Abstract
Characterization of photon statistics of a light source is one of the most basic tools in quantum optics. Existing methods rely on an implicit and unverifiable assumption that the source never emits too many photons to stay within the measuring range of the detectors. As a result, they fail to fulfill the demand arising from emerging applications of quantum information such as quantum cryptography. Here, we propose a characterization method using a conventional Hanbury-Brown-Twiss setup to produce rigorous bounds on emission probabilities of low photon numbers from an unknown source. As an application, we show that our characterization method can be used for a practical light source in a quantum key distribution protocol to forsake the commonly used a priori assumption without significant change in efficiency. Our versatile and flexible formula for rigorous bounds will make an essential contribution to the optics toolbox in the era of quantum information.
© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
1. Introduction
Autocorrelation measurement of a light source has been known to be a convenient method for investigating the characteristics of the source. It dates back to Hanbury-Brown and Twiss (HBT) who measured [1, 2] the correlation of photocurrents from two photodetectors shone by a common light source to determine its second-order intensity correlation function. The meaning of the correlation functions in quantum optics was clarified by Glauber [3, 4], who showed that the second-order correlation function can also be determined from a HBT setup with two photon detectors by measuring the rate of coincidence counts. It was successfully used in the direct observation of the non-classical property of light [5]. In the case of a pulsed light, a proper integration around τ = 0 and a normalization lead to a normalized factorial moment of the photon number n in the pulse [6]. Since is achieved only by an ideal single photon source (SPS), the measurement of by the HBT setup has been widely adopted for the characterization of experimentally developed SPSs [7, 8]. Extension of the method to higher-order moments is also straightforward by increasing the number of detectors to r [9, 10].
Despite the apparent success for the non-classical light sources, the above characterization method is not particularly suited to the emergent applications in quantum information. The most severe drawback is the fact that the HBT setup with conventional on-off (threshold) photon detectors provides the accurate value of the factorial moment only in the limit of low detection efficiencies. Here, on-off detectors such as avalanche photodiodes in Geiger mode or superconducting nano-wire detectors respond only to the absence or presence of photons. As a result, the value of from an actual experiment is only approximate, and how it is deviated from the true value is unknown. This is problematic for the applications involving the security [11, 12], for which rigorous security statements are mandatory. For the computational tasks using photons such as boson sampling [13], reliability of the outcome will eventually be ascribed to that of the constituent components including light sources. Another drawback is that we encounter the moments much less frequently in the quantum information theory than the photon-number probability distribution . For example, the requirement for the light source used in the decoy-state quantum key distribution (QKD) [14–16] is given by a set of inequalities in terms of the photon-number probability distribution [17, 18]. Hence, as a characterization method in the era of quantum information, it is vital that it provides rigorous statements over , and preferably it is tight.
Main difficulty of the problem lies in the fact that a practical characterization scheme must use a finite size of data, such as expectation values of a finite number of observables, while the input photon number is not bounded. Some of the previous methods [19, 20] using multiple on-off detectors assumed a cutoff on the input photon number and estimated likely values of rather than their bounds. Other methods to produce rigorous statements were limited to specific properties of light such as the non-classical property [21–26] and the non-Gaussian property [27, 28]. Very recently, Kovalenko et al. [29] have discussed the problem in a more general framework, but the obtained state-independent bounds on the systematic error for were rather large and will not be suited for applications such as QKD. Here we propose a characterization method using an HBT setup to produce rigorous bounds on emission probabilities of low photon numbers and show that the derived bounds are tight enough to improve the security of a quantum key distribution protocol without significant reduction in the key rate.
2. Characterization method
2.1. Formalism for constructing the rigorous bounds
Our proposed method uses a generalized HBT setup with D photon detectors, where the light pulses to be characterized are divided into D parts by beam splitters. We assume that each detector is an on-off detector with quantum efficiency , which is modeled as reporting a presence of nonzero photons after a linear absorber with transmission . Figure 1 shows an example for D = 4. The configuration of the beam splitters is not relevant. The only relevant system parameters are the overall efficiencies, , including both the branching and the detector efficiencies. We denote their average as .
We define an averaged r-fold coincidence probability to represent the observed data in the following way. We represent a subset of the D detectors by the corresponding index set , where . We denote by the cardinality of set W. We first define a full coincidence event at a detector set W as the case where all the detectors report detection, regardless of presence or absence of detections at the remaining detectors . We denote the corresponding probability by . The averaged r-fold coincidence probability is then defined as the arithmetic mean of over all the combination of r detectors, namely, with .
Let us first consider the case where the measured pulse contains exactly n photons. We can express probabilities for various coincidence patterns in terms of the overall efficiencies and combine those to construct a closed-form expression for the averaged r-fold coincidence probability . As shown in Appendix A, the probability for the n-photon input (pn = 1) is then given by
where we defined . Note that if . For the case of a general input pulse with distribution , the averaged coincidences should satisfyOur goal is to find rigorous bounds on under the constraint of Eq. (2).
The above expressions should not be confused with the standard model [30] of a photon number resolving detector based on multiple on-off detectors. For a setup with D on-off detectors, the latter considers the probability of reporting detection of k photons, which occurs when k on-off detectors click and the other detectors do not click. Events with distinct values of k are exclusive and holds. In contrast, our definition of r-fold coincidence involves events with as well as , and events with distinct values of r are not exclusive.
To describe the formula for the bounds, it is convenient to introduce vectors of order as follows. Let , , and . Consider a basis specified by the index set , and let be its reciprocal basis, namely, for . Similarly, define for . We can obtain and as the rows of inverses of matrices and , respectively. We postulate that the variations among the efficiencies are moderate, and they satisfy
for any . Now our main result is stated in the form of the following theorem.Theorem 1 Under the condition (3), the constraint (2) implies
for andAn analytical proof of Theorem 1 is given in Appendix B. Calculation of the bounds and in Eqs. (4)-(9) is straightforward because C and C′ are triangular matrices. Each bound is given as a linear function of with their coefficients written in terms of . It is flexible and versatile since the formula for an arbitrary number D of detectors is given in a closed-form expressionand the detection efficiencies do not need to be uniform. The explicit forms of the derived formulas are given in Appendix C. In Fig. 2, we plotted the expected numerical values of these bounds along with the true values when we characterize an ideal Poissonian source with . We see that the bounds on p0 and p1 are fairly good for with a D = 3 setup, and so are those on p2 and p3 with a D = 4 setup.
From Fig. 2, we notice that a bound often improves only slightly as an increment of D. The corresponding formulas like Eq. (32) to Eq. (38) and Eq. (40) to Eq. (48) in Appendix C show that the dominant terms in η do not change. In general, we can prove that improves only by from a -detector setup to a D-detector setup when D − n is odd, and the same goes for when D − n is even (see Appendix D). In other words, each bound shows a major improvement for every other increment of the number D of detectors used in the setup. The origin of this unexpected behavior may be understood from the threshold or saturation behavior of the detectors, which an adversary may exploit to fool us to believe in a wrong distribution. Given a distribution and the corresponding , one may change only slightly by replacing a potion of the pulses with ones with an extremely large photon number to flood the D detectors. Through this small modification, the adversary can increase to any value without changing the rest of . Existence of such an attack forces us to trust the observed value of only in one direction, which results in improving only half of the bounds. The above argument tells us that, in the derivation of the rigorous bound, it is essential to take the saturation behavior of the detectors into consideration.
2.2. Optimality of the proposed bounds
The presented formulation of the bounds has several merits. First, one can make sure the optimality (nonexistence of a better bound) of the obtained bounds easily. In short, the optimality follows if all the calculated bounds are nonnegative (see Appendix E). Second, it is optimal for a broad class of light with a small mean photon number . We consider the uniform case in the limit of . For weak light sources where pn rapidly decreases with n, the most severe condition for the optimality of the S-related bounds is expected to be . Indeed, if a light source satisfies
for , the condition is sufficient for the optimality. The last condition holds true for if the light source satisfiesEquations (10) and (11) form a sufficient condition for the optimality of the S-related bounds. We can obtain the conditions for S′-related bounds by replacing D with . The proof of these statements is given in Appendix F. Examples for sources satisfying these conditions are a coherent light source with and a thermal light source with (see Appendix F).
2.3. Parameter ambiguity and statistical errors
The closed-form expression allows us to adapt our method easily to the cases where there are ambiguities in the values of the system parameters and , simply by calculating the worst-case values and by introducing confidence levels if necessary. It also helps us to estimate how the degrees of such ambiguities will affect the tightness of the bounds. As an example, we consider the D = 4 setup with a uniform efficiency . We assume that the actual distribution is similar to that of a weak coherent light source or a single photon source, namely, for . It implies and for , where . Since , we have By applying it to the dominant terms in the equations for the D = 4 case in Appendix C, we obtain
These show that the relative errors in and η affect the bounds only proportionally, unless . While the above relations are derived from the explicit form for D = 4, it is not difficult to show that they hold for arbitrary values of D.
3. The decoy-state BB84 protocol with a characterized source
As an application of the proposed characterization method, we consider the characterization of the laser light source used in the decoy-state BB84 protocol [14–16], which is one of the most frequently demonstrated QKD protocols [31]. The security of the protocol has usually been proved under the a priori Poissonian assumption, namely, with mean photon number μ. Since the Poissonian assumption involves an infinite number of conditions, it is impossible to verify it experimentally. The proposals [17, 32, 33] for the use of light sources other than lasers also rely on an infinite set of conditions. It is thus important to replace such a priori assumptions with experimentally verifiable ones [34–36]. What we seek here is to use experimentally available bounds from Theorem 1.
We focus on the decoy-state BB84 protocol using pulses with three different intensities, termed signal, decoy, and vacuum. Let and be the photon-number distributions of the signal and the decoy pulses, respectively. We assume that the vacuum pulses contain no photons. The crux of the decoy-state protocol is to estimate the amount of valid signals, namely, the conditional detection probability Y1 given the sender emits exactly one photon (Y1 is often called the one-photon yield). Comparison between the observed probability of the detected signal pulses, Q, and that of the detected decoy pulses, Q′, establishes a lower bound on Y1. Combined with an upper bound on the error probability in the single photon emission events, an asymptotic secure key rate is given by [11]
where q is the probability of choosing the signal pulse and E is the observed error probability for the signal pulses, with q′ and E′ similarly defined for the decoy pulses.Under the a priori Poissonian assumption of and with , the bounds [37] are then given by
where the zero-photon yield Y0 is determined from the observed probability of the detected vacuum pulses, and . For a general light source which is not necessarily Poissonian, Wang et al. [18] have shown that Eqs. (15) and (16) are still valid by replacing each term by the worst-case values, provided that holds for all . We can easily extend them to bounds valid when holds only for , which can be verified by the proposed characterization method. The new bounds are andThe detailed derivation is given in Appendix G.
Figure 3 shows a comparison of the asymptotic secure key rate with the a priori assumption of ideal Poissonian and those with our characterization method. To calculate these curves, we used Eqs. (15) and (16) for curve (a) and Eqs. (17) and (18) for curves (b) and (c) in Fig. 3. For curve (d) with D = 2, Eq. (17) does not hold, and we used a trivial bound shown in Appendix G. We assumed that the overall quantum efficiencies of the detectors are uniform and known with an accuracy of 1 percent. From Fig. 3, we find that the secure key rate improves as D increases, and that for D = 4 it is comparable to that with the a priori assumption of ideal Poissonian. As mentioned in Sec. 1, previous schemes for characterizing the photon number statistics of a light source either require additional assumptions, concern properties not directly relevant to QKD, or produce too loose bounds. Hence the computed key rates (b)–(d) are the first instances with their security guaranteed with no a priori assumptions on the photon number statistics of the light source.
In order to test the robustness of our proposed scheme, we also computed the same key rates when the true distribution of the light source is slightly deviated from Poissonian. The result is given in Appendix H, which shows that the key rates do not change significantly.
4. Discussion and conclusion
We have presented a characterization method for photon-number distribution of a light source and shown the explicit formula for rigorous bounds on probabilities for small photon numbers. We believe that our characterization method makes a significant contribution to the quantum optics toolbox, and is especially useful in quantum information, such as in applications involving security and in computational tasks whose outcome cannot be verified efficiently.
For the measurement of the photon-number distribution of a light source, other methods with more compact setups [38–40] are known, but so far they only give us the most probable values of the probabilities and it is by no means obvious how one may derive rigorous bounds. Homodyne detection [39] and photon-number-resolving detectors [40–42] have an advantage of responding to arrival of two or more photons. On the other hand, these devices tend to require many system parameters to model them, which may make it difficult to produce a rigorous bound. They cannot avoid saturation behavior either, namely, a photon-number-resolving detector can resolve photons only up to a certain photon number, and homodyne tomography usually introduces a threshold manually to avoid artifacts. On these grounds, we believe that the HBT setup has an advantage of being made up of components, each of which is represented by a simple model. Of course, this inevitably raises a question of how closely an actual detector behaves to the on-off detector model. An obvious deviation is the dark counting, which may be treated as an estimation problem of genuine coincidence rates from the actually observed coincidence rates including the contribution of the dark counts. It is also important to verify [43] the validity of the on-off detector model in future experimental researches.
Appendix A: coincidence probabilities for photon input
For simplicity, we consider the case when the input optical pulse to our HBT setup is treated as a single optical mode labeled as “in”, and each of the pulses incident on the D on-off detectors is also a single optical mode. Then, our setup is modeled by a quantum channel χ from the “in” mode to D distinct optical modes, each of which is followed by a perfect on-off detector. The channel χ is a 1-to-D linear loss channel with transmissions . A perfect on-off detector is modeled by positive-operator-valued measure (POVM) with for no-click and for click, where represents the vacuum (zero-photon) state of the incident mode.
Let us denote by Ci the event where the i-th detector clicks, and by its complement (no-click). In terms of this notation, the full coincidence probability at a detector set W′ is given by
Using the inclusion-exclusion principle, it is rewritten in terms of no-click events as
For an input state , we have
The righthand side is the probability of observing no photons in the output modes of χ. Hence, when the input state has exactly n photons , it is given by
Note that this relation is valid even when the input pulse and the incident pulses to the detectors span over multiple modes as long as the efficiencies are invariant over those modes. Substituting Eq. (22) to Eq. (20), we have, for the n-photon input,
To calculate , we need to take a sum of over . In this sum, a set W appears with multiplicity given by
which is the number of combinations to choose elements from . Hence, we have which leads to Eq. (1).Alternatively, it is also possible to derive the expression of in Eq. (1) by considering the case where the input distribution is Poissonian with mean μ, namely, . Then, the D output modes of the lossy channel χ are independent and the i-th mode is Poissonian with mean . As a result, Eq. (19) can be directly evaluated as
leading toSince for this input, we have
Taking the n-th derivative and setting μ = 0 reproduces the definition of in Eq. (1).
Appendix B: proof of theorem 1
We first prove the inequalities (4), (7), and (8) involving S. The crux of the proof is to show that has a constant sign for . To do so, we focus on the property of as a function of m for a fixed value of n. Let us introduce a smooth function over as
with . Assume that the constants are given by , where with for . From Eq. (1), we see that for nonnegative integer m. By definition of , and for .Let us show that the numbers of zeros of and its derivative are D and , respectively. The prerequisite (3) ensures that there exists such that . Let us temporarily assume that all are nonzero and have the same sign. Using the notation , we have
We see that the coefficients of for j = 1 and 2 have the same sign. In a similar vein, all the coefficients in have the same sign, implying that this function has no zeros. Since multiplication of does not change zeros, Rolle’s theorem assures that should have no more than D zeros. If some of were zero or had the opposite sign, we could remove the zeros by a fewer number of operating Dγ, contradicting the fact that has at least D zeros. Hence, we conclude that has exactly D zeros at , and has exactly zeros.
Since Rolle’s theorem also implies that the zeros of must be strictly between neighboring zeros of , it follows that for . Hence, changes its sign across every point in . When D − n is even, then implies for . Then we have , proving Eq. (4). The case with D − n being odd similarly leads to Eq. (7).
For the special case of , the largest zero of lies in . Since and , we have for , and hence for . This leads to Eq. (8).
The proof of Eqs. (5) and (6) proceeds in a similar way. By setting in Eq. (29) for a fixed value of , we see that for nonnegative integer m. Since , we have . If are nonzero and have the same sign, it follows that has no zeros and has no more than zeros. If some of are zero or have the opposite sign, has fewer zeros. Since for , the number of zeros of is . It also means that the number of zeros of is , and at zeros of . This property implies that is non-zero at zeros of . When is even, is positive for , leading to Eq. (5). When is odd, is negative for , leading to Eq. (6).
Finally, the proof of Eq. (9) proceeds exactly as that of Eq. (8) in the main text by setting , except that is replaced by . Combined with , we have for and hence for . This leads to Eq. (9).
Appendix C: explicit formulas for the bounds
We present explicit formulas for the bounds calculated from Theorem 1 with , and 4. We define , which reduces to for the uniform cases of . They are of in the limit of . To simplify the notations, we also define (), and (). The formula for the uniform case is simply given by setting for all .
()
(D = 3)
()
Appendix D: relation between bounds for a D-detector setup and a (D-1)-detector setup
We discuss the relation between the S′-related bounds for a D-detector setup and the S-related bounds for a -detector setup. We assume that the efficiencies are uniform (). We also assume that the factorial moment of order D,
is finite and . We denote for a D-detector setup and for a -detector setup. From the biorthogonality relations, we have for . They also formally hold true for r = 0 if we define and . From Eq. (56) with , we have . By subtracting Eq. (56) from Eq. (57), we obtain for . Notice that the right-hand side is at most . Since converge to a triangular matrix with nonzero diagonal elements for , we see that implying that the S-related bounds for -detector setup improves only by through adding another detector.Appendix E: conditions for the optimality of the proposed bounds
The present formula allows us to check the optimality of the obtained bounds. From the first row of the equality , we have . Hence, if all the S-related bounds are nonnegative, namely, if
we find that defined as for and pn = 0 for is a probability distribution, and it fulfills Eq. (2) as is seen from the remaining rows of . The inequalities (4),(7) and (8) can thus be simultaneously saturated and no tighter bounds exist. Similarly, if and we can construct a probability distribution defined by for , for , and pn = 0 otherwise. It saturates the inequalities (5),(6) and (9), while it fulfills Eq. (2) in the limit of , implying the optimality of Eqs. (5),(6) and (9).Appendix F: types of light sources which can be optimally characterized
We will prove that the conditions of Eqs. (10) and (11) are sufficient for the optimality of the S-related bounds. We consider the limit of , and assume that the efficiencies are uniform (). Then it is not difficult to show for , since is equal to the probability for at least r out of n photons to survive to reach r detectors. We also exclude sources which are singular. More precisely, we assume that in Eq. (55) is finite and .
Since converges to , which is a polynomial of m of order r, so does to a polynomial of order at most D, which we denote by . The function satisfies for except for and . The former condition means that . The latter condition means that the normalization factor is . We thus obtain
Since , we have
for where . Comparison of its right-hand side with the one with , we see that holds for . It means that if Eq. (10) holds, positivity of follows that of .For , Eq. (63) can be rewritten as . Since is , we see that if Eq. (11) holds, in the limit of . Due to (59), the whole argument is applicable to the S′-related bounds just by replacing D by .
Next, we consider how these conditions are applied to typical light sources. For a coherent light source, we have and , and Eq. (11) becomes . For a thermal light source with , we have and Eq. (11) becomes . In these two cases, we can also check that Eq. (10) holds if Eq. (11) is satisfied. On the other hand, the condition (10) is not fulfilled by a pseudo single-photon source with an exceptionally small value of p0. While the optimality may not be achieved then, practically we will seldom encounter such a source due to coupling losses in experiments.
Appendix G: derivation of Y and e
We justify the lower bound given in Eq. (17) and the upper bound in Eq. (18). The conditions , and leads to
andCombined with for , we have
Since , we obtain Eq. (17). For the derivation of , we use and , leading to
and obtain Eq. (18).For D = 2, we cannot use the bound in Eq. (17). Instead, we obtain a bound directly from Eq. (66) as
The bound in Eq. (18) is still valid for D = 2.
Apeendix H: effect of an imperfection in the light source
We consider the key rate of the decoy-state protocol when we use a light source with its photon number distribution deviated from Poissonian. We take a fluctuating laser source as an example, and assume that the squared amplitude of the coherent state is uniformly distributed over the range . The value of this source is . Assuming such sources for signal and decoy pulses, we have done otherwise the same calculation as that in Fig. 3. The result is shown in Fig. 4. Comparison between the two figures shows that our method is not specialized for the Poissonian distribution but works for different distributions.
Funding
Cross-ministerial Strategic Innovation Promotion Program (SIP) and ImPACT Program (Council for Science, Technology and Innovation [CSTI]); Photon Frontier Network Program (Ministry of Education, Culture, Sports, Science and Technology); Core Research for Evolutional Science and Technology (CREST) (JPMJCR1671); Japan Society for the Promotion of Science (KAKENHI JP18K13469).
Acknowledgments
We thank Marco Lucamarini for valuable discussions.
References
1. R. Hanbury Brown and R. Q. Twiss, “A test of a new type of stellar interferometer on sirius,” Nature 178, 1046–1048 (1956). [CrossRef]
2. R. Hanbury Brown and R. Q. Twiss, “Interferometry of the intensity fluctuations in light - i. basic theory: the correlation between photons in coherent beams of radiation,” Proc. Royal Soc. Lond. A: Math. Phys. Eng. Sci. 242, 300–324 (1957). [CrossRef]
3. R. J. Glauber, “The quantum theory of optical coherence,” Phys. Rev. 130, 2529–2539 (1963). [CrossRef]
4. R. J. Glauber, “Coherent and incoherent states of the radiation field,” Phys. Rev. 131, 2766–2788 (1963). [CrossRef]
5. H. J. Kimble, M. Dagenais, and L. Mandel, “Photon antibunching in resonance fluorescence,” Phys. Rev. Lett. 39, 691–695 (1977). [CrossRef]
6. M. Koashi, K. Kono, T. Hirano, and M. Matsuoka, “Photon antibunching in pulsed squeezed light generated via parametric amplification,” Phys. Rev. Lett. 71, 1164–1167 (1993). [CrossRef] [PubMed]
7. B. Lounis and M. Orrit, “Single-photon sources,” Rep. Prog. Phys. 68, 1129 (2005). [CrossRef]
8. S. Buckley, K. Rivoire, and J. Vuckovic, “Engineered quantum dot single-photon sources,” Rep. Prog. Phys. 75, 126503 (2012). [CrossRef]
9. M. J. Stevens, S. Glancy, S. W. Nam, and R. P. Mirin, “Third-order antibunching from an imperfect single-photon source,” Opt. Express 22, 3244–3260 (2014). [CrossRef] [PubMed]
10. A. Rundquist, M. Bajcsy, A. Majumdar, T. Sarmiento, K. Fischer, K. G. Lagoudakis, S. Buckley, A. Y. Piggott, and J. Vučković, “Nonclassical higher-order photon correlations with a quantum dot strongly coupled to a photonic-crystal nanocavity,” Phys. Rev. A 90, 023846 (2014). [CrossRef]
11. D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect device,” Quant. Inf. Comp. 4, 325 (2004).
12. V. Dunjko, E. Kashefi, and A. Leverrier, “Blind quantum computing with weak coherent pulses,” Phys. Rev. Lett. 108, 200502 (2012). [CrossRef] [PubMed]
13. S. Aaronson and A. Arkhipov, “The computational complexity of linear optics,” Theory Comput. 9, 143–252 (2013). [CrossRef]
14. W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003). [CrossRef] [PubMed]
15. X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. Lett. 94, 230503 (2005). [CrossRef] [PubMed]
16. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94, 230504 (2005). [CrossRef] [PubMed]
17. Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution with parametric down-conversion,” Phys. Rev. Lett. 99, 180503 (2007). [CrossRef] [PubMed]
18. X.-B. Wang, L. Yang, C.-Z. Peng, and J.-W. Pan, “Decoy-state quantum key distribution with both source errors and statistical fluctuations,” New J. Phys. 11, 075006 (2009). [CrossRef]
19. J. Řeháček, Z. Hradil, O. Haderka, J. Peřina, and M. Hamar, “Multiple-photon resolving fiber-loop detector,” Phys. Rev. A 67, 061801 (2003). [CrossRef]
20. G. Harder, C. Silberhorn, J. Rehacek, Z. Hradil, L. Motka, B. Stoklasa, and L. L. Sánchez-Soto, “Time-multiplexed measurements of nonclassical light at telecom wavelengths,” Phys. Rev. A 90, 042105 (2014). [CrossRef]
21. J. Sperling, W. Vogel, and G. S. Agarwal, “Correlation measurements with on-off detectors,” Phys. Rev. A 88, 043821 (2013). [CrossRef]
22. R. Filip and L. Lachman, “Hierarchy of feasible nonclassicality criteria for sources of photons,” Phys. Rev. A 88, 043827 (2013). [CrossRef]
23. J. Sperling, M. Bohmann, W. Vogel, G. Harder, B. Brecht, V. Ansari, and C. Silberhorn, “Uncovering quantum correlations with time-multiplexed click detection,” Phys. Rev. Lett. 115, 023601 (2015). [CrossRef] [PubMed]
24. L. Lachman, L. Slodička, and R. Filip, “Nonclassical light from a large number of independent single-photon emitters,” Sci. Reports 6, 19760 (2016). [CrossRef]
25. P. Obšil, L. Lachman, T. Pham, A. Lešundák, V. Hucl, M. Čížek, J. Hrabina, O. Číp, L. Slodička, and R. Filip, “Nonclassical light from large ensembles of trapped ions,” Phys. Rev. Lett. 120, 253602 (2018). [CrossRef]
26. L. Qi, M. Manceau, A. Cavanna, F. Gumpert, L. Carbone, M. de Vittorio, A. Bramati, E. Giacobino, L. Lachman, R. Filip, and M. Chekhova, “Multiphoton nonclassical light from clusters of single-photon emitters,” New J. Phys. 20, 073013 (2018). [CrossRef]
27. L. Lachman and R. Filip, “Quantum non-Gaussianity from a large ensemble of single photon emitters,” Opt. Express 24, 27352–27359 (2016). [CrossRef] [PubMed]
28. I. Straka, L. Lachman, J. Hloušek, M. Miková, M. Mičuda, M. Ježek, and R. Filip, “Quantum non-Gaussian multiphoton light,” npj Quantum Inf. 4, 4 (2018). [CrossRef]
29. O. P. Kovalenko, J. Sperling, W. Vogel, and A. A. Semenov, “Geometrical picture of photocounting measurements,” Phys. Rev. A 97, 023845 (2018). [CrossRef]
30. J. Sperling, W. Vogel, and G. S. Agarwal, “True photocounting statistics of multiple on-off detectors,” Phys. Rev. A 85, 023820 (2012). [CrossRef]
31. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81, 1301–1350 (2009). [CrossRef]
32. T. Horikiri and T. Kobayashi, “Decoy state quantum key distribution with a photon number resolved heralded single photon source,” Phys. Rev. A 73, 032331 (2006). [CrossRef]
33. Q. Wang, X.-B. Wang, and G.-C. Guo, “Practical decoy-state method in quantum key distribution with a heralded single-photon source,” Phys. Rev. A 75, 012312 (2007). [CrossRef]
34. Y. Zhao, B. Qi, and H.-K. Lo, “Quantum key distribution with an unknown and untrusted source,” Phys. Rev. A 77, 052327 (2008). [CrossRef]
35. M. Lucamarini, J. F. Dynes, I. Choi, M. B. Ward, B. Frohlich, Z. L. Yuan, and A. J. Shields, “Practical security of a quantum key distribution transmitter,” in Invited Talk 9648–41, SPIE Security + Defence, Toulouse, 2015 (unpublished), (2015).
36. J. F. Dynes, M. Lucamarini, K. A. Patel, A. W. Sharpe, M. B. Ward, Z. L. Yuan, and A. J. Shields, “Testing the photon-number statistics of a quantum key distribution light source,” Opt. Express 26, 22733–22749 (2018). [CrossRef] [PubMed]
37. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72, 012326 (2005). [CrossRef]
38. G. Zambra, A. Andreoni, M. Bondani, M. Gramegna, M. Genovese, G. Brida, A. Rossi, and M. G. A. Paris, “Experimental reconstruction of photon statistics without photon counting,” Phys. Rev. Lett. 95, 063602 (2005). [CrossRef] [PubMed]
39. A. I. Lvovsky, H. Hansen, T. Aichele, O. Benson, J. Mlynek, and S. Schiller, “Quantum state reconstruction of the single-photon fock state,” Phys. Rev. Lett. 87, 050402 (2001). [CrossRef] [PubMed]
40. E. Waks, E. Diamanti, B. C. Sanders, S. D. Bartlett, and Y. Yamamoto, “Direct observation of nonclassical photon statistics in parametric down-conversion,” Phys. Rev. Lett. 92, 113602 (2004). [CrossRef] [PubMed]
41. D. Rosenberg, A. E. Lita, A. J. Miller, and S. W. Nam, “Noise-free high-efficiency photon-number-resolving detectors,” Phys. Rev. A 71, 061803 (2005). [CrossRef]
42. M. Fujiwara and M. Sasaki, “Direct measurement of photon number statistics at telecom wavelengths using a charge integration photon detector,” Appl. Opt. 46, 3069–3074 (2007). [CrossRef] [PubMed]
43. M. Bohmann, R. Kruse, J. Sperling, C. Silberhorn, and W. Vogel, “Direct calibration of click-counting detectors,” Phys. Rev. A 95, 033806 (2017). [CrossRef]