Tools for the Performance Optimization of Single-Photon Quantum Key Distribution

Quantum light sources emitting triggered single photons or entangled photon pairs have the potential to boost the performance of quantum key distribution (QKD) systems. Proof-of-principle experiments affirmed these prospects, but further efforts are necessary to push this field beyond its current status. In this work, we show that temporal filtering of single-photon pulses enables a performance optimization of QKD systems implemented with realistic quantum light sources, both in experiment and simulations. To this end, we analyze the influence of temporal filtering of sub-Poissonian single-photon pulses on the expected secret key fraction, the quantum bit error ratio, and the tolerable channel losses. For this purpose, we developed a basic QKD testbed comprising a triggered solid-state single-photon source and a receiver module designed for four-state polarization coding via the BB84 protocol. Furthermore, we demonstrate real-time security monitoring by analyzing the photon statistics, in terms of $g^{(2)}(0)$, inside the quantum channel by correlating the photon flux recorded at the four ports of our receiver. Our findings are useful for the certification of QKD and can be applied and further extended for the optimization of various implementations of quantum communication based on sub-Poissonian quantum light sources, including measurement-device-independent schemes of QKD as well as quantum repeaters. Our work represents an important contribution towards the development of QKD-secured communication networks based on quantum light sources.


INTRODUCTION
Privacy in communication is an increasingly important challenge in our information-driven society [1]. The concepts gathered in the field of quantum communication [2][3][4] represent solutions to this challenge and enable information theoretical secure communication. Quantum key distribution (QKD) for instance enables the tapproof encryption of data, by exploiting quantum properties of light [5,6]. The respective quantum light sources ideally required for QKD, however, had been impossible to fabricate with sufficient brightness and quality for a long time. Most implementations of QKD are therefore still implemented with weak coherent pulses (WCPs), i.e. attenuated lasers, requiring so-called decoy-state protocols [7,8]. During the last decade, however, tremendous progress has been made in the fabrication of quantum light sources. Single-photon sources (SPSs) based on epitaxial semiconductor quantum dots (QDs) nowadays can be triggered at GHz clock rates under pulsed-optical [9] and -electrical [10,11] excitation, feature high degrees of photon indistinguishability [12,13], large photon extraction efficiencies [11,14,15], and to date achieve the highest single-photon purity in terms of g (2) (0) compared to any other single-photon emitter [16,17]. The development of deterministic fabrication technologies had particular large impact for these developments, as summarized in a recent review article in [18]. Despite this immense progress, only few proof-of-concept QKD experiments have been reported based on optically [19][20][21][22][23][24] and electrically [25,26] operated single-photon sources. These experiments affirmed the potential sub-Poissonian light sources offer for QKD. To push the field of sub-Poissonian QKD to a new level, however, further efforts need to be undertaken. In particular practical methods for the security analysis and certification as well as measures to improve the performance of QKD systems for a given quantum light source need to be developed. While Waks et al. discussed security aspects of QKD with sub-Poissonian light sources from a theoretical viewpoint [27], experimental studies on this important topic are still missing.
In this work, we perform a detailed analysis on the influence of temporal filtering of single-photon pulses on the performance of QKD systems implemented with sub-Poissonian light sources. For this purpose we set up a basic QKD testbed comprising a QD-based SPS and a receiver module designed for four-state polarization coding via the BB84 protocol. Using this Bob module in combination with our SPS, we determine the sifted key fraction, the quantum bit error ratio (QBER) caused by the receiver, and the g (2) (0) of the single-photon pulses inside the quantum channel, to finally extract the secure key rate expected in full implementations of QKD. As the temporal filtering of single-photon pulses differently affects these parameters, a performance optimization of QKD systems implemented with quantum light source is possible. We show that optimal performance for a given SPS can be achieved by carefully setting Bob's acceptance time windows, depending on the pulse shape and noise level. This can be either used to maximize the se-cure key rate for a given channel loss or to extend the maximally tolerable loss, i.e. the achievable communication distance. In addition, we demonstrate real-time security monitoring by analyzing the suppression of multiphoton emission events, i.e. g (2) (0) of the single-photon pulses inside the quantum channel during key generation. Finally we generalize our findings by employing simulations with synthetic pulse shapes, providing predictions for different SPSs and detectors. We consider the results presented in this work an important contribution towards the development of QKD-secured communication networks based on quantum light sources. Importantly, our approach can be easily applied and further extended for the optimization of any implementation of quantum communication based on sub-Poissonian quantum light sources.

QKD testbed
The QKD testbed used for our experiments is illustrated in Fig. 1 (a). On transmitter side, Alice is represented by a triggered SPS, comprising a single preselected QD embedded in a deterministically fabricated microlens [28] providing enhanced photon collection efficiency (see Methods for details). As depicted in Fig. 1 (b) this device emits single photons at an emission wavelength of 918 nm with low multi-photon emission probability reflected in an antibunching of g (2) (0) = 0.089 ± 0.002. The non-ideal g (2) (0) is a consequence of the simple excitation scheme (p-shell excitation) used in our present work, and can be further improved using strict resonant pumping of the quantum emitter. The polarization state of the emitted photons is set by a highextinction-ratio linear-film polarizer and a lambda-half waveplate, respectively, preparing single-photon pulses in horizontal (H), vertical (V), diagonal (D), and antidiagonal (A) polarization. On receiver side, Bob comprises a four-state polarization analyzer with passive basis choice. Single-photon counting modules based on silicon avalanche photon diodes, time-tagging electronics and a custom made control software is used for polarization-resolved single-photon detection, data acquisition, and postprocessing. The Bob module is integrated into a portable 19-inch rackbox presented in Fig. 1 (c) (see Methods for details). In the following, we investigate the performance of this QKD testbed assuming an implementation of the BB84 protocol by analyzing the achievable QBER, single-photon purity g (2) (0) and secret key rate.
First we investigate the limit our Bob module introduces to the total QBER expected in a full implementation. For this purpose, we record the photon arrival time distribution at the four detection channels of Bob for all four possible input polarizations of the SPS. The corresponding experimental data are shown in Fig. 1 (d) in a 4x4 matrix representation, where the distributions within one row are normalized to the peak maximum of the curve in the respective diagonal element. Ideally, for a given input polarization (e.g. H) of one basis (H-V), one would expect only detection events in the respective channel at Bob's side (H), while the channel with orthogonal polarization (V) should be empty. Detection events in the other basis (D-A) should be equally distributed, due to the statistically random projection of the photons polarization. From the measured matrix in Fig. 1 (d) this appears to be well reproduced in the experiment. A closer look in Fig. 1 where q denotes the error contributions due to Bob's optical imperfections, p signal is the probability to observe a signal event, p dc the probability for a dark count event, and p click the overall probability for a click [27]. Furthermore, the distributions of photons projected in the wrong basis, i.e. D photons detected in the H channel and vice versa, are not equally distributed as ideally expected. Instead, the probability to detect an H (V) photon in the D (A) basis is higher compared to the case of detecting D (A) photons in the H(V) basis. This is a result of a detection efficiency mismatch across the four detection channels, which is caused by slightly varying transmission losses in the optical paths and different quantum efficiencies of the detector modules. Please note, that the detection efficiency mismatch is important to consider in the security analysis of full implementations of QKD, as it leads to a reduced tolerable QBER [29].

Performance optimization via temporal filtering
In the following, we analyze the impact of the temporal filtering of the raw sifted key on the performance of our single-photon QKD testbed. Experimentally, the error contribution in the H-channel is calculated via denote the number of clicks in H and V polarization, respectively, detected within an acceptance time window of width ∆t centered at time t c . Note here, that we calculate the QBER by its definition using all events recorded in the respective acceptance time window, while it has to be carefully estimated in full implementations using subsets of bits [30]. Restricting the acceptance time window, the signal-to-noise-ratio can be enhanced, as noise due to detector dark counts can be filtered effectively [26,31]. Fig. 2 (a) exemplarily illustrates the measured photon arrival time probability distributions at both detectors of the H-V basis (H-polarized single-photon input) together with an acceptance time window ∆t = 2.5 ns centered at the pulse maximum (t c = 6.25 ns). Evaluating QBER H (∆t, t c ) by applying a temporal filter to the recorded time-tags, the QBER and the fraction F of the sifted and filtered photon detection events can be extracted as a function of ∆t (see Fig. 2 (b)). Restricting the acceptance time window ∆t leads first of all to a reduction of the sifted key, as portions of the overall signal are discarded. At the same time the contribution of the detector dark counts is reduced, leading to a de-crease of QBER H towards small ∆t. At ∆t = 1.7 ns a local minimum with QBER H = 0.48% limited by optical imperfections inside the receiver is observed. This value can be further improved, e.g. by using polarization beam splitters based on Wollaston prisms enabling higher extinction ratios compared to beampslitter cubes with dielectric coating. Note, that the global minimum in QBER H at ∆t = 0.05 ns is not taken into account, due to the vanishing sifted key. The remaining three channels of the Bob module show similar behavior (see Supplementary Note 1). Note, that the single-photon pulses at Bob need to be synchronized carefully for both channels of one basis to achieve optimum performance (see Methods section 'Postprocessing').
Next, and in contrast to WCP-based implementations, the photon statistics needs to be taken into account in the security analysis for sub-Poissonian quantum light sources. The multi-photon probability p m inside the quantum channel is governed by g (2) (0) via . Applying temporal filtering, noise due to detector dark counts can be reduced. (b) QBER and sifted key fraction F as a function of the acceptance time window width ∆t for fixed window center tc. (c) Impact of the temporal filtering on the g (2) (0). Each correlation histogram g (2) (τ ) is calculated from the raw recorded time-tags of all four detection channels after applying the temporal filter to the data for an evaluation time of 360 s. This evaluation time corresponds to the first data point in Fig.4 (d). (d) Expected secret key rate fraction S(∆t, tc) as a function of the temporal width ∆t and the center tc of the acceptance time window. For the analysis the QBER and the sifted key fraction were considered in a two-dimensional parameter space (∆t, tc) (see Supplementary Note 2), while g (2) (0) was fixed to its unfiltered value (cf. discussion in main text).
where µ is the mean photon number per pulse Alice couples to the quantum channel [27].
In our QKD testbed we obtain the photon autocorrelation g (2) (τ ) by directly correlating the temporally filtered time-tags recorded at all four detection channels of Bob (see Methods). The resulting g (2) (τ ) histograms are exemplary shown in Fig. 2 (c) for the case of three different acceptance time windows. Narrowing the temporal filter, the antibunching improves from 0.104 ± 0.017 at ∆t = 12.50 ns to 0.032 ± 0.007 at ∆t = 2.5 ns (see Supplementary Note 3 for further analysis). This trend is explained by the temporal filtering of two-photon emission events due to a finite probability for the re-excitation of the quantum emitter outside the acceptance time window. This effect can be used in principle to further enhance the security and the performance of QKD systems based on realistic sub-Poissonian light sources. To benefit from the temporal filtering of g (2) (0) at Bob, however, an active gating (e.g. via an amplitude modulator) or at least monitoring of g (2) (0) would be necessary at Al-ice side, due to possible photon number splitting attacks outside the acceptance time window. This is an interesting perspective not considered in previous work. Due to the experimentally more demanding implementation, however, we use the g (2) (0) as obtained from the timetags of the complete repetition period from now on. Also note, that our approach of evaluating g (2) (τ ) is different from reports, where post-selected values of g (2) (0) are generated by the temporal filtering of g (2) (τ ) after performing the correlation measurement [17,32]. Our routine only considers photon detection events used for secure key distillation in the end.
Exploiting temporal filtering as discussed above, the overall performance of a QKD implementation based on single-photon sources can be optimized as we will demonstrate in the following. For this purpose, a trade-off needs to be found between low QBER and high sifted key fractions on the other hand. In addition, a symmetric temporal filter as chosen above is not sufficient in general, due to the asymmetry in the photon arrival time distribution of the single-photon pulses. To this end, we perform a two-dimensional (2D) analysis by varying the temporal width ∆t and the center t c of the acceptance time window. The 2D analysis is performed for the QBER H (∆t, t c ) and the sifted fraction F H (∆t, t c ) (see Supplementary Note 2 and 3). From these quantities, we finally extract the normalized secret key rate S(∆t, t c ) expected in a full implementation of BB84 QKD according to [27] Here, the factor 1/2 stems from the sifting procedure, p click is the click-rate on the detectors, e the QBER, β the fraction of the detection events caused by single photons, τ (e) the compression function accounting for Eve's possible attacks, h(e) the binary Shannon-entropy, and f (e) the error correction efficiency [27]. The expected backto-back secret key rate calculated from Eq. 3 is presented in Fig. 3 (a). A small ∆t leads to a small QBER but also to a small sifted fraction. An acceptance window within a region governed by noise does not allow for a secret key distribution at all. The optimal value for our measurement does only need to discard a small part of the signal. Depending on the length of the single-photon pulses and the detector noise level, however, temporal filtering can have crucial impact on the resulting back-to-back secure key, as demonstrated in simulations discussed further below.
The secure communication distance achievable with a given QKD system is of superior importance. Based on the secret key analysis performed in Fig. 2 (d), we calculated the rate-loss dependencies accounting for our experimental conditions (see Methods). Fig. 3 illustrates the expected secret key per pulse as a function of the losses inside the quantum channel for different temporal filters. In the low-loss regime (< 20 dB) optimum backto-back performance is achieved for our SPS by using the full acceptance time window (∆t = 12.5 ns), as already discussed above. The maximal tolerable loss, however, is limited to 28.28 dB in this case. In the asymptotic case, the range could in principle be extended indefinitely by applying an asymptotic small temporal filtering and therefore enhancing the signal-to-noise ratio (SNR). In practice this is not possible. First, there is the finite temporal resolution of realistic device. The smallest possible timewindow in our system is lower bounded by the 1 ps digitization of the times tags. Second, the reduction in sifted key by further and further narrowing the width of the acceptance time window renders the system impractical as well. The reduction to ∆t = 1 ns enhances the tolerable losses to 35.15 dB by decreasing the sifted fraction to 55 %. A further reduction down to ∆t = 0.25 ns, already below the detector timing resolution, further enhances the tolerable losses to 37.98 dB but reduces the sifted fraction further down to 24 % (see also Fig. 2 (b)). Therefore, for our system by applying a reasonable temporal filter, the achievable maximal tolerable loss inside the quantum channel can be enhanced to over 35 dB for an optimized filter setting (∆t = 1.00 ns, t c = 0.25 ns). This corresponds to a QKD range extension of 24 %. This transmission range extension is possible due to the improvement in signal-to-noise ratio resulting from the temporal filtering (see Supplementary Note 4). This transmission range extension could be even further enhanced by exploiting the temporal filtering and monitoring of g (2) (0) on Alice's side, as discussed with Fig. 2 (c). Assuming a single-photon source of similar performance with an emission wavelength of 1310 nm and 1550 nm, respectively, extensions for the secure communication distance by 22.2 km (to a distance of 113.4 km) and 40.4 km (to a distance of 206.8 km) are expected, for state-ofthe-art single-mode fiber (Corning SMF28-ULL) with 0.31 dB/km and 0.17 dB/km at 1310 nm and 1550 nm, respectively.
To assess the robustness of our SPS against transmission losses, we further analyzed its device performance in our QKD testbed in terms of the mean photon number per pulse µ (i.e. its efficiency) into the quantum channel. As derived in Ref. [27], a critical value µ c = 2p dc /g (2) (0) can be estimated above which a sub-Poissonian light source with a given g (2) (0) is able to achieve the same maximally tolerable loss as the same source but with unity efficiency (µ = 1). Based on our experimental results from Fig. 2 (d) we estimated µ c = 0.0053 for the maximal width of the acceptance time window corresponding to a tolerable loss of T min = 33.24 dB (see also Fig. 3). The experimental mean photon number per pulse µ = 0.0043 our SPS delivers into the quantum channel (cf. Methods) therefore deviates by only 18 % from this critical value, leading to a slightly reduced maximal tolerable loss (cf. Fig. 3). Also note, that the µ achieved in our QKD testbed is comparable to previous implementations of single-photon QKD by Waks et al. with µ = 0.007 [19], although we do not reach the performance of more recent implementation by Takemoto et al. [33] with µ = 0.050. The considerations above show, that the requirements for maximum robustness against transmission losses can be fulfilled by relatively modest improvements of our source efficiency. To outperform WCP-based based implementations with sub-Poissonian light sources, however, a simple estimation leads to the requirement µ > 0.3 (see Methods for details). The value µ > 0.3 thereby is a pessimistic upper bound, which is further reduced if the QBER is not negligible. Also, finding tighter bounds for the multiphoton emission probability as a function of g (2) (0) will give a tighter bound on µ. Recent experimental progress showed that this efficiency threshold is within reach using existing technologies using state-of-the-art deterministically fabricated solid-state quantum light sources [34].
Importantly, the optimization routine presented above can be adapted and extended for most other applications in quantum communication employing realistic quantum light sources, including future implementations of multiuser quantum networks based on measurement-deviceindependent QKD [35] or multi-dimensional memorybased quantum repeaters [36].

Real-time photon statistics monitoring
In future QKD-secured networks implemented with quantum light sources, g (2) (0) inside the quantum channel needs to be monitored in real time to enable secret key distillation. Until now, most reports on singlephoton QKD measured g (2) (0) separately and independently from the key generation/distribution process, using for instance a Hanbury-Brown and Twiss setup on Alice's side. Applying our approach for the optimization via temporal filtering presented above, we are able to also monitor g (2) (0) in real-time and for each block used for secret key distillation. For this purpose, we conducted a proof-of-principle experiment by recording time-tags over a period of 90 minutes with fixed input polarization H of our SPS. Based on the recorded events, we first analyze the confidence of determining g (2) (0) from our data. If the evaluation accumulation time is too short, the g (2) (0) may be over or underestimated. In the case of an overestimation this leads to reduced performance and in the case of overestimation this could lead to information leakage compromising the security. Fig. 4 (a) depicts the g (2) (0) of our SPS evaluated via Bob together with the corresponding sifted block size as a function of the accumulation time. As expected, the error decreases with increasing accumulation time. The value of g (2) (0) converges to g (2) (0) = 0.089 ± 0.002 for accumulation times approaching the entire measurement period. Fig. 4 (b) and (c) additionally show the countrates of the four detection channels and the extracted QBER H during the 90-min measurement period confirming stable conditions for the photon collection efficiency. Interestingly, a closer look at Fig. 4 (a) reveals that the extracted g (2) (0) does not perfectly match the converged value (within its error) for certain ranges of accumulation times. This behavior could be related to slight changes of the properties of Alice (i.e. the SPS itself or the experimental setup) over time, which are important to consider for full implementations of quantum communication. Next, we demonstrate real-time monitoring of g (2) (0) inside the quantum channel evaluating the time-tags from Bob. Comparison with Fig. 4 (a) reveals, that for 10 s of accumulation time the obtained g (2) (0) is close to the converged value but the uncertainty is far too large (43 %). For 60 s the error margin is significantly reduced to 16 % and the block size should already be enough to allow for a secret key distillation incorporating finite-key size effects [37]. Choosing 360 s accumulation time, the uncertainty is further reduced to 6 % and the sifted block size would already allow secret key distillation by neglecting finite-key size effects. Fig. 4 (c) presents the time traces of g (2) (0) for two different choices of the accumulation time of 60 s and 360 s (cf. markers in Fig. 4 (a)) corresponding to sifted block sizes of 1.47, and 8.93 Mbit at the first measurement point. The real-time monitoring of g (2) (0) presented above, previously only been used for coherent and bunched light sources [38,39], enables us to perform a reliable security analysis in future QKD experiments, by taking into account the photon statistics of single-photon pulses used for secret key distillation. In addition, the ability to monitor the photon statistics in real time allows for reacting on changes in the source itself or on various types of attacks if g (2) (0) is additionally monitored on Alice side. In case of photon number splitting attacks, for instance, an eavesdropper would artificially reduce g (2) (0) inside the quantum channel, which could be detected comparing g Alice (0) and g (2) (0) Bob . Moreover, any attack where the eavesdropper uses a light source with photon statistics different from the one of the QKD implementation could easily be detected.

Simulations
To extend the scope of our approach for the performance optimization of single-photon QKD systems beyond the specific properties of our testbed, we additionally performed simulations on the secret key fraction expected for different single-photon sources and detectors. For this purpose, we modeled the photon arrival time distributions of the single-photon pulses with a synthetic pulse shape and varied the decay time constant as well as the noise level (see Methods). For the sake of clarity, we limit ourselves to four regimes: (1) Low noise and short lifetime, (2) high noise and short lifetime, (3) low noise and long lifetime, and (4) high noise and long lifetime, with short and long referring to the clock-rate. The simulation results for the secret key fraction S(∆t, t c ) are presented in a two-dimensional parameter space in Fig. 5, assuming an ideal single-photon source (g (2) (0) = 0). In all four cases the temporal filtering enables one to find an optimal trade-off between sifted-key and QBER. Hence the secret key rate can be maximized by correctly choosing the settings of the temporal filter, resulting in a performance optimization of the QKD system. The gain in secret key rate compared to the case without applying a temporal filter is 2.5 % in case (1), 184.5 % in case (2), 6.0 % in case (3), and 148.3 % in case (4). Substantial improvements are achieved in the cases with high noise levels ( (2) and (4)), corresponding to the regime of high transmission channel losses. Therefore, the optimization via temporal filtering becomes particular important in long distance QKD with noisy detectors. Using stateof-the-art superconducting single-photon detectors [40], the noise can be drastically reduced [41]. Many practical QKD scenarios, however, will not be able to provide the infrastructure for liquid-helium or closed-cycle refrigerators required for these detectors to date.

DISCUSSION
We have demonstrated that temporal filtering of single-photon pulses is a viable tool to optimize the performance of QKD implementations based on sub-Poissonian quantum light sources. Using a basic QKD testbed comprising a solid-state based triggered SPS and a receiver module for four-state polarization coding, we showed that carefully setting the acceptance time windows enables one to maximize the achievable back-toback secure key rate or the maximally tolerable transmission loss inside the quantum channel. Our optimization routine is particular beneficial in the high loss regime characteristic for long distance QKD. Additionally, we showed real-time security monitoring by evaluating the photon statistics of our SPS in terms of g (2) (0) during the key generation.
The routines developed in our work with a basic BB84-QKD testbed are readily applicable for various implementations of quantum communication employing realistic quantum light sources, including measurement deviceindependent QKD and quantum repeaters, and are useful for certification of QKD [42]. Furthermore, the temporal filtering and real-time monitoring of sub-Poissonian light pulses opens up new possibilities for improving the performance taking detection flaws into account. Using SPSs for QKD, an attacker is forced to use a SPS as well. This in turn reduces the penalty on the achievable secret key rate taking detection flaws into account [29]. Even advanced non-linear attacks influencing or even controlling the photon statistics inside the quantum channel can be detected, by additionally monitoring g (2) (0) on Alice' side. With respect to full implementations of QKD, further extensions are required, taking side-channel attacks [26,43] or finite-key effects [44][45][46] into account. As the temporal filtering reduces the amount of key material that can be generated, finite-key size effects are getting increasingly important.

Single-Photon Source
The SPS on Alice's side comprises a single pre-selected InGaAs/GaAs QD embedded in a monolithic microlens above a bottom distributed Bragg reflector, both of which increase the photon collection efficiency from the QD. Details on the sample and its deterministic fabrication can be found elsewhere [28,47]. The SPS was mounted into a closed-cycle refrigerator integrated in a cryooptical table (Model attoDRY800, attocube systems AG) for operating the SPS at a temperature of 4.2 K. An aspheric lens (NA = 0.77) inside the cryostat collected the QD emission, which was optically triggered at 80 MHz repetition rate using quasi-resonant excitation into the QD's p-shell via a pulsed (2 ps pulse width) tunable laser system (picoEmerald, APE GmbH). Single-photon emission from the QD was spectrally filtered via an edge-pass filter and a monochromator coupled to a polarization maintaining single-mode fiber (PM 98-U25D) connected to the receiver module Bob. Here, the polarization of the single-photon pulses is set using a high-extinction-ratio linear-film polarizer followed by a lambda-half waveplate for aligning Alice's and Bob's polarization axes.

Receiver Module Bob
The receiver module Bob contains a four-state polarization analyzer with passive basis choice. Here, the stream of single-photon pulses is split by a non-polarizing 50:50 beamsplitter (BS) followed by a polarizing beamsplitter (PBS) in the first output and a lambda-half waveplate combined with another PBS in the second output. Thus the four BB84 states (H-, V-, D-, and A-polarized photons) are routed in four different output ports, each comprising a fiber-collimator with attached optical multimode fiber (FG050LGA, Thorlabs GmbH). The photons are detected using four single-photon counting modules (COUNT-T100-FC, Laser Components GmbH) with a timing jitter between 500 ps and 600 ps. The singlephoton detection events are converted to four streams of time-tags (1 ps digital resolution) using a time-to-digital converter (TDC) (quTag, qutools GmbH) synchronized to the excitation laser.

Postprocessing
To process the time-tags from the receiver module, a homemade software package was developed (based on LabVIEW and Rust), in order to extract the sifted key fraction, the QBER, and the antibunching value g (2) (0) as explained in the following. First, temporally filtered data sets were processed from the raw time-tags by discarding events outside the specified acceptance time windows of width ∆t and center t c . For this purpose, slight temporal delays within Bob had to be compensated using electronic delays build in the TDC electronics. This synchronization was achieved by minimizing the ratio r = N P /N P of the arrival time distributions for a given polarization basis P within the full temporal window of 12.5 ns. Note, that this temporal synchronization is important for properly extracting g (2) (τ ) (see further below) as well as to reduce possible detection efficiency mismatches between channels affecting the performance of QKD systems [29]. Afterwards the parameters mentioned above were extracted from the temporally filtered data sets. The QBER was calculated from the photon arrival time distributions as well as the sifted key. The photon statistics g (2) (τ ) were evaluated in a ∆τ = 250 ns-wide delay window, by correlating the timetags from the four detection channels of Bob. From the resulting g (2) (τ ) histograms, g (2) (0) was calculated via g (2) (0) = Nτ=0 N τ =0 , where N τ =0 denotes the number of coincidences of the peak at zero time delay and N τ =0 the average number of coincidences of the side peaks. The standard error of g (2) (0) is deduced via Gaussian error propagation, taking into account σ(N τ =0 ) = √ N τ =0 as well as the standard deviation of the areas from the side peaks. For illustrations in this work, a time-bin width of 25 ps and 250 ps were chosen for the photon arrival time distributions and g (2) (τ ) histograms, respectively.

Simulations
For the simulations the photon arrival time distributions of the single-photon pulses were modeled with synthetic pulse shapes using an exponential decay convoluted with a Gaussian of 500 ps FWHM, accounting for the temporal response function of the detection apparatus. Two types of QD-SPSs are considered: The first one resembles an QD with a radiative lifetime of 1.5 ns (long pulse) and the second one with a lifetime of 0.5 ns (short pulse). The optical imperfections in the second channel were modeled by the same distribution scaled to 1 %. The finite signal-to-noise-ratio (noise level) was considered by an uncorrelated offset of 0.01 per bin for low noise and 0.3 per bin for high noise, corresponding to signal-to-noise ratios of 392 and 13 in the input polarization channel. To account for effects arising from the overlap of consecutive pulses, a temporal window of 12.5 ns width was used from a train of three consecutive pulses.

Estimation of expected secret key rates
The expected loss-dependent secret key in Fig. 3 was calculated via Eq. 3 using estimated parameters extracted from our measurement data with the binary Shannon entropy h(e) = −e log 2 (e) − (1 − e) log 2 (1 − e). The parameters used for the calculation stem from the long-term measurement for fixed H input polarization. The extraction from this data is described in the following for the mean photon number µ, the detection rate p click and detector dark count probability p dc . The mean photon number µ at Alice's output was calculated from the clock frequency of the excitation laser (80 MHz), the setup efficiency and the mean detector count rate on all four detectors during the measurement. This results in a mean photon number µ = 0.0043. This already low value does not allow for further optimization of µ as in [27]. The detector dark counts can be estimated by shielding the detectors from all incoming light results in a cumulative dark count rate of below 100 Hz. For the acceptance window of 12.5 ns, this leads to p dc = 1.22 · 10 −6 .

Comparison of Device Performance
While state-of-the-art point to point QKD systems still employ weak coherent pulses (WCPs) or even light emitting diodes [48], the performance of QKD can in principle be further enhanced by using sub-Poissonian quantum light sources. In the following we estimate the effect of different photon sources (i.e. photon statistics) on the achievable secret key rate for a given QKD system. One can show, that for the case of an ideal implementation without errors nor noise and therefore neglecting the multi-photon emission events, the secret key rate S from Eq. (3) simplifies for SPSs and for decoy-states alike to: Here, η sifting denotes the efficiency of the protocol, f rep the repetition rate, T the transmission, and P (n = 1) the probability for single photon emission. Note here, that η sifting is 1/2 in case of BB84, but this efficiency can also become close to unity by choosing asymmetrical measurement bases [49]. For a given implementation of QKD, i.e. with the same η sifting , f rep , and T , the performance is ultimately bounded by the probability of single photon emission P (n = 1) of Alice. Only single photons can be used for the secret key generation. Weak laser pulses following a Poisson photon number distribution are limited to P (n = 1) decoy max ≤ 0.37 with µ WCP = 1, whereby this case even ignores multi-photon events. Typical WCP experiments using mean photon numbers µ WCP = 0.5 [8] have an even lower value of P (n = 1) 0.3. The upper bound for the multi-photon emission probability from [27] yields P (n = 1) ≥ µ − µ 2 g (2) (0). Therefore, to surpass the performance of a WCP-based QKD system at same η sifting and f rep , Alice using an ideal SPS (g (2) (0) = 0) must achieve µ = 0.3 into the quantum channel. This efficiency is within reach using existing technologies and state-of-the-art deterministically fabricated solid-state quantum light sources [34].

DATA AVAILABILITY
The data that support the plots within this paper and other findings of this study are available from the corresponding author upon reasonable request.   . S1 shows the sifted key fraction and the QBER extracted from the data in Fig. 1(d) of the main article for all four detection channels of Bob as a function of the width ∆t of the acceptance time window (fixed center t c = 0 ns). Reducing the size of the acceptance time window, we expect a decrease in QBER due to the improvement in signalto-noise ratio. This is observed in qualitative agreement for the H, V and A polarization, where the minimum is observed at the narrowest acceptance time window. For the D-channel we observe a differing behavior. The minimal QBER is observed at 1.75 ns followed by a rapid increase towards diminishing width of the acceptance time window. In addition, the QBER is in general higher compared to the three remaining detection channels. These discrepancies are attributed to varying properties of the used single-photon counting modules (e.g. temporal jitter) in combination with a lower extinction ratio for the photons reflected at the polarizing beamsplitter in the D/A-Basis. Note 2: Impact of 2D temporal filtering on the performance of single-photon QKD For signal pulses which are asymmetric in the temporal domain, the acceptance time-windows for QKD need to be adjusted in two dimensions using its width ∆t and its center position t c . In Fig. 2 (d) of the main text, we present the secret key rate S(∆t, t c ) in this 2D parameter space. Supplementary Fig. S2 depicts the complementing data for the signal fraction and the QBER. As mentioned in the discussion of Fig. 3 of the main article, temporal filtering can be exploited to enhance the signalto-noise ratio resulting in enhanced tolerable losses in single-photon QKD. Fig. S3 depicts the tolerable losses and g (2) (0) as a function of the width ∆t of the acceptance time window (at fixed center position ∆t = 0 ns). Exploiting temporal filtering of g (2)(0) , the tolerable loss can be further increased compared to Fig. 3 of the main article. To benefit from this effect requires active gating on Alice's side using e.g. a fast amplitude modulator. Otherwise a backdoor is opened for photon number splitting attacks.   Fig. 2 (c) and 3 of the main article presenting the tolerable loss, the QBERH and g (2) (0) together with its error as a function of the width ∆t of the acceptance time window (tc = 0). Reducing ∆t results in an enhanced signal-to-noise ratio as indicated by the decreasing QBER and g (2) (0). To benefit from the temporal filtering of g (2)(0) , active gating on Alice's side is required.