Abstract
The roundrobin differentialphaseshift quantum key distribution (RRDPSQKD) protocol could provide an effective way to estimate the leakage information without monitoring the signal disturbance. Moreover, the selfcompensating property of plugandplay (P&P) setup can eliminate the variations of phase or polarization in QKD procedure. In the paper, we introduce the P&P concept into RRDPSQKD, and propose a QKD protocol, named P&P RRDPSQKD protocol, to make the RRDPSQKD scheme more practical. We analyze the security, and discuss the key generation rate with infiniteintensity decoy state method. The results show that the proposed protocol is a good solution to RRDPSQKD protocol with untrusted sources. It has a high security and its key generation rate could be as good as the protocol with trusted sources when the average input photon number N is greater than 10^{6}. In addition, the proposed protocol has a high noise tolerance in comparison with P&P BB84QKD protocol.
Introduction
Quantum key distribution (QKD) allows two distant parties (Alice and Bob) to share secret keys even with the existence of an eavesdropper, Eve^{1}. The unconditional security is based on quantum mechanics, such as quantum nocloning theorem and Heisenberg’s uncertainty principle^{2,3,4}. Since the first QKD (BB84QKD) was proposed^{1}, many QKD protocols have been presented to enhance the security of the practical quantum communications, such as, decoystate QKD protocol^{5,6,7}, deviceindependent QKD protocol^{8} and measurementdeviceindependent QKD protocol^{9,10,11,12,13,14}. The security proofs of the above QKD protocols are focused on the amount of the information leaked to Eve. According to the Heisenberg’s uncertainty principle, any intervention from Eve would inevitably cause the disturbance in the quantum signals, and the leakage information can be estimated by monitoring the signal disturbance^{15,16,17}. Recently, Sasaki et al. proposed a new QKD protocol, named roundrobin differentialphaseshift QKD (RRDPSQKD)^{18}, where the information leakage is estimated without any monitoring, but depends only on the state prepared by Alice.
In RRDPSQKD protocol, Alice encodes random bits in the phases of quantum signal including L pulses, named train, and sends the signal to Bob through an insecure quantum channel. Then Bob randomly picks two pulses in a train, and measures the relative phase between them to obtain the raw key. Bob’s randomness makes it hard for Eve to obtain the information of the key, while the leakage information only comes from the state prepared by Alice. With large enough L, the tolerance of bit error rate e _{ bit } can be up to 50%. It becomes a promising practical QKD scheme.
Up to now, both theoretical^{19,20,21,22,23,24,25,26}, and experimental^{27,28,29,30} studies of RRDPSQKD have been developed. Zhang et al.^{25} applied the tagging technique to overcome the effects of background noise and misalignment. Wang et al.^{29} presented an active implementation of the protocol, where secret keys can be distributed over the distance of 90 km. Constructing a variabledelay interferometer with 127 actively selectable delays, Li et al.^{30} experimentally demonstrated the RRDPS protocol and obtained a final key rate of 15.54 bps with a total loss of 18 dB and an error rate of 8.9%.
To guarantee the security of RRDPSQKD protocol, the sources are usually assumed to be the trusted ones. However, this assumption is not always valid in practice. For example, the intensity fluctuation from the laser source, the parameter fluctuation from the optical devices, and the birefringence of the fibers may invalidate the assumption^{31}. Hence, it is still a challenge to assure the security of RRDPSQKD protocol with an untrusted source.
On the other hand, a plugandplay (P&P) QKD setup is often used to QKD to avoid the careful adjustments and the control of the system on both sides of the communication channel^{32}, and the selfcompensating property could eliminate the variations of phase or polarization in the QKD procedure^{32,33}. Furthermore, the QKD protocol with P&P configuration can give the key generation rate closely to that with a trusted source, even if the source is unknown and untrusted, which is equivalent to the source controlled by an eavesdropper^{34,35,36,37}.
In this paper, we propose a P&P RRDPSQKD protocol to make RRDPSQKD be more practical. In the protocol, the trains of L strong optical pulses, instead of weak ones, are prepared by Bob, and then are encoded and attenuated to singlephoton levels by Alice. Later, the weak pulses carrying information are sent back to Bob with a Faraday mirror and measured by Bob’s variabledelay interferometer. Lastly, Alice and Bob could obtain a secret key with the indices of successful measurement results, together with error correction and privacy amplification. In addition, the security is analysed and the lower bound of the key generation rate is estimated. The performance comparison between our protocol, oneway RRDPSQKD with a trusted source and the P&P BB84QKD with an untrusted source are also presented.
The proposed protocol has the following advantages: (i) The assumption of a trust source can be removed. (ii) Due to the selfcompensating property of the bidirectional structure, the protocol has a high stability. (iii) Strong optical pulses are utilized. This ensures that the preparation, monitoring and synchronization of the source are easily realized under the proposed technique. (iv) The P&P architecture doesn’t disturb the measurement setup of the RRDPS protocol, so the high tolerance of bit error rate in RRDPS protocol is maintained. (v) The proposed protocol is more practical.
Results
The scheme of the plugandplay RRDPSQKD
The schematic diagram of the proposed P&P RRDPSQKD is shown in Fig. 1. A series of Lpulse trains are generated by a strong laser from Bob and transmitted through a quantum channel to Alice. Once the trains arrive at Alice, they are passed through an optical filter (F) and a monitoring unit, which consists of a beam splitter(BS) and an intensity detector (ID). After being reflected by a Faraday mirror (FM), they are phase randomized by a phase randomizer (PR), and encoded by an encoder that consists of an intensity modulator (IM) and a phase modulator (PM). The IM attenuates the optical pulses and sets the average photon numbers to the desired signal or decoy states. Here, the devices (PM, PR and IM) are properly designed to work only during a short time that the legitimate signal is passed. The weak pulses carrying information are sent back to Bob. Bob’s measurement is an unbalanced MachZehnder interferometer (MZI) with a variable delay r controlled by a random number generator (RNG). Using the MZI, Bob detects the signal and acquires the indices {i, j}, and announces the indices via a public channel to Alice. Then Alice and Bob obtain a sifted key s _{ A } and s _{ B }, respectively. Finally, after performing error correction and privacy amplification, Alice and Bob can share a secure key.
The proposed protocol
The details of our protocol are as follows.

(1)
Pulse trains preparation and transmission. Adopting a strong laser source, Bob (the receiver of signal), instead of Alice (the sender of signal), prepares a series of pulse trains each containing L optical pulses and sends them to Alice through an optical fiber.

(2)
Trains monitoring and information encoding. Once each train arrives, Alice performs the filtering by the optical filter (F), and monitors the train by the monitoring unit. Then the pulse trains are passed and reflected from a Faraday mirror (FM) and randomized by a phase randomizer (PR). Alice encodes her information on the series of random Lbit sequences is already generated by Alice with the RNG in her side, and each symbol of one sequence \({s}_{1}{s}_{2}\ldots {s}_{L}\) is encoded to different phases modulated on the L pulses in one train with the phase modulator (PM), for instance, s _{ i } = 0 with 0 phase, s _{ i } = 1 with π phase. Using the IM, Alice attenuates heavily the pulse train to quantum level, and randomly generate signal state with intensity μ or decoy states with intensities \({\nu }_{1}{\nu }_{2}\ldots {\nu }_{m}\). Finally she sends the encoded trains back to Bob.

(3)
Measurement. Upon receiving the Lpulse train, Bob splits the Lpulse train into two Lpulse trains with a 50:50 beam splitter (BS). Then he uses the other RNG to generate a random number \(r\in \{L+1,\cdots ,2,1,1,2,\cdots ,L1\}\), and shifts one of the Lpulse train by r pulses. Bob Measures the interference between the unshifted Lpulse train and the rdelayed train. If Bob obtains a detection result on position i in the unshifted Lpulse train, corresponding to position j in the shifted Lpulse train, where i and j satisfy \({j}={i}+r{(}\mathrm{modL}{)}\), Bob records the result as s _{ B } according to the responses of Bob’s detectors (s _{ B } = 0 according to a click in D0 or s _{ B } = 1 according to a click in D1). Otherwise, Bob regards the transmission as a failure and discards it.

(4)
Key sifting. Bob announces the indices {i, j} to Alice through a classical channel, and Alice obtains a sifted key bit s _{ A } by computing \({s}_{A}={s}_{i}\oplus {s}_{j}\).

(5)
Error correction and privacy amplification. After repeating steps (1)–(4) to accumulate enough sifted key bits, Alice and Bob perform error correction and privacy amplification on the sifted key to extract the final secure key.
Security
Next, we discuss the security of the proposed protocol from two aspects. One aspect is the security of the protocol itself.
In the above procedures, three skills are employed by Alice to enhance the security. First, the narrow bandpass filter is adopted in the proposed protocol to allow only a single mode to enter the encoder, therefore, the singlemode assumption for each signal is guaranteed^{37,34}. Secondly, the monitoring unit is employed to detect the pulse energy and the arrival time to acquire certain information about the photonnumber distribution and the timing mode. By randomly sampling a portion of the pulses to test the photon numbers, the bounds on the output photonnumber distribution can be estimated^{34,37,38}. Finally, the phase randomizer is used to make the phases of the Lpulse trains completely random, which can guarantee the phase randomization assumption made in the security proof for laserbased QKD^{5,39,40}.
On the other hand, as Bob’s random measurement is after Eve’s disturbance, the information leaked to Eve is very limited because of information causality^{41}. Intuitively, Eve seems to have some control over the generation of index i, but the other index j is determined randomly from the rest of the L − 1 as \(j=i+r(modL)\) by the random number r. According to the security proof of the original RRDPS^{18}, the possibility of Eve’s successful interference in the particular value \({s}_{i}\oplus {s}_{j}\) is in the order O(L ^{−1}), which means that the leakage information is dependent on the number of pulses of the source, L. Hence, the amount of privacy amplification depends only on the source and there is no need to monitor Eve’s disturbance.
The other aspect is the security against typical attacks. For the QKD protocol, there are several eavesdropping strategies for Eve to obtain key information. In the following, we analyze them, individually.

(i)
The beam splitting attack: During the protocol, Eve has two chances to intervene and eavesdrop the signal by beam splitting attack. The first chance is the transmission of strong pulse trains from Bob to Alice. Since there is no information encoded on the beam, Eve can not eavesdrop any information at this stage. The other chance is the transmission of the encoded weak pulse trains back from Alice to Bob. Because these Lpulse trains have been attenuated to the singlephoton level, Eve has no control over which of the pulses the photons are in and has a very small possibility to tap one photon if a pulse happens to have more than one photon. Hence she cannot aim to learn the phase difference between a specific pair of pulses. Neither can she force Bob to announce a particular values of {i, j}, since the difference r is randomly chosen by Bob. Such a two fold randomness in {i, j} makes the eavesdropping difficult. So the present protocol is safe under the beam splitting attack.

(ii)
The Trojanhorse attack^{38}. Ideally, Eve may send a spying pulse to Alice to detect the phase shift. However, the pulses from Bob are greatly attenuated by Alice to the singlephoton level, typically, 0.1 per pulses. To get the spying pulse returned with at least 1 photon per pulse, Eve has to send her pulse ten times stronger than Bob’s, which means that Alice can easily detect the existence of Eve by monitoring the pulse energy. So the monitoring unit is also useful in preventing a Trojanhorse attack.

(iii)
The IR(intercept/resent) attack: For this type of attack, Eve may intercept/resent the signal by using the same receiver’s setup as Bob, and detects a photon as Bob does. However, she only could obtain the partial information of index i, because Bob has not yet announced the indices {i, j}. In order to find the secret key, Eve has to resend a fake pulse train to Bob, which unfortunately for Eve her existences will be revealed by an obvious increase of error rate.
Key rate
Define N and K as the average photon number of the source to Alice and the number of pulses, respectively. Here, N and K are the larger positive integers. In the QKD protocol with an untrusted source^{34,36,37}, the pulses with photon number \(m\in [(1\delta )N,(1+\delta )N]\) are defined as “untagged” bits, and the other pulses with photon number \(m < (1\delta )N\) or \(m > (1+\delta )N\) are defined as “tagged” bits, where δ is a small positive real number chosen by Alice and Bob. According to the random sampling theorem, if Δ is defined as the average probability of the tagged sampling pulses in the asymptotic case, Alice can conclude that there are no fewer than \((1{\rm{\Delta }}{\varepsilon })K\) untagged encoding pulses with high fidelity, where ε should be satisfy that \({\varepsilon }^{2}K\gg 1\). Therefore, Alice and Bob focus only on the \((1{\rm{\Delta }}\varepsilon )K\) untagged bits for key generation of the protocol. The key rate of the protocol should be
where Q _{ e } and e _{ bit } denote the overall gain and the quantum bit error rate (QBER), respectively. f denotes the efficiency of the error correction. \(H(x)={\rm{x}}{\mathrm{log}}_{{\rm{2}}}(x)(1x){\mathrm{log}}_{{\rm{2}}}(1x)\) is the binary Shannon entropy function. H _{ PA } is the ratio of key rate loss in privacy amplification. Q represents the gain of the untagged bits, which cannot be measured experimentally, but its upper bounds and lower bounds can be estimated as^{34}
Then, equation (1) can be rewritten as
If the infiniteintensity decoy states are used, the gain Q and the amount of key loss for privacy amplification QH _{ PA } can be given by^{34}
where \({P}_{in}(m)\) is the probability that the input signal of Alice contains m photons, and it can be inferred by monitoring the photon distribution at the setup of ID. P _{ n }(m) is the conditional probability that n photons are emitted by Alice given that m photons enter Alice’s laboratory, which satisfies with a binomial distribution \({P}_{n}(m)={(}_{n}^{m}){\lambda }^{n}{(1\lambda )}^{mn}\). Here, λ denotes the internal transmittance of Alice’s local laboratory, and it can be set by the IM device. \({e}_{ph}^{n}\) is the phase error rate. Y _{ m,n } is the conditional probability that Bob’s detectors click given that m photons enter Alice’s laboratory and n photons are emitted by Alice, and the yield of nphoton state Y _{ n } is given by
where \(P\{mn\}\) is the conditional probability that m photons enter Alice’s laboratory given that n photons are emitted by Alice.
According to the analysis in RRDPSQKD protocol^{18}, the phase error rate \({e}_{ph}^{n}\) in equation (4) can be estimated by
and a threshold photon number \({\nu }_{th} < \frac{L1}{2}\) is chosen, over which the phase error rate is bounded by 1/2. Then, QH _{ PA } is upperbounded by
Thus, the secure key rate of our protocol is estimated by
Numerical simulation
In this section, the performance of our proposed protocol is discussed. For simplicity, we consider the source in the asymptotic case, which means that Alice sends bits to Bob infinitely (i.e. \(K\to \infty \)), therefore ε is close to 0. For any \(\delta \in \mathrm{[0,}\,\mathrm{1]}\), the tagged ratio Δ can be calculated by
where Φ is the cumulative distribution function of the photon for the input pulses. Since it is complicated to calculate numerically, particularly for large N, we approximate the photon number distribution by a Gaussian distribution in our numerical simulation. Hence Δ is given as \({\rm{\Delta }}=erfc(\sqrt{\frac{N}{2}}\delta )\), and δ is chosen as 0.01 in our simulations^{34}.
In the formula of key rate, Q _{ e }, e _{ bit } and \(\underline{Q}\) play important roles in estimating the final secret key rate R. Here, we use the results in ref.^{6} for Q _{ e } and e _{ bit }, they can be measured directly by experiment.
where p _{ d } is the background count rate for the detector, e _{0} and e _{ d } are the error probabilities caused by the background and the misalignment, respectively. μ is the average intensity of the pulse train. η _{ B } is the efficiency of Bob’s detectors, and η _{ t } is the efficiency of the channel transmission, which is expressed as
where α and l are the channel transmission loss rate and the transmission distance, respectively. In addition, according to the Poisson limit theorem, heavy attenuation can transform arbitrary photon number distribution into a Poissonlike distribution, so P _{ n }(m) is approximately written as^{37}
when the parameters N is larger than 10^{6} and μ is less than 1, μ = Nλ. So in our simulation, the parameters P _{ n }(m) and Y _{ m,n } are approximatively independent of m. With the infinite number of decoy states, the yields Y _{ m,n } can be accurately estimated as
In our simulations, λ is an optimal value by calculations, and the other parameters are listed in Table 1 which are reported in ref.^{42}, where L represents the pulse train length.
Figure 2 shows the key rates against the transmission distance with different average input photon number N for (a) L = 16, (b) L = 32, (c) L = 64 and (d) L = 128. Here, the key rate is a maximized one by optimizing μ and v _{ th } for a given transmission distance. From Fig. 2(a–d), we can see that the key rates of the proposed protocol decrease with the increasing transmission distance. The comparison between RRDPSQKD and the P&P RRDPSQKD shows that, for the untrusted source, the key rates of the proposed protocol with N = 10^{6} and N = 10^{7} are similar to that with a trusted source, and is better than the case with N = 10^{5}. Therefore, N is set to 10^{6} in the later simulation analysis.
Figure 3 shows the key rates of our protocol with L = 8, L = 16, L = 32, L = 64 and L = 128. The results indicate that the key rates decrease with the increase of distance, and the maximum transmission distance is close to 80 km, 115 km, 125 km, 125 km and 130 km for L = 8, L = 16, L = 32, L = 64 and L = 128, respectively. Moreover, the maximum key rate and the maximum distance grows with L. With a larger L, both the key rate and the transmission distance can be improved.
Figure 4 shows the key rates versus the bit error rate e _{ bit } for P&P RRDPSQKD protocols with L = 16, L = 32 and L = 64, together with P&P BB84QKD protocol, where the transmission distance is 30 km. The results show that the key rates of the two protocols decrease as the e _{ bit } increases, and for the P&P RRDPSQKD protocol, the performance is better when L is larger. The comparison results with BB84QKD show that BB84QKD has a higher key rate when e _{ bit } is less that 0.065. However, with the increasing e _{ bit }, the key rate of BB84QKD decreases more rapidly, and our protocol has a better key rate performance when e _{ bit } is greater than 0.083. That is, our protocol has a high error tolerance. The P&P RRDPSQKD protocol keeps the advantage of RRDPS while solving the untrusted source problem.
Discussion
In this paper, we have proposed the P&P RRDPSQKD protocol to make RRDPSQKD protocol be more practical. In the proposed protocol, Bob prepares and sends the strong pulse trains to Alice, then Alice monitors, attenuates, and encodes her bit information on these trains, and sends the attenuated trains back to Bob, who later performs interference measurement to obtain raw keys. After the post processing, Alice and Bob could share the final secret key. We have discussed the security of the protocol and analyzed the tight bound of the key rate with the infiniteintensity decoy states method. With the optimal intensity of the signal states and threshold photon number, we have presented the key generation rates performance. The numerical results show that the proposed protocol can perform as well as the oneway RRDPSQKD with trusted sources when the intensity of the untrusted source is greater than 10^{6}, and the proposed protocol can tolerate more noise than that of P&P BB84QKD protocol. Moreover, both the key rate and the transmission distance are improved when the pulse number in a train L is increased.
Additional information
Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
 1.
Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers Systems and Signal Processing, 175–179 (1984).
 2.
Lo, H.K. & Chau, H. F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999).
 3.
Shor, P. W. & Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000).
 4.
Mayers, D. Unconditional security in quantum cryptography. J. Acm 48, 351–406 (2001).
 5.
Lo, H.K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
 6.
Ma, X. F., Qi, B., Zhao, Y. & Lo, H. K. Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005).
 7.
Song, T. T., Qin, S. J., Wen, Q. Y., Wang, Y. K. & Jia, H. Y. Finitekey security analyses on passive decoystate QKD protocols with different unstable sources. Sci. Rep. 5, 15276 (2015).
 8.
Acin, A. et al. Deviceindependent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).
 9.
Lo, H.K., Curty, M. & Qi, B. Measurementdeviceindependent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
 10.
Ma, X. & Razavi, M. Alternative schemes for measurementdeviceindependent quantum key distribution. Phys. Rev. A 86, 062319 (2012).
 11.
Wang, L., Zhao, S. M., Gong, L. Y. & Cheng, W. W. Freespace measurementdeviceindependent quantumkeydistribution protocol using decoy states with orbital angular momentum. Chin. Phys. B 24, 120307 (2015).
 12.
Hwang, W.Y., Su, H.Y. & Bae, J. Ndimensional measurementdeviceindependent quantum key distribution with N + 1 uncharacterized sources: zero quantumbiterrorrate case. Sci. Rep. 6, 30036 (2016).
 13.
Mizutani, A., Tamaki, K., Ikuta, R., Yamamoto, T. & Imoto, N. Measurementdeviceindependent quantum key distribution for ScaraniAcinRibordyGisin 04 protocol. Sci. Rep. 4, 5236 (2014).
 14.
Mao, Q. P., Zhao, S. M., Wang, L., Qian, C. C. & Chen, H. W. Wavelength division multiplexing for measurementdeviceindependent quantum key distribution. Chin. J. Quantum Electron. 34, 46–53 (2017).
 15.
Gottesman, D., Lo, H. K., Lutkenhaus, N. & Preskill, J. Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325–360 (2004).
 16.
Yin, H.L., Fu, Y., Mao, Y. & Chen, Z.B. Security of quantum key distribution with multiphoton components. Sci. Rep. 6, 29482 (2016).
 17.
Kato, G. & Tamaki, K. Security of sixstate quantum key distribution protocol with threshold detectors. Sci. Rep. 6, 30044 (2016).
 18.
Sasaki, T., Yamamoto, Y. & Koashi, M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature 509, 475–480 (2014).
 19.
Mizutani, A., Imoto, N. & Tamaki, K. Robustness of the roundrobin differentialphaseshift quantumkeydistribution protocol against source flaws. Phys. Rev. A 92, 060303 (2015).
 20.
Cao, Z., Yin, Z. Q. & Han, Z. F. Trustworthiness of measurement devices in roundrobin differentialphaseshift quantum key distribution. Phys. Rev. A 93, 022310 (2016).
 21.
Yin, H.L., Fu, Y., Mao, Y. & Chen, Z.B. Detectordecoy quantum key distribution without monitoring signal disturbance. Phys. Rev. A 93, 022330 (2016).
 22.
Zhang, Y. Y. et al. Practical roundrobin differential phaseshift quantum key distribution. Opt. Express 24, 20763–20773 (2016).
 23.
Liu, L., Guo, F.Z., Qin, S.J. & Wen, Q.Y. Roundrobin differentialphaseshift quantum key distribution with a passive decoy state method. Sci. Rep. 7, 42261 (2017).
 24.
Wang, L. & Zhao, S. Roundrobin differentialphaseshift quantum key distribution with heralded paircoherent sources. Quantum Inf. Processing 16, 100 (2017).
 25.
Zhang, Z., Yuan, X., Cao, Z. & Ma, X. Practical roundrobin differentialphaseshift quantum key distribution. New J. Phys. 19, 033013 (2017).
 26.
Hu, K., Mao, Q. P. & Zhao, S. M. Round robin differential phase shift quantum key distribution using heralded single photon source and detector decoy. Acta Opt. Sin. 37, 0527002 (2017).
 27.
Guan, J. Y. et al. Experimental passive roundrobin differential phaseshift quantum key distribution. Phys. Rev. Lett. 114, 180502 (2015).
 28.
Takesue, H., Sasaki, T., Tamaki, K. & Koashi, M. Experimental quantum key distribution without monitoring signal disturbance. Nature Photon. 9, 827–831 (2015).
 29.
Wang, S. et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring. Nature Photon. 9, 832–836 (2015).
 30.
Li, Y.H. et al. Experimental roundrobin differential phaseshift quantum key distribution. Phys. Rev. A 93, 5 (2016).
 31.
Wang, X.B., Hiroshima, T., Tomita, A. & Hayashi, M. Quantum information with Gaussian states. Phys. Rep. 448, 1–111 (2007).
 32.
Muller, A. et al. “Plug and play” systems for quantum cryptography. Appl. Phys. Lett. 70, 793–795 (1997).
 33.
Stucki, D., Gisin, N., Guinnard, O., Ribordy, G. & Zbinden, H. Quantum key distribution over 67 km with a plug& play system. New J. Phys. 4, 41 (2002).
 34.
Zhao, Y., Qi, B. & Lo, H. K. Quantum key distribution with an unknown and untrusted source. Phys. Rev. A 77, 052327 (2008).
 35.
Peng, X., Xu, B. J. & Guo, H. Passivescheme analysis for solving the untrusted source problem in quantum key distribution. Phys. Rev. A 81, 042320 (2010).
 36.
Zhao, Y., Qi, B., Lo, H. K. & Qian, L. Security analysis of an untrusted source for quantum key distribution: passive approach. New J. Phys. 12, 023024 (2010).
 37.
Xu, F. H. Measurementdeviceindependent quantum communication with an untrusted source. Phys. Rev. A 92, 012333 (2015).
 38.
Gisin, N., Fasel, S., Kraus, B., Zbinden, H. & Ribordy, G. Trojanhorse attacks on quantumkeydistribution systems. Phys. Rev. A 73, 022320 (2006).
 39.
Lo, H.K. & Preskill, J. Security of quantum key distribution using weak coherent states with nonrandom phases. Quantum Inf. Comput. 7, 431–458 (2007).
 40.
Cao, Z., Zhang, Z., Lo, H.K. & Ma, X. Discretephaserandomized coherent state source and its application in quantum key distribution. New J. Phys. 17, 053014 (2015).
 41.
Pawlowski, M. et al. Information causality as a physical principle. Nature 461, 1101–1104 (2009).
 42.
Gobby, C., Yuan, Z. L. & Shields, A. J. Quantum key distribution over 122 km of standard telecom fiber. Applied Physics Letters 84, 3762–3764 (2004).
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Grant No. 61271238, No. 61475075), the Postgraduate Research & Practice Innovation Program of Jiangsu Province (Grant No. KYLX150832), the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education (Grant No. NYKL2015011), and the Science and Technology Project of State Grid (Grant No. SGRIXTKJ[2017]459).
Author information
Affiliations
Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China
 QianPing Mao
 , Le Wang
 & ShengMei Zhao
College of Computer Science and Technology, Nanjing Tech University, Nanjing, 211800, China
 QianPing Mao
Authors
Search for QianPing Mao in:
Search for Le Wang in:
Search for ShengMei Zhao in:
Contributions
Q.P. Mao and S.M. Zhao proposed the idea. Q.P. Mao and L. Wang carried out the calculations. Q.P. Mao wrote the the main manuscript text. S.M. Zhao and L. Wang reviewed the manuscript.
Competing Interests
The authors declare that they have no competing interests.
Corresponding authors
Correspondence to QianPing Mao or ShengMei Zhao.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Further reading

1.
Science China Physics, Mechanics & Astronomy (2018)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.