Efficient High-dimensional Quantum Key Distribution with Hybrid Encoding

01/28/2019
by   Yonggi Jo, et al.
0

We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode secret key information. Its practical implementation consists of optical elements that are within the reach of current technologies such as a multiport interferometer. We show that the proposed feasible protocol has improved the secret key rate with much sophistication compared to the previous 2-dimensional protocol known as the detector-device-independent QKD.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

05/11/2021

Fast and Simple One-Way High-Dimensional Quantum Key Distribution

High-dimensional quantum key distribution (QKD) provides ultimate secure...
09/10/2021

Security analysis method for practical quantum key distribution with arbitrary encoding schemes

Quantum key distribution (QKD) gradually has become a crucial element of...
10/20/2020

On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack

Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a li...
05/18/2022

Anonymous conference key agreement in linear quantum networks

Sharing multi-partite quantum entanglement between parties allows for di...
12/11/2019

Forging quantum data: classically defeating an IQP-based quantum test

In 2009, Shepherd and Bremner proposed a "test of quantum capability" ar...
11/14/2018

A framework for covert and secret key expansion over quantum channels

Covert and secret quantum key distribution aims at generating informatio...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Quantum key distribution (QKD) is a novel scheme to distribute a symmetric secret key between two distant authorized parties, Alice, and Bob, by exploiting quantum mechanical phenomena. The protocol provides an information-theoretic security under potential attacks of malicious eavesdropper, conventionally called Eve. Since its first seminal proposal called BB84 protocol Bennett and Brassard (1984), many relevant or extended versions of QKD protocols have been proposed and studied based on quantum principles Ekert (1991); Deutsch et al. (1996); Mayers (2001); Shor and Preskill (2000); Devetak and Winter (2005); Koashi (2006, 2009).

In recent QKD studies, the security defects due to device imperfections have been emerging as an important issue. It has been shown that Eve can hack into the QKD system by exploiting the imperfection of devices. This is known as a side channel attack including photon number splitting (PNS) attack Brassard et al. (2000), faked-state attack Makarov and Hjelme (2005), detector efficiency mismatch attack Makarov et al. (2006), detector blinding attack Lydersen et al. (2010); Huang et al. (2016), time-shift attack Qi et al. (2007), and laser damage attack Bugge et al. (2014). In this background, measurement-device-independent QKD (MDI-QKD) was proposed to overcome the problems coming from imperfections of measurement devices Lo et al. (2012). In MDI-QKD, the Bell state measurement (BSM) of two photons Żukowski et al. (1993)

is an essential task. However, the success probability of BSM with linear optics on single photons is upper bounded by 50%

Lütkenhaus et al. (1999); Calsamiglia (2002)

. Recent advanced schemes of BSM require multi-photon encoding of 2-dimensional quantum states, called qubits, to beat the limit with linear optics

Grice (2011); Zaidi and van Loock (2013); Lee and Jeong (2013); Lee et al. (2015a, b). Then, detector-device-independent QKD (DDI-QKD) was proposed Lim et al. (2014); Liang et al. (2015); González et al. (2015) to simplify the scheme of MDI-QKD, exploiting two different degrees-of-freedoms (DoFs) in a single photon and single-photon interference instead of two-photon interference. In its protocol, Alice encodes her information into one DoF of a single photon and sends it to Bob, who encodes his information into another DoF of the single photon. The measurement result of the single photon reveals correlation of two DoFs in the single photon. The implementation of DDI-QKD requires only measurements on single photons and is thus less challenging than BSM performed on two photons. As its scheme is similar to the process of BSM used in MDI-QKD, it was conjectured that DDI-QKD guarantees the same security level with MDI-QKD. However, it has been shown that not all the side channel attacks are protected with DDI-QKD Boaron et al. (2016); Sajeed et al. (2016), and an assumption of the trusted measurement setup is necessary for ensuring its security.

Figure 1: A schematic setup of -dimensional QKD with hybrid encoding. Alice uses OAM modes of a single photon, and Bob controls phase of each path to encode their information in the single photon. The encoded photon enters into 3-port interferometer. After single photon interference, a OAM value and existing path of the single photon is measured. SLM : spatial light modulator; BS1 : 50:50 beam splitter; BS2 : beam splitter of which transmissivity is ; BS3 : beam splitter of which transmissivity is ; OAM CT : cyclic transformation of OAM modes.

In another branch of QKD researches, there have been significant effort to improve secret key rate, for example, using -dimensional quantum states, called qudits. There are several advantages of using qudits a generalized information carrier. For example, qudits () can naturally carry more classical information than qubits. Compared to qubit operations, qudits has been shown to be more robust against quantum cloning (i.e. a possible eavesdropping) Navez and Cerf (2003); Bouchard et al. (2017); Cerf et al. (2002). It has been also found that the efficiency of key distribution increases with qudits in an ideal situation Cerf et al. (2002); Durt et al. (2004); Sheridan and Scarani (2010); Ferenczi and Lütkenhaus (2012); Coles et al. (2016). Various high-dimensional QKD protocols have been proposed such as a generalized version of BB84, a multipartite high-dimensional QKD Pivoluska et al. (2018), and MDI-QKDs using high-dimensional quantum states Jo and Son (2016); Hwang et al. (2016); Dellantonio et al. (2018). Moreover, QKD protocols using qudits have been implemented experimentally in various quantum system, for instance, energy-time eigenstates Bechmann-Pasquinucci and Tittel (2000); Ali-Khan et al. (2007); Mower et al. (2013); Nunn et al. (2013); Bunandar et al. (2015) and orbital angular momentum (OAM) mode of a single photon Gröblacher et al. (2006); Mirhosseini et al. (2015); Sit et al. (2017); Wang et al. (2018); Bouchard et al. (2018).

In this article, we propose a schematic configuration of high-dimensional QKD based on hybrid encoding over two different DoFs. We demonstrate that the secret key rate is improved with our scheme over previous 2-dimensional QKD based on two different DoFs of a single photon. We also present its implementation with current optical technologies, by exploiting the OAM mode of a single photon as a high-dimensional information carrier. We evaluate the secret key rate of our scheme with respect to the experimental parameters and identify the regime where our scheme is more secure than the original DDI-QKD. In addition, we also compare the security of our scheme with that of high-dimensional MDI-QKD (for the case of ).

We note that our protocol is more secure than the original BB84 protocol against a side channel attack (but less secure than MDI-QKD). For example, it can detect the basic detector blinding attack Lydersen et al. (2010) from double clicks of detectors Boaron et al. (2016); Sajeed et al. (2016). On the other hand, the attained key rate with our protocol is comparable with BB84 protocol, while MDI-QKD has a half of signal sifting rate of BB84 protocol due to the 50% limit of the success probability of the BSM. Although DDI-QKD is not as secure as MDI-QKD and requires trusted elements in BSM setup, the main idea of employing two different DoFs motivated by DDI-QKD still merits consideration for practical usage in some secure communications e.g. quantum secret sharing Yang et al. (2018). As we demonstrate in this article, it is possible to improve the security as well as the efficiency over the original DDI-QKD in high-dimensional approach. In addition, we here propose a feasible high-dimensional QKD scheme with OAM of a single photon, while a high-dimensional MDI-QKD may be hard to realize due to the difficulty in implementing high-dimensional BSM on two photons with linear optical elements Calsamiglia (2002).

This article is organized as follows. A schematic description of the -dimensional QKD (-QKD) with hybrid encoding is presented in Sec. II, and its practical implementation is in Sec. III. In Sec. IV, we analyze the secure key rate of our protocol. Finally, conclusion on the efficiencies is drawn in Sec. V.

Ii Schematic description

In this section, we describe a schematic setup of -QKD with hybrid encoding. As an example, the schematic setup of -dimensional QKD (3-QKD) with hybrid encoding is shown in Fig. 1. In -QKD with hybrid encoding, we exploit OAM mode and multipath mode of a single photon as a information carrier, since the OAM mode is known to be suitable for quantum communication as it is resilient against perturbation effects Erhard et al. (2018).

As a first step of the protocol, Alice generates -dimensional information randomly. Subsequently, Alice randomly chooses a encoding basis between two mutually unbiased bases (MUBs) which are written as and where . The relation between the two MUBs is described as the

-dimensional discrete Fourier transformation on the

OAM modes which is shown in Eq. (1):

(1)

where . Alice encodes her -dimensional information in OAM modes of a single photon Mair et al. (2001). For example, when , Alice’s classical information would be one of the dimensional integers, , and she generates a quantum state denoted as whose OAM value is .

(a) Path mode encoding
(b) Bar path mode encoding
Figure 2: Schematic setups of Bob’s two encoding systems. (a) Bob chooses one path to encode his information by using optical switch. (b) Bob encodes his information by control phase shifters, B1 and B2. Details are described in the maintext. BS1 : 50:50 beam splitter; BS2 : beam splitter of which transmissivity is ; PS : phase shifter

Subsequently, Alice sends the encoded photon to Bob, who encodes his -dimensional information in multipath modes of the single photon. Bob also uses two MUBs that are described as and . denotes a single photon state in the optical path where . Similarly with Alice’s bases, the relation between Bob’s two bases is given as the -dimensional discrete Fourier transformation of the path modes. Fig. 2 shows a schematic setup of Bob’s encoding systems. Bob randomly chooses one basis between path modes and bar path modes, which are MUB of the path modes. If Bob uses a path mode, he selects one optical path among corresponding to his information. If he chooses a bar path mode, he encodes his information by selecting a phases set in Fig. 2 (b) among , , and .

After Bob’s encoding, the two qudits encoded in the single photon, which can be written as , goes to a cyclic transformation of OAM modes. A transformed OAM value of the single photon in path is obtained with the following rule: (mod ). Subsequently, a single photon interference is performed by recombining -path via beam splitters that have different transmissivity. The unitary transformation on path modes operated by multi-port interferometer, called tritter Żukowski et al. (1997), is defined as the -dimensional discrete Fourier transformation on the path modes as shown in Eq. (2):

(2)

Subsequently, a OAM value of the single photon is measured in each output port of the tritter. The result of the measurement is obtained from click of a single photon detector. A click in one of the detectors corresponds to a projection into one of the following two qudits encoded in a single photon written in Eq. (3):

(3)

where , and (mod ) is omitted in the subscript of . Since the states have the similar form to the -dimensional Bell states, it is expected that the states can be used to distribute a secret key between Alice and Bob. The relation between two qudits encoded in a single photon that enters into the tritter and its corresponding detector click event is shown in Eq. (4):

(4)

where , and we label a click event of a single photon detector as corresponding to the single photon whose OAM value is and path mode is after the tritter operation. Since there are orthonormal states in Eq. (3), the measurement setup should include single photon detectors for one-to-one correspondence of the states and the detectors.

Bases Bob’s operation ()
bases 1 (, ) (mod )
for
bases 2 (, ) for
for
Table 1: An example of Bob’s operation on his encoded information when and the result of the measurement is . According to their bases choice and the measurement result, it is necessary to retrieve his information for sharing the same information.

In order to share a secret key, it is necessary to retrieve Bob’s information based on the basis choice of Alice and Bob, and the result of the measurement. For restoration, Alice sends her basis choice to Bob. The method of the restoration is shown in Table 1 as an example when 3-QKD with hybrid encoding is performed. Bob announces only the basis matching information through classical communication, not the result of the measurement. Alice does not need to know the measurement outcome, since Bob already retrieved his encoded information by using the result.

Iii Experimental implementation

Figure 3: A schematic diagram of experimental setup of three-fold cyclic transformation of OAM modes. There are OAM beam splitters (OAM BSs) which consist of a Mach-Zehnder interferometer with Dove prisms. means relative angle between the two Dove prisms. The first OAM BS () and the final OAM BS (

) change a direction of propagation of a photon whose OAM value is odd and even, respectively. The second OAM BS (

) separates a photon whose OAM value is and . With OAM holograms, the three-fold cyclic transformation of OAM modes is accomplished.

We investigate a practical implementation of experimental elements that can construct -QKD with hybrid encoding. Alice can generate a single photon OAM state by means of a spatial light modulator (SLM) Bazhenov et al. (1992). SLMs usually have a limited frame rate of around 60 Hz, for fast generation of various OAM values, a digital micromirror device(DMD) is more desirable Mirhosseini et al. (2013a). An OAM sorter based on liquid crystal devices can also generate photonic OAM states. Larocque et al. (2016, 2017).

Bob’s path encoding system is realizable with an optical switch over -port, and a schematic setup is shown in Fig. 2 (a). Bob’s bar path encoding system can be changed from Fig. 2 (b) by using an optical -port switch and a -port tritter, whose operation on path modes is the -dimensional discrete Fourier transformation as shown in Eq. (2). With the tritter, Bob can choose bar path mode by selecting an input port of the tritter rather than controlling the phase shifters in Fig. 2 (b).

After Bob’s encoding, cyclic transformations of OAM modes are performed in the each port. Fig. 3 shows a schematic setup of three-fold OAM cyclic transformation of OAM values . The setup consists of OAM holograms, mirrors, beam splitters and OAM beam splitters (OAM BSs). An OAM BS, composed of a Mach-Zehnder interferometer with a Dove prism in each arm, sorts individual photons based on their OAM value Leach et al. (2002). is defined from relative angle between the two Dove prisms and relative phase between photons in the two arms is given by . The three-fold OAM cyclic transformation consists of three OAM BSs whose are , , and . The first OAM BS () and the final OAM BS () change the direction of propagation of a photon whose OAM value is odd and even, respectively. The second OAM BS () spatially separates photons whose OAM value is and . Photons are separated and combined spatially by using the OAM BSs according to their OAM value. With OAM holograms on each arms, the three-fold cyclic transformation of OAM modes is accomplished as it is shown in Fig. 3. The experimental setup of the four-fold and five-fold cyclic transformation of OAM modes were proposed and demonstrated as well Krenn et al. (2016); Schlederer et al. (2016); Babazadeh et al. (2017); Chen et al. (2017). While theoretical efficiency of the four-fold cyclic transformation is 100%, fidelity of 4-dimensional Bell state transformation using the four-fold cyclic transformation setup was reported as roughly 91.5% due to reflectivity of optical elements and misalignment Schlederer et al. (2016).

Subsequently, -port single photon interference is performed by using the tritter shown in Eq. (2). The tritter can be implemented with only linear optical elements which are beam splitters, mirrors, and phase shifters. After the interference, an OAM value of the single photon is measured. Direct measurements of an OAM value of a single photon have been studied recently, for instance, by using refractive optical elements that convert OAM modes into transverse momentum modes Lavery et al. (2012, 2013), refractive optical elements that give spatial separation of OAM modes Mirhosseini et al. (2013b), sequential weak and strong measurements Malik et al. (2014); Shi et al. (2015), spectrum analysis based on the rotational Doppler effect Zhou et al. (2017), and interferogram analysis with a multipixel camera Kulkarni et al. (2017).

There has been an experimental demonstration of the prepare-and-measure qudit QKD using seven OAM values of a single photon, which includes DMD for fast generation of single photon OAM states and spatial separation of OAM modes proposed in for OAM mode detection Mirhosseini et al. (2013a, b). In the experiment, it was reported that the efficiency of OAM mode separation was 93%. It is expected that an experimental demonstration of -QKD with hybrid encoding is possible by using above technologies as well as the prepare-and-measure qudit QKD.

Iv Security analysis

Before we analyze security of -QKD with hybrid encoding, we need to assume constraints to construct secure -QKD with hybrid encoding as it is studied in Boaron et al. (2016): (i) Alice’s and Bob’s random number generators and their classical post-processing should be trusted. (ii) Alice’s and Bob’s encoding systems should be fully characterized and not be influenced by Eve. (iii) Eve cannot physically access to the output ports of the interferometer, in our protocol, the tritter. (iv) The detectors may have some imperfections, but the defects is not from Eve. The first assumption is essential for all QKD schemes to ensure security. The first and second assumptions are necessary for MDI-QKD as well. The third and final assumptions are different from the scenario of MDI-QKD. They are necessary to prevent particular classes of side channel attacks Boaron et al. (2016); Sajeed et al. (2016). The third assumption can be considered not impractical, since -QKD with hybrid encoding has the similar experimental situation to prepare-and-measure QKD protocols like original BB84. In the situation, Bob can have full measurement setup in his room and he can block access from the outside.

Let us consider several side channel attacks against -QKD with hybrid encoding. Since its similarity of principles to the original DDI-QKD, the security of -QKD with hybrid encoding against side channel attacks is comparable to that of the original DDI-QKD studied in Boaron et al. (2016); Sajeed et al. (2016). Faked-state attack Makarov and Hjelme (2005), detector efficiency mismatch attack Makarov et al. (2006), and time-shift attack Qi et al. (2007) are not compatible with assumption (iv) since the attacks require a prior knowledge of imperfections of the single photon detectors. Trojan-horse attack based on back reflection Gisin et al. (2006); Jain et al. (2014, 2015) is considerable. In Trojan-horse attack based on back reflection, Eve sends multi-photon states into Alice’s(Bob’s) encoding system. The photons are reflected at the elements in the encoding system. Then Eve can obtain information about a generated single photon state by analyzing the reflected beam. The attack can be prevented by using frequency filters and isolators like in MDI-QKD case. Trojan-horse attack proposed in Qi (2015) is forbidden by assumption (iv), since the detectors in the measurement setup should be manufactured by Eve to accomplish this attack.

Detector blinding attack can threaten QKD systems as well. An essential procedure of the detector blinding attack is that Eve shines strong classical light onto detectors, avalanche photodiodes, to change their mode from Geiger mode to linear mode Lydersen et al. (2010). In the linear mode, a detection signal can be generated by the strong light pulse that exceeds a threshold. This means that Eve can control a detector click by regulating amplitude of the light pulse. If a threshold of the all detectors is identical, the basic detector blinding attack can be detected by Bob. Let us define the threshold . Then the amplitude of Eve’s light pulse should be larger than when it arrives at detectors. Eve intercepts Alice’s signal and resends a strong light corresponding to the measured quantum state. When Eve’s and Bob’s bases are matched, for example OAM modes and path modes, the amplitude of Eve’s light pulse should be larger than to make a detector click since the tritter splits the light pulse into four output ports identically. In the situation, Bob can notice the detector blinding attack since detectors are clicked simultaneously. Bob can make an error rate be affected by the attack by assigning random number when more than two detectors are clicked. If there are differences among the threshold of detectors, it is possible that Eve generates one detector click. The clicked detector must have the lowest threshold among the detectors. This means that Eve cannot generate a click of the other detectors independently. So the attack can be found by analyzing statistics of detector clicks.

Detector blinding attack with various blinding power Huang et al. (2016) can threaten -QKD with hybrid encoding as well as the original DDI-QKD Sajeed et al. (2016). However, since the attack requires a prior knowledge about the detectors, it is not compatible with assumption (iv). So we can conclude that without the assumptions which are not necessary in MDI-QKD, the security of -QKD with hybrid encoding cannot be guaranteed against all detector side channel attacks.

To detect Eve’s side channel attacks, we introduce a random tritter operation of Bob. The tritter operation written in Eq. (2) is performed on path modes after Bob’s encoding. It is possible that Bob chooses one of tritter operation among different operations ratter than a fixed operation. For example, Bob can chooses one operation among the operations shown in Eq. (5):

(5)

for 3-QKD with hybrid encoding. The operations can be implemented by using 3-tritter and phase shifters.

Let us consider the case that Bob chooses path mode and Eve tries detector blinding attack with strong pulse whose OAM mode is . If Bob chooses , where , and performs the tritter operation , the pulse goes to output port of the tritter. For a successful attack, Eve must find pulse intensity that one detector in the output port is clicked and the other detectors are not, regardless of Bob’s choice of tritter operation. Also, Eve should perform detector blinding attack with various blinding power and find at least three different blinding powers, since Bob monitors statistics of outcomes. For instance, Bob can check whether is projected onto , , and equally or not. Therefore, Eve should prepare at least three different pulse intensities, which occur click events of different detectors on the same output port, to pass Bob’s statistics check.

For a large dimension, we expect that such attack is improbable with the assumption (iv), i.e. with trusted devices. Since click thresholds of different detectors are very similar but randomly fluctuated, it is difficult to find blinding powers and pulse intensities that satisfy the successful attack conditions. For a successful attack, Eve should find the powers and intensities that only one detector is clicked while the other detectors in the port are not clicked, and the attack does not influence Bob’s outcome statistics regardless of Bob’s choice of tritter operation , where . Therefore, we expect that side channel attacks are probably detected for a high-dimensional QKD using hybrid encoding, if Bob applies the random choice of tritter operation and a countermeasure of a side channel attack, such as the random-detector-efficiency protocol da Silva et al. (2015); Lim et al. (2015). Compared to this, prepare-and-measure QKD protocols using high-dimensional systems are threaten by the first proposal of detector blinding attack Lydersen et al. (2010), and the original DDI-QKD was breached by the combined attack of the detector blinding attack with various blinding power and detector efficiency mismatched attack even with the random-detector-efficiency protocol Huang et al. (2016). Therefore, we can conclude that the complexity of a successful side channel attack becomes higher by exploiting the proposed protocol compared to prepare-and-measure -QKDs and the original DDI-QKD, although the proposed protocol does not provide the detector-device-independent security.

It is necessary to analyze security of -QKD with hybrid encoding to evaluate the usefulness of the protocol. The analysis of the security is able to be made through the inspection of the equivalent protocol using the entanglement distillation process (EDP) Mayers (2001); Shor and Preskill (2000); Devetak and Winter (2005). The idea of the method is that, if Alice and Bob share the maximally entangled state, Eve cannot generate correlation between her state and the shared maximally entangled state of Alice and Bob Coffman et al. (2000). In the method, we can analyze the security of the proposed protocol with the amount of distributed maximally entangled states. In order to use the method, an equivalent protocol of which Alice and Bob share an entangled state at the end should be introduced. Note that the equivalent protocol is employed only for the security analysis, so its experimental efficiency is not significant. However, it is important that the equivalent protocol is physically realizable, since any security analysis of QKD should be valid under the quantum mechanics. Therefore, we will briefly introduce possible implementations of the equivalent protocol to show that it is physically reasonable.

At first, Alice and Bob generate the three-photon entangled state shown in Eq. (6):

(6)

where the subscript () means Alice’s(Bob’s) single photon state and the subscript means a single photon that goes to tritter and OAM measurement setup. Generation of this state is possible, in principle, by using two cascade spontaneous parametric down-conversion(SPDC) crystals, spatial discrimination elements of the OAM mode, and relabelling of the OAM and path values. For 4-dimensional system, it was demonstrated that generation of 4-dimensional OAM mode entangled states Wang et al. (2017) and 4-dimensional path mode entangled states Lee et al. (2017); Lee and Park (2019) by using SPDC crystals. Alice and Bob keep their photons, and Bob measures the photon by using the measurement setup. Based on the result, Bob performs corresponding unitary operation to share the maximally entangled state shown in Eq. (7) :

(7)

Alice(Bob) chooses her(his) measurement basis randomly between OAM(path) modes and bar OAM(path) modes. After the measurement, Alice and Bob share their measurement bases and discard if the two bases are not matched. If the two bases are matched, their measurement outcomes are always identical if there is no error and no Eve.

Since the maximally entangled state is distributed to Alice and Bob, security of the protocol becomes the same with that of a -dimensional entanglement based QKD. Security of a QKD using -dimensional maximally entangled states was studied against individual attacks Durt et al. (2004) (Eve monitors state separately), and against collective attacks Sheridan and Scarani (2010); Ferenczi and Lütkenhaus (2012) (Eve monitors several states jointly). According to the results, secret key rate of QKD using -dimensional quantum states against collective attack is evaluated as shown in Eq. (8):

(8)

The unit of the secret key rate is (bits/sifted signal). is state error rate obtained from Eq. (9):

(9)

where is density matrix of the state shared by Alice and Bob, and . In the ideal case, no error and no Eve, since the distributed state is the state described in Eq. (7), the error rate becomes trivial, .

Now, we investigate an improvement of a secret key rate of -QKD with hybrid encoding compared with the original DDI-QKD. Secret key rates per sifted signal, , of -QKD with hybrid encoding are plotted in Fig. 4. Fig. 4 (a) shows the secret key rate of the original DDI-QKD (black dotted line), 3- (red dashed line), 4- (blue dot-dashed line), and 5-QKD with hybrid encoding (orange solid line) in the ideal situation. QKD with hybrid encoding using higher dimensional quantum states has a higher secret key rate than the original DDI-QKD at same error rate, since a quantum system in high-dimension can carry more information per single quanta and qudit has enhanced robustness against an optimal cloning and eavesdropping.

(a)
(b)
Figure 4: The secret key rate of the original DDI-QKD (black dotted line), 3- (red dashed line), 4- (blue dot-dashed line), and 5-QKD with hybrid encoding (orange solid line). (a) Plot of the secret key rate (bits/sifted pulse) vs. state error rate . (b) Plot of the secret key rate (bits/sifted pulse) vs. transmission loss (dB). Dark count rate of single photon detectors is assumed as per pulse.

In Fig. 4 (b), we simulate secret key rates of -QKD with hybrid encoding and the original DDI-QKD with a change of the realistic experimental factors, transmission loss and dark count rate of single photon detectors. When a photon propagates through an optical fiber or atmosphere, there is transmission loss. So transmission efficiency is approximately proportional to the distance between Alice and Bob that QKD is able to be achieved. For a single photon detector, since it is very sensitive in order to detect a very weak pulse, a single photon, it is possible to be clicked by background noise even if there is no received photon. The event is called dark count. If there is no Eve, the probability of the detector click corresponding to the state when Alice encodes and Bob encodes in a single photon is able to be described as follows:

(10)
(11)

where , , is the dimension of quantum states used in -QKD with hybrid encoding, and is the dark count rate per pulse. The first term in Eq. (10) denotes the case when the single photon arrives at a detector and it triggers off the detector, while there is no dark count in the other detectors. The second term in Eq. (10) denotes the single photon detector is clicked due to the dark count when the single photon is lost in channel and the other detectors are not clicked. In the ideal case, no Eve and no state error, should be zero since the state cannot be projected on . The only case that the detector is clicked is that the single photon is lost and the detector is clicked due to the dark count. The error rate in this situation is evaluated from the equation described as follows:

(12)

where . The dark count rate, , is assumed as per pulse in Fig. 4 (b). In the plot, it is shown that a secret key rate becomes higher, as the dimension of quantum states used in -QKD with hybrid encoding increases in low transmission loss regime. When the transmission loss is high, the secret key rate decreases more rapidly as increases. QKD with hybrid encoding using higher dimensional quantum states is more influenced by the dark count of detectors, since the number of the single photon detector used in -QKD with hybrid encoding is lager than the original DDI-QKD. Therefore, when a single photon is lost, the error rate of QKD with hybrid encoding using higher dimensional quantum states increases rapidly compared with that of the original DDI-QKD.

Figure 5: The secret key rate of 3-MDI-QKD (red dashed line) and 3-QKD with hybrid encoding (black solid line). Plot of the secret key rate (bits/total pulse) vs. transmission loss (dB). The secret key rate per total signal is obtained from (the secret key rate per sifted key)(the signal sifting rate). Details are described in maintext. Dark count rate of single photon detectors is assumed as per pulse.

Now, we compare 3-QKD with hybrid encoding with MDI-QKD using 3-dimensional quantum states (3-MDI-QKD). 3-MDI-QKD was proposed to increase a secret key rate of original MDI-QKD Jo and Son (2016). In its key rate analysis, it is assumed that 3-dimensional BSM used in 3-MDI-QKD includes six single photon detectors and the 3-dimensional BSM setup can discriminate only three 3-dimensional Bell states among nine ones. Fig. 5 shows the secret key rate of 3-MDI-QKD (red dashed line) and 3-QKD with hybrid encoding (black solid line). Secret key rate per total pulse can be obtained from (signal sifting rate)(secret key rate per sifted key ). The signal sifting rate is obtained from (probability that Alice and Bob used the same bases) in -QKD with hybrid encoding, and (probability that Alice and Bob used the same bases)(success probability of a BSM) in MDI-QKD. Since a success probability of BSM with linear optics cannot be Lütkenhaus et al. (1999); Calsamiglia (2002), MDI-QKD always has a lower secret key rate per total signal than prepare-and-measure QKD protocols and QKD with hybrid encoding.

Furthermore, it was proven that a generalized BSM in high-dimensional two-photon state cannot be implemented by means of linear optical elements Calsamiglia (2002). The scheme using multi-photon interference with linear optics can be adopted to implement MDI-QKD using qudits Goyal et al. (2014), however, the secret key rate of the protocol is always lower than original MDI-QKD, since the signal sifting rate of the protocol is given as . There is another scheme of which ideal signal sifting rate can reach by exploiting nonlinear effects, however, because of the nonlinearity, experimental efficiency of the scheme is much lower than that of the setup with linear optical elements Jo et al. (2019). Also, it was shown that a secret key rate of MDI-QKD using qudits () cannot exceed that of qubit MDI-QKD at low error rate even if a signal sifting rate of a -dimensional BSM setup reaches Jo et al. (2019). Therefore, it can be claimed that QKD with hybrid encoding is more suitable to exploit qudits than MDI-QKD in its implementation, although it needs additional assumptions to guarantee the security level of MDI-QKD.

Figure 6: The secret key rate of 3-QKD hybrid encoding (black solid line) and a prepare-and-measure 3-QKD (red dashed line). Dark count rate of single photon detectors is assumed as per pulse.

Here, we compare key generation efficiency of -QKD with hybrid encoding with that of existing -QKDs. First, compared with entanglement-based -QKDs Mower et al. (2013); Nunn et al. (2013); Bunandar et al. (2015), our protocol has advantage that generation of an entangled state is not necessary. A high-dimensional time-energy entangled state is generated from spontaneous parametric down-conversion (SPDC), and entangled state generation efficiency of SPDC is not comparable with a single photon OAM mode encoder.

Key generation efficiency of prepare-and-measure -QKDs Mirhosseini et al. (2015); Sit et al. (2017); Ding et al. (2017); Wang et al. (2018); Bouchard et al. (2018) are comparable with that of our protocol. Our protocol is vulnerable to photon loss noise compared with prepare-and-measure -QKDs, as it is shown in Fig. 6. Our protocol employs detectors in the measurement setup, while prepare-and-measure -QKDs have detectors. Because of this reason, an effect of a dark count of detectors in our protocol is larger than that in prepare-and-measure -QKDs. This means that growth in an error rate of our protocol is higher than that of prepare-and-measure -QKDs when a single photon is lost. However, as it is shown in the security analysis, our protocol can prevent certain kinds of side channel attacks against detectors, while security of prepare-and-measure -QKDs is threatened even by the first proposal of detector blinding attack. In consideration of this, the gap between the two secret key rates shown in Fig. 6 is not significant.

Finally, we note that it is possible to employ state-of-the-art techniques in our protocol, since our protocol is constructed with general experimental elements. For example, in -QKD using partial MUB of OAM Wang et al. (2018), they proposed using special single photon OAM modes in their protocol for noise robustness. It is expected that the setups used in the protocol are exploited in our protocol for the same purpose as well.

V Conclusion

In this paper, we proposed a schematic configuration of -dimensional QKD based on hybrid encoding over two different DoFs. Qudits are exploited in the setup to improve a secret key rate, since a qudit can carry more classical information and it has enhanced robustness against eavesdropping compared with a qubit. We investigated possible practical implementations of the proposed QKD protocol with current optical technologies. OAM modes of a single photon is exploited as high-dimensional information carrier. OAM modes are suitable for quantum communication because of their resilience against perturbation effects. We showed that a cyclic transformation of OAM modes can be implemented within the reach of current technologies as well. We analyzed security of the proposed protocol and showed there is improvement compared with original qubit protocol in ideal situation. We found the condition that -QKD with hybrid encoding has a higher secret key rate than the original DDI-QKD in the consideration of realistic experimental parameters as well. Finally we compared our protocol with existing -QKDs and showed our protocol has advantages on prevention of side channel attacks against detectors and experimental feasibility.

Vi Author contributions

Y. Jo designed and analysed the protocols. H. S. Park and S. -W. Lee provided guidance. W. Son supervised the whole project. All authors reviewed the manuscript.

Vii Funding

This work was supported by the R&D Convergence Program of the National Research Council of Science and Technology (NST) (Grant No. CAP-15-08-KRISS) of Republic of Korea.

Viii Acknowledgments

Y. Jo thanks to the Agency for Defense Development (ADD) for their graduate student scholarship program. W. Son acknowledges the University of Oxford and the Korea Institute for Advanced Study (KIAS) for their visitorship program.

Ix Conflicts of interest

The authors declare no conflict of interest.

References

  • Bennett and Brassard (1984) C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE, 1984) p. 175.
  • Ekert (1991) A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991)0911.4171v2 .
  • Deutsch et al. (1996) D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu,  and A. Sanpera, Phys. Rev. Lett. 77, 2818 (1996)9604039 [quant-ph] .
  • Mayers (2001) D. Mayers, J. ACM 48, 351 (2001)9802025 [quant-ph] .
  • Shor and Preskill (2000) P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000)0003004 [quant-ph] .
  • Devetak and Winter (2005) I. Devetak and A. Winter, Proc. R. Soc. A Math. Phys. Eng. Sci. 461, 207 (2005)0306078 [quant-ph] .
  • Koashi (2006) M. Koashi, J. Phys. Conf. Ser. 36, 98 (2006).
  • Koashi (2009) M. Koashi, New J. Phys. 11, 045018 (2009).
  • Brassard et al. (2000) G. Brassard, N. Lütkenhaus, T. Mor,  and B. C. Sanders, Phys. Rev. Lett. 85, 1330 (2000).
  • Makarov and Hjelme (2005) V. Makarov and D. R. Hjelme, Journal of Modern Optics 52, 691 (2005).
  • Makarov et al. (2006) V. Makarov, A. Anisimov,  and J. Skaar, Phys. Rev. A 74, 022313 (2006).
  • Lydersen et al. (2010) L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar,  and V. Makarov, Nat. Photonics 4, 686 (2010)1008.4593 .
  • Huang et al. (2016) A. Huang, S. Sajeed, P. Chaiwongkhot, M. Soucarros, M. Legre,  and V. Makarov, IEEE J. Quantum Electron. 52, 8000211 (2016)1601.00993 .
  • Qi et al. (2007) B. Qi, C. F. Fung, H. Lo,  and X. Ma, Quantum Information & Computation 7, 73 (2007).
  • Bugge et al. (2014) A. N. Bugge, S. Sauge, A. M. M. Ghazali, J. Skaar, L. Lydersen,  and V. Makarov, Phys. Rev. Lett. 112, 070503 (2014).
  • Lo et al. (2012) H.-K. Lo, M. Curty,  and B. Qi, Phys. Rev. Lett. 108, 130503 (2012).
  • Żukowski et al. (1993) M. Żukowski, A. Zeilinger, M. A. Horne,  and A. K. Ekert, Phys. Rev. Lett. 71, 4287 (1993).
  • Lütkenhaus et al. (1999) N. Lütkenhaus, J. Calsamiglia,  and K.-A. Suominen, Phys. Rev. A 59, 3295 (1999).
  • Calsamiglia (2002) J. Calsamiglia, Phys. Rev. A 65, 030301 (2002).
  • Grice (2011) W. P. Grice, Phys. Rev. A 84, 042331 (2011).
  • Zaidi and van Loock (2013) H. A. Zaidi and P. van Loock, Phys. Rev. Lett. 110, 260501 (2013).
  • Lee and Jeong (2013) S.-W. Lee and H. Jeong, Phys. Rev. A 87, 022326 (2013).
  • Lee et al. (2015a) S.-W. Lee, K. Park, T. C. Ralph,  and H. Jeong, Phys. Rev. Lett. 114, 113603 (2015a).
  • Lee et al. (2015b) S.-W. Lee, K. Park, T. C. Ralph,  and H. Jeong, Phys. Rev. A 92, 052324 (2015b).
  • Lim et al. (2014) C. C. W. Lim, B. Korzh, A. Martin, F. Bussières, R. Thew,  and H. Zbinden, Applied Physics Letters 105, 221112 (2014).
  • Liang et al. (2015) W.-Y. Liang, M. Li, Z.-Q. Yin, W. Chen, S. Wang, X.-B. An, G.-C. Guo,  and Z.-F. Han, Phys. Rev. A 92, 012319 (2015).
  • González et al. (2015) P. González, L. Rebón, T. Ferreira da Silva, M. Figueroa, C. Saavedra, M. Curty, G. Lima, G. B. Xavier,  and W. A. T. Nogueira, Phys. Rev. A 92, 022337 (2015).
  • Boaron et al. (2016) A. Boaron, B. Korzh, R. Houlmann, G. Boso, C. C. W. Lim, A. Martin,  and H. Zbinden, J. Appl. Phys. 120, 063101 (2016)arXiv:1607.05435 .
  • Sajeed et al. (2016) S. Sajeed, A. Huang, S. Sun, F. Xu, V. Makarov,  and M. Curty, Phys. Rev. Lett. 117, 250505 (2016).
  • Navez and Cerf (2003) P. Navez and N. J. Cerf, Phys. Rev. A 68, 032313 (2003).
  • Bouchard et al. (2017) F. Bouchard, R. Fickler, R. W. Boyd,  and E. Karimi, Science Advances 3 (2017), 10.1126/sciadv.1601915.
  • Cerf et al. (2002) N. J. Cerf, M. Bourennane, A. Karlsson,  and N. Gisin, Phys. Rev. Lett. 88, 127902 (2002).
  • Durt et al. (2004) T. Durt, D. Kaszlikowski, J.-L. Chen,  and L. C. Kwek, Phys. Rev. A 69, 032313 (2004).
  • Sheridan and Scarani (2010) L. Sheridan and V. Scarani, Phys. Rev. A 82, 030301 (2010).
  • Ferenczi and Lütkenhaus (2012) A. Ferenczi and N. Lütkenhaus, Phys. Rev. A 85, 052310 (2012).
  • Coles et al. (2016) P. J. Coles, E. M. Metodiev,  and N. Lütkenhaus, Nat. Commun. 7, 11712 (2016)arXiv:1510.01294 .
  • Pivoluska et al. (2018) M. Pivoluska, M. Huber,  and M. Malik, Phys. Rev. A 97, 032312 (2018).
  • Jo and Son (2016) Y. Jo and W. Son, Phys. Rev. A 94, 052316 (2016).
  • Hwang et al. (2016) W.-Y. Hwang, H.-Y. Su,  and J. Bae, Sci. Rep. 6, 30036 (2016).
  • Dellantonio et al. (2018) L. Dellantonio, A. S. Sørensen,  and D. Bacco, Phys. Rev. A 98, 062301 (2018).
  • Bechmann-Pasquinucci and Tittel (2000) H. Bechmann-Pasquinucci and W. Tittel, Phys. Rev. A 61, 062308 (2000).
  • Ali-Khan et al. (2007) I. Ali-Khan, C. J. Broadbent,  and J. C. Howell, Phys. Rev. Lett. 98, 060503 (2007).
  • Mower et al. (2013) J. Mower, Z. Zhang, P. Desjardins, C. Lee, J. H. Shapiro,  and D. Englund, Phys. Rev. A 87, 062322 (2013).
  • Nunn et al. (2013) J. Nunn, L. J. Wright, C. Söller, L. Zhang, I. A. Walmsley,  and B. J. Smith, Opt. Express 21, 15959 (2013).
  • Bunandar et al. (2015) D. Bunandar, Z. Zhang, J. H. Shapiro,  and D. R. Englund, Phys. Rev. A 91, 022336 (2015).
  • Gröblacher et al. (2006) S. Gröblacher, T. Jennewein, A. Vaziri, G. Weihs,  and A. Zeilinger, New Journal of Physics 8, 75 (2006).
  • Mirhosseini et al. (2015) M. Mirhosseini, O. S. Magaña-Loaiza, M. N. O’Sullivan, B. Rodenburg, M. Malik, M. P. J. Lavery, M. J. Padgett, D. J. Gauthier,  and R. W. Boyd, New Journal of Physics 17, 033033 (2015).
  • Sit et al. (2017) A. Sit, F. Bouchard, R. Fickler, J. Gagnon-Bischoff, H. Larocque, K. Heshami, D. Elser, C. Peuntinger, K. Günthner, B. Heim, C. Marquardt, G. Leuchs, R. W. Boyd,  and E. Karimi, Optica 4, 1006 (2017).
  • Wang et al. (2018) F. Wang, P. Zeng, X. Wang, H. Gao, F. Li,  and P. Zhang, “Towards practical high-speed high dimensional quantum key distribution using partial mutual unbiased basis of photon’s orbital angular momentum,” arXiv:quant-ph/1801.06582 (2018), arXiv:1801.06582 .
  • Bouchard et al. (2018) F. Bouchard, K. Heshami, D. England, R. Fickler, R. W. Boyd, B.-G. Englert, L. L. Sánchez-Soto,  and E. Karimi, Quantum 2, 111 (2018)arXiv:1802.05773v3 .
  • Yang et al. (2018) X. Yang, K. Wei, H. Ma, H. Liu, Z. Yin, Z. Cao,  and L. Wu, Sci. Rep. 8, 5728 (2018).
  • Erhard et al. (2018) M. Erhard, R. Fickler, M. Krenn,  and A. Zeilinger, Light Sci. Appl. 7, 17146 (2018)arXiv:1708.06101 .
  • Mair et al. (2001) A. Mair, A. Vaziri, G. Weihs,  and A. Zeilinger, Nature 412, 313 (2001)arXiv:0104070 [quant-ph] .
  • Żukowski et al. (1997) M. Żukowski, A. Zeilinger,  and M. A. Horne, Phys. Rev. A 55, 2564 (1997).
  • Bazhenov et al. (1992) V. Bazhenov, M. Soskin,  and M. Vasnetsov, Journal of Modern Optics 39, 985 (1992).
  • Mirhosseini et al. (2013a) M. Mirhosseini, O. S. M. na Loaiza, C. Chen, B. Rodenburg, M. Malik,  and R. W. Boyd, Opt. Express 21, 30196 (2013a).
  • Larocque et al. (2016) H. Larocque, J. Gagnon-Bischoff, F. Bouchard, R. Fickler, J. Upham, R. W. Boyd,  and E. Karimi, Journal of Optics 18, 124002 (2016).
  • Larocque et al. (2017) H. Larocque, J. Gagnon-Bischoff, D. Mortimer, Y. Zhang, F. Bouchard, J. Upham, V. Grillo, R. W. Boyd,  and E. Karimi, Opt. Express 25, 19832 (2017).
  • Leach et al. (2002) J. Leach, M. J. Padgett, S. M. Barnett, S. Franke-Arnold,  and J. Courtial, Phys. Rev. Lett. 88, 257901 (2002).
  • Krenn et al. (2016) M. Krenn, M. Malik, R. Fickler, R. Lapkiewicz,  and A. Zeilinger, Phys. Rev. Lett. 116, 090405 (2016).
  • Schlederer et al. (2016) F. Schlederer, M. Krenn, R. Fickler, M. Malik,  and A. Zeilinger, New Journal of Physics 18, 043019 (2016).
  • Babazadeh et al. (2017) A. Babazadeh, M. Erhard, F. Wang, M. Malik, R. Nouroozi, M. Krenn,  and A. Zeilinger, Phys. Rev. Lett. 119, 180510 (2017).
  • Chen et al. (2017) D.-X. Chen, R.-F. Liu, P. Zhang, Y.-L. Wang, H.-R. Li, H. Gao,  and F.-L. Li, Chinese Physics B 26, 060305 (2017).
  • Lavery et al. (2012) M. P. J. Lavery, D. J. Robertson, G. C. G. Berkhout, G. D. Love, M. J. Padgett,  and J. Courtial, Opt. Express 20, 2110 (2012).
  • Lavery et al. (2013) M. P. J. Lavery, D. J. Robertson, A. Sponselli, J. Courtial, N. K. Steinhoff, G. A. Tyler, A. Willner,  and M. J. Padgett, New Journal of Physics 15, 013024 (2013).
  • Mirhosseini et al. (2013b) M. Mirhosseini, M. Malik, Z. Shi,  and R. W. Boyd, Nat. Commun. 4, 1 (2013b)arXiv:1306.0849 .
  • Malik et al. (2014) M. Malik, M. Mirhosseini, M. P. J. Lavery, J. Leach, M. J. Padgett,  and R. W. Boyd, Nat. Commun. 5, 3115 (2014)arXiv:arXiv:1306.0619v2 .
  • Shi et al. (2015) Z. Shi, M. Mirhosseini, J. Margiewicz, M. Malik, F. Rivera, Z. Zhu,  and R. W. Boyd, Optica 2, 388 (2015).
  • Zhou et al. (2017) H.-L. Zhou, D.-Z. Fu, J.-J. Dong, P. Zhang, D.-X. Chen, X.-L. Cai, F.-L. Li,  and X.-L. Zhang, Light Sci. Appl. 6, e16251 (2017).
  • Kulkarni et al. (2017) G. Kulkarni, R. Sahu, O. S. Magaña-Loaiza, R. W. Boyd,  and A. K. Jha, Nat. Commun. 8, 1054 (2017)arXiv:1612.00335 .
  • Gisin et al. (2006) N. Gisin, S. Fasel, B. Kraus, H. Zbinden,  and G. Ribordy, Phys. Rev. A 73, 022320 (2006).
  • Jain et al. (2014) N. Jain, E. Anisimova, I. Khan, V. Makarov, C. Marquardt,  and G. Leuchs, New Journal of Physics 16, 123030 (2014).
  • Jain et al. (2015) N. Jain, B. Stiller, I. Khan, V. Makarov, C. Marquardt,  and G. Leuchs, IEEE Journal of Selected Topics in Quantum Electronics 21, 168 (2015).
  • Qi (2015) B. Qi, Phys. Rev. A 91, 020303 (2015).
  • da Silva et al. (2015) T. F. da Silva, G. C. do Amaral, G. B. Xavier, G. P. Temporão,  and J. P. von der Weid, IEEE Journal of Selected Topics in Quantum Electronics 21, 159 (2015).
  • Lim et al. (2015) C. C. W. Lim, N. Walenta, M. Legré, N. Gisin,  and H. Zbinden, IEEE Journal of Selected Topics in Quantum Electronics 21, 192 (2015).
  • Coffman et al. (2000) V. Coffman, J. Kundu,  and W. K. Wootters, Phys. Rev. A 61, 052306 (2000).
  • Wang et al. (2017) F. Wang, M. Erhard, A. Babazadeh, M. Malik, M. Krenn,  and A. Zeilinger, Optica 4, 1462 (2017).
  • Lee et al. (2017) H. J. Lee, S.-K. Choi,  and H. S. Park, Sci. Rep. 7, 4302 (2017)arXiv:1610.04359 .
  • Lee and Park (2019) H. J. Lee and H. S. Park, Photon. Res. 7, 19 (2019).
  • Goyal et al. (2014) S. K. Goyal, P. E. Boukama-Dzoussi, S. Ghosh, F. S. Roux,  and T. Konrad, Sci. Rep. 4, 4543 (2014)arXiv:arXiv:1212.5115v1 .
  • Jo et al. (2019) Y. Jo, K. Bae,  and W. Son, Sci. Rep. 9, 687 (2019).
  • Ding et al. (2017) Y. Ding, D. Bacco, K. Dalgaard, X. Cai, X. Zhou, K. Rottwitt,  and L. K. Oxenløwe, npj Quantum Information 3, 25 (2017).