Modulator-free coherent-one-way quantum key distribution
Modulator-free coherent-one-way quantum key distribution
www.lpr-journal.org
ζ = (2V − 1) × exp(−μ)
1/2 (2) attribute this enhanced performance to the lower QBER enabled
− 2 1 − exp(−2μ) V (1 − V ) .
by our source, alongside high efficiency detectors.
The extracted key length is then calculated using We also plot the QBER and the interference visibility in
figure 3(b). These parameters give a direct evaluation of the per-
1/2 formance of our light source as a quantum transmitter. Because
l = n 1 − Q − (1 − Q)h 1−ζ − 7 n log2 (β −1 )
2
(3) the single photon detectors have negligible DCRs, we do not ex-
− f I R × h(Q) × n − log2 2εcor1 β 2 , pect a strong variation of QBER across the entire range of the
channel attenuation. This is indeed the case for attenuations
where n is the block size used for post processing, Q is the QBER, equal to and above 20 dB, where the QBER is measured at be-
h is the binary entropy function truncated to unity at input values low 0.15 %. This is low relative to other QKD protocols, which
over 0.5, β is optimised at ε QK D /4, f I R is the efficiency of informa- achieve QBERs of around 4 % at similar distances.[3,17] At the low-
tion reconciliation and εcor is the probability with which the key est channel attenuation of 1.5 dB, the QBER increases to 0.78 %.
is incorrect. The total measurement time increases with channel We attribute this QBER increase to the deterioration of the tim-
attenuation, although only 600 s are required at 30 dB channel ing jitter performance of the superconducting nanowire detec-
loss to collect the required number of counts. tors at high count rates, where the jitter increases from 40 ps
Figure 3(a) shows the estimated secure key rate as a function of to 90 ps. We also increase the time-bin width on the digitizer at
channel attenuation. This is the first time that megabit per sec- short distances to ensure all counts are measured. This deteriora-
ond estimated key rates have been shown using the COW pro- tion causes an overlap between the detected time-bins, as shown
tocol. These key rates are extracted in a finite key-size scenario, in figure 2(a), creating an ambiguity in the bit value of a photon.
attaining 4.57 Mbit/s at 1.5 dB of attenuation. As the channel at- The interference visibility does not suffer from the time jit-
tenuation increases, the secure key rate decreases exponentially. ter deterioration because the count rate of SPD2 is 30 times
At 20 dB of optical attenuation, equivalent to 100 km of ordinary lower than SPD1 . As shown in figure 2(b) and (c), the detection
optical fiber (0.2 dB/km loss), a secure key rate of 127.8 kbps is peaks are well separated from each other. We measure a visi-
delivered. This rate is ten times higher than that measured by bility of 97.81 % at 10 dB attenuation, illustrating high quality
Korzh et al[4] using the COW protocol at similar attenuations. We coherence transfer to the intensity-modulated pulses of the slave
laser. This value is lower than the master laser visibility because
the direct intensity modulation slightly weakens the indistin- [1] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Rev. Mod. Phys. 74
guishability among optical pulses due to the limited bandwidth (1), 145–195 (2002).
of the slave laser. While our simulations show that improvement [2] E. Diamanti, H-K. Lo, B. Qi, and Z. L. Yuan, npj Quantum Information
of the visibility would only entail a relatively small increase in 2, 16025 (2016).
the secure key rates, there is potential to reach far higher mod- [3] A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields,
ulation rates using different slave laser diodes. Transmission at Appl. Phys. Lett. 96 (16), 161102 (2010).
10 Gbit/s has been shown in classical communications by using [4] B. Korzh, C.C.W. Lim, R. Houlmann, N. Gisin, M.J. Li, D. Nolan, B.
Sanguinetti, R. Thew, and H. Zbinden, Nat. Photonics 9 (3), 163–168
a gain-switched vertical-cavity surface-emitting laser with optical
(2015).
injection locking.[18]
[5] B. Fröhlich, M. Lucamarini, J. F. Dynes, L. C. Comandar, W. W-S. Tam,
In summary, we have successfully demonstrated the suitabil- A. Plews, A. W. Sharpe, Z. L. Yuan, and A. J. Shields, Optica 4 (1), 163,
ity of a modulator-free QKD transmitter for the COW protocol. (2017).
This system has produced estimated secure key rates between [6] K. A. Patel, J. F. Dynes, M. Lucamarini, I. Choi, A. W. Sharpe, Z. L.
4.57 Mbit/s to 6.38 kbit/s over equivalent distances of 7.5 km to Yuan, R. V. Penty, and A. J. Shields, Appl. Phys. Lett. 104 (5), 051123
150 km. The lack of external modulators reduces both the system (2014).
size and complexity. An exciting prospect opened up by this work [7] J. Qiu, Nature 508, 441, (2014).
is the potential for implementation in a multi-protocol network. [8] C. H. Bennett and G. Brassard, in: International Conference on
Current work towards this has used bulky systems with a number Computer System and Signal Processing, IEEE, 1984, pp. 175–
179.
of active components. The system presented in this work would
[9] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek,
enable a single transmitter to quickly switch between protocols
N. Lütkenhaus, and M. Peev, Rev. Mod. Phys. 81 (3), 1301
depending on a client’s requirement on bit-rate, distance or secu- (2009).
rity. The wide range of functionalities offered by this transmitter, [10] P. Sibson, M. Godfrey, C. Erven, S. Miki, T. Yamashita, M. Fuji-
namely amplitude and phase modulation with on-demand phase wara, M. Sasaki, H. Terai, M. G. Tanner, C. M. Natarajan, R. H.
randomization, mean that newly developed protocols could be Hadfield, J. O’Brien, and M. G. Thompson, Nat. Comms. 8, 13984
easily adopted with firmware updates. An example of this would (2017).
be an extension to the COW protocol that incorporates block-wise [11] Z. L. Yuan, B Föhlich, M Lucamarini, G. L. Roberts, J. F. Dynes, and
phase randomization to offer unconditional security, similar to A. J. Shields, Phys. Rev. X 6 (3), 031044 (2016).
work done for the DPS protocol.[19] [12] K. Inoue, E. Waks, and Y. Yamamoto, Phys. Rev. Lett. 89 (3), 037902
(2002).
[13] R. Loudon, The quantum theory of light (OUP Oxford, 2000).
Acknowledgments [14] Z. Liu, J. Kakande, B. Kelly, J. O’Carroll, R. Phelan, D. J. Richardson,
G. L. R. Acknowledges financial support via the EPSRC funded CDT in In- and R. Slavik, Nat. Comms. 5, 5911 (2014).
tegrated Photonic and Electronic Systems and Toshiba Research Europe [15] J. He, G. Jin, B. Liu and J. Wang, Opt. Lett. 41, 5724 (2016).
Limited. [16] L. C. Comandar, M. Lucamarini, B. Fröhlich, J. F. Dynes, A. W. Sharpe,
S.W.-B. Tam, Z. L. Yuan, R. V. Penty, and A. J. Shields, Nat. Photonics.
10, 312 (2016).
Keywords [17] M. Lucamarini, K. A. Patel, J. F. Dynes, B. Fröhlich, A. W. Sharpe, A. R.
Optical communications, quantum key distribution, fiber optic communi- Dixon, Z. L. Yuan, R. V. Penty, and A. J. Shields, Opt. Express 21 (21),
cations, quantum optics, COW protocol 24550 (2013).
[18] C. C. Lin, Y. C Chi, H. C. Kuo, P. C. Peng, C. J. Chang-Hasnain, and G.
R. Lin, J. Lightw.Technol. 29, 830 (2011).
Received: March 20, 2017
Revised: May 26, 2017 [19] K. Tamaki, M. Koashi, and G. Kato, arXiv preprint arXiv:1208.1995
Published online: June 27, 2017 (2012).