i Δ 2 c o s Δ 2 , α 1 = 1 e i Δ 2 e i Δ π 2 s i n Δ 2
| φ | = ( α 0 | t 0 + α 1 | t 1 ) / | α 0 | 2 + | α 1 | 2
L = M 1 z z L [ 1 H 2 ( e 1 z z p U ) ] + M 1 x x L [ 1 H 2 ( e 1 x x p U ) ] l e a k E C
M 1 z z L = g L ( M 1 z z L )
e 1 z z p U = g U ( M E 1 x x U ) M 1 x x L + γ x
M 1 z z L = μ 2 e μ p μ p z | μ μ ( v ρ ) v 2 + ρ 2 ( e v M ν z z L p v p z | v v 2 e μ M μ z z U μ 2 p μ p z | μ ( μ 2 v 2 ) e ρ M ρ z z U μ 2 p ρ p z | ρ )
M E 1 x x U = m i n ( μ e μ p μ p x | μ v ρ ( e v M E ν x x U p v p x | v e ρ M E ρ x x L p ρ p x | ρ ) , μ e μ p μ μ ρ ( e μ M E μ x x U p μ p x | μ e ρ M E ρ x x L p ρ p x | ρ ) )
M μ z z U = f U ( M μ z z ) , M ν z z L = f L ( M ν z z ) , M ρ z z U = f U ( M ρ z z )
M E μ x x U = f U ( M E μ x x ) , M E ν x x U = f U ( M E ν x x ) , M ρ x x U = f U ( M E ρ x x ) = f L ( M ρ x x ) 2
θ x = γ U ( ε s e c 23 , M E 1 x x U M 1 x x L , M 1 x x L , M 1 z z L ) .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.