Twin-field quantum key distribution with passive-decoy state

Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater. The security proof of these protocols are based on decoy-state method, which is usually performed by actively modulating a variable optical attenuator together with a random number generator in practical experiments, however, active-decoy schemes like this may lead to side channel and could open a security loophole. To enhance the source security of TF-QKD, in this paper, we propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method. And we present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. This shows our work is meaningful in practice.


I. INTRODUCTION
With the help of quantum key distribution (QKD), distant agents (Alice and Bob) are able to share secret keys with information-theoretic security which is guaranteed by quantum physics [1][2][3]. QKD has been developed rapidly both in theory and experiment over the decades [4][5][6][7][8][9][10][11][12]. However, a fundamental limit is that the secret key rate (SKR) is scaled by the transmittance η [13][14][15], which is finally revealed as the linear key rate bound: R ≤ −log 2 (1 − η) [14]. Fortunately, the Twin-Field quantum key distribution (TF-QKD) protocol made a difference [16], in TF-QKD protocol, pairs of phase-randomized optical pulses are generated at Alice and Bob and then combined at a central measuring station Charlie, single-photon interference is produced at Charlie, this lets TF-QKD gain the square-root of the channel transmittance, which is the same as it with a quantum repeater. The Ref. [17] enhanced the security proof of that given in Ref. [16], it proposed a novel way to use decoy states by switching between decoy mode and code mode, by doing this, it confirmed the scaling properties of the original scheme and overcame the linear key bound at long distances.
Inspired by the original TF-QKD, many variants are proposed including Phase-matching protocol [18], Sending-or-not-sending protocol [19]. And Ref. [20][21][22] removed active phase randomization and phase postselection in code mode, this proved to reach a higher final key rate. Yet, the security proof of all these protocols are based on decoy-state method [23][24][25], the essential idea behind decoy-state method in TF-QKD is simple, the sender (Alice and Bob) varies the mean photon number of each pulse she transmits to the central station (Charlie), users can obtain a better estimation of the behavior of the quantum channel from the measurement results corresponding to different intensity settings, this helps to enhance the achievable SKR and communicating distance. In practical experiments, decoy-state method is usually performed by actively modulating a variable optical attenuator together with a random number generator [26]. However, these approaches may lead to side channel and can even break the security of the system [27], if the VOA, which changes the intensity of Alice's (Bob's) pulses, is not properly designed, it may happen that some physical parameters (for example frequency spectrum) of the pulses emitted by the sender depend on the particular setting selected, which could open a security loophole in the active schemes. Fortunately, passive-decoy protocol [28][29][30] is able to remove certain side channel caused by actively modulating intensity of the source. Specifically, in our proposed scheme, this kind of side channel can be removed provided that Alice and Bob have perfect local detectors and there is no Trojan horse attack. Even though perfect detectors are not available in practical experiments, the side channel may still be significantly reduced when high-detection-efficiency local detectors are equipped. The original passive-decoy protocol utilizes a parametric downconversion source in conjunction with a photon number resolving detector to substitute an idealized single-photon source, the passive-decoy state selection can be accomplished without the need for any active optical elements. Besides, the Refs. [31][32][33] implemented passive-decoy method by using weak coherent pulses (WCPs), in which Alice and Bob treat click and no click of the detectors separately and distill a secret key from both of them.
To enhance the source security of TF-QKD, in this paper we propose passive-decoy TF-QKD, in our scheme, different decoy states are generated passively according to the mode of photon detectors. Our passive scheme can eliminate the side channel generated by active modulation of source intensities, simultaneously, it provides a performance as good as the active decoy method when the setup with four-intensity settings is applied. In Sec.II, we introduce our scheme and the setups. In Sec.III, we give the method to calculate SKR with twointensity decoy setups and four-intensity setups. The conclusion and a discussion are given in Sec.IV.

II. PASSIVE-DECOY TF-QKD PROTOCOL
The system of our passive-decoy TF-QKD scheme is given in Fig.1(a). The setups on Alice have no difference from that on Bob, thus we take Alice as an example. Weak coherent pulse (WCP) is generated at Alice side, BS 1 splits the pulses into two paths (path r and path s), the transmittance of BS 1 is t 1 . Path r and path s are the same in length so the pulses at these two paths will interfere in the passive-decoy setup (PDS). After interference, the outcome mode a 1 is sent to untrusted party Charlie. The PDS is the setup we designed to implement our passive-decoy scheme, it mainly consists of BSs and photon detectors, specifically, Fig.1(b) and Fig.1(c) are two PDSs with two-intensity settings and four-intensity settings. the specific steps of our passive-decoy TF-QKD scheme can be described as follows [20]: step 1. Alice and Bob randomly choose code mode or decoy mode in each trial. step 2.a. When Alice (Bob) chooses code mode, The intensity modulator (IM) blocks the pulses on path s, here we choose Lithium Niobate-based Mach-Zehnder (LNMZ) intensity modulator for its advantages of low driving voltage, high bandwidth, adjustable chirp. The phase modular (PM 1 ) on path r modulates the signal phase according to the random classical key bit 0 or 1. By doing these, Alice (Bob) prepares a weak coherent state | ± √ µ A (| ± √ µ B ) mentioned in Ref. [20].
When Alice (Bob) chooses decoy mode, PM 1 and PM 2 randomize the phase of the pulses on each path and leave the IM on path s unmodulated, the randomized phase will never be publicly announced. By doing these, mixed state in Fock space is generated on path r and path s, and the photon distribution of the mixed state is depending on the mode of photon detectors in PDS.
step 3. For each trial, Charlie publicly announces which detector (L or R) clicks or is a no click event.
After repeating steps 1 to 3 for sufficient times, Alice and Bob publicly announce which trials are code modes and which trials are decoy modes. For the trials in which Alice and Bob both select the code mode and Charlie announces a click event, the raw key bits are generated. For the trials in which Alice and Bob both select decoy mode, Alice and Bob can estimate the yield Y nm , Y nm is the probability of Charlie announcing click event provided Alice emits an n-photon state and Bob emits an m-photon state in a decoy mode.
In step 2, the IM we choose is LNMZ intensity modulator. Since the only purpose of the IM is blocking the pulses on path s in code mode with no information encoded, thus it won't lead to side channel attacks. On the other hand, LNMZ intensity modulator has high bandwidth (usually GHz), making it suitable for systems with high repetition rate like ours. Besides, the extinction ratio of LNMZ intensity modulator is usually more than 25 dB, which means the error rate caused by the IM could be neglected compared with the code rate of our system (see detailed derivation in appendix A).
In the scheme, the secret key rate per trial in a code mode is given as follow Here h(x, y) = −xlog 2 x − ylog 2 y + (x + y)log 2 (x + y), Q µ is the counting rate in code mode, er µ is the error rate of raw key bits, Q µ and er µ can be directly observed experimentally. I u AE is the upper bound of the information leakage, and I u AE can be solved by the following optimization problem in which P k = e −µ µ k /k! is Poissonian distribution. P n (P m ) is determined by the input parameter µ, which is chosen by the parties prior to initiating the experiment.

III. CALCULATION OF THE KEY RATES
To get the secret key rate R in code mode, we need to know the information leakage I u AE in Eq. (2). For that P n , P m and Q µ in Eq.(2) can be observed in practical experiments, thus it is necessary to estimate Y n,m . In our scheme, Y n,m can be bounded with the passive-decoy state method. The gain of the decoy states satisfies Here Q d is the counting rate in decoy mode, P r a (n) (P r b (m)) is the n-photon (m-photon) distribution of the state on Alice (Bob) in decoy mode, which depends on the mode of photon detectors on PSD in our passivedecoy scheme. In ideal case with infinite decoy states, we can list infinite linear equations like Eq.(3) to calculate Y n,m accurately. On the other hand, finite decoy states can also help to estimate the lower bound for yields and it is more feasible in practical system. In our scheme, when the two-intensity setup is implemented in PDS as shown in Fig.1(b), pulses on path r and path s will interfere at BS 2 with two outcomes a 1 and a 2 , a 1 is sent to Charlie and a 2 is detected by D 1 . Denote the detect efficiency of D 1 is η, the darkcount rate is η d , we can get in which P c (n) and P u (n) are probabilities that detector click or not when n photons come. With these two probabilities, we have two different conditional photon number distributions according to the mode of D 1 (see the details in the appendix B) and Here P r 1 (k) is the probability of finding k photons in a 1 when D 1 produces a click, P r 0 (k) is the probability of that when D 1 doesn't click, P (q, k|µ 1 , µ 2 ) is the conditional probability of finding k photons in a 1 and q photons in a 2 when the mean photon numbers of pulses in path s and path r are µ 1 and µ 2 , P (q, k|µ 1 , µ 2 ) is derived in appendix. Then substituting P r 1 (k) and P r 0 (k) into Eq.(3), we can have: in which Q 0,0 d , Q 0,1 d , Q 1,0 d and Q 1,1 d are counting rates on different detector modes in decoy mode . For example, in Eq.(7) Q 0,1 d is the counting rate when the detector on Alice doesn't click and the detector on Bob produces a click, P r 0 a (n) and P r 0 b (n) are defined as same as P r 0 (n) while the subscripts a and b denote the distributions on Alice's and Bob's sides respectively.
In practice, after observing Q 0,0 and Y 2 by linear programming using Eq. (7), where Y 2 denots the yields that are from decoy trials in which Alice and Bob share two photons in total, which means n+m = 2. Then following the same technique in Sec.V of Ref. [20], we substitute these yields into Eq.(2) to bound the information leakage I u AE and calculate the final key rate R in Eq.(1).
After presenting the scheme of generating two-intensity decoy state passively, we decide to go further, thus we add BS 3 and two photon detectors at the end, as shown in Fig.1(c). There are four different modes with two photon detectors in the setup, thus we can get four different conditional photon distributions according to the modes of detector D 1 and D 2 , which means four-intensity decoy states (see the details in the appendix B) P r 00 (k) = ∞ j,l=0 P (k, j, l|µ 1 , µ 2 )P u (j)P u (l) ∞ k,j,l=0 P (k, j, l|µ 1 , µ 2 )P u (j)P u (l) in which P r 00 (k), P r 10 (k), P r 01 (k) and P r 11 (k) are the photon distributions in a 1 given that D 1 and D 2 are in different modes. For example, P r 10 (k) is the probability of finding k photons in a 1 when D 1 produces a click and D 2 doesn't. Note that when the transmittance of BS 3 is t 3 = 0.5, we will get P r 10 (k) = P r 01 (k), which means P r 10 (k) and P r 01 (k) are not independent. To get more useful constraints in linear program, we let 0.5 < t 3 < 1. For readability we write P r 00 , P r 10 , P r 01 , P r 11 as P r 1 , P r 2 , P r 3 , P r 4 , and define the following gains: is the counting rate when both D 1 and D 2 on Alice don't click and the both D 1 and D 2 on Bob produce click, then like what we do in two-intensity cases, after observing these gains, we can give approximations to Y 0,0 , Y 0,1 , Y 1,0 , Y 2,0 , Y 0,2 and Y 2 by linear programming, and we can get the final key rate R using Eq. (1,2). This's the passive scheme of generating four-intensity decoy state with two BS and two photon detectors.
Comparing Fig.1(b) with Fig.1(c), we can know that Alice could increase the mode of the detectors by adding a BS at the end to get more constrains in linear programing and improve key rates. Following this idea, we can actually generalize our setup to infinite passive-decoy case. we denote the joint photon number distribution of the passive setup with n (n=1,2,3...) intensity settings is p n , we can get a recursive formula p n = p n−1 p(n, m|µ 1 , µ 2 ) From Eq. (12), we can get the conditional probabilities of photon number distribution in a 1 on each mode of the detectors, one may refer to the appendix for detailed derivations.
Now we carry out a numerical simulation to evaluate the performance of our two-intensity and four-intensity protocols. We focus on the symmetric case, which means that Charlie is at the middle of Alice and Bob and all other device parameters on Alice's side and Bob's side are identical. The simulation model can be found in the appendix of Ref. [20], the parameters in our simulation are listed in Table.1. Our results are shown in Fig.2. It shows that, in two-decoy settings, there is a gap between active decoy scheme and passive-decoy scheme, while in four-decoy settings, our passive-decoy scheme performs as good as the active one and even slightly better at a long distance. This shows that our passive-decoy state method can perform as good as the active one. Furthermore, our method can eliminate side channels on sources which may be caused by active modulation. Thus our scheme is very promising for applications of practical systems. Besides, we also add a simulation of the passive setup with eight decoys, and compare it with the infinite decoy states.The result shows that the secret key rate of passive setup with the eight decoys surpasses that of the four decoys at a long range of distance. More importantly, the gap between the passive setup with the eight decoys and the infinite decoy states is narrow, which shows our protocol can present satisfactory performance with just a few detectors.

IV. CONCLUSION AND DISCUSSION
We have proposed the scheme of passive-decoy state TF-QKD, in which different decoy states are generated passively according to the modes of photon detectors. In this way, our scheme can eliminate side channel on source caused by actively modulating of the source intensity. Moreover we presented a simulation comparing the key generation rate with that in active-decoy, it shows our result can performs as good as that in active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. Thus our work provides a useful approach to improve the performance of TF-QKD in practical implementation.
Nevertheless, although our scheme can remove certain side channel caused by actively modulating intensity of the source, we can not remove all side channels, there are still further work to do. For example, the scheme is still threatened by Trojan horse attack although it's not easy in practice, and an imperfect real-life source may emit imperfect states with varied frequency spectra, which will also lead to side channel. Fortunately, imperfect states preparation may be remedied by Ref. [34], which proposed that an imperfect source S and a perfect source P are identical in side-channel space if there exists a quantum process that can map the S to P . Besides, the intensities of the photon pulses could be unstable. To solve this issue, Refs. [35,36] have discussed these issues. Ref. [35] bounded the fraction of single-photon counts in the decoy-state QKD, while Ref. [36] proposed a theory that decoy-state QKD with an unstable source can work as if the source were stable provided the condition: max ), for all k ≥ 2 hold. In our scheme, this condition still holds by optimizing the transmittance of BS(s), therefore, our scheme can work under unstable source in principle. Moreover, there are still side channels in our scheme due to bases switching, i.e., different values in phase modulation in the code mode. It would be interesting to study this issue in the future. We take Alice as an example, for simplicity, we let the extinction ratio of the IM be 20 dB, the intensity of the weak coherent pulses from laser be µ, the transmittance of BS 1 is t 1 , thus we have in which µ s , µ r are the intensity of the pulses at the two outputs of BS 1 , then pulses on path s will be blocked by the IM, the intensity of the output pulses is µ s = µ s /100, thus we can get the probability P (µ s , n = 0) = e −µ s , P (µ s , n = 0) = 1 − e −µ s .
Where P (n = 0, µ s ) is the probability of finding no photons from the output of path s after blocking of the IM, P (n = 0, µ s ) = 1 − e −µ s is the probability of finding at least one photon from the output of path s.
For simplicity, we take the error rate er = 0.5 on a 1 as long as there are photons come from path s, thus we have the total error rate er total = 0.5P (µ s , n = 0) = 0.5(1 − e −µ s ).
Since µ s = µ s /100, thus er total is a small value, we take µ s = 0.1 for example, we get er total = 0.00005, it's a small value that it won't affect the performance of our system.

APPENDIX B:PASSIVELY GENERATE DIFFERENT PHOTON NUMBER STATISTICS
Here we focus on the PDS in the whole passive-decoy TF-QKD system, as shown in Fig.1. Let us first consider the interference with two pure coherent states |n = a † n |0 and |m = b † m |0 , where a † and b † are creation operators, n and m are photon numbers. For a † and b † at a BS: Here t is the transmittance of the BS 2 , c † and d † are creation operators of the quantum state of output a 1 and a 2 . Denote U BS2 is the unitary operator of BS 2 , thus we have from Eq.(2) we can get the probability of finding k photons at mode a 1 , it's a problem of statistics.
Here P (k|n, m) is the probability of finding k photons on a 1 given the coherent states on path s and path r containing n and m photons respectively. With P (k|n, m) we can then get the joint probability P (k, n, m|µ 1 , µ 2 ) P (k, n, m|µ 1 , µ 2 ) = P (µ 1 , n)P (µ 2 , m)P (k|n, m), where P (k, n, m|µ 1 , µ 2 ) means the pulses in path r, s are phase-randomized weak coherent states with mean photon number µ 1 and µ 2 , P (µ, n) = e −µ µ n /n! is Poissonian distribution. Summing up n and m and we can get where P (k|µ 1 , µ 2 ) is the photon distribution on mode a 1 given two phase-randomized weak coherent states interfere at BS 2 . In Fig.1, the photon distribution on mode a 2 is the same as mode a 1 .
Here P (k, q|µ 1 , µ 2 ) is the joint probability of finding k photons on mode a 1 and q photons on mode a 2 . Denote η is detect efficiency, η d is darkcount rate of photon detector D 1 , we have in which P c (n) and P u (n) are probabilities that the detector D 1 produces a click and no click when n photons come, thus there are two modes of the detector D 1 according to its click event and no click event. consequently, there are two different conditional photon distribution on a 1 according to the mode of D 1 where the subscripts '1' and '0' of P r 1 (k) and P r 0 (k) means the detector clicks or not when pulses come.

FIG. 1. Passive-decoy state setup with two intensity settings
The derivation above clarifies our passive setup with two-intensity settings, and we also investigate the fourintensity settings, the approach is to add a BS 3 at the end and two detectors for the outcome signals as shown in Fig.2. Thus there are four different conditional photon distributions on a 1 , P r 00 (y), P r 01 (y), P r 10 (y), P r 11 (y), according to the mode of the two detectors, We have get the probability of finding q photons on a 2 in Eq.(5), denote the transmittance of BS 3 is t 3 , we can get the probability of finding j, l photons at the two output of BS 3 with q photons be splitted at BS 3 thus we can get P (j, l|µ 1 , µ 2 ) = q=0 P (j, l|q)P (q|µ 1 , µ 2 ).
Here P (j, l|µ 1 , µ 2 ) is the probability of finding j photons on D 1 and l photons on D 2 , when there are two weak coherent states with the mean photon number of µ 1 and µ 2 on path s and path r. Then we have the joint probability P (k, j, l|µ 1 , µ 2 ) = P (j, l|µ 1 , µ 2 )P (k|µ 1 , µ 2 ).
Here P (k, j, l|µ 1 , µ 2 ) is the joint probability of finding k on a 1 , j photons on D 1 and l photons on D 2 , then we can get the conditional probabilities of photon number distribution on a 1 according to the mode of the detectors D 1 and D 2 P r 00 (k) = ∞ j,l=0 P r 11 (k) = ∞ j,l=0 P (k, j, l|µ 1 , µ 2 )P c (j)P c (l) ∞ k,j,l=0 P (k, j, l|µ 1 , µ 2 )P c (d 1 )P c (l) .
FIG. 2. Passive-decoy state setup with four intensity settings The derivation above clarifies our passive-decoy setup with four-intensity settings, the main idea is adding a BS at the end of the setup with two-intensity settings and two detectors detecting the output pulses. Thus the modes of detectors have increased from two to four, which means we increased the number of passive decoy intensities from two to four.
Following this idea, we can generalize the setup to infinite passive-decoy case. First, we denote the joint probability of the passive-decoy setup with n − 1 (n=1,2,3...) intensity settings is P (k, d 1 , d 2 ...d n−1 |µ 1 , µ 2 )), which means we add n − 1 photon detectors at the end and the joint probability of finding k photons on mode a 1 and finding d n photons on the corresponding photon detector D n is P (k, d 1 , d 2 ...d n−1 |µ 1 , µ 2 ). Then if we add another BS at the end and two photon detectors at the output mode, the setup becomes a setup with n intensity settings, this means in the setup with n − 1 settings, the pulse on the D n−1 is splitted by the added BS and detected by the add photons detectors, denote the transmittance of this BS is t, we can get P (n, m|d n−1 ) = C n q t m (1 − t) m , this is the same as given in Eq. (9), and in P (k, d 1 , d 2 ...d n−1 |µ 1 , µ 2 ), we have P (d n−1 |µ 1 , µ 2 ) = k,d1,d2...dn−2=0 P (k, d 1 , d 2 ...d n−1 |µ 1 , µ 2 ).
(21) P r 100...000 (k) is the conditional probability of photon number distribution on a 1 in the mode that only the detector D 1 clicks and the rest don't among the n detectors added. For other modes of the detectors, the conditional probability of photon number distribution is similar to Eq. (21).