Introduction

There has been a long history between the attacks and the anti-attacks in the development of quantum key distributions (QKD) since the idea of BB84 (Bennett-Brassard 19841,2,3,4,5) protocol was put forward, due to the conflictions between the “in-principle” unconditional security and realistic implementations. Till today, there have been many different proposals for the secure QKD with realistic setups, such as the decoy-state method6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27 which can rescue the QKD with imperfect single-photon sources28,29,30,31,32, while the device-independent quantum key distribution33,34,35,36,37 and the recently proposed measurement-device independent quantum key distribution (MDI-QKD)38,39 can further relieve the QKD even when the detectors are controlled by the eavesdropper40,41. Most interestingly, the MDI-QKD is not only immune to any detector attacks, but also able to generate a significant key rate with existing technologies. Moreover, its security can still be maintained with imperfect single-photon sources38,42,43,44,45,46,47,48,49.

In developing practical QKDs, one important question is how to evaluate the performance of a proposal before really implementing it, since it is not realistic to experimentally test everything. Therefore, it is an important job to make a theoretical study and numerical simulation to predict the experimental results. In principle, it allows to use different kinds of sources in a decoy state MDI-QKD42,43. Before experimentally testing all of them, one can choose to give a theoretical comparison with a reasonable model. In the traditional decoy state methods8,9,10,11,12, the simulation model with linear channel loss is relatively simple. For example, given a source state, it is easy to calculate the state after transmission and further estimate the gains and error rates possibly being observed in an experiment. However, for MDI-QKDs, it is not a simple job except for the special case of using weak coherent states, because both sides send out pulses and the successful events and errors are defined differently. So far, there have been proposals with different sources, e.g., the heralded single-photon source (HSPS) etc14,15,42. And it has been shown that such a source can promise a longer secure distance than the weak coherent state. Nevertheless, it is unknown whether there are other sources which can present even better performance. Therefore, a general model on simulating the performance of arbitrary source states will be highly desirable. Here in this manuscript we solve the problem.

For simplicity, we assume a linear lossy channel in our model. Note that the security does not depend on the condition of linear loss at all. We only use this model to predict: what values the gains and error rates would possibly be observed if one did the experiment in the normal case when there is no eavesdropper. Given these values, one can then calculate the low bound of the yield and the upper bound of the phase flip-error rates for single-photon pairs. The major goal here is to simulate the values of gains and error rates of different states in normal situations. Of course, they can be replaced with the observed values in real implementations.

The paper is arranged as follows: In Sec. II we present the general model for the gains and error rates in a MDI-QKD, describing the detailed calculation processes. In Sec. III we proceed corresponding numerical simulations, comparing the different behaviors of MDI-QKDs when using different source states. Finally, discussions and summaries are given out in Sec. IV.

The general model on MDI-QKD

A. Setups and definitions

Consider the schematic setup in Fig. 138, there are three parties, the users-Alice and Bob and the un-trusted third party (UTP)-Charlie. Alice and Bob send their polarized photon pulses to the UTP who will take collective measurement on the pulse-pairs. The collective measurement results at the UTP determine the successful events. They are two-fold click of detectors (1,4), (2,3), (1,2) or (3,4). The gain of any (two-pulse) source is determined by the number of successful events from the source. There are 4 detectors at the UTP, we assume each of them has the same dark count rate d and the same detection efficiency ξ. In such a case, we can simplify our model by attributing the limited detection efficiency to the channel loss. Say, if the actual channel transmittance from Alice to Charlie is η1, we shall assume perfect detection efficiency for Charlie's detectors with channel transmittance of η1ξ. Each detector will detect one of the 4 different modes, say , , , in creation operator. For simplicity, we denote them by , i.e., , , , . In such a way, detector Di corresponds to mode i exactly. To calculate the gains that would-be observed for different source states in the linear lossy channel, we need to model the probabilities of different successful events conditional on different states. Let's first postulate some definitions before further study.

Figure 1
figure 1

A schematic of the experimental setup for the collective measurements at the UTP.

BS: beam-splitter; PBS: polarization beam-splitter; D1 - D4: single-photon detector; 1, 2: input port for photons. Incident and output lights at the left side of BS are mode a, lights at the right side of BS are mode b.

Definition 1: event (i, j). We define event (i, j) as the event that both detector i and detector j click while other detectors do not click. Obviously, each i, j must be from numbers {1, 2, 3, 4} and ij. For simplicity, we request i < j throughout this paper.

Definition 2: Output states and conditional probabilities of each events: notations ρout: the output state of the beam-splitter. |li, lj〉 = |lilj〉: the beam-splitter's specific output state of li photon in mode i, lj photon in mode j and no photon in any other mode. Explicitly, . P(ij|li, lj) and P(ijout): the probability that event (i, j) happens conditional on that the beam-splitter's output state is |lilj〉 and ρout, respectively. Hereafter, we omit the comma between li and lj, i.e., we use |lilj〉 for |li, lj〉 and P(ij|lilj) for P(ij|li, lj).

Definition 3: Events' probability conditional on the beam-splitter's input state:. We denote as the probability of event (i, j) conditional on that there are k1 photons of polarization α for mode a and k2 photons of polarization β for mode b as the input state of the beam-splitter. Hereafter, we omit the comma between k1 and k2. α or β indicate the photon polarization. Explicitly, α or β can be H, V, +, − for polarizations of horizontal, vertical, π/4 and 3π/4, respectively. To indicate the corresponding polarization state, we simply put each of these symbols inside a ket.

Definition 4: Events' probability conditional on the two-pulse state of Alice and Bob's source:. It is the probability that event (i, j) happens conditional on that Alice sends out photon-number state ρA with polarization α and Bob sends out photon number state ρB with polarization β. Sometimes we simply use for simplicity.

B. Elementary formulas and outline for the model

Given the definitions above, we now formulate various conditional probabilities. We start with the probability of event (i, j) conditional on the output state |lilj〉.

Here the detection efficiency does not appear because we put shall this into the channel loss and hence we assume perfect detection efficiency. The factor (1 − d)2 comes from the fact that we request detectors other than i, jnot to click. Also, the probability for event (i, j) is 0 if any mode other than i, j is not vacuum. Given these, we can now calculate probability distribution of the various two fold events given arbitrary input states of the beam-splitter. Therefore, for any output state of the beam-splitter ρout, the probability that event (i, j) happens is

Based on this important formula, we can calculate the probability of event (i, j) for any input state by this formula. For the purpose, we only need to formulate ρout. Therefore, given the source state of the two pulses , we can use the following procedure to calculate the probability of event (i, j), :

  1. i

    Using the linear channel loss model to calculate the two-pulse state when arriving at the beam-splitter. Explicitly, if the channel transmittance is η, any state |n〉 〈n| is changed into

  2. ii

    Using the transformation: to calculate the output state of the beam-splitter, ρout.

  3. iii

    Using Eq.(2) to calculate the probability of event (i, j). According to the protocol, we shall only be interested in the probabilities of successful events, (1, 2), (3, 4), (1, 4) and (2, 3). Below we will describe the detailed calculation processes in Z basis and X basis individually.

In Z basis, all successful events correspond to correct bit values when Alice and Bob send out orthogonal polarizations and they correspond to wrong bit values when Alice and Bob send out the same polarizations. The observed gain in Z basis for photon-number state is,

and the set Suc = {(1, 2), (3, 4), (1, 4), (2, 3)}. Here, as defined in Definition 4, represents the probability of event (i, j) whenever Alice sends her photon number state ρA with polarization α and Bob sends his photon number state ρB with polarization β. For simplicity, we shall omit in brackets or in subscripts if there is no confusion. Meantime, the successful events caused by the same polarizations will be counted as wrong bits. These will contribute to the bit-flip rate by:

In X basis, we should be careful that the situation is different from in Z basis, since now the successful events correspond to correct bits include two parts: 1) Alice and Bob send out the same polarizations (++ or −−) and Charlie detects Φ+ ((1,2) or (3,4) events happen); 2) Alice and Bob send out orthogonal polarizations (+− or −+) and Charlie detects Ψ ((1,4) or (2,3) events happen). And the left successful events belong to wrong bits. Therefore, we have

and

Moreover, there are alignment errors which will cause a fraction (Ed) of states to be flipped. We then modify the error rate in different bases by

and

Note that in the above two formulas above, we have considered this fact: before taking the alignment error into consideration, the successful events can be classified into two classes: one class has no error and the other class has an error rate of 50%, they are totally random bits. The second class takes a fraction of 2EZ (or 2EX) among all successful events. Alignment error does not change the error rate of the second class of events, since they are random bits only.

Given these, we can simulate the final key rate. In a model of numerical simulation, our goal is to deduce the probably would-be value for SZ, SX and EZ, EX in experiments. One can then calculate the yield of the single-photon pairs, s11, the bit-flip rates in Z basis and X basis and hence the final key rate. Now everything is reduced to calculate all above.

C. Conditional probabilities for beam-splitter's incident state of k1 photons in mode a and k2 photons in mode b

We consider the case that there are k1 incident photons in mode a and k2 incident photons in mode b of the beam-splitter. Each incident pulse of the beam-splitter has its own polarization and is indicated by a subscript. In general, we consider the state

We shall consider the conditional probabilities for various successful events, i.e. . Since we only consider the incident state of k1 photons in mode a and k2 photons in mode b, we shall simply use for in what follows.

  1. i

    in Z basis

    First, we consider the following two-mode state

    as the input state of the beam-splitter. After BS, the output state |ψ〉 is

    Therefore

    According to Eq.(2), the conditional probability for event (1,2) is

    Similarly, we have

    Note that here P(ij|kmkn) is just P(ij|li = km, lj = kn) when l1 = k1 as defined by our Definition 2 in previous section. For example, P(23|k2k1) is actually P(23|l2 = k2, l3 = k1). Similarly, if the beam-splitter's input state is |k1V|k2H, i.e. k1 vertical photons in mode a and k2 horizontal photons in mode b, we have

    Next we consider the following two-mode state

    as the input state of the beam-splitter. After the beam-splitter, it changes into:

    We have the following uniform formula for probabilities of any successful events:

    Similarly, when the beam-splitter's input pulses are both vertical, we can find the value for .

  2. ii

    X basis

    We first consider the beam-splitter's input state of |k1+|k2, i.e., there are k1 photon with π/4 polarization in mode a and k2 photons with 3π/4 polarization in mode b. Note that .

    The output state of the beam-splitter is

    We have

    where

    and min{li, k1(k2)} is the smaller one of li and k1(k2). Thus we can calculate the conditional probabilities by

    Hence

    for i = 1, j = 2 and i = 3, j = 4; and

    for i = 1, j = 4 and i = 2, j = 3. Besides, it is easy to show

    If the polarization of incident pulses of the beam-splitter are both π/4, then the output state is

    We find

    for i = 1, j = 2 and i = 3, j = 4; and

    for i = 1, j = 4 and i = 2, j = 3. Also, we have

D. Probabilities of events conditional on source states

In the above subsection, we have formulated the probabilities of various events conditional on a pure input state |k1〉|k2〉. In fact, the results can be easily extended to the more general case when the beam-splitter's input state is a mixed state. Say,

Suppose the polarizations of mode a, b are α, β, respectively. We then have

where is the same as defined in the previous subsection, for all possible polarizations (α, β) = (H, V), (V, H), (H, H), (V, V), (+, −), (−, +), (+, +), (−, −). To formulate the probabilities conditional on any source states, we only need to relate the source state with the beam-splitter's input state. Suppose the source state in photon-number space is and

After some loss channel, the state changes into the beam-splitter's input state as Eq.(30). Suppose the transmittance for the channel between Alice (Bob) and UTP is ηAB). Using the linear loss model of Eq. (3) we have

We now arrive at our major conclusion:

Major conclusion: Formulas of in the earlier subsection together with Eqs. (31,33) complete the model of probabilities of different events conditional on any source states, i.e., the gains. Using Eqs. (8,9), one can also model the observed error rates of any source states.

E. 3-intensity decoy-state MDI-QKD

Using the Major conclusion above, we can model the gains and the error rates with a 3-intensity decoy-state MDI-QKD method42,43. We assume that Alice (Bob) has three intensities in their source states, denoted as 0, μA, . Denote ρxy) as the density operator for source x (y) at Alice's (Bob's) side and x (y) can take any value from 0, μA, .

Then we have the expression for the low bound of the yield of single-photon pulse pairs

and their upper bound of the phase flip-error rate

With the results above, now we can calculate the key rate with the formula38,42,43

Numerical simulations

Using all the above correspondence, we can numerically simulate the gains and error rates of any source states. Taking as an example, we consider the source of a HSPS from parametric down-conversion processes42. It originally has a Poissonian photon number distribution when pumped by a continuous wave (CW) laser42, written as:

where x is the the average intensity of the emission light. However, after chosen a proper gating time and triggered with a practical single photon detector, a sub-Poissonian distributed source state can be obtained, which can be expressed as:

where PCor is the correlation rate of photon pairs, i.e., the probability that we can predict the existence of a heralded photon when a heralding one was detected; di is the dark count rate of the triggering detector.

In the following numerical simulations, for simplicity, we assume the UTP lies in the middle of Alice and Bob and all triggering detectors (at Alice or Bob's side) have the same detection efficiency (75%) and the same dark count rate (10−6). We also assume all triggered detectors (at the UTP's side) have the same detection efficiency (they are attributed into the channel loss) and the same dark count rate (3 × 10−6). Besides, we set reasonable value for the system misalignment probability Ed = 1.5% and for the correlation rate of photon pairs PCor = 0.415.

Fig. 2(a) and (b) each shows the relative low bound of and the upper bound of changing with channel loss for different source states, i.e., the weak coherent sources (W), the possonian heralded single photon sources (P) and the sub-possonian heralded single photon sources (S). The solid line represents the result of using infinite number of decoy state method (W0) and the dashed or dotted lines (W1, P1 or S1) are the results of using three-decoy state method.

Figure 2
figure 2

(a) The relative lower bound of and (b) the upper bound of for different photon sources. The solid lines (W0) represent the results of using infinite-decoy state method and the dashed or dotted lines (W1, P1 or S1) represent using three-decoy state method. Besides, W, P or S each corresponds to the scheme of using weak coherent sources38, possonian heralded single photon sources15 or sub-possonian heralded single photon sources42, individually. Here the superscript X represents in X basis and at each point, we set μ = 0.05 and optimize the value for μ′.

Similar to Fig. 2(a) and (b), Fig. 3(a) and (b) each shows corresponding values of the gains () and the quantum bit-error rates (QBER) () of the signal pulses in Z basis for different source states. And Fig. 4 presents the final key rate changing with channel loss.

Figure 3
figure 3

(a) The gain and (b) the quantum error-bit rate of the signal pulses in Z basis for different photon sources. The solid lines (W0) represent the results of using infinite-decoy state method and the dashed or dotted lines (W1, P1 or S1) represent using three-decoy state method. Besides, W, P or S each corresponds to the scheme of using weak coherent sources, possonian heralded single photon sources15 or sub-possonian heralded single photon sources42, individually. Here at each point, we set μ = 0.05 and optimize the value for μ′.

Figure 4
figure 4

(a) The final key rate for different photon sources. The solid lines (W0) represent the results of using infinite-decoy state method and the dashed or dotted lines (W1, P1 or S1) represent using three-decoy state method. Besides, W, P or S each corresponds to the scheme of using weak coherent sources, possonian heralded single photon sources15 or sub-possonian heralded single photon sources42, individually. Here at each point, we set μ = 0.05 and optimize the value for μ′.

See from Fig. 4, we find that the sub-possonian heralded single photon sources can generate the highest key rate at lower or moderate channel loss (≤64 dB). Because within this range, its signal state has a lower QBER than in the weak coherent sources and a higher gain than in the possonian heralded single photon sources as simulated in Fig. 3 (a) and (b). However, at larger channel loss (≥64 dB), the possonian heralded single photon source shows better performance than the other two, this is mainly due to its much lower vacuum component which may play an essential role in the key distillation process when suffering from lager channel loss.

Conclusions

In summary, we have presented a model for simulating the gains, the error rates and the key rates for MDI-QKDs, which can be applicable to the schemes of using arbitrary probabilistic mixture of different photon states or using any coding methods. This facilitates the performance evaluation of the MDI-QKD with phase randomized general sources and thus makes it a valuable tool for devising high efficient QKD protocols and for studying long distance quantum communications.