Introduction

Quantum key distribution (QKD)1,2,3,4,5 allows two remote parties to distribute secure keys through public channels. QKD can ensure unconditional security guaranteed by the laws of quantum physics1,2,3,4,5. However, in practical implementation, the imperfections of QKD system like imperfect single-photon sources will cause loopholes that eavesdropper may make use of. To overcome this insecurity, the decoy state method was proposed6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26, and one can still keep the unconditional security of QKD with imperfect single-photon sources27,28,29,30,31. Then, to patch up the loophole caused by the limitation of detection efficiency as well as channel losses32,33, the device independent QKD (DI-QKD)34,35,36,37 and the measurement-device independent QKD (MDI-QKD)38,39,40 were developed. The combination of the decoy-state method and MDI-QKD has been studied both experimentally41,42,43,44,45 and theoretically46,47,48,49,50,51,52,53,54,55,56,57.

Yet, because of the complexity of the system compared with the BB84 protocol, the key rate of the decoy-state MDI-QKD is rather lower than BB84. Taking into account the statistical fluctuation, the data size and the communication time become the great influence to the final key rate47,48,50,56. For example, the number of total pulses at each side N is usually larger than 1012 to generate keys. To overcome this difficulty, previously58 we provided a very efficient 4-intensity protocol which can remarkably improve the key rate and communication distance. It can improve the key rate by almost 2 magnitude orders after parameter optimization. However, one should not counted on the unrealistic wish to further improve the efficiency unlimitedly by taking progress on the protocol only. We should also consider the path of improving the quality of the single-photon sources. Generally, at present the weak coherent state(WCS) sources are used for practical QKD. But the WCS pulses have a large vacuum component and significant fraction of multi-photon states, these will severely reduce the key rate and transmission distance. The situation is even worse in MDI-QKD because the large fraction of vacuum pulses(both vacuum decoy states and vacuum fraction in a Poisson pulse) at one side lead to a large observed value of the error rate in X basis. Fortunately, a quantum blockade source(QBS) can conspicuously enhance the signal photon component. The method of using quantum blockade source in QKD was proposed59 with a simple simulation of asymptotic key rate. However, it considers only the traditional BB84 protocol, it has not studied the important MDI-QKD and the finite size effects for practical QKD. Here in this work, we study the application of quantum blockade source in practical decoy state method MDI-QKD with most high efficient protocol, the 4-intensity protocol. Our numerical results will verify the remarkable progress of about 100 times rise in key rate.

Results

The photon blocade

Photon blockade as a nonlinear quantum optical process can be realized experimentally with single atoms coupled to a resonator60,61, solid-state with (quantum dot) QD coupled to dielectric resonators62,63,64,65 and nonlinear Kerr medium66,67. Particularly, Kerr-type material has advantages in its controllability and flexibility. To obtain a high quality single-photon sources, in our previous work(OL2016), we have calculated and simulated explicitly the photon-number distribution for pulses outside cavities. In the single-photon blockade using Kerr-type resonators under the condition of different parameters, it reveals an optimized single-photon state probability. In that work, we have simulated the system with quantum trajectory method68,69,70. In this method, for each single trajectory we simulate, we monitory the number of photons from the output of the resonantor. And the output light could be generally expanded in the Fock basis as: \(|{a}_{out}\rangle ={\sum }_{n=0}^{\infty }{c}_{n}|n\rangle \) where |c n |2 is the probability of photon state |n〉. At last we can estimate the photon number probability P n = \(\frac{{|{c}_{n}|}^{2}}{\sum {|{c}_{i}|}^{2}}\) from the number of counted photons.

Obviously, when evaluating the superiority of certain sources in decoy state method QKD, the photon number probability is wanted. To obtain P n , one needs to simulate the system using quantum trajectory method. For this, the calculation takes a lot of computation resource. And it is not likely to reach the continuous functions but discrete results (seen in Table 1) of the system parameters to P n . This situation urges us to change the normal strategy of dealing with decoy state method MDI-QKD under the influence of statistical fluctuation, which will be discussed later in the work.

Table 1 The photon number probability of two typical different sets of system parameters in ref.59.

Protocol

We use subscript A or B to denote a source at Alice’s side or Bob’s side. In the protocol we proposed before58, sources x A and y A (x B and y B ) only emit pulses in X basis while source z A (z B ) only emits pulses in Z basis. The protocol needs four different states \({\rho }_{{o}_{A}}=|0\rangle \langle 0|,{\rho }_{{x}_{A}},{\rho }_{{y}_{A}},{\rho }_{{z}_{A}}\) \(({\rho }_{{o}_{B}}=|0\rangle \langle 0|,{\rho }_{{x}_{B}},{\rho }_{{y}_{B}},{\rho }_{{z}_{B}})\) respectively.

In photon number space, suppose

$${\rho }_{{x}_{A}}=\sum _{k}{a}_{k}|k\rangle \langle k|,\quad {\rho }_{{x}_{B}}=\sum _{k}{b}_{k}|k\rangle \langle k|,$$
(1)
$${\rho }_{{y}_{A}}=\sum _{k}a{^{\prime} }_{k}|k\rangle \langle k|,\quad {\rho }_{{y}_{B}}=\sum _{k}b{^{\prime} }_{k}|k\rangle \langle k|,$$
(2)
$${\rho }_{{z}_{A}}=\sum _{k}a{^{\prime\prime} }_{k}|k\rangle \langle k|,\quad {\rho }_{{z}_{B}}=\sum _{k}b{^{\prime\prime} }_{k}|k\rangle \langle k|,$$
(3)

We call x A , x B as well as y A , y B the decoy sources; z A , z B the signal sources, and o A , o B the vacuum sources.

At each time, Alice will randomly choose source l A with probability \({p}_{{l}_{A}}\) for l = o, x, y, z. Similarly, Bob will randomly choose source r B with probability \({p}_{{r}_{B}}\) for r = o, x, y, z. The emitted pulse pairs (one pulse from Alice, one pulse from Bob) are sent to the un-trusted third party (UTP). We shall use notation lr to indicate the two-pulse source when Alice use source l A and Bob use source r B to general a pulse pair, e.g., source xy is the source that Alice uses source x A and Bob uses source y B . Also, here in our protocol, the intensity for pulses in Z basis can be different from those of X basis, this makes more freedom in choosing the intensities and hence further raises the key rate. Those effective events caused by pulse pairs from source zz will be used for key distillation, while the effective events caused by sources in X basis and vacuum sources will be used to estimate the yield and the phase-flip error rate of the single-photon pulse pairs.

The final key rate of per pulse pair can be calculated as6,7

$$\begin{array}{l}R={p}_{{z}_{A}}{p}_{{z}_{B}}\cdot \{{a}_{1}^{\text{'}\text{'}Z}{b}_{1}^{\text{'}\text{'}Z}{\underline{s}}_{11}\mathrm{[1}-H({\bar{e}}_{11})]-f{S}_{zz}H({E}_{zz})\},\end{array}$$
(4)

In which, \({\underline{s}}_{11}\) is the lower bound of the single photon counting rate s11, and \({\bar{e}}_{11}\) is the upper bound of the single photon error rate e11, H is the binary Shannon entropy, f is the factor of error correction inefficiency. S lr note the counting rate in UTP while Alice choice the source l and Bob choice the source r, E lr and T lr note the error rate and error counting rate respectively. (Meaning T lr = E lr S lr ).

As S zz and E zz can directly get in UTP, to obtain the final key rate, one needs to know \({\underline{s}}_{11}\) as well as \({\bar{e}}_{11}\) by the decoy state method. As was shown in ref.58, both \({\underline{s}}_{11}\) and \({\bar{e}}_{11}\) are functionals of a common variable \( {\mathcal H} \) (See details in the appendix). The final key rate is then

$$R=\mathop{{\rm{\min }}}\limits_{ {\mathcal H} \,\in \, {\mathcal I} } {\mathcal R} ( {\mathcal H} \mathrm{).}$$
(5)

And as shown in detail in the appendix, \( {\mathcal I} \) is the range of values for \( {\mathcal H} \).

Numerical simulation

With the protocol introduced above, we can numerically calculate the key rate and evaluate the performance of the MDI-QKD. In considering the finite-size effects, we shall take a failure probability of 10−7 with a normal distribution. Finite size effects are very important in the practical application of QKD, because of the finite transition time and relatively small data size, especially when one needs communication with little delay, like generating fresh key.

For these purpose, to achieve a practical useful key rate, we need both the protocol introduced above and the optimization algorithm. There are variety parameters in the protocol (if using the traditional WCS sources, the parameters are the intensities and the emitting probabilities for each sources, which means six variables). Not like the situation without statistical fluctuation, globally optimization will make remarkable difference in the final key rates.

Usually, we describe the decoy state method system by several continuously parameters and optimiz them in computer program. But the case here makes this strategy difficult, because our quantum blockade source is described by the disperse P n . Though these P n are essentially based on several continuously parameters in quantum blockade system, but as discuss above, one have to implement Monte Carlo algorithm to conduct the photon number distribution, which takes a lot of time and the results are may not smooth enough for the farther optimization.

To solve the predicament, we no longer optimize the quantum blockade source itself, but add a linear attenuation device(optical fiber for example) right after each source. Equally obtain the continuously changing source as

$$P{^{\prime} }_{n}=\sum _{k=n}^{\infty }{P}_{k}{\eta }^{n}{\mathrm{(1}-\eta )}^{k-n}{C}_{k}^{n}$$
(6)

here η is the penetration rate, and η [0, 1].

Through this treatment, we need only one kind of quantum blockade source to accomplish the whole decoy state method MDI-QKD. By choice three different η, two decoy sources and one signal source can be easily obtained. And we just need to optimize the three η and corresponding emittion probabilities, which would make the problem simpler and more calculable.

In the numerical simulation, we take a simple treatment using normal distribution to make a fair comparison with the prior art results56,57,58, and uniformly set failure probability ε = 10−7, and implement the global optimization for each method compared in our figures.

Table 2 shows the device parameters and data sizes used in numerical simulations. Except for the parameters listed, we also set error correction inefficiency f e = 1.16 for all the simulation. The parameters choice is based on58 to provide comprehensive and fair comparison and the two lines represent two typical experimental setup.

Table 2 Device parameters and data sizes used in numerical simulations. e d : the alignment error. p d : the dark count rate. η d : the detection efficiency of all detectors. N: the total pulse pair emitted.

In Fig. 1, we compare the performances of quantum blockade source with different photon number distributions in Table 1. The result approximately declares that P1 is the most important parameter to estimate the advantage of quantum blockade source in MDI-QKD. But we must point out that the key rate is also affect by the other P n .

Figure 1
figure 1

The optimized key rates (per pulse pair) versus transmission distance by different sources with device parameters and data size being given by line a of Table 2. The quantum blockade source is choice from Table 1.

Based on this conclusion, in Figs 2 and 3, we chooses quantum blockade source III to compare with the traditional weak coherent source, and the advantage is observable with both case a and case b. In Fig. 4, we plot the single photon pulse pair error rates of the two sources discussed above in the calculation of case a in Fig. 2. And it clearly shows that the remarkable reduction of single photon pulse pair error rate for the quantum blockade source comparing with the traditional weak coherent source, which is the main contribution to the improvement of key rate.

Figure 2
figure 2

The optimized key rates (per pulse pair) versus transmission distance by different sources with device parameters and data size being given by line a of Table 2.

Figure 3
figure 3

The optimized key rates (per pulse pair) versus transmission distance by different sources with device parameters and data size being given by line b of Table 2.

Figure 4
figure 4

The single photon pair error rates versus transmission distance by different sources of the calculation in Fig. 1.

We also give some typical key rates in certain distance points in Table 3. In that table, the key rates in lines 2 and 3 are obtained with parameters of case a, and the other two lines are calculated with parameters of case b in Table 2. It clearly shows the significantly increasing of the key rate due to the quantum blockade sources used, and we also explain that this advantage is mainly due to the reduction of single photon pair error rate.

Table 3 The key rates of some typical distance points. The line two and line three are the simulation of Fig. 2, the line four and line five are the simulation of Fig. 3.

And here we also compare the secure key rate of our numerical simulation with an existing MDI-QKD experiment71. Given the same detector parameters, alignment errors and pulse number, at the distance of 259 km, the key rate of the MDI-QKD experiment with weak coherent state is 3.48 × 10−9 and the key rate of quantum blockade sources is 1.88 × 10−7.

Discussion

In summary, we have investigated the performance of quantum blockade source in practical MDI-QKD. Although the previous work59 obtain the similar simulations to prove the advantage of quantum blockade source comparing with the WCS, but the statistical fluctuation and global optimization are not included there. Even the finite data size reduces the key rate, one can still reach the irresistibly superiority of quantum blockade source by the efficient decoy state method considering statistical fluctuation58 and global optimization strategy. It demonstrates that by implementing the scheme above, the quantum blockade source can greatly improve the key rate and communication distance of practical MDI-QKD, which is nearly tens of or hundreds of times.

Methods

When statistical fluctuation is considered, the estimation will be tougher, but as mentioned above, using our newly developed strategy58, those two parameters of great importance can be estimated easily and tight.

To deal with the decoy state method with statistical fluctuation, we need bring in the expected value of observed variable S lr , T lr , as the form of 〈S lr 〉 and 〈T lr 〉, so the estimation equations are:

$$\begin{array}{c}{s}_{11}\ge {\underline{s}}_{11}( {\mathcal H} )=\frac{[{a}_{1}^{\text{'}}{b}_{2}^{\text{'}}\langle {S}_{xx}\rangle +{a}_{1}{b}_{2}{a}_{0}^{\text{'}}\langle {S}_{oy}\rangle +{a}_{1}{b}_{2}{b}_{0}^{\text{'}}\langle {S}_{yo}\rangle ]-[{a}_{1}{b}_{2}\langle {S}_{yy}\rangle +{a}_{1}{b}_{2}{a}_{0}^{\text{'}}{b}_{0}^{\text{'}}\langle {S}_{oo}\rangle ]-{a}_{1}^{\text{'}}{b}_{2}^{\text{'}} {\mathcal H} }{{a}_{1}{a}_{1}^{\text{'}}({b}_{1}{b}_{2}^{\text{'}}-{b}_{1}^{\text{'}}{b}_{2})},\\ {e}_{11}\le {\bar{e}}_{11}( {\mathcal H} )=\frac{\langle {T}_{xx}\rangle - {\mathcal H} \mathrm{/2}}{{a}_{1}{b}_{1}{ {\mathcal H} }_{11}},\\ {\rm{and}}\, {\mathcal H} ={a}_{0}\langle {S}_{ox}\rangle +{b}_{0}\langle {S}_{xo}\rangle -{a}_{0}{b}_{0}\langle {S}_{oo}\rangle \mathrm{.}\end{array}$$
(7)

In these two estimations, we choice s11 and e11 as the functions of \( {\mathcal H} \), which is the common part of them. (The detail prove of this method can be seen in our previous work58). By using this kinds of estimations, the final key rate is also the functions of \( {\mathcal H} \). Then through scanning \( {\mathcal H} \) in the interval giving by the statistical fluctuation of certain failure probability, the minimum value of \(R( {\mathcal H} )\) is final key rate. And it’s much better than the result of treat statistical fluctuation in s11 and e11 respectively.

So we have,

$$R=\mathop{{\rm{m}}{\rm{i}}{\rm{n}}}\limits_{ {\mathcal H} \,\in \, {\mathcal I} } {\mathcal R} ( {\mathcal H} \mathrm{).}$$
(8)

And \( {\mathcal I} =[h-\delta ,\,h+\delta ]\) with

$$\begin{array}{rcl}h & = & {a}_{0}{S}_{ox}+{b}_{0}{S}_{xo}-{a}_{0}{b}_{0}{S}_{oo}\\ \delta & = & {a}_{0}\gamma \sqrt{\frac{{S}_{ox}}{{N}_{ox}}}+{b}_{0}\gamma \sqrt{\frac{{S}_{xo}}{{N}_{xo}}}+{a}_{0}{b}_{0}\gamma \sqrt{\frac{{S}_{oo}}{{N}_{oo}}}\end{array}$$
(9)

This result is obtained by the theory of statistical fluctuation, γ is the parameter decided by the failure probability.(For example, if we choice the failure probability as 1e − 7, then γ = 5.3)

The other advantage of our method propose in refs58,72 is the joint-treatment of the statistical fluctuation, which allow us to get the expect values in the estimations of \({\underline{s}}_{11}\) and \({\bar{e}}_{11}\) by the following constraints:

$$\begin{array}{c}{N}_{lr}{S}_{lr}+\gamma \sqrt{{N}_{lr}{S}_{lr}}\ge {N}_{lr}\langle {S}_{lr}\rangle \ge {N}_{lr}{S}_{lr}-\gamma \sqrt{{N}_{lr}{S}_{lr}};\,{\rm{f}}{\rm{o}}{\rm{r}}\,{\rm{a}}{\rm{n}}{\rm{y}}\,lr\in {\mathscr{D}}\\ {N}_{yo}\langle {S}_{yo}\rangle +{N}_{oy}\langle {S}_{oy}\rangle \ge {N}_{yo}{S}_{yo}+{N}_{oy}{S}_{oy}-\gamma \sqrt{{N}_{yo}{S}_{yo}+{N}_{oy}{S}_{oy}}\\ {N}_{xx}\langle {S}_{xx}\rangle +{N}_{yo}{\langle {S}_{yo}\rangle }_{+}{N}_{oy}\langle {S}_{oy}\rangle \ge {N}_{xx}{S}_{xx}+{N}_{yo}{S}_{yo}+{N}_{oy}{S}_{oy}-\gamma \sqrt{{N}_{xx}{S}_{xx}+{N}_{yo}{S}_{yo}+{N}_{oy}{S}_{oy}}\\ {N}_{yy}\langle {S}_{yy}\rangle +{N}_{oo}\langle {S}_{oo}\rangle \le {N}_{yy}{S}_{yy}+{N}_{oo}{S}_{oo}+\gamma \sqrt{{N}_{yy}{S}_{yy}+{N}_{oo}{S}_{oo}}\end{array}$$
(10)

and

$${N}_{ox}{S}_{ox}+{N}_{xo}{S}_{xo}+\gamma \sqrt{{N}_{ox}{S}_{ox}+{N}_{xo}{S}_{xo}}\ge {N}_{xo}\langle {S}_{xo}\rangle +{N}_{ox}{\langle {S}_{ox}\rangle }_{ {\mathcal L} }\ge {N}_{ox}{S}_{ox}+{N}_{xo}{S}_{xo}-\gamma \sqrt{{N}_{ox}{S}_{ox}+{N}_{xo}{S}_{xo}}$$
(11)