Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Letter
  • Published:

Practical quantum key distribution protocol without monitoring signal disturbance

Abstract

Quantum cryptography1,2,3,4,5,6,7,8 exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper’s intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol9,10. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables11. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol12,13,14, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

This is a preview of subscription content, access via your institution

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

Figure 1: Basic idea behind the proposed QKD scheme.
Figure 2: Practical implementation of the proposed QKD scheme.
Figure 3: Key rates versus channel transmission.

Similar content being viewed by others

References

  1. Bennett, C. H. & Brassard, G. in Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing 175–179 (IEEE Press, 1984)

    Google Scholar 

  2. Ekert, A. K. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661–663 (1991)

    Article  ADS  MathSciNet  CAS  Google Scholar 

  3. Bennett, C. H. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)

    Article  ADS  MathSciNet  CAS  Google Scholar 

  4. Bruß, D. Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018–3021 (1998)

    Article  ADS  Google Scholar 

  5. Scarani, V., Acín, A., Ribordy, G. & Gisin, N. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)

    Article  ADS  Google Scholar 

  6. Stucki, D., Brunner, N., Gisin, N., Scarani, V. & Zbinden, H. Fast and simple one-way quantum key distribution. Appl. Phys. Lett. 87, 194108 (2005)

    Article  ADS  Google Scholar 

  7. Inoue, K., Waks, E. & Yamamoto, Y. Differential-phase-shift quantum key distribution using coherent light. Phys. Rev. A 68, 022317 (2003)

    Article  ADS  Google Scholar 

  8. Grosshans, F. & Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88, 057902 (2002)

    Article  ADS  Google Scholar 

  9. Cai, R. Y. & Scarani, V. Finite-key analysis for practical implementations of quantum key distribution. New J. Phys. 11, 045024 (2009)

    Article  ADS  Google Scholar 

  10. Hayashi, M. & Nakayama, R. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths. Preprint at http://arxiv.org/abs/1302.4139 (2013)

  11. Koashi, M. Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11, 045018 (2009)

    Article  ADS  MathSciNet  Google Scholar 

  12. Hwang, W.-Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)

    Article  ADS  Google Scholar 

  13. Lo, H.-K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)

    Article  ADS  Google Scholar 

  14. Wang, X.-B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)

    Article  ADS  Google Scholar 

  15. Shor, P. W. & Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)

    Article  ADS  CAS  Google Scholar 

  16. Pawlowski, M. et al. Information causality as a physical principle. Nature 461, 1101–1104 (2009)

    Article  ADS  CAS  Google Scholar 

  17. Takesue, H. et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors. Nature Photon. 1, 343–348 (2007)

    Article  ADS  Google Scholar 

  18. Tamaki, K., Koashi, M. & Kato, G. Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization. Preprint at http://arxiv.org/abs/1208.1995 (2012)

  19. Mayers, D. Unconditional security in quantum cryptography. J. ACM 48, 351–406 (2001)

    Article  MathSciNet  Google Scholar 

  20. Hayashi, M. & Tsurumaru, T. Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths. New J. Phys. 14, 093014 (2012)

    Article  ADS  Google Scholar 

  21. Tomamichel, M., Lim, C. C. W., Gisin, N. & Renner, R. Tight finite-key analysis for quantum cryptography. Nature Commun. 3, 634 (2012)

    Article  ADS  Google Scholar 

  22. Bourgoin, J. et al. A comprehensive design and performance analysis of low earth orbit satellite quantum communication. New J. Phys. 15, 023006 (2013)

    Article  ADS  Google Scholar 

  23. Nauerth, S. et al. Air-to-ground quantum communication. Nature Photon. 7, 382–386 (2013)

    Article  ADS  CAS  Google Scholar 

  24. Wang, J.-Y. et al. Direct and full-scale experimental verifications towards ground-satellite quantum key distribution. Nature Photon. 7, 387–393 (2013)

    Article  ADS  CAS  Google Scholar 

  25. He, Y.-M. et al. On-demand semiconductor single-photon source with near-unity indistinguishability. Nature Nanotechnol. 8, 213–217 (2013)

    Article  ADS  CAS  Google Scholar 

  26. Yuan, Z. et al. Electrically driven single-photon source. Science 295, 102–105 (2002)

    Article  ADS  CAS  Google Scholar 

  27. Claudon, J. et al. A highly efficient single-photon source based on a quantum dot in a photonic nanowire. Nature Photon. 4, 174–177 (2010)

    Article  ADS  CAS  Google Scholar 

  28. Huttner, B., Imoto, N., Gisin, N. & Mor, T. Quantum cryptography with coherent states. Phys. Rev. A 51, 1863–1869 (1995)

    Article  ADS  CAS  Google Scholar 

  29. Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330–1333 (2000)

    Article  ADS  CAS  Google Scholar 

  30. Gottesman, D., Lo, H.-K., Lütkenhaus, N. & Preskill, J. Security of quantum key distribution with imperfect device. Quant. Inf. Comput. 4, 325 (2004)

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

We thank H. Takesue and K. Tamaki for helpful discussions. This work was supported by the Funding Program for World-Leading Innovative R & D on Science and Technology (FIRST), Grant-in-Aid for Scientific Research on Innovative Areas number 21102008 (MEXT), and Photon Frontier Network Program (MEXT).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the initial conception of the ideas, to the working out of details, and to the writing and editing of the manuscript.

Corresponding author

Correspondence to Masato Koashi.

Ethics declarations

Competing interests

The authors declare no competing financial interests.

PowerPoint slides

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sasaki, T., Yamamoto, Y. & Koashi, M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature 509, 475–478 (2014). https://doi.org/10.1038/nature13303

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/nature13303

This article is cited by

Comments

By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing