Abstract
Phase encoding in quantum key distribution (QKD) enables long-distance information-theoretic secure communication in optical fibers. We present a novel theoretical model characterizing errors from various sources in practical phase encoding-based QKD systems, namely the laser linewidth, detector dark counts, and channel dispersion. This model provides optimized optical pulse parameters and less distortion in pulses, which eliminates system imperfections and leads to a reduced quantum bit error rate (QBER) for practical QKD scenario. This analysis is applicable to various fiber-based phase and time encoding protocols. In particular, we implement this to a differential phase shift (DPS) QKD scheme operating at a 2.5 GHz clock, which produces a secure key rate of 193 bits/s at a fiber length of 265 km and an unprecedented QBER < 1\(\%\) up to 225 km length with standard telecom components. We show that by adjusting the quantum efficiency and dark count rates of detectors, proposed system can establish secure keys up to 380 km distance using standard telecom grade fiber with a QBER of 1.48%. Moreover, the system is compatible with existing optical fiber networks and capable of establishing a secure key exchange between two cities 432 km apart using ultra-low-loss (ULL) specialty fiber.
Similar content being viewed by others
Introduction
Quantum Key Distribution (QKD) is a cryptographic method based on the principles of quantum mechanics1, 2 that enables two parties to securely share a secret key for encrypting and decrypting messages3. Any attempt of eavesdropping, therefore, introduces detectable error into the system, alerting legitimate users. Qubits can be encoded in various degrees of freedom, including polarization, phase, time bin, etc., and distributed through fiber or free space quantum channels. Fiber-based QKD serves as a perfect candidate for inter-city quantum communication. In single-mode fiber, stress induced from the environment randomly evolves the birefringence causing the polarization drift. Therefore, additional resources are required for polarization compensation in polarization encoding based QKD. In contrast, the phase encoding based QKD system is less susceptible to noise and other types of interferences. It is diminutively affected by polarization drift, making it a perfect fit for fiber-based channels. Various protocols exist which utilize phase encodings such as phase-based BB844, DPS and several variants of DPS protocol5. There have been many recent advancements in QKD, such as investigating QKD security6 with realistic devices7, QKD using random states8, analysis of reference frame independent QKD9, 10 and decoy-state method for quantum private query11. Significant progress has been achieved in realizing long range twin field QKD without quantum repeaters12, and MDI QKD with polarization-discriminated time-bin phase encoding13. The transmission of polarization states from GEO satellite to earth has been demonstrated14, and chip-based QKD platform has been studied15 that is compatible with current telecommunication hardware for hybrid classical and quantum communication.
One of the most promising implementations of phase-encoded QKD is differential phase shift QKD (DPS-QKD), known for its implementable simplicity and high key rate16. It is also resistant to various attacks, including those based on photon-number-splitting (PNS)17 and general individual attacks18. DPS-QKD is based on the phase difference between adjacent pulses of a coherent pulse train having applications in various domains, including secure communication, network security, and quantum cryptography. In secure communication, DPS-QKD can be used to establish secure links between two parties, protecting sensitive information such as financial transactions, medical records, and government secrets. DPS-QKD can also secure network communication, such as in the case of secure routing and authentication in the internet of things (IoT) and other communication networks19. It has several use cases with various cryptographic protocols, such as quantum digital signatures20,21,22, and quantum secret sharing23, 24.
Recent research has focused on enhancing the performance and security of DPS-QKD by several modifications in the original DPS protocol5. For instance, round-robin DPS (RRDPS), first introduced by Sasaki et al.25, has been widely explored. Although it offers a robust security aspect, the implementation is resource intensive. The typical realizations are having nearly 100 km channel lengths or are limited in secure key rates26,27,28,29,30,31. Not to mention, the Tokyo field demonstration32 implementing DPS protocol was also limited to 90 km. Such shorter channel lengths in the above experiments require several trusted nodes to be implemented to realize long-distance quantum communication making the system prone to compromise in security. Finite secure key rate generation was reported with a clock rate of 1 GHz33, which used special dispersion shifted fibers (DSF) instead of standard telecom fibers. Using specialty fibers such as DSF or ultra-low loss (ULL) fibers would require a new telecom infrastructure with huge monetary requirements. The real test of a QKD implementation would be with standard telecom fibers, as quantum channels are already available in the existing telecom infrastructure which support electronics with a small footprint. Moreover, the best performance of DPS QKD utilizing regular telecommunications fiber has been so far limited to a quantum bit error rate (QBER) of \(3.45\%\) and a maximum channel loss of 52.9 dB28.
The noise in a realistic QKD setup arises from imperfections in devices. Earlier studies in DPS QKD34 only assume a baseline noise level and error from the detector dark counts. This simple theoretical model is widely used in fitting experimental data, but it lacks the ability to analyze the whole experimental setup and optimize it. The above implementations of the DPS-QKD protocol have been done with the same old theory, which does not consider the various sources of errors. Such limitations exist for a wide range of QKD protocols that use components like modulators and interferometers, for example, phase-encoded BB84, coherent one-way (COW), RRDPS, MDI QKD, quantum private query (QPK) protocols, etc11, 35,36,37,38. Thus a thorough study of all major sources of errors is essential for the efficient implementation of such QKD protocols for long distances.
In this work, we aim to analyze device imperfections and characterize bit errors caused by source linewidth, electro-optical modulation, chromatic dispersion, and detector’s dark counts to optimize performance for high secure key rates and low QBER in a phase-based QKD system. This analysis allows us to precisely characterize phase-encoded QKD systems taking the DPS QKD system as an example. With this optimization, QBER of \(2.36\%\) is achieved at 265 km fiber channel, which is at least 31\(\%\) improvement over previously reported works28. This system can generate a secure key rate of 192.7 bits/s, which has not been achieved yet for such lengths as per the authors’ knowledge. By lowering the bias current of the superconducting nanowire single photon detectors (SNSPDs), the QKD setup enables secure key distribution for channel loss of more than 72.2 dB, equivalent to a channel length of 380 km with QBER nearly 1.48\(\%\). Such capacity will also enable DPS QKD based long-distance quantum secret sharing24, 39 and quantum digital signature22, 40, including other useful applications like quantum secure direct communication and quantum conference key agreement. With a similar setup as this experiment except for the fiber channel, this analysis will enhance the performance for free space DPS-QKD enabling high key rate GEO satellite to ground secure key distribution41.
This paper is organized as follows: “Theoretical model” starts with an introduction to DPS QKD, and then presents a detailed analysis of QBER calculations incorporating device imperfections. Here, the QBER is characterized in three different categories. In “Experiment and results”, the experimental setup is highlighted and the achieved results are discussed. The comparison of our results with those reported in literature is made in “Discussion”. Finally, “Conclusion” summarises the overall findings.
Theoretical model
The performance of QKD systems has extraordinarily improved over time in terms of length and key rate due to technological advancements. QBER is the limiting factor that bounds the QKD performance, which originates in the system due to imperfections in real-time experimental devices. In order to optimize a QKD protocol, it is essential to study the origin of QBER due to various components. In the simple conventional approach28,29,30,31, 34, 42, QBER constitutes system baseline error and dark counts of detectors. This baseline error is constant for the system, but the effect of dark counts becomes dominant as distance increases. To get a deep understanding, the QBER arising from various imperfections in the devices is rigorously calculated, making the analysis more precise and realistic for practical scenarios. This analysis aims to optimize the baseline error focusing on DPS QKD, which can also be applied to various other protocols using similar components.
DPS QKD protocol
The basic scheme of the DPS protocol is shown in Fig. 1. A continuous wave laser is modulated into a train of pulses with an intensity modulator (IM). The pulses further pass through a phase modulator where a random phase 0 or \(\pi\) is given to each pulse. The pulses are then attenuated to a single photon regime depending on the security requirements, usually with nearly 0.2 mean photons. The encoded states become of the form \(\vert \alpha e^{i\phi _j}\rangle _{0,j}\vert \alpha e^{i\phi _{j+1}}\rangle _{0,j+1}\) where \(\phi \in \{0, \pi \}\) denotes the phase of jth pulse, and \(\alpha\) denotes the amplitude of the weak coherent pulse. The encoded weak coherent state propagates through the fiber quantum channel, which then enters Bob’s one-bit-delay Mach Zehnder Interferometer (MZI). Inside the one-bit delay MZI, each pulse splits at the first beam splitter and interferes with its neighboring (next) pulse at the second beam splitter. The post-selected state thus becomes \(\vert \frac{\alpha }{2}(e^{i\phi _j}+e^{i\phi _{j+1}})\rangle _{D1,j+1} \vert \frac{i\alpha }{2}(e^{i\phi _j}-e^{i\phi _{j+1}})\rangle _{D2,j+1}\). According to the phase difference between adjacent pulses being 0 or \(\pi\), the photon is detected in either of the detectors D1 or D2. Bob shares his detection timestamps with Alice (but no information about which detector has clicked). Alice discards the bits that are not detected by Bob. This way, both arrive at a common sifted key sequence with some error given by QBER.
In this analysis, the key rate and QBER for DPS QKD are calculated, incorporating the effect of the properties of the light source, electro-optic intensity and phase modulation, dispersion in optical fiber channel, Mach Zehnder interferometer, and the single photon detectors. QBER is categorized into three categories \(QBER_{disp}\), \(QBER_{MZI}\), and \(QBER_{dark}\) to finally calculate the total QBER of the system. \(QBER_{disp}\) incorporates the effect of imperfection in phase modulation, optical pulse shape, and dispersion in fiber channels. \(QBER_{MZI}\) comprises the effect of source linewidth on the Mach-Zehnder interferometer, and \(QBER_{dark}\) contains the effect of dark counts in the single photon detector. The key rate depends on the losses in the system, the dead time of detectors \(t_{deadtime}\), and the width of the detection window \(t_W\). The theoretical proof for unconditional security of DPS QKD is still being explored with various assumptions6. However, for the scope of this work, we have considered the theoretical analysis given in Ref.18, which provides the security guarantee under general individual attacks. The required mean photon number is calculated for secure key distribution under these attacks. Experimentally fixing the mean photon number using a set of optical attenuators suffices the security under these attacks.
Effect of dispersion and electro-optic modulation
The performance of the fiber optic communication system is limited by the pulse broadening induced by the dispersion effect. At telecom wavelength in standard fibers, pulse broadening is substantially caused by second-order dispersion. This broadening causes a portion of adjacent pulses to intermix, thus limiting transmission length for a particular bit rate. Apart from this, polarization mode dispersion (PMD) is induced by random polarization evolution in fibers manifested by material anisotropy or asymmetric stress that distorts the pulse shape. However, PMD effects are inconsiderable in standard telecom fibers compared to chromatic dispersion.
Intensity or phase modulation of CW laser to produce optical pulses also modulates the spectrum of light that is mainly governed by the modulation depth and modulation frequency. The output spectrum consists of sidebands separated by the modulation frequency and their relative power depends on the modulation depth43. Ideally, the phase modulation should be a random step function (0 or \(\pi\)) but in actual implementation, electronic signals are constrained by significant fall and rise times. Thus, adjacent coherent optical pulses don’t exhibit purely 0 or \(\pi\) phase difference and contribute to QBER. Electro-optical modulation broadens the spectral width of optical pulses that will cause dispersion in the fiber channel. This QBER contribution is considered as \(QBER_{disp}\) and calculated as following:
Suppose I(t) is the intensity of the optical pulse and \(\phi (t)\) is the phase given to the optical pulse at time t as shown in Fig. 2. \(\phi (t)\) is obtained by measuring the waveform signal input to the phase modulator and multiplying the proportionality constant estimated while calibrating the phase modulator. \(S^\prime (\nu )\) is the spectral profile of photons after the intensity and phase modulation as shown in Fig. 3c. T is the time period of the optical pulse train.
In a one-bit delay MZI, two optical pulses separated by time T will interfere. Since the phase difference between two adjacent pulses is not precisely 0 or \(\pi\), photons have a finite probability of going into the wrong detector. When considering the effect of dispersion, photons of different wavelength travel at different speeds, and the temporal broadening of the pulse is observed. Let us assume that the initial pulse entering into the fiber channel (shown in Fig. 3a) has phase \(\phi (t_0)\) at a time \(t_0\). While propagating into the optical fiber channel, photons of various wavelengths will travel at different speeds causing the broadening of the pulse as shown in Fig. 3b. In the broadened pulse, at time label \(t_0\), there would be a fraction of photons that traveled at different speeds in the medium. So, the broadened pulse at time label \(t_0\), contains a fraction of photons from the time label \(t_0+\Delta t\) of the initial pulse as shown in Fig. 3a and that component is written as:
where, \(\alpha _{disp}\) is the dispersion coefficient, L is fiber length, \(\lambda _c\) is the central wavelength. The broadened pulse at time label \(t_0\) namely \(p(t_0, \Delta t)\) contains the fraction of photons that have a phase \(\phi (t_0+ \Delta t)\) of the initial pulse. Thus by varying \(\Delta t\) for the whole range, phase distribution \(p_{t_0}(\varphi )\) at time label \(t_0\) of the pulse after dispersion is obtained as depicted in Fig. 3d. It is worth noting that \(\phi (t)\) is a function of phase imparted by phase modulator and should not be confused with variable \(\varphi\) in phase distribution function \(p_{t_0}(\varphi )\). This shows that the initial modulated pulse has a fixed phase value at any point in time, whereas in the broadened pulse, there is a distribution of phase as a consequence of group velocity dispersion. In a similar manner, the phase distribution \(p_{t_0+T}(\varphi )\) can be obtained for time \(t_0 + T\) that corresponds to photons in the adjacent pulse. The interference at the second beam splitter of MZI is the interference of these two phase distributions \(p_{t_0}(\varphi )\) and \(p_{t_0+T}(\varphi )\). The phase difference between two adjacent pulses is the convolution of \(p_{t_0}(\varphi )\) and \(p_{t_0+T}(\varphi )\).
For the interference between two adjacent pulses (say ith pulse and \(i^{th}+1\) pulse), let \(N^{(i)}_1\) and \(N^{(i)}_2\) are photons reaching D1 and D2 respectively for the time detection window \(t_W\) given by
The amount of photons leaking to the wrong port of MZI due to phase imperfection is given by \(min(N^{(i)}_1, N^{(i)}_2)\). Here, min( ) function is used since we assume a small fraction of photons is leaking into the wrong port of detection due to phase imperfection and channel dispersion and the majority of the photons follow the phase encoding. The corresponding QBER is given by
By considering the interference between adjacent pulses for a large train of optical pulses, fluctuations are averaged out in the estimation of \(QBER_{disp}\). Taking the ensemble average of a long train of optical pulses yields
For phase difference of 0 (or \(\pi\)) between adjacent pulses, photons going to the wrong detector D1 (or D2) will contribute in \({QBER}_{disp}\). Also, the area under the curve from \(t_1\) to \(t_1+t_W\) of the broadened pulse is defined as f as shown in Fig. 3b, and it is the fraction of photons considered for key generation, and other photons are discarded since they belong to the time regions of comparatively large QBER. In Fig. 4a, one can see the variation of \(QBER_{disp}\) with the channel length. To mitigate the dispersion effects, a dispersion compensating fiber (DCF) could be added to the scheme.
Effect of source linewidth on Mach Zehnder interferometer
The linewidth of the laser source originates from the phase noise inside the laser44, which impacts the performance of MZI. The transmittance of MZI can be expressed in terms of losses in MZI arms, their extinction ratio, and free spectral range (\(\nu _{fsr}\)). The higher linewidth of the source causes photons to leak in the wrong output port of MZI and is denoted by \(QBER_{MZI}\). The interferometer has two arms, out of which one is delayed with respect to the other by one pulse separation. Let the two arms of MZI have insertion losses \(IL_1\) and \(IL_2\), and extinction ratios \(ER_1\) and \(ER_2\). Thus the transmittance (\(T_1\) and \(T_2\)) of the output ports of MZI can be expressed as:
Since the source has some finite spectral width, photons will leak into the wrong output port of the Mach-Zehnder interferometer. Let us define four coefficients \(m_{ij},\ \text{where}\ i,j\ \in \{1,\ 2\}\) representing the fraction of photons supposed to go in output port i actually going to output port j as follows:
where, \(S(\nu )\) is the spectral width of the laser. The fraction of photons that have leaked into the wrong output port of MZI, which contributes to QBER, can be expressed as
In Fig. 4b, the behavior of \(QBER_{MZI}\) with source linewidth is plotted for the MZI used in the experiment. The plot shows that the contribution to \(QBER_{MZI}\) is minimally affected by an increase in linewidth for spectral widths much smaller than the free spectral range of the MZI. As the linewidth increases further, the QBER linearly increases and saturates at 50\(\%\).
Effect of detector dark counts
The dark counts generated in a single photon detector are random false detections that do not correspond to a signal photon. These dark counts give rise to QBER that is calculated below:
Suppose \(\eta _{detector}\) is the quantum efficiency, \(t_{deadtime}\) is the dead time, and r\(_{DCR}\) is the dark count rate of the single photon detector. Let \(r_{thermal}\) be the rate of thermal photons generated inside a single photon detector that triggers an avalanche. The total photon rate that could cause an avalanche in a single-photon detector is denoted by \(\mathrm {\Lambda }\) that majorly consists of signal photons,
where the 1/2 factor is due to the equiprobable distribution of incoming photons in both detectors due to random phase encoding. \(\eta _{link}\) is the channel efficiency considering the fiber loss and any additional losses in the system and R is the clock speed. The total photon count rate registered by the detection system is defined as the sifted key rate given by:
Here, \(\alpha _{deadtime} = e^{-\Lambda t_{deadtime}}\)45, and \(r_{thermal}\) can be calculated from the Eq. (15) by substituting \(\eta _{link} = 0\) and \(R_{sifted} = 2r_{DCR}\). f is defined in “Effect of dispersion and electro-optic modulation” as the fraction of photons inside the detection window considered for key generation. QBER due to dark counts of single photon detectors is given by:
The variation of \(QBER_{dark}\) with system losses are presented in Fig. 4c for various detectors’ dark count rates. It shows that \(QBER_{dark}\) becomes significant when the rate of signal photons is comparable to the dark count rate at higher channel losses.
Estimation of QBER and key rate
Recalling the definition, QBER is the fraction of detected photons that are inconsistent with Alice’s encoding. Half of the detected dark counts contribute to QBER denoted as \(QBER_{dark}\), and the probability that a detection occurred due to signal photon is \((1-2QBER_{dark})\) .
Let us consider \(QBER_{dark}\), \(QBER_{disp}\) and \(QBER_{MZI}\) to be independent events. A signal photon going into the wrong port due to \(QBER_{disp}\) has a probability of \((1-QBER_{MZI})\) to pass unaffected. The net QBER becomes \(QBER_{disp} (1-QBER_{MZI})\). Similarly, a signal photon correctly passing due to dispersion with probability \((1-QBER_{disp})\) has a probability \(QBER_{MZI}\) of flipping to the wrong port. The net QBER, in this case becomes \((1-QBER_{disp})QBER_{MZI}\). Adding up all the contributions, collectively total QBER of the system can be written as:
The factor \((1-2QBER_{dark})\) is the probability that a detection occurred due to a signal photon. Figure 4 shows the characteristics of all three sources of QBER discussed above. The secure key rate can be calculated as18:
where \(R_{sifted}\) is calculated in Eq. (15), \(\tau\) is the compression factor for privacy amplification46, \(f_{EC}\) is the factor due to the efficiency of the error correction process47 and is chosen to be 1.16 in this analysis, considering the performance of the bidirectional error reconciliation protocol48 . H(x) is the binary entropy function. A better estimate of the factor \(f_{EC}\) can be made taking into account the finite block size effect and QBER of the protocol49. Since the analysis explores only the sources of QBER, it is compatible with established methods of determining phase error rates and later advancements in security analysis through Eq. (18).
Experiment and results
A CW laser centered at ITU channel 22 was first modulated into a 2.5 GHz, 120 ps pulse train by an intensity modulator (IM). The IM was driven by a field programmable gate array (FPGA) as shown in Fig. 5. A phase modulator (PM) encoded the pulses with random bit sequences with a phase of either 0 or \(\pi\). The encoded pulse train is then attenuated by a variable optical attenuator (VOA) that sets the required mean photon number using a power meter. The mean photon per pulse was set to 0.23 for fiber lengths up to 175 km and 0.24 beyond that length as calculated from the theory considering general individual attacks18. A dispersion compensation fiber (DCF) up to 120 km length was used before the variable optical attenuator (VOA) to compensate for chromatic dispersion at larger lengths. Placing the DCF before quantum channel is important to avoid introducing extra losses in the channel.
At Bob’s end, a 1-bit delay MZI is used so that even and odd pulses interfered with one another. The 1-bit delay MZI used in this experiment is a commercially available off-the-shelf fiber coupled MZI (make Kylia). The interferometer is thermally stabilized to avoid any phase drift. The phase of the MZI is tuned using a resistive heater placed in one of its arms. The delay between the arms corresponds to the temporal separation of pulses generated by the intensity modulator (IM) at 2.5 GHz. The two outputs of the MZI are then connected with SNSPDs separately. Polarization controllers were placed before the intensity modulator, phase modulator, and MZI to diminish the polarization effects in these devices. The time stamps of clicks were recorded and analyzed by Bob using an FPGA-based time-correlated single photon counting module (TCSPC). Bob’s TCSPC is externally synchronized by Alice’s FPGA, which is also driving the intensity modulator and phase modulator.
During the experiment, Alice and Bob generated keys and measured the QBER and sifted key rates by directly comparing their keys over fiber lengths ranging from 115 km to 290 km. A QBER of \(2.36\%\), a sifted key rate of 1.38 kbits/s, and a secure key rate of 193 bits/s were achieved for 265 km of telecom grade fiber for a laser of 10 kHz linewidth with the best optimization of all the components, see Fig. 6a. In Fig. 6a,b, the theoretical curves are plotted using Eqs. (15), (17), and (18). We also performed the experiment with a 4 MHz linewidth laser to investigate the effect of laser linewidth in DPS QKD. Equation (13) predicts \(QBER_{MZI}\) for 10 kHz and 4 MHz linewidth lasers as 0.02\(\%\) and 0.27\(\%\), respectively. The QBER curves in Fig. 6a,b are validated by experimental data. An upward shift in QBER in Fig. 6b is thus an increment in the baseline error due to the effect of laser linewidth.
With a 4 MHz linewidth laser, a QBER of \(3.25\%\), a sifted key rate of 1.16 kbits/s, and a secure key rate of 56.68 bits/s was achieved when the channel length was 255 km as shown in Fig. 6b. Using a DCF also enhances performance by controlling the pulse broadening. \(QBER_{disp}\) curve in Fig. 4a quantitatively presents the QBER contribution from dispersion effect. At a channel length of 265 km, \(QBER_{disp}\) is 1.03\(\%\) without using DCF; when a DCF of length 120 km was used, the \(QBER_{disp}\) component was reduced to 0.57\(\%\).
The stability of the setup was also observed in terms of QBER and secure key rate for a channel length of 115 km. The system was stable for more than 5 h, which proves the applicability of the DPS QKD system for long-hour operations. The standard deviation for fluctuations in QBER and key rates were 0.02\(\%\) and 0.003 Mbits/s, respectively, as shown in Fig. 7. The high stability and low QBER allow the setup to withstand more environmental fluctuations making it suitable for long time secure key distribution.
Measurement of spectral width after electro-optical modulation
As mentioned in “Effect of dispersion and electro-optic modulation”, after intensity modulation and phase modulation, the inherent spectral width of the weak coherent pulses modifies. Intensity modulation generates sidebands in the spectrum at a separation of the frequency of the RF signal driving the intensity modulator. Irrespective of the inherent spectral width of the source, these modulation processes manipulate the spectrum. This new spectrum governs the effect of dispersion in the fiber channel. The resultant spectral width increases with the clock speed of the QKD protocol. Thus dispersion control is necessary for a high clock speed DPS QKD system. The broadening factor measures pulse width at any distance with respect to its initial width. In the same experimental setup in Fig. 5, we significantly increased the mean photon number and detected the photons using SNSPD at the output port of MZI. The pulse shape is constructed by analyzing the timestamp data and the pulse width is measured at several fiber lengths. The measured broadening factor is shown in Fig. 8. The propagation of optical pulses inside the single-mode fiber is described by the nonlinear Schrödinger equation. Since the working wavelength was far away from the zero dispersion point, the third-order dispersion effect could be neglected. The broadening factor is given by50
where \(\sigma _0\) and \(\sigma\) are the pulse widths at distances 0 and z respectively, and C is the chirp parameter. \(\beta _2 = {(\frac{d^2\beta }{d\omega ^2})}_{\omega \ =\ \omega _0}\) where \(\beta\) is the mode propagation constant. \(V_\omega \ =\ 2\sigma _0\sigma _\omega\), \(\sigma _\omega\) is the spectral width. We used Eq. (19) to determine the spectral width of the optical pulse after modulation. From this measurement, \(\sigma _\omega\) of 5.5 GHz was obtained and used in Eq. (1) to calculate \(QBER_{pulse}\) which fits reasonably well with experimental results presented in Fig. 6. However, it is worth noting that MZI is not affected by this bandwidth since the sidebands in the spectrum are generated at a separation of the free spectral range of MZI. Therefore, only the linewidth of the laser has an effect on MZI as discussed in “Effect of source linewidth on Mach Zehnder interferometer”.
Discussion
One can see that in our study various sources of QBER are modeled and validated by experimental results. This theoretical analysis can be used in general for all phase-encoded QKD schemes such as phase-based BB84, RRDPS, and also for COW protocol. For a particular choice of laser in the experiment, the \(QBER_{MZI}\) component is fixed, and the effect of chromatic dispersion could be ameliorated using a DCF, but the dark count rate of the single photon detector ultimately determines the maximum channel length possible to establish secure communication. We experimentally adjusted the quantum efficiencies of SNSPDs above 85\(\%\) to obtain a high key rate. This experiment produces the highest key rate in DPS QKD protocol to date for all lengths. The optimization techniques described in this work helped us to suppress the QBER extraordinarily to 0.53\(\%\) at 115 km and below 1\(\%\) up to 225 km. From the \(QBER_{disp}\) plot in Fig. 4a, it was observed that the \(QBER_{disp}\) component grows fast at higher lengths. However, adding a DCF before the channel is a viable solution for managing dispersion for QKD using fibers. Furthermore, it does not add any additional loss to the system. A secure key generation through standard telecom fiber compatible with ITU-T recommendation G.652 was achieved. This enables the experimental setup for inter-city quantum communication for lengths more than 275 km with 0.19 dB/km fiber loss. This is the first implementation of DPS QKD for such lengths. This experiment also demonstrates the feasibility of DPS QKD using FPGA at 2.5 GHz without bulky hardware and using existing telecom infrastructure. The efficiency and dark count rates of SNSPDs depend on the detector bias currents similar to Fig. 2 in Ref.51. The detector bias current can be adjusted to reduce the dark count rate significantly at the expense of reducing the quantum efficiency. Figure 9a,b show the effect of lowering the dark count rate for our SNSPD on the system’s secure key rate and QBER, respectively. One can see that our optimized QKD setup can attain a 0.11 bits/s secure key rate with 72.2 dB channel loss with QBER of 1.48\(\%\). In terms of length, the experimental setup is capable of producing 0.11 bits/s secure key rate at 380 km channel length. A comparison of available DPS QKD implementations in shown in Table 1. It is apparent that our present work demonstrates largest QKD channel length with least QBER value with 2.5 GHz clock rate. Furthermore in this experimental setup, by just replacing the current fiber with ultra-low loss (ULL) fiber having loss 0.15 dB per km, one can accomplish 0.11 bits/s secure key rate at 432 km channel length.
Conclusion
In this work, we present a comprehensive model incorporating various sources of QBER in practical QKD systems similar to DPS QKD. We experimentally validate the outcomes of the theoretical model by performing one of the highest clock rate DPS QKD experiment so far (at 2.5 GHz) employing a portable FPGA for synchronization. Thanks to the optimized parameters given by the model, QKD for fiber length of 265 km is achieved with a QBER of \(2.36\%\) and secure key rate of 193 bits/s. This successful demonstration paves a way for the straightforward implementation of the DPS QKD protocol with existing telecom infrastructure without specialty fibers and extending the scope for even higher clock rates in near future. The low QBER and its stability in this reported experiment makes the QKD link more tolerant against various environmental disturbances enabling for long time operation. The proposed theoretical model can be generalized to all those QKD protocol based practical systems that utilize coherent laser pulses, phase encoding, and Mach–Zehnder delay line interferometer leading to optimization of QKD systems using RRDPS, phase-based BB84, and COW protocol. This work also highlights that dispersion management using DCF is a compatible solution with the existing standard telecom system without needing dispersion-shifted fibers. By tuning the dark count rates of the detector, we show that the setup is capable of distributing secure keys for more than 380 km. This would significantly reduce the need for intermediate trusted nodes for such long distances, making the system more robust for ascertaining the security of QKD. This characterization method is a crucial step toward the commercial production of long distance secure practical QKD devices. This experiment motivates future developments enabling more than 432 km of secure key distribution with specialty low-loss fiber. With further development of high efficiency and low dark count single photon detectors, DPS QKD would be one of the top choices for metropolitan and intercity quantum networks.
Data availability
The data that support the findings of this study are available with the corresponding author upon reasonable request.
References
Bennett, C. H., Brassard, G. & Mermin, N. D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557 (1992).
Ekert, A. K., Huttner, B., Palma, G. M. & Peres, A. Eavesdropping on quantum-cryptographical systems. Phys. Rev. A 50, 1047 (1994).
Fuchs, C. A., Gisin, N., Griffiths, R. B., Niu, C.-S. & Peres, A. Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy. Phys. Rev. A 56, 1163–1172 (1997).
Tamaki, K., Lo, H.-K., Fung, C.-H.F. & Qi, B. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85, 042307 (2012).
Inoue, K., Takesue, H. & Honjo, T. Dps quantum key distribution and related technologies. In Proc. SPIE 7236, Quantum Communications Realized II, vol. 7236, 87–95 (2009).
Mizutani, A., Takeuchi, Y. & Tamaki, K. Finite-key security analysis of differential-phase-shift quantum key distribution. Phys. Rev. Res. 5, 023132 (2023).
Xu, F., Ma, X., Zhang, Q., Lo, H.-K. & Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020).
Bera, S., Gupta, S. & Majumdar, A. Device-independent quantum key distribution using random quantum states. Quantum Inf. Process. 22, 109 (2023).
Laing, A., Scarani, V., Rarity, J. G. & O’Brien, J. L. Reference-frame-independent quantum key distribution. Phys. Rev. A 82, 012304 (2010).
Nie, Y.-F. & Zhang, C.-M. Afterpulse analysis for reference-frame-independent quantum key distribution. Quantum Inf. Process. 21, 340 (2022).
Liu, B. et al. Decoy-state method for quantum-key-distribution-based quantum private query. Sci. China Phys. Mech. Astron. 65, 240312 (2022).
Yin, Z.-Q. et al. Twin-field protocols: Towards intercity quantum key distribution without quantum repeaters. Fundam. Res. 1, 93–95 (2021).
Tang, G.-Z., Li, C.-Y. & Wang, M. Polarization discriminated time-bin phase-encoding measurement-device-independent quantum key distribution. Quantum Eng. 3, e79 (2021).
Wang, X.-F. et al. Transmission of photonic polarization states from geosynchronous earth orbit satellite to the ground. Quantum Eng. 3, e73 (2021).
Kwek, L.-C. et al. Chip-based quantum key distribution. AAPPS Bull. 31, 1–8 (2021).
Inoue, K. Differential phase-shift quantum key distribution systems. IEEE J. Sel. Top. Quantum Electron. 21, 109–115 (2015).
Inoue, K. & Honjo, T. Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack. Phys. Rev. A 71, 042305 (2005).
Waks, E., Takesue, H. & Yamamoto, Y. Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 73, 012344 (2006).
Adnan, M. H., Ahmad Zukarnain, Z. & Harun, N. Z. Quantum key distribution for 5g networks: A review, state of art and future directions. Future Internet 14, 73 (2022).
Collins, R. J. et al. Experimental transmission of quantum digital signatures over 90 km of installed optical fiber using a differential phase shift quantum key distribution system. Opt. Lett. 41, 4883–4886 (2016).
Collins, R. J. et al. Experimental demonstration of quantum digital signatures over 43 db channel loss using differential phase shift quantum key distribution. Sci. Rep. 7, 3235 (2017).
Inoue, K. & Honjo, T. Differential-phase-shift quantum digital signature without disclosing measurement information. J. Phys. Commun. 6, 075003 (2022).
Inoue, K. et al. Differential-phase-shift quantum secret sharing. Opt. Express 16, 15469–15476 (2008).
Jia, Z.-Y., Gu, J., Li, B.-H., Yin, H.-L. & Chen, Z.-B. Differential phase shift quantum secret sharing using a twin field with asymmetric source intensities. Entropy 23, 716 (2021).
Sasaki, T., Yamamoto, Y. & Koashi, M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature 509, 475–478 (2014).
Wang, K. et al. Round-robin differential phase-time-shifting protocol for quantum key distribution: Theory and experiment. Phys. Rev. Appl. 15, 044017 (2021).
Zhang, Y.-Y. et al. Practical decoy-state round-robin differential-phaseshift quantum key distribution. arXiv preprintarXiv:1605.02853 (2016).
Wang, S. et al. 2 ghz clock quantum key distribution over 260 km of standard telecom fiber. Opt. Lett. 37, 1008–1010 (2012).
Takesue, H. et al. Differential phase shift quantum key distribution experiment over 105 km fibre. New J. Phys. 7, 232 (2005).
Takesue, H. et al. Quantum key distribution over a 40-db channel loss using superconducting single-photon detectors. Nat. Photonics 1, 343–348 (2007).
Diamanti, E., Takesue, H., Langrock, C., Fejer, M. & Yamamoto, Y. 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors. Opt. Express 14, 13073–13082 (2006).
Sasaki, M. et al. Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387–10409 (2011).
Shibata, H., Honjo, T. & Shimizu, K. Quantum key distribution over a 72 db channel loss using ultralow dark count superconducting single-photon detectors. Opt. Lett. 39, 5078–5081 (2014).
Diamanti, E. Security and implementation of differential phase shift quantum key distribution systems. publisher Doctoral Thesis, Stanford University (2006).
Stucki, D. et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibers. New J. Phys. 11, 075003 (2009).
Ma, H.-Q., Zhao, J.-L. & Wu, L.-A. Quantum key distribution based on phase encoding and polarization measurement. Opt. Lett. 32, 698–700 (2007).
Zhou, L. et al. Experimental quantum communication overcomes the rate-loss limit without global phase tracking. Phys. Rev. Lett. 130, 250801 (2023).
Gu, J. et al. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Sci. Bull. 67, 2167–2175 (2022).
Sheng, Y.-B. & Zhou, L. Accessible technology enables practical quantum secret sharing. Sci. China Phys. Mech. Astron. 66, 260331 (2023).
Yin, H.-L. et al. Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 10, nwac228 (2023).
Endo, H. et al. Line-of-sight quantum key distribution with differential phase shift keying. New J. Phys. 24, 025008 (2022).
Zhang, Q. et al. Megabits secure key rate quantum key distribution. New J. Phys. 11, 045010 (2009).
Hui, R. Introduction to Fiber-Optic Communications (Academic Press, 2019).
Honjo, T., Inoue, T. & Inoue, K. Influence of light source linewidth in differential-phase-shift quantum key distribution systems. Opt. Commun. 284, 5856–5859 (2011).
Kissell, R. & Poserina, J. Chapter 4—Advanced math and statistics. In Optimal Sports Math, Statistics, and Fantasy (eds. Kissell, R. & Poserina, J.) 103–135 (Academic Press, 2017).
Bennett, C., Brassard, G., Crepeau, C. & Maurer, U. Generalized privacy amplification. IEEE Trans. Inf. Theory 41, 1915–1923 (1995).
Lütkenhaus, N. Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000).
Brassard, G. & Salvail, L. Secret-key reconciliation by public discussion. In Advances in Cryptology—EUROCRYPT ’93 (ed. Helleseth, T.) 410–423 (Springer Berlin Heidelberg, 1994).
Lim, C. C. W., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014).
Mamyshev, P. V. & Chernikov, S. V. Ultrashort-pulse propagation in optical fibers. Opt. Lett. 15, 1076–1078 (1990).
Caloz, M. et al. High-detection efficiency and low-timing jitter with amorphous superconducting nanowire single-photon detectors. Appl. Phys. Lett. 112, 061103 (2018).
Acknowledgements
The research leading to these results has received financial support from Indian Institute of Technology Delhi, India through the Institute of Eminence (IoE) grant. The authors thank DIA-COE, IIT Delhi for lending the SNSPD for QKD measurements, and Sterlite Technologies Limited for lending one of the 100 km fiber-spools.
Author information
Authors and Affiliations
Contributions
Conceptualization, B.K.; Experiment N.K.P., S.C. and Sangeeta.; Simulation, S.C.; formal analysis, N.K.P., S.C. and B.K.; resources and funding, B.K.; writing—original draft preparation, N.K.P., S.C. and Sangeeta; writing—review and editing, B.K., N.K.P., and S.C.; supervision, B.K.; all authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Pathak, N.K., Chaudhary, S., Sangeeta et al. Phase encoded quantum key distribution up to 380 km in standard telecom grade fiber enabled by baseline error optimization. Sci Rep 13, 15868 (2023). https://doi.org/10.1038/s41598-023-42445-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-023-42445-y
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.