Abstract
Global quantum communications will enable longdistance secure data transfer, networked distributed quantum information processing, and other entanglementenabled technologies. Satellite quantum communication overcomes optical fibre range limitations, with the first realisations of satellite quantum key distribution (SatQKD) being rapidly developed. However, limited transmission times between satellite and ground station severely constrains the amount of secret key due to finiteblock size effects. Here, we analyse these effects and the implications for system design and operation, utilising published results from the Micius satellite to construct an empiricallyderived channel and system model for a trustednode downlink employing efficient BennettBrassard 1984 (BB84) weak coherent pulse decoy states with optimised parameters. We quantify practical SatQKD performance limits and examine the effects of link efficiency, background light, source quality, and overpass geometries to estimate longterm key generation capacity. Our results may guide design and analysis of future missions, and establish performance benchmarks for both sources and detectors.
Introduction
Quantum technologies have the potential to enhance the capability of many applications^{1} such as sensing^{2,3,4}, communications^{5,6,7,8}, and computation^{9}. Ultimately, a worldwide networked infrastructure of dedicated quantum technologies, i.e. a quantum internet^{10}, could enable distributed quantum sensors^{11,12,13,14}, precise timing and navigation^{15,16,17}, and faster data processing through distributed quantum computing^{18}. This will require the establishment of long distance quantum links at global scale. A fundamental difficulty is exponential loss in optical fibres, which limits direct transmission of quantum photonic signals to < 1000 km^{19,20,21,22}. Quantum repeaters may overcome the direct transmission limit but stringent performance requirements render them impractical by themselves for scaling to the intercontinental ranges needed for global scaleup^{23}. Alternatively, satellitebased freespace transmission significantly reduces the number of ground quantum repeaters required^{24}.
Satellitebased quantum communication has attracted much recent research effort^{23,24,25,26,27,28,29,30} following recent inorbit demonstrations of its feasibility by the Micius satellite^{31}. For lowEarth orbit (LEO) satellites, a particular challenge is the limited time window to establish and maintain a quantum channel with an optical ground station (OGS). For satellite quantum key distribution (SatQKD), this constrains the amount of secret key that can be generated due to two issues. First, the commonly assumed asymptotic resource assumption is not a good approximation for short received signal blocks. Without an arbitrarily large number of received signals, statistical uncertainties can no longer be ignored and the security of the distilled secret key requires careful treatment of the statistical fluctuations in estimated parameters^{32,33,34}. Second, the tradeoff between the proportion of signals used for parameter estimation and key generation becomes increasingly important to optimise. Further postprocessing operations, such as error correction, reduce the amount of extractable secret key, with small block lengths leading to additional inefficiencies over the asymptotic limit^{35,36}.
Initial SatQKD studies used the observed standard deviation to estimate statistical uncertainties and derive correction terms to the secret key rate^{37,38}. Analyses based on smooth entropies^{32} improve finitekey bounds^{39} and have been applied to freespace quantum communication experiments^{40}. Recently, tight bounds^{36} and small block analyses^{41} further improve key lengths for finite signals. Here, we provide a detailed analysis of SatQKD secret key generation, which utilises tight finite block statistics in conjunction with system design and operational considerations.
As part of our modelling, we implement tight statistical analyses for parameter estimation and error correction to determine the optimised, finiteblock, singlepass secret key length (SKL) for weak coherent pulse (WCP) efficient BB84 protocols using three signal intensities (twodecoy states). We base our nominal system model on recent experimental results reported by the Micius satellite^{42} and use a simple scaling method to extrapolate performance to other SatQKD configurations. The effects of different system parameters are explored, such as varying system link efficiencies, protocol choice, background counts, source quality, and overpass geometries. We also provide a simple estimation method to determine the maximum expected longterm key volume at a particular OGS latitude. The improvement from combining data from multiple satellite passes is also examined. Our model and analysis may guide the design and specification of SatQKD systems, highlighting factors in the quantum communication link that limit secret key generation in the regime of high channel loss and limited pass duration.
We outline the system model in section ‘System model’, including overpass geometries and system parameters. Operational models and finite block construction are given in section ‘SatQKD Operations’. We describe in section ‘Finite key length analysis’ our SatQKD finite key analysis and examine the dependence of the SKL on different system parameters in subsequent sections. We conclude with a discussion of our results in section ‘Discussion’.
Results
System model
We consider a satellite in a circular Sunsynchronous orbit (SSO) of altitude h = 500 km, similar to the Micius satellite^{31}, performing downlink QKD to an OGS at night to minimise background light. The elevation and range is calculated as a function of time for different overpass geometries representing different ground track offsets and maximum elevations for the overpass (Fig. 1a). The instantaneous link efficiency η_{link} is calculated as a function of the elevation θ(t) and range R(t) to generate expected detector count statistics. The quantum link is restricted to be above \({\theta }_{\min }=1{0}^{\circ }\).
The link loss \({\eta }_{{{\mbox{link}}}}=10{\log }_{10}{p}_{{{\mbox{d}}}}\) (dB) is determined by the probability, p_{d}, that a single photon transmitted by the satellite is detected by the OGS. A lower dB value of η_{link} represents smaller loss due to better system electrooptical efficiency. This improvement could stem from the use of larger transmit and receive aperture diameters, better pointing accuracy, lower receiver internal losses, and higher detector efficiencies. Internal transmitter losses are not included since they can be countered by adjusting the WCP source to maintain the desired exit aperture intensities^{37}. We also do not explicitly consider timevarying transmittance, modelling the average change in channel loss due only to the change in elevation with time. For discrete variable QKD (DVQKD) protocols, e.g. BB84, channel transmissivity fluctuations do not directly impact the secret key rate, in contrast to continuous variable QKD where this appears as excess noise leading to key reduction^{43,44}.
The ideal overpass corresponds to the satellite traversing the OGS zenith (Fig. 1b) giving the longest transmission time with lowest average channel loss. Generally, an overpass will not pass directly overhead but will reach a maximum elevation \({\theta }_{\max }( < 9{0}^{\circ })\). We model total losses, including pointing and atmospheric effects, using Micius inorbit measurements (ref. ^{42} Extended data, Fig. 3b) to construct a representative η_{link} vs θ curve extrapolating over the entire horizon to horizon passage time (Fig. 1c). The Micius data represent a near ideal scenario since the OGSs are situated in dark sky conditions at high altitudes of ~3000 m minimising the effects of atmospheric turbulence and attenuation, other sites may perform differently. Though the link efficiency in ref. ^{42} is for the entanglement distribution system, not the optimised preparemeasure QKD downlink system as reported in ref. ^{45}, it should still be representative of downlink efficiencies and sifted key rates achievable with current technologies (Fig. 1d).
Systems with higher link losses are also considered. The system loss metric, \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\), is used to characterise the overall system electrooptical efficiency independent of the overpass geometry, and is defined as the η_{loss} value at zenith, i.e. the maximum probability of detecting a single photon sent from the satellite to the OGS. Worse performing systems have a larger associated \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\). The baseline \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) value considered is 27 dB, which corresponds to the improved Micius system using a 1.2 m diameter OGS receiver at Delingha^{42}. By increasing the value of this metric, we explore the performance of SatQKD systems with greater fixed losses, e.g. using a smaller OGS, but otherwise similar behaviour to the Micius system. We consider a maximum \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) value of 40 dB since this reflects realistic SatQKD operation using smaller OGS receiver diameters and a reduced pointing accuracy of smaller satellites. If the timeaveraged ground spot is much larger than the OGS diameter D_{r}, \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) scales as \(20{\log }_{10}({D}_{{{\mbox{r}}}}/{D}_{{{\mbox{r}}}\,}^{0})\) (dB) where \({D}_{\,{{\mbox{r}}}\,}^{0}=1.2\) m is the reference Delingha OGS diameter.
Estimating the effect of transmitter aperture (D_{t}) is more complex since factors other than diffraction, such as pointing performance and turbulence, also determine the timeaveraged ground spot size^{46,47}. Micius, with D_{t} of 180 mm and 300 mm and subμrad pointing performance, reported 10 μrad beam widths^{42} which suggests the presence of nondiffractionlimited beam spreading effects that may result in a smaller dependence of \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) on D_{t}. A smaller D_{t} could result in a smaller increase in \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) than given by purely diffractive beam broadening, conversely using a larger D_{t} may not significantly improve \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) if pointing and turbulence losses dominate. We refer the reader to detailed analyses of atmospheric turbulence^{48} or extinction^{49}, and more recent works where their effects on SatQKD are considered^{46,50,51}.
We simplify our model by including several quantities in the parameters p_{ec} and QBER_{I}. The sum of dark and background light count rates, p_{ec}, is assumed constant and independent of elevation. The intrinsic quantum bit error rate, QBER_{I}, combines errors arising from source quality, receiver measurement fidelity, basis misalignment, and polarisation fluctuations^{52}. Baseline system parameters are summarised in Table 1.
SatQKD Operations
A standard model of SatQKD uses large, fixed, and longterm OGSs to establish links with satellites^{29}. A more demanding scenario is where the OGS may only be able to communicate sporadically with a particular satellite, limiting the amount of data that can be processed as a single large block, e.g. smaller, mobile OGS terminals may be required to generate a key from a limited number of passes, possibly only one, due to operational constraints. In contrast, fibrebased QKD can often assume a stable quantum channel able to be operated continuously until a sufficiently large block size is attained. High count rates and large block sizes, e.g. 10^{12}, are generally more feasible in fibrebased QKD.
In SatQKD, often the theoretical instantaneous asymptotic key rate \({{{{\mathscr{R}}}}}_{\infty }(t)\) is integrated over the overpass to give the continuous secret key length (SKL)^{28,29},
where the quantum transmission occurs between times t_{start} and t_{end}. Data segments from multiple passes with identical statistics should be combined to yield an asymptotically large block for postprocessing. More practically, small blocks, each having similar statistics, from different passes are combined to give the following SKL,
where \({{{{\mathscr{R}}}}}_{\infty }^{j}\) is the asymptotic key rate for a small segment j, and \({{{{\mathcal{L}}}}}_{j}\) its length. Operationally, this leads to considerable latency between establishing a first satelliteOGS link and the generation of secret keys after a sufficient number of subsequent overpasses. A less restrictive mode of operation is to combine data from multiple passes without segmenting into data blocks with similar statistics, and processing using asymptotically determined or assumed parameters. However, the security guarantee for this procedure requires closer examination.
Here instead, we process overpass data as a single block without segmentation, incorporating finite statistics and uncertainties to maintain high levels of composable security with
where \(\{{n}_{k}^{\mu },{m}_{k}^{\mu }\}\) denote agglomerated observed counts without partitioning into subsegments (see ‘Methods’ section ‘Finite key analysis for decoystate BB84’). This is more practical for large constellations^{28,53} and OGS numbers, obviating the need to track and store a combinatorially large number of link segments until each has attained a sufficiently large block size for asymptotic key extraction. Note that we have the freedom of constructing block sizes in this manner since the security of the distilled finite key remains unaffected. However, an important requirement in finite key analyses is the assumption that each block is randomly sampled at a constant and uniform rate. This requires both the protocol parameters and the fraction of X to Z bases be kept the same. We do not make any assumptions on the underlying statistics for each data block, which are not required to be the same. Instead, we require only information on the count statistics for the entire overpass.
Finite key length analysis
We now quantify SatQKD system performance and SKL generation from different satellite overpasses. We employ the efficient BB84 protocol with weak coherent pulses (WCPs)^{6} for which tight finitekey security bounds have been derived for one^{34} and two^{33} decoy states. The performance of one and twodecoy states is similar, however using two decoy states allows better vacuum yield estimation, useful in high loss operation. We optimise the twodecoy state protocol parameters and the amount of overpass data used in a block to explore the dependence of the singlepass SKL on different variables and derive an expected long term key volume.
The efficient BB84 protocol^{54} encodes signals in X and Z bases with unequal probabilities p_{X} and 1 − p_{X}, respectively. One basis is used exclusively for key generation and the other only for parameter estimation. We choose to use the error rate of the announced sifted Z basis to bound leaked information from the sifted X basis raw key. Biased basis choice improves the sifting ratio whilst retaining security. In the asymptotic regime, the sifting ratio tends to 1, versus 0.5 for symmetric basis choice (original BB84). This sifting ratio advantage persists in the finite key regime (see section ‘Protocol performance’) resulting in a longer raw sifted key that reduces parameter estimation uncertainties and provides more raw key to distil.
For the two decoystate WCP BB84 protocol, the sender randomly transmits one of three intensities μ_{j} for j ∈ {1, 2, 3} with probabilities p_{j}. For the purposes of the security proof, we assume the intensities satisfy μ_{1} > μ_{2} > μ_{3} = 0. The finite block secret key length is then given by^{33},
where s_{X,0}, s_{X,1} and ϕ_{X}, are the Xbasis vacuum yield, singlephoton yield and phase error rates, respectively. In contrast to fibreoptic based systems, the size of the sifted Xbasis data block cannot easily be fixed for satellitebased QKD. Instead the number of pulses N sent per pass is determined by the source repetition rate and the time available during a satellite overpass. In the asymptotic sample size limit (Eq. (2)), the X and Z basis data block sizes are straightforwardly determined by N, the pulse detection probability (itself a function of time), and the sifting ratio. However, finitely sized samples generate observed statistics that deviate from asymptotic expectations. Taking this into account can significantly reduce the SKL and we employ correction terms \({\delta }_{{\mathsf{X}}({\mathsf{Z}}),k}^{\pm }\) that relate the expected and observed statistics for bases X(Z) with a kphoton state, using the tight multiplicative Chernoff bound^{36} (see ‘Methods’ ‘Finite key analysis for decoystate BB84’ and ref. ^{55} for software details).
Error syndrome information is publicly announced to perform error correction. The number of bits thus leaked is denoted λ_{EC}, and is accounted for during privacy amplification. In the finite key regime, this information leakage has a fundamental upper bound \({\lambda }_{{{\mathrm{EC}}}}\le \log  {{{\mathcal{M}}}}\), where \({{{\mathcal{M}}}}\) characterises the set of syndromes in the information reconciliation stage^{35}. We use an estimate of λ_{EC} that varies with block size (Eq. (9)).
We characterise the reliability and security of the protocol by two parameters, ϵ_{c} and ϵ_{s}. The protocol is ε = ϵ_{c} + ϵ_{s}secure if it is ϵ_{c}correct and ϵ_{s}secret^{33,56}. For the numerical optimisation, we take ϵ_{c} = 10^{−15} and ϵ_{s} = 10^{−9}. Conditioned on passing the checks in the errorestimation and errorcorrection verification steps, an ϵ_{s}secret key of length ℓ can be generated that is secure against general coherent attacks and is universally composable^{56}. This indicates it is not possible for a malicious party to take advantage of changes to any underlying statistics in each data block that may arise due to changes in channel losses in SatQKD.
In the following sections, we highlight constraints arising from the quantum communication link and its implications for system design. It is also important to consider the constraints arising from the classical communication link. This is particularly important for SatQKD operations. We can use our finite key optimiser to provide an estimate for the number of classical bit transmission required in SatQKD for the baseline system parameters summarised in Table 1 with \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}=\)40 dB (see ‘Methods’ section ‘Classical communications for SatQKD’).
Transmission time window optimisation
A satellite overpass is limited in duration and experiences highly varying channel loss, hence the expected count rates and QBER will change significantly throughout the pass. The received data obtained from lower elevations will have higher QBER compared to signals sent from higher elevations due to greater losses and the contribution of extraneous counts. This suggests that the SKL that could be extracted could be optimised by truncating poorer quality data from the beginning and end of the transmission period in some circumstances, despite resulting in a shorter raw block^{57}.
Our approach is to first fix the transmission duration and optimise the protocol parameters to use during the pass, then iterate over the window duration to find the highest resulting SKL. We define the transmission time window to run from −Δt to +Δt, where t = 0 represents the time of highest elevation \({\theta }_{\max }\). For each Δt, we find optimum protocol parameters that maximise the SKL extractable from the data block generated within this transmission window. We impose a minimum elevation limit that reflects practicalities such as local horizon visibility and system pointing limitations. Here we use \({\theta }_{\min }=1{0}^{\circ }\) which for a zenith pass limits 2Δt to less than ~440 s.
We show the SKL as a function of Δt for different \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) values in Fig. 2. For small \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\), the QBER at low elevations does not rise greatly above QBER_{I} and it is better to construct keys from the greatest amount of data where Δt reaches the maximum allowed by \({\theta }_{\min }\). Conversely, for large \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\), utilising only data from near zenith leads to a longer SKL due to the better average QBER countering both the smaller raw key length and larger statistical uncertainties.
SKL system parameter dependence
We now determine the dependence of the SKL on different system parameters, including extraneous counts p_{ec}, intrinsic quantum bit errors QBER_{I}, and the source repetition rate f_{s}. The optimised SKL is then determined for different \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) that model alternative SatQKD systems that differ from the baseline configuration (Table 1) up to \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}=42\) dB, corresponding to Micius transmitting to an OGS with D_{r} = 21.3 cm, keeping all other system parameters the same.
We first consider how the SKL is affected by p_{ec}, which includes both detector dark counts and background light. For DVQKD, silicon single photon avalanche photodiodes (SiSPADs) are typically used for visible or near infrared wavelengths and can achieve a dark count rate of a few counts per second with thermoelectric cooling and temporal filtering^{58}. Superconducting nanowire single photon detectors (SNSPDs)^{59} can offer superior wavelength sensitivity (particularly beyond 1 μm), dark count rate (less than 1 cps), and timing jitter, though at the expense of greater cost, size, weight, and power (SWaP), owing to the need for cryogenic operation. Background light, due to light pollution and celestial bodies (most notably the Moon) is the main constraint to minimising p_{ec}^{60}. We have used a simplified model which does not include elevation dependent background light levels (which is highly site dependent). The impact of varying p_{ec} on the single overpass (solid), twopass normalised (dashed), and normalised block asymptotic (dotted) finite SKLs (see ‘Methods’ section ‘Asymptotic key length per pass’) is shown in Fig. 3a. For the finite variants, the SKL is determined using Eq. (3), where data from either one (solid lines) or two (dashed lines) zenith overpasses are processed as a single block. Multiplepass SKLs are normalised by the number of passes to maintain a fair comparison with the single pass SKL. For each scenario, while extraneous counts increase the vacuum yield \(s_{{\rm{X}},0}\), any addition to the SKL is offset by reductions from worse phase error rates and error correction terms. For example, a factor of 10 increase in p_{ec} results in a 40% net reduction to the SKL for \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}=27\) dB. The effect of extraneous counts is further compounded for large \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) values and can result in zero SKL due to an excessive QBER.
The QBER also suffers from effects such as nonideal signals, satelliteOGS reference frame misalignment, or imperfect projective measurements by the OGS. We characterise these by an intrinsic system error, QBER_{I}, which is independent of the count rate or channel loss. Figure 3b illustrates the effect of different QBER_{I} on the SKL. We observe that the finite key length is not as susceptible to changes in the QBER_{I} as compared with p_{ec}. The relative effects of both p_{ec} and QBER_{I} on the SKL is illustrated in Fig. 4 (see also Supplementary Fig. 1). The SKL varies greatly along the p_{ec} direction, with zero finite key returned for large p_{ec} irrespective of improvements to QBER_{I}. This indicates that improvements to background light suppression and detector dark count over source fidelities and satellite alignment should be prioritised.
We can estimate the effect of increasing the source rate f_{s} by incorporating a correction factor to \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) for the current results. Since the SKL is a function of \(\{{n}_{k}^{\mu },{m}_{k}^{\mu }\}\), these only depend on the integrated product of the source rate and the link efficiency, with all other system parameters kept the same. Therefore, a 100 MHz source at a given \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) provides the same amount of raw key as a 1 GHz source with a 10 dB larger system loss metric, e.g. corresponding to a three times smaller OGS receiver diameter (Supplementary Fig. 2). This approximation, however, neglects extraneous counts and the resultant instantaneous QBER which is unaffected by the source rate but does depend on \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\). Nevertheless, the above heuristic holds provided the contribution of p_{ec} to QBER is small and thus SKL is mostly constrained by raw key length and statistical uncertainties.
Practically, the amount of raw key that could be transmitted during an overpass may be limited by the amount of available stored random bits, irrespective of increases in f_{s}. Realtime quantum random number generation can overcome this though at the expense of increased SWaP, which is often constrained on smaller satellites. Even with limits on the amount of raw key available, increasing f_{s} can still be advantageous by compressing the transmission into a smaller duration around \({\theta }_{\max }\), which decreases the average loss per transmitted block.
Protocol parameters that affect the SKL include signal intensities μ_{j}, their probabilities p_{j}, and basis bias p_{X}. The optimum values of these system parameters generally depend on \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) and the overpass geometry. The optimal key generation basis choice probability p_{X} decreases with increasing \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\). As the OGS detects fewer photons with increasing loss, leading to worse parameter estimation of s_{X,0}, s_{X,1} and ϕ_{X} due to greater statistical fluctuations, to compensate we need to collect more Z basis events by increasing 1 − p_{X}. The reduced number of key generation events is outweighed by better bounds on the key length parameters. This implies that the uncertainties in the parameter estimation from finite statistics dominates the SKL compared with raw key length when \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) is large (Supplementary Fig. 3).
SKL and overpass geometry
A typical satellite overpass will not go directly over zenith but will pass within some minimum ground track offset \({d}_{\min }\) of the OGS, reaching a maximum elevation \({\theta }_{\max }( < 9{0}^{\circ })\) (Fig. 1a). To maximise the number of overpass opportunities that can generate a secret key, a SatQKD system should be able to operate with as low a maximum elevation \({\theta }_{\max }\) as possible. The SKL per pass as a function of \({d}_{\min }\) is shown in Fig. 5 for different \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) values. As expected, overpasses with smaller \({\theta }_{\max }\) deliver smaller SKLs due to shorter transmission times and lower count rates from large average η_{link} at lower elevations and longer ranges. The SKL vanishes once \({\theta }_{\max }\) is below a critical elevation angle \({\theta }_{\max }^{}\) when the small block size leads to excessive statistical uncertainties or the average QBER becomes too high.
We now can estimate the longterm average amount of secret key that can be generated using single overpass blocks with an OGS site situated at a particular latitude. We first integrate the area under the SKL vs \({d}_{\min }\) curve,
where \({d}_{\min }^{+}\) is the maximum OGS ground track offset that generates key. Assuming a sun synchronous orbit, we then estimate the expected annual key from (neglecting weather),
where \({N}_{\,{{\mathrm{orbits}}}}^{{{\mathrm{year}}}\,}\) is the number of orbits per year, and L_{lat} is the longitudinal circumference along the line of latitude at a single OGS location (see Methods section ‘Expected annual SKL’). This estimate assumes that \({d}_{\min }\) is evenly distributed (unless in an Earth synchronous orbit^{28}) and the OGS is not close to the poles where the orbital inclination (~97°) invalidates the approximation of even distribution. In Table 2, we summarise the expected yearly secret finite key lengths attainable for various \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) at latitude 55. 9^{∘} N.
Multiple satellite passes
Disregarding latency of key generation, data from several overpasses can be combined to improve SKL generation. Figure 3 displays finite and asymptotic SKLs for a single zenith overpass. The overpassnormalised asymptotic SKL corresponds to multiple overpasses where the block sizes used for key rate determination tend to infinity. Instead of Eq. (2), we aggregate data from separate overpasses (with the same geometry and protocol parameters) into a single processing block without segmented instantaneous asymptotic key rates, only assuming asymptotically ascertained combined block parameters. The process of taking the block size to infinity requires care due to the limited amount of data per pass (see ‘Methods’ section ‘Asymptotic key length per pass’). The perpass SKL increases significantly as the block asymptotic regime is approached.
Systems with zero singleoverpass SKL can generate positive key by accumulating signals from several overpasses (Fig. 6). If ℓ_{M} is the total SKL generated from M identical satellite passes, then ℓ_{M} ≥ Mℓ_{1} with diminishing improvement ℓ_{M+1} − ℓ_{M} with increasing M, with the largest jump going from M = 1 to 2. Averaging over several identical passes does not improve the underlying block averaged signal parameters such as QBER, hence the perpass SKL improvement is mainly due to smaller estimation uncertainties from increased sample size, with better error correction efficiency and reduced λ_{EC} also contributing. This shows that finite statistical fluctuations are the principle limitation to the SKL that can be generated with a limited number of overpasses.
Practically, employing multiple passes to improve SKL generation should be balanced against greater latency and potential security vulnerabilities in storing large amounts of raw data for a longer period between passes. This will depend on the assumed security model and anticipated attack surfaces of the encryption keys at rest^{61}.
Protocol performance
The choice of QKD protocol can also significantly affect the SKL due to finite block size statistics. This is illustrated by comparing two BB84 variants: efficient BB84 (considered thus far)^{54} and standard BB84^{62}. The main difference is the basis choice bias, with standard BB84 choosing both X and Z bases with equal (symmetric) probability, while efficient BB84 allows biased (asymmetric) basis choice. Standard BB84 also uses both bases to generate key, hence requires parameter estimation of both. Efficient BB84 uses only one basis for key generation and the other for parameter estimation. We refer to the two protocols as sBB84 and aBB84, respectively.
In general aBB84 produces higher SKL for all system loss metrics, can tolerate larger \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\), and operate with lower \({\theta }_{\max }\) (Supplementary Fig. 4). The expected annual SKL (as in section ‘SKL and overpass geometry’) with aBB84 and sBB84 for the baseline system parameters (Table 1) is obtainable from Fig. 7. For \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}=33\) dB and 40 dB, aBB84 generates 70% and 182% times more key on average, respectively. The advantage increases with larger \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}\) due to several reasons. First, the better sifting ratio of aBB84 results in more raw bits that also allows for better parameter estimation. Second, aBB84 uses all events in one basis to estimate the vacuum and single photon yields in the other. In contrast, sBB84 reveals an optimally sized random sample of results for each basis to separately estimate signal parameters. Hence only half the revealed results are used for each basis estimation, leading to worse statistical uncertainties.
A tangential advantage is that aBB84 requires less classical communication than sBB84. In aBB84 the choice of bits for public comparison for QBER estimation is implicit in the basis choice and automatically revealed during sifting. A minor disadvantage to aBB84 is the extra overhead in generating biased basis probabilities^{63}, but the advantage of sBB84 in this regard is relatively small taking into account all the biased probabilities required for both decoystate variants.
Discussion
Important differences with fibrebased QKD mean that small sample statistical uncertainties have a significant impact on the performance of satellite QKD. The restricted overpass time of a LEO satellite constrains the amount of sifted key that can be established with an optical ground station. Operationally, a secret key may need to be generated from a single pass, thus statistical uncertainties will significantly impact performance in practical scenarios. Our study examines the severity of finitekey effects for representative spaceground quantum channel link efficiencies as indicated by the inorbit demonstration of Micius.
Our results highlight the influence of system and protocol parameters on the secret key length that can be generated from a single overpass. For the range of system loss metrics considered (\({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}=27\,\,{{\mbox{to}}}\,\,42\) dB), the strongest dependence comes from the degree by which extraneous counts (p_{ec}) can be suppressed, with a much weaker dependence on the intrinsic signal/measurement quality (QBER_{I}) of the system. There is also a minimal effect of imposing a minimum elevation limit for quantum signal transmission. This suggests that SatQKD systems should prioritise background light suppression over higher intrinsic quantum signal visibilities or extending transmission closer to the horizon.
The dominance of finitekey effects is highlighted by the comparison between efficient (asymmetric basis bias) BB84 with conventional (symmetric basis bias) BB84. The much greater secret key length of efficient BB84 stems from a better sifting ratio and longer raw key length as well as obviating the need to perform parameter estimation for two bases that would further compound the finite statistical uncertainty. This greater performance translates into a higher secret key length for a given overpass geometry and also extends the satellite ground footprint within which secret key can be established with a ground station. Overall, improvements in system performance, whether through better protocols, smaller system loss metrics, or higher source rates, can significantly expand expected annual secret key volumes, e.g. a reduction of 3 dB in the system loss metric from 40 dB to 37 dB improves the expected annual key volume by a factor of 7.6. Should operations allow, secret key extraction efficiency can also be enhanced by combining data blocks from several passes, especially if no secret is possible from a single overpass.
This preliminary study of SatQKD finitekey effects can be extended to remove some simplifications and approximations. An immediate extension would include a more comprehensive time and elevation dependent quantum channel model incorporating scattering, turbulence, and anisotropic background light distributions. Site dependent scenarios could include local horizon limits, light pollution, and seasonal weather effects. We can constrain the optimisation of the protocol parameters to reflect additional restrictions on system operations and deployment in practice. Ultimately, design and optimisation of SatQKD systems should incorporate orbital modelling of constellations and ground stations geographic diversity together with cost/performance tradeoff studies.
Methods
Finite key analysis for decoystate BB84
The BennettBrassard 1984 (BB84) quantum key distribution (QKD) protocol is widely implemented owing to its simplicity, overall performance and provable security^{62}. However, practical implementations of BB84 depart from the use of idealised singlephoton sources. Instead, weak pulsed laser sources are used given their wide availability and relative ease of implementation. This improves repetition rates over current single photon sources, but leaves the BB84 protocol vulnerable to photonnumbersplitting (PNS) attacks that exploit the multiphoton pulse fraction present in emitted laser pulses^{64}.
Decoystate protocols circumvent PNS attacks and improve tolerance to high channel losses, with minimal modification to BB84 implementations. These protocols employ multiple phase randomised coherent states with differing intensities that replace signal pulses. This modification permits better characterisation of the photon number distribution of transmitted pulses associated with detection events^{65}, which reliably detect the presence of PNS attacks in the quantum channel. Decoystate BB84 protocols also allow better estimation of the secure fraction of the sifted raw key (vacuum and single photon yields), which makes them a secure and practical implementation of QKD.
The security of decoystate QKD was initially developed assuming the asymptotickey regime^{66,67}. For applications with finite statistics, uncertainties in the channel parameters cannot be ignored^{68,69,70}. Early approaches in handling these finite key statistics used Gaussian assumptions to bound the difference between the asymptotic and finite results^{71}. This restricts the security to collective and coherent attacks. Security analyses for more general attacks have also been developed^{72}. The multiplicative Chernoff bound^{39,71} and Hoeffding’s inequality^{33} can be used to bound the fluctuations between the observed values and the true expectation value. Recently, a more complete finitekey analysis for decoystate based BB84, with composable security, has been presented in ref. ^{36}, which uses the multiplicative Chernoff bound to derive simple analytic expressions that are tight.
Due to limited transmission times, satellitebased quantum communications are strongly affected by finite statistics. To model different SatQKD systems, we improve the analysis in ref. ^{33} with recent developments in modelling statistical fluctuations arising from finite statistics. This improvement leads to a more robust SKL and is imprinted through the finite statistic correction terms \({\delta }_{{\mathsf{X(Z)}},k}^{\pm }\), which we define using the inverse multiplicative Chernoff bound^{36,71}. Specifically, let Y denote a sum of M independent Bernoulli samples, which need not be identical. Denote y^{∞} as the expectation value of Y, with y the observed value for Y from a single experimental run. The magnitude of difference between the observed and expected values depends on the statistics available. To quantify this deviation, we determine the probability that \(y\le {y}^{\infty }+{\delta }_{Y}^{+}\) is less than a fixed positive constant ε > 0, and the probability that \(y\ge {y}^{\infty }{\delta }_{Y}^{}\) is less that ε. This is achieved through setting
where \(\beta =\ln (1/\varepsilon )\)^{36}. Hence, we define the following finite sample size data block size
for the number of events and errors respectively in the X(Z) basis. From this, we define the vacuum and single photon yields, and the phase error rate of singlephoton events using ref. ^{33} (see also pseudocode 1 in Fig. 8) that determines the finite key length.
An important step in any QKD protocol is error correction. This necessitates classical communication, of λ_{EC} bits, which are assumed known to Eve. This must be taken account of in the privacy amplification stage. While λ_{EC} is known for practical implementations of the protocol, it must be estimated for the finite key optimisation. An overly conservative estimate would yield no key in a region of the parameter space where one should be viable. Conversely, an overly optimistic value for λ_{EC} leads to spurious results. This highlights the importance of choosing a good estimate. It is standard to model the channel as a bitflip channel^{33,35}. This leads to \(\lambda_{\rm{EC}}=f_{\rm{EC}}n_{\mathsf{X}}h_{2}(Q)\), where Q is the QBER and f_{EC} the reconciliation factor. The value for f_{EC} is chosen slightly above unity, e.g. 1.16. The use of a constant reconciliation factor is a simple way of accounting for inefficiency in the error correction protocol. This approach is normally sufficient when determining the optimal secret key length. However, for satellite QKD, one operates with high losses that are at the limit of where one can extract a key. As such, it is beneficial to use a more refined estimate of λ_{EC}.
A better estimate for λ_{EC} is given in ref. ^{35}. In this approach, the correction to \(n_{\mathsf{X}}h(Q)\) depends on the data block size. In particular,
where n_{X} is the data block size, Q is the QBER and F^{−1} is the inverse of the cumulative distribution function of the binomial distribution. We utilise this definition to estimate the information leaked during error correction in the finite key regime.
These postprocessing terms define the attainable finite key, subject to rigorous statistical analyses. The key length is a function of the basis encoding probability, \(p_{\mathsf{X}}\), the source intensities and their probabilities, {μ_{j}, p_{j}} for j ∈ {1, 2, 3}, and the transmission time window, Δt, used to construct block data for a satellite pass. Without loss of generality, we set the second decoy state intensity as the vacuum μ_{3} = 0. For a defined SatQKD system, we generate an optimised finite key length by optimising over the parameter space of the six variables: {p_{X}, μ_{1}, μ_{2}, p_{1}, p_{2}, Δt}. A baseline for system performance used in this work is detailed in Table 1 in the main text. This procedure can be generalised for any satellite trajectory. Fig. 8 illustrates a pseudocode of our numerical optimiser, which is available as open source software^{55}.
Asymptotic key length per pass
In this section, we provide an operational definition for the asymptotic key length per pass and explain how it can be determined by adapting the finite key optimiser. Data is combined from multiple satellite passes. The optimisation over the protocol parameters is then performed on the combined results and a secret key is extracted. For the following, we assume that each satellite pass has the same trajectory. With minimal modification, this can be extended to varying satellite trajectories for each pass.
Denoting ℓ_{M} as the SKL attained from M satellite passes, we saw in Fig. 6 that ℓ_{M} ≠ Mℓ_{1}. We also saw that the improvement to the SKL decreased with increasing number of satellite passes. This leads to a natural question: what is the largest attainable SKL per pass? This is given by the asymptotic secret key length \({\ell }_{\infty }=\mathop{\lim }\limits_{M\to \infty }{\ell }_{M}/M\). The key length, ℓ_{M}, is found using equation (4), and the quantity ℓ_{∞} is determined by examining the asymptotic scaling of ℓ_{M}/M.
The estimate for the vacuum counts per pass is^{33},
where n_{X,k} is the number of sifted counts in the Xbasis, from pulses of intensity k, τ_{0} is averaged probability that a vacuum state is transmitted by the laser, \({{{\Gamma }}}_{k}=\exp ({\mu }_{k})/{p}_{k}\) and \({\delta }_{{\mathsf{X}},k}^{\pm }\) are correction terms that account for the finite statistics. In ref. ^{33}, \({\delta }_{{\mathsf{X}},k}^{\pm }\) is derived from Hoeffding’s inequality. A higher SKL is attained by instead deriving these correction terms from the multiplicative Chernoff bound^{36}. The asymptotic scaling of these correction terms are \({{{\mathcal{O}}}}(\sqrt{{n}_{{\mathsf{X}}}})\). This scaling is independent of whether the Hoeffding and Chernoff bounds are used. This scaling implies that the scaling with the number of satellite passes is \({{{\mathcal{O}}}}(\sqrt{M})\). Hence, \({\delta }_{{\mathsf{X}},k}^{\pm }/M\) scales \({{{\mathcal{O}}}}(1/\sqrt{M})\) and thus tends to zero as M → ∞. The finite statistics correction terms thus go to zero, as expected.
Since each satellite pass is assumed to have the same orbit, the total number of counts accumulated \(n_{{\mathsf{X}},k}\) is equal to M times the corresponding number of counts for a single pass, \({n}_{{\mathsf{X}},k}^{(1)}\). From this, we obtain
where \({s}_{{\mathsf{X}},0}^{\infty }\) is the asymptotic estimate of the vacuum counts for a single pass, which we define formally in the next paragraph. By following a similar process for each term in ℓ_{M}/M, we obtain
where \({\phi }_{{\mathsf{X}}}^{\infty }={\nu }_{{\mathsf{Z}},1}^{\infty }/{s}_{{\mathsf{Z}},1}^{\infty }\) is the phase error rate, \({s}_{{\mathsf{X}},1}^{\infty }\), \({s}_{{\mathsf{Z}},1}^{\infty }\) and \({\nu }_{{\mathsf{Z}},1}^{\infty }\) are the single pass asymptotic estimates for: the single photon counts in the X basis, the Z basis, and the single photon errors in the Z basis, respectively.
The asymptotic quantities: \({\nu }_{{\mathsf{Z}},1}^{\infty }\), \({s}_{{\mathsf{X}},0}^{\infty }\) and \({s}_{{\mathsf{X(Z)}},1}^{\infty }\), correspond to averaging the single pass quantities over infinitely many passes. More formally, let \(u \in \{\phi_{\mathsf{X}}, \nu_{{\mathsf{Z}},1},s_{{\mathsf{X}}({\mathsf{Z}}),0},s_{{\mathsf{X}}({\mathsf{Z}}),1},\lambda_{\rm{EC}}\}\), and let u^{(M)} denote the quantity estimated using the full data from M passes. The asymptotic quantity is then defined as
A refined estimate of λ_{EC} and its upper bound on the asymptotic behaviour is provided in ref. ^{35}. From this, we determine that \({\lambda }_{\,{{\mathrm{EC}}}\,}^{\infty }={n}_{{\mathsf{X}}}^{(1)}h(Q)\), where Q is the QBER for a single pass. When running the finite key optimiser for the asymptotic key length per pass, we define \({\lambda }_{\,{{\mathrm{EC}}}\,}^{\infty }=1.16{n}_{{\mathsf{X}}}^{(1)}h(Q)\), which accounts for inefficient error correction even in the asymptotic limit.
Rather than looking at the key length per pass, it is also common to consider the key rate, i.e. the number of secret key bits per transmitted pulse. Let N be the total number of pulses transmitted by the satellite during a single pass. The key rate for M passes is just SKR_{M} = ℓ_{M}/(MN). In the limit of infinitely many passes, the asymptotic key rate is given by SKR_{∞} = ℓ_{∞}/N.
Notice that our analysis of the asymptotic secret key rate, SKR_{∞} differs from the route often taken in the literature. Specifically, the asymptotic key rate can be determined as a function of different elevation angles. The data is then combined according to Eq. (1). While such an approach is possible if we extract keys for each angle of elevation, it is not appropriate for the current analysis, where we group all the data for a pass and then extract a key from the combined data.
Classical communications for SatQKD
In traditional fibrebased QKD, the cost of classical communications is often overlooked given the availability of the internet backbone. However, in SatQKD classical radio communications is often constrained due to restrictions in antenna size and power, and thus could possibly represent a bottleneck in the reconciliation process.
We estimate the classical communication capacity required for secret key generation in SatQKD. Using the baseline system parameters from Micius summarised in Table 1, we consider a system loss metric of \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}=40\) dB for a zenith pass. For BB84 there are five stages requiring four distinct rounds of classical communication between the satellite (Alice) and the OGS (Bob) to process a block:

1.
Alice to Bob: Prior to any classical transmission, Alice first encodes information in the polarisation basis of WCPs that are transmitted to Bob. Based on our finite key optimiser, the optimal time window for \({\eta }_{{{{\rm{loss}}}}}^{{{{\rm{sys}}}}}=\) 40 dB is a total of 200 s centred at zenith (Δt = 100 s) with signal parameters of μ_{1} = 0.697364, p_{1} = 0.738668, μ_{2} = 0.159325, p_{2} = 0.189355, μ_{3} = 0, p_{3} = 0.0720, and a basis encoding probability P_{X} = 0.725313. This results in the expected detections by Bob of \({\overline{n}}_{{\mathsf{X}}}=536038\) and \({\overline{n}}_{{\mathsf{Z}}}=203006\) in the X and Z bases, respectively.

2.
Bob to Alice: Bob needs to report to Alice the timeslot positions and basis values for each detection event. To specify a timeslot position requires a maximum of \(\lceil {\log }_{2}(2{{\Delta }}t{f}_{{{\mbox{s}}}})\rceil =36\) bits with a naïve encoding. Bob detected \({n}_{{{\mbox{B}}}}={\overline{n}}_{{\mathsf{X}}}+{\overline{n}}_{{\mathsf{Z}}}=739044\) events and uses 36 + 1 bits per event in his bit string which is < 27 Mb.

3.
Alice to Bob: Alice confirms to Bob the timeslot of the detected events for which the bases matched. She also transmits along with each reconciled event the intensity of the pulse (2 bits), and if sent in the Z basis (1 bit), the sent bit value. After basis reconciliation there are on average n_{X} = 388795, n_{Z} = 55763 events in the X and Z bases, respectively. Alice reports n_{A} = n_{X} + n_{Z} = 444558 events and uses at most 36 + 2 + 1 bits per event in her bit string which results in < 20 Mb data to be downlinked.

4.
Bob to Alice: Bob now calculates the phase and bit error rates using Alice’s reconciliation data and then transmits to Alice the parameters for the error correction code to use, e.g. which preagreed set of low density parity check (LDPC) codes to use, as well as the dimensions of the privacy amplification matrix, which require bit strings of size ≪ 1 kb.

5.
Alice to Bob: Alice calculates the specified error correction syndromes and transmits the results to Bob who then performs the error correction on his side. We estimate the amount of syndrome data to be transmitted by the amount of leaked information, λ_{EC} = 55360 bits, hence Alice sends < 60 kb down to Bob in this step.
The total classical communication required in the above steps is less than 50 Mb (6.25 MB), of which ~27 Mb is uplinked and ~20 Mb is downlinked.
Note for the classical communication exchange in satellite QKD, steps two and three can start as soon as Bob starts receiving counts. However, steps four and five can only occur after Bob receives the final counts that make up the block, but the amount of data in these steps is minimal. This indicates that the bulk of the classical communication exchange can occur in parallel to the quantum transmission.
Expected annual SKL
We can estimate the expected annual secret key length from SKL vs ground track offset relation. Consider a satellite in sun synchronous orbit (SSO) at an inclination of ~98^{∘}. For OGS latitudes below 60^{∘}, this can be approximated by a polar orbit (Fig. 9). The precession period of a SSO is one year, during which time the satellite makes ~5500 orbits.
The striped purple ground path below the satellite is the key generation footprint. As the Earth rotates daily under the orbit of the satellite, the key generation footprint intercepts the line of latitude uniformly on average throughout the year. Note, this is under the assumption that the orbital period is not rationally related to the length of the solar day, i.e. not for a simultaneous SSO and Earth synchronous orbit. Since at low latitudes the distance around the line of latitude is greater than for higher latitudes, the key generation footprint represents a smaller fraction of the longitudinal circumference. Hence, on average, the satellite is more likely to pass close to the OGS at higher latitudes.
Data availability
The data that support the findings of this study are available from the corresponding authors upon reasonable request.
Code availability
The code that supports the findings of this study has been released as open source software with documentation in ref. ^{55}.
References
Dowling, J. P. & Milburn, G. J. Quantum technology: the second quantum revolution. Philos. Trans. R. Soc. A 361, 1655 (2003).
Proctor, T. J., Knott, P. A. & Dunningham, J. A. Multiparameter estimation in networked quantum sensors. Phys. Rev. Lett. 120, 080501 (2018).
Sidhu, J. S., Ouyang, Y., Campbell, E. T. & Kok, P. Tight bounds on the simultaneous estimation of incompatible parameters. Phys. Rev. X 11, 011028 (2021a).
Sidhu, J. S. & Kok, P. Geometric perspective on quantum parameter estimation. AVS Quantum Sci. 2, 014701 (2020).
Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009).
Pirandola, S. et al. Advances in quantum cryptography. Adv. Opt. Photon. 12, 1012 (2020).
Sidhu, J. S., Izumi, S., NeergaardNielsen, J. S., Lupo, C. & Andersen, U. L. Quantum receiver for phaseshift keying at the singlephoton level. PRX Quantum 2, 010332 (2021).
Sidhu, J. S., Bullock, M. S., Guha, S. & Lupo, C. Unambiguous discrimination of coherent states. arXiv:quantph/2109.00008. Preprint at https://arxiv.org/abs/2109.00008 (2021).
Knill, E., Laflamme, R. & Milburn, G. J. A scheme for effcient quantum computation with linear optics. Nature 409, 46 (2001).
Wehner, S., Elkouss, D. & Hanson, R. Quantum internet: a vision for the road ahead. Science 362, 6412 (2018).
Humphreys, P. C., Barbieri, M., Datta, A. & Walmsley, I. A. Quantum enhanced multiple phase estimation. Phys. Rev. Lett. 111, 070403 (2013).
Kómár, P. et al. A quantum network of clocks. Nat. Phys. 10, 582 (2014).
Polino, E. et al. Experimental multiphase estimation on a chip. Optica 6, 288 (2019).
Guo, X. et al. Distributed quantum sensing in a continuousvariable entangled network. Nat. Phys. 16, 281 (2020).
IloOkeke, E. O., Tessler, L., Dowling, J. P. & Byrnes, T. Remote quantum clock synchronization without synchronized clocks. NPJ Quantum Inf. 4, 40 (2018).
Jozsa, R., Abrams, D. S., Dowling, J. P. & Williams, C. P. Quantum clock synchronization based on shared prior entanglement. Phys. Rev. Lett. 85, 2010 (2000).
Qian, T., Bringewatt, J., Boettcher, I., Bienias, P. & Gorshkov, A. V. Optimal measurement of field properties with quantum sensor networks. Phys. Rev. A 103, L030601 (2021).
Fitzsimons, J. F. Private quantum computation: an introduction to blind quantum computing and related protocols. NPJ Quantum Inf. 3, 23 (2017).
Yin, H.L. et al. Measurementdeviceindependent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 117, 190501 (2016).
Boaron, A. et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 121, 190502 (2018).
Boaron, A. et al. Progress on quantum key distribution using ultralow loss fiber. book Optical Fiber Communication Conference. J. Opt. Soc. Am. M4A5 (2020).
Chen, J.P. et al. Sendingornotsending with independent lasers: secure twinfield quantum key distribution over 509 km. Phys. Rev. Lett. 124, 070501 (2020).
Sidhu, J. S. et al. Advances in space quantum communications. IET Quantum Commun. 2, 182–217 (2021).
Gündoğan, M. et al. Proposal for spaceborne quantum memories for global quantum networking. npj Quantum Inf. 7, 128 (2021).
Hughes, R. et al. Quantum cryptography for secure freespace communications. Proc. SPIE 3615, 98 (1999).
Kurtsiefer, C. et al. A step towards global key distribution. Nature 419, 450 (2002).
Oi, D. K. L. et al. Cubesat quantum communications mission. EPJ Quantum Technol. 4, 6 (2017).
Mazzarella, L. et al. QUARC: quantum research cubesat—a constellation for quantum communication. Cryptography 4, 7 (2020).
Polnik, M. et al. Scheduling of space to ground quantum key distribution. EPJ Quantum Technol. 7, 3 (2020).
Villar, A. et al. Entanglement demonstration on board a nanosatellite. Optica 7, 734 (2020).
Jianwei, P. Progress of the quantum experiment science satellite (QUESS) Micius project. Chin. J. Space Sci. 38, 604 (2018).
Tomamichel, M., Lim, C. C. W., Gisin, N. & Renner, R. Tight finitekey analysis for quantum cryptography. Nat. Commun. 3, 634 (2012).
Lim, C. C. W., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Concise security bounds for practical decoystate quantum key distribution. Phys. Rev. A 89, 022307 (2014).
Rusca, D., Boaron, A., Grünenfelder, F., Martin, A. & Zbinden, H. Finitekey analysis for the 1decoy state QKD protocol. Appl. Phys. Lett. 112, 171104 (2018).
Tomamichel, M., MartinezMateo, J., Pacher, C. & Elkouss, D. Fundamental finite key limits for oneway information reconciliation in quantum key distribution. Quantum Inf. Process. 16, 280 (2017).
Yin, H.L. et al. Tight security bounds for decoystate quantum key distribution. Sci. Rep. 10, 14312 (2020a).
Bourgoin, J.P. et al. A comprehensive design and performance analysis of low earth orbit satellite quantum communication. N. J. Phys. 15, 023006 (2013).
Bourgoin, J.P. et al. Experimental quantum key distribution with simulated groundtosatellite photon losses and processing limitations. Phys. Rev. A 92, 052339 (2015).
Curty, M. et al. Finitekey analysis for measurementdeviceindependent quantum key distribution. Nat. Commun. 5, 3732 (2014).
Bacco, D., Canale, M., Laurenti, N., Vallone, G. & Villoresi, P. Experimental quantum key distribution with finitekey security analysis for noisy channels. Nat. Commun. 4, 1 (2013).
Lim, C. C.W., Xu, F., Pan, J.W. & Ekert, A. Security analysis of quantum key distribution with small block length and its application to quantum space communications. Phys. Rev. Lett. 126, 100501 (2021).
Yin, J. et al. Entanglementbased secure quantum cryptography over 1,120 kilometres. Nature 582, 501 (2020b).
Usenko, V. C. et al. Entanglement of Gaussian states and the applicability to quantum key distribution over fading channels. N. J. Phys. 14, 093048 (2012).
Hosseinidehaj, N., Walk, N. & Ralph, T. C. Composable finitesize effects in freespace continuousvariable quantumkeydistribution systems. Phys. Rev. A 103, 012605 (2021).
Chen, Y.A. et al. An integrated spacetoground quantum communication network over 4,600 kilometres. Nature 589, 214 (2021).
Liorni, C., Kampermann, H. & Bruß, D. Satellitebased links for quantum key distribution: beam effects and weather dependence. N. J. Phys. 21, 093055 (2019).
Vasylyev, D., Semenov, A. & Vogel, W. Atmospheric quantum channels with weak and strong turbulence. Phys. Rev. Lett. 117, 090501 (2016).
Andrews, L. C. & Phillips, R. L. Laser Beam Propagation Through Random Media (SPIE Press, 2005) .
Berk, A. et al. MODTRAN6: a major upgrade of the MODTRAN radiative transfer code. In Proc. SPIE, Vol. 9088 (2014).
Vasylyev, D., Vogel, W. & Moll, F. Satellitemediated quantum atmospheric links. Phys. Rev. A 99, 053830 (2019).
Pirandola, S. Satellite quantum communications: fundamental bounds and practical security. Phys. Rev. Res. 3, 023130 (2021).
Toyoshima, M. et al. Polarization measurements through spacetoground atmospheric propagation paths by using a highly polarized laser source in space. Opt. Express 17, 22333 (2009).
Vergoossen, T., Loarte, S., Bedington, R., Kuiper, H. & Ling, A. Modelling of satellite constellations for trusted node QKD networks. Acta Astronautica 173, 164 (2020).
Lo, H.K., Chau, H. F. & Ardehali, M. Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133 (2005a).
Sidhu, J. S., Brougham, T., McArthur, D., Pousa, R. G. & Oi, D. K. L. Satellite quantum modelling & analysis software version 1.0: Documentation.arXiv:2109.01686. Preprint at https://arxiv.org/abs/2109.01686 (2021).
Renner, R. Security of Quantum Key Distribution. Ph.D. thesis. Swiss Federal Institute of Technology, Zurich. arXiv:quantph/0512258. Preprint at https://arxiv.org/abs/quantph/0512258 (2006).
Wang, W., Xu, F. & Lo, H.K. Prefixedthreshold realtime selection method in freespace quantum key distribution. Phys. Rev. A 97, 032337 (2018).
Ceccarelli, F. et al. Recent advances and future perspectives of singlephoton avalanche diodes for quantum photonics applications. Adv. Quantum Technol. 4, 2000102 (2021).
Holzman, I. & Ivry, Y. Superconducting nanowires for singlephoton detection: progress, challenges, and opportunities. Adv. Quantum Technol. 2, 1800058 (2019).
Erlong, M. et al. Background noise of satellitetoground quantum key distribution. N. J. Phys. 7, 215 (2005).
Alléaume, R. Implementation security of quantum cryptography: Introduction, challenges, solutions. ETSI White Pap. 27, 28 (2018).
Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Proc. IEEE Int. Conf. Comput., Syst. & Signal Process., 175 (1984).
Gryszka, K. From biased coin to any discrete distribution. Period. Math. Hung. 83, 71 (2020).
Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000).
Hwang, W.Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).
Wang, X.B. Beating the photonnumbersplitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).
Lo, H.K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
Ma, X., Qi, B., Zhao, Y. & Lo, H.K. Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005).
Hasegawa, J., Hayashi, M., Hiroshima, T. & Tomita, A. Security analysis of decoy state quantum key distribution incorporating finite statistics. arXiv:quantph/0707.3541. Preprint at https://arxiv.org/abs/0707.3541 (2007).
Cai, R. Y. Q. & Scarani, V. Finitekey analysis for practical implementations of quantum key distribution. N. J. Phys. 11, 045024 (2009).
Zhang, Z., Zhao, Q., Razavi, M. & Ma, X. Improved keyrate bounds for practical decoystate quantumkeydistribution systems. Phys. Rev. A 95, 012333 (2017).
Hayashi, M. & Nakayama, R. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths. N. J. Phys. 16, 063009 (2014).
Yin, J. et al. Satellitebased entanglement distribution over 1200 kilometers. Science 356, 1140 (2017).
Acknowledgements
We acknowledge support from the UK NQTP and the Quantum Technology Hub in Quantum Communications (EPSRC Grant Ref: EP/T001011/1), the UK Space Agency (NSTP3FT063, NSTP3FT2065, NSIP ROKS Payload Flight Model), the Innovate UK project ReFQ (Project number: 78161), and QTSPACE (COST CA15220). D.O. is an EPSRC Researchers in Residence at the Satellite Applications Catapult (EPSRC Grant Ref: EP/T517288/1). D.O. and T.B. acknowledge support from the Innovate UK project AirQKD (Project number: 45364). D.O. and D.M. acknowledge support from the Innovate UK project ViSatQT (Project number: 43037). R.P. acknowledges support from the EPSRC Research Excellence Award (REA) Studentship. The authors thank J. Rarity, D. Lowndes, S. K. Joshi, E. Hastings, P. Zhang, and L. Mazzarella for insightful discussions. D.O. also acknowledges discussion with S. Mohapatra, Craft Prospect Ltd., and support from the EPSRC Impact Acceleration Account.
Author information
Authors and Affiliations
Contributions
D.O. conceived, obtained funding for, and initiated the research. J.S.S. and T.B. developed the finite key optimiser and performed the simulations with additional assistance from D.Mc.A. R.G.P. conducted background literature reviews. J.S.S., T.B., and D.O. wrote an initial draft with inputs and feedback from all authors. All authors contributed equally in selecting relevant literature, final editing, and proofreading of the manuscript. J.S.S. and T.B. contributed equally to the paper.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Sidhu, J.S., Brougham, T., McArthur, D. et al. Finite key effects in satellite quantum key distribution. npj Quantum Inf 8, 18 (2022). https://doi.org/10.1038/s41534022005253
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41534022005253
This article is cited by

Simulating quantum repeater strategies for multiple satellites
Communications Physics (2022)

Statistical verifications and deeplearning predictions for satellitetoground quantum atmospheric channels
Communications Physics (2022)

Secured: quantum key distribution (SQKD) for solving sidechannel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks
Soft Computing (2022)