Quantum fingerprinting using two-photon interference

We present a quantum fingerprinting protocol relying on two-photon interference which does not require a shared phase reference between the parties preparing optical signals carrying data fingerprints. We show that the scaling of the protocol, in terms of transmittable classical information, is analogous to the recently proposed and demonstrated scheme based on coherent pulses and first-order interference, offering comparable advantage over classical fingerprinting protocols without access to shared prior randomness. We analyze the protocol taking into account non-Poissonian photon statistics of optical signals and a variety of imperfections, such as transmission losses, dark counts, and residual distinguishability. The impact of these effects on the protocol performance is quantified with the help of Chernoff information.


Introduction
The use of quantum mechanical superposition states allows one to reduce the communication complexity in certain tasks involving distributed information processing.A seminal example has been provided by Buhrman et al. with the quantum fingerprinting protocol [1], where a Referee is tasked with deciding whether bit strings in possession of two separate parties, Alice and Bob, are identical or different.If Alice and Bob can sent to Referee quantum systems prepared in superposition states rather than orthogonal ones that can carry only classical information, the resource scaling changes to logarithmic from square-root in terms of the number of transmitted qubits.The classical bound is based on an assumption that Alice and Bob have no access to shared prior randomness.Interestingly, the quantum fingerprinting protocol has a feasible optical implementation using coherent states and passive linear optics as recently proposed [2,3] and experimentally demonstrated over standard telecom fiber links [4,5].Comparing bit strings encoded in optical signals is also used as a primitive in other quantum protocols, such as quantum digital signatures [6,7].Note that the coherent-state fingerprinting protocol has a quantum mechanical single-particle counterpart with field amplitudes replaced by probability amplitudes [8].
The coherent-state implementation of the quantum fingerprinting protocol relies on phase coherence between Alice and Bob that enables the Referee to obtain the required information using first-order interference between received coherent states.Although substantial effort has been dedicated to develop stable phase-locked light sources for coherent optical communication [9], they may be unavailable or impractical in some specialized scenarios.A possible remedy to this problem is to resort to second-order interference [10], which is insensitive to the global phase between the incoming beams.In this paper we present and discuss theoretically a quantum fingerprinting protocol, which does not require a shared phase reference between the communicating parties.It is based on two-photon interference also known as the Hong-Ou-Mandel effect [11] which can serve as a linear-optics implementation of the swap test [12].The principle of quantum fingerprinting has been previously demonstrated in experiments with pairs of qubits [13,14].Here we analyze a scalable version of the protocol based on mapping the bit strings held by Alice and Bob onto sequences of binary ± phases that are used to modulate single photons prepared as superposition states of multiple time bins.We show that the advantage over classical protocols without shared randomness matches that for the coherent state scenario despite lack of the phase reference.
Further, we analyze the impact of imperfections, such as residual distinguishability between interfering photons, non-unit detection efficiency which can also include losses and probabilistic single-photon generation, as well as the presence of multiphoton components in the radiation employed in the fingerprinting protocol.The last imperfection is characterized with the help of the normalized second-order intensity correlation function g (2) for a zero delay time [10].
This model can describe quantum fingerprinting using either single photons, corresponding to g (2) ≈ 0, or phase-averaged coherent states with Poissonian statistics for which g (2) = 1, in the regime when the probability of detecting a photon in a single experimental run is much less than one.Such a situation can occur for low transmission of optical channels used by Alice and Bob to send optical signals to the Referee.The performance of a realistic implementation of the two-photon quantum fingerprinting protocol is quantified using the concept of Chernoff information [15], which is a convenient information theoretic tool to characterize the attainable error probability in the asymptotic limit of a large number of experimental runs.
This paper is organized as follows.In Sec. 2 we review quantum fingerprinting with coherent states and introduce the two-photon protocol.The construction of the error-correcting code required for the two-photon protocol is presented in Sec. 3. The advantage in terms of transmittable information compared to classical protocols is also discussed there.In Sec. 4 we describe a model that includes common experimental imperfections.The effect of using light sources with different photon statistics is analyzed using Chernoff information in Sec. 5. Finally, Sec. 6 concludes the paper.

Fingerprinting using optical interference
The basic idea of quantum optical fingerprinting [2] is to map n-bit strings x and y held by Alice and Bob respectively onto sequences of m optical pulses that are subsequently sent to the Referee for comparison.In the simplest scenario Alice and Bob modulate individual pulses with two opposite phases ± that are chosen according to m-bit long binary error correcting codewords E(x) and E(y) for the input strings.The purpose of the error correcting code is to enhance the differences between input strings when x y and thus to augment the response obtained at the detection stage.The relevant characteristics of the error correcting code E will be discussed in Sec. 3. If âi and bi , i = 0, . . ., m − 1, denote annihilation operators for modes corresponding to individual pulses on Alice's and Bob's sides, such modulation corresponds to preparing states of the electromagnetic field over all m time bins in modes âx and by that are given by linear combinations: In the standard coherent-state protocol [2] the states of optical signals prepared by Alice and Bob can be written as where α and β are the complex amplitudes of the sequences prepared by Alice and Bob, and |0 A and |0 B denote vacuum states on Alice's and Bob's sides respectively.Let the complex amplitudes be equal and have the same phase, α = β = √ n, where n is the mean total photon number in each of the sequences.The signals received from Alice and Bob are interfered by the Referee on a balanced beam splitter as shown in Fig. 1(a).This corresponds to the standard linear transformation of the annihilation operators for individual pulses [16]: In the case of identical strings, when x = y, completely destructive interference occurs at the beam splitter output port b corresponding to the family bi of annihilation operators in the representation of output modes.For unequal strings, when x y, the field amplitude at this port is non-zero.A straightforward calculation presented in Appendix yields the probability of registering at least one count at this port equal to 1 − exp[− n(1 − ReV)], where The same conclusion can be drawn in the two-photon protocol when a coincidence between the two detectors is registered.
is the interference visibility.The right hand side of the above expression can be generalized in a straightforward manner to the case when the phases of individual pulses are taken from a constellation larger than the binary set +, −.The protocol gives an erroneous answer when the interference of optical signals encoding different strings does not generate any click at the output port b.The probability of such an event is given by exp[− n(1 − ReV)], which exhibits exponential scaling with the mean photon number n.In many physical scenarios, sharing a common phase reference between Alice and Bob or maintaining the phase stability during the realization of the protocol may be difficult if not impossible.This requirement could be especially demanding in free-space optical communication used e.g. in earth-satellite links or in signal transmission between moving objects.If the global phase between sequences prepared by Alice and Bob is random, a detection event on a single output port can no longer serve as an unambiguous signature of different strings x y.However, in this case one can resort to the Hong-Ou-Mandel effect [11] in two-photon interference which is invariant with respect to a global phase shift.Suppose that Alice and Bob prepare single photons in modes âx and by : where the strings are encoded into binary ± phases of superposition components.These signals are sent to a balanced beam splitter.The probability of a coincidence count between the detectors monitoring the beam splitter outputs reads [17] where V is given by Eq. ( 4) as before.For completeness the above expression has been derived in Appendix.The coincidence count refers to a pair of clicks on both detectors monitoring the output ports a and b of the beam splitter over the timespan of the entire pulse sequence.A coincidence does not necessarily need to occur within a single time bin.For identical sequences the two photons mode match perfectly and P c = 0. Therefore an observation of a coincidence event between the two detectors is an unambiguous signature that the input strings were different, i.e.
x y.After N 2 pairs have been detected by the Referee, the probability that no such event will occur for different strings is This expression exhibits exponential dependence in N 2 , which specifies the number of photons received by the Referee from each party.Hence the scaling in the photon number is analogous to the coherent state protocol, which suggests that the advantage compared to the classical scenario will be similar to the case of first-order interference.One distinguishing feature is that because two-photon interference is insensitive to the global phase, suppression of coincidence counts will occur also when V = −1.
Consequently, too many differences between individual symbols in error correcting codewords E(x) and E(y) will have a detrimental effect on the performance of the two-photon protocol.This issue will be carefully analyzed in the next section.

Error correcting code
The error correcting code is used in the quantum fingerprinting protocol to introduce a minimum gap between the perfect 100% visibility corresponding to identical input strings and the non-unit visibility for any pair of different strings.For a given error correcting code E that maps n-bit input strings onto m-bit sequences used to modulate the ± phases of individual optical pulses the visibility defined in Eq. ( 4) can be written as: where d E(x), E(y) is the Hamming distance between strings E(x) and E(y), i.e. the number of positions at which the two strings differ, and δ = d E(x), E(y) /m is the relative Hamming distance.For notational simplicity we will omit the argument of δ.The error correcting code ensures that for any pair of different strings the relative Hamming distance δ is always greater or equal to a certain minimum value δ min , i.e. δ ≥ δ min .The corresponding change in the sequence length is conventionally characterized by the code rate r = n/m, which for long input strings satisfies the asymptotic Gilbert-Varshamov bound r ≤ r GV (δ min ) = 1 − H 2 (δ min ), where is the binary entropy function [18].The bound is valid for δ min < 1/2.
The key difference between the coherent-state and the two-photon protocol is that in the latter scenario the relative Hamming distance δ approaching one, i.e. when E(x) is a bitwise negation of E(y), generates the same outcome as for δ = 0 when the sequences are identical.This reflects the insensitivity of two-photon interference to the global phase between the interfering fields.A remedy to this issue is to extend a standard error correcting code by an additional sequence of identical bits, as shown in Fig. 2. Specifically, suppose that the initial code of length m is characterized by the minimum relative distance δ min .If we add extra mδ min identical bits to each codeword, the total length of the new code created that way is M = m(1 + δ min ), while the relative Hamming distance ∆ between any pair of different codewords after extension satisfies ∆ min ≤ ∆ ≤ 1 − ∆ min , where ∆ min = δ min /(1 + δ min ).The maximum rate of such a modified code implied by the Gilbert-Varshamov bound is n/M ≤ r GV (δ min )/(1 + δ min ).The right hand side expressed in terms of ∆ min gives: Note that the condition δ min < 1/2 implies that ∆ min < 1/3.The bound (8) enables one to compare the performance of the coherent state and the twophoton protocols.In the coherent-state scenario, both Alice and Bob send on average n photons.Suppose that the coherent-state protocol utilises a standard error correcting code with a minimum Hamming distance δ coh min which gives maximum visibility V coh = 1 − 2δ coh min .The probability that different input strings will not generate any count in the beam splitter output port b is equal to exp[− n(1 − ReV coh )] = exp(−2 nδ coh min ).In the two-photon protocol, Alice and Bob each send N 2 photons and need to use a modified error correcting code characterized by a Hamming distance ∆ min .The probability that after receiving N 2 photon pairs no coincidence event has occurred is equal to , where we have used the visibility for the modified code V = 1 − 2∆ min .
In order to make a fair comparison between the coherent-state and the two-photon protocol we will assume that the number of photons sent by both Alice and Bob to the Referee is in each scenario similar, i.e. n ≈ N , and that the probability of misidentifying different strings is the same.These requirements give rise to the relation: between the minimum Hamming distances of codes used in both protocols for which the misidentification probabilities are equal.This relation enables a direct comparison of respective code rates.In Fig. 3(a) we depict the Gilbert-Varshamov bound for the error-correcting code used in the coherent-state protocol r GV (δ coh min ) along with the bound for the modified code R GV (∆ min ) employed the in two-photon protocol.In order to ensure the same misidentification probability for both protocols, ∆ min has been expressed by δ coh min using Eq. ( 9).This dependence is shown in the inset of Fig. 3(a).
In order to quantify the increase of the sequence length M for the two-photon protocol compared to the value m in the coherent-state case, in Fig. 3(b) we present the ratio r GV (δ coh min )/R GV (∆ min ).Assuming that error correcting codes approaching the Gilbert-Varshamov bound are available, it is seen that for δ coh min ≤ 0.25 the overhead remains approximately below M/m 5.1.Let us recall that the classical information capacity of the optical system sent to the Referee by either Alice or Bob in the coherent-state protocol scales as n log 2 m [2].The counterpart for the two-photon protocol is N 2 log 2 M. As long as the minimum Hamming distance remains in the range considered here, these two expressions differ by a term proportional to the number of photons received by the Referee.Consequently, the advantage in the scaling of the quantum protocol based on two-photon interference should be analogous to the coherent-state case.
The above argument can be put on a rigorous footing by calculating the amount of classical information that could be transmitted using physical systems employed in the quantum fingerprinting protocol.This figure needs to be compared with the amount of information that needs to be communicated in classical fingerprinting.The best known bound on the latter quantity expressed in bits is , where P err is the error probability.Note, however, that it is not known if this bound is saturable and for the best known classical protocol it is necessary to transmit more bits [5].In the quantum two-photon scenario, the number of bits that can be transmitted using at most N 2 photons in M N 2 modes is equal to [19].This expression takes into account also messages composed from fewer than N 2 photons, providing a very conservative figure for the comparison.In the case of the quantum fingerprinting protocol with coherent states, we will estimate the amount of transmittable classical information I coh by the capacity of a bosonic channel with the mean photon number n/m per channel use, which gives I coh = ( n + m) log 2 ( n + m) − n log 2 n − m log 2 m for the entire sequence of m time bins.
In Fig. 4 we compare I class , I S , and I coh for the error probability P err = 10 −6 , and the minimum relative Hamming distance δ coh min = 0.2 for the coherent state protocol, and the corresponding value given by Eq. ( 9) for the two-photon protocol.The hypotheses of equal and different input strings are taken as equiprobable with the worst-case scenario, i.e. minimum Hamming distance, assumed for the latter.It is seen that the quantum advantage appears for input strings longer than approx.10 6 bits and that the performances of the coherent-state and the two-photon protocols are very similar even though the latter does not make use of a phase reference.Remarkably, as illustrated in the inset in Fig. 4, the amount of transmittable classical information for both quantum protocols is nearly the same for large n.It can be shown that in this regime both I S and I coh scale as O(log 2 n), whereas the bound on classical fingerprinting exhibits a different, square-root scaling 4. Comparison of the performance of classical and quantum fingerprinting protocols as a function of the input bit string length n.The gray curve represents the best known lower bound on the number of bits required in the classical protocol I class .The red and black curves depict the amount of classical information I S and I coh that could be transmitted in physical systems employed respectively in the two-photon and the coherent state quantum fingerprinting protocol.The error probability is P err = 10 −6 and the minimum relative Hamming distance equals δ coh min = 0.2 for the coherent state protocol with the corresponding value for the two-photon protocol given by Eq. ( 9).The inset depicts the ratio I S /I coh .

Realistic two-photon fingerprinting
In realistic implementations of the quantum fingerprinting protocol one needs to take into account a variety of experimental imperfections.We will consider a symmetric scenario, in which Alice's and Bob's light sources and optical channels to the Referee have identical properties.The transmission of the channels will be denoted by η.This parameter can also include the non-unit efficiency of detectors used by the Referee.Further, let the detectors have photon number resolution and exhibit dark counts described by Poissonian statistics with the mean p d for each detector.In order to describe imperfections of single photon sources used by Alice and Bob, we will take the probability of generating a single photon to be n.Finally, non-ideal indistinguishability between photons arriving from Alice and Bob will be characterized with a parameter W specifying the fraction of events when the photons interfere perfectly with each other, while in the remaining fraction 1 − W of cases the photons behave as distinguishable particles.
Assuming the model described above, the Referee receives from Alice the one-photon state |1 x A with probability η n.We will also include the possibility of receving simultaneously two photons in a state A with a probability denoted as (η n) 2 g (2) /2.The same probabilities are associated with the states |1 y B and |2 y B = ( b † y ) 2 / √ 2|0 B received from Bob.We will assume that two-photon states appear much more rarely compared to one-photon states, i.e. η ng (2)  1.The factor g (2) has the interpretation of the normalized second-order intensity correlation function [10] and it allows us to describe imperfections of the single-photon source when g (2)  1 as well as include the case of strongly attenuated coherent light sources with a random global phase, when η n 1 and g (2) = 1.Additionally, we shall assume that the contribution of dark counts is small compared to genuine photocounts, i.e. p d /(η n) 1.The overall probability of a two-click event, including both coincidences between the detectors and double counts on one of the reads: where we took into account only the leading terms proportional to (η n) 2 .A straightforward calculation yields the relative probability of a coincidence event among all two-click events in the form: The remaining fraction 1 − Q of two-click events corresponds to double counts on one of the detectors placed after the beam splitter.Deciding whether the received sequences are different or equal can be viewed as a test between two hypotheses [20], which we will denote with respective indices D and E. These two hypotheses define the corresponding fractions of coincidence events Q D and Q E calculated using Eq. ( 11) respectively for V = 1 − 2∆ min and V = 1, assuming the worst-case scenario for the hypothesis D. The basis for the decision is the number N c of coincidence events observed in the overall sample of N 2 two-click events.The probability of obtaining a specific N c is given by a binomial distribution Provided that both hypotheses D and E are equiprobable, the average error probability P err is minimized by a decision rule assigning to each N c the hypothesis υ for which p υ (N c ) is larger as shown in Fig. 5(a).This yields In Fig. 5(b) we depict the error probability for ∆ min = 0.1, p d /(η n) = 0.01, and W = 0.98.The single photon case corresponding to g (2) = 0 is compared with strongly attenuated phase-averaged coherent states for which g (2) = 1.The total number of two-click events is taken as the average value N 2 ≈ P 2 N rounded to the nearest integer, where P 2 is given by Eq. ( 10) and N is the total number of repetitions of the protocol.In such settings, (η n) 2 N of events has been on average generated by a pair composed of photons received from both Alice and Bob.This figure has been used to parameterize the abscissa of Fig. 5(b), which allows one to compare the performance of different light sources used by Alice and Bob with the same photon flux.It is seen that single photon sources perform substantially better compared to classical Poissonian-statistics signals with the same brightness.Note that assumptions made in the calculations imply that the mean photon number received by the Referee from each party in a single run is η n 1.

Chernoff information
In order to quantify the benefit of using non-classical single-photon states we will use the Chernoff information C [15], which allows one to write the error probability for a large number N of repetitions in the asymptotic form P err ∼ exp (−NC).Importantly, Chernoff information gives only the leading order of the exponent in N and the exact exponent may also include terms that are sublinear in N. We will see in numerical examples that the actual error probability is in general below the asymptotic exponential expression, P err ≤ exp (−NC).If a single experimental run yields the value of a certain variable k governed by one of two probability distributions p D (k) or p E (k), Chernoff information is given explicitly by where the sum is taken over all possible values of k.We will consider hypothesis testing based on coincidence events and double counts on one detector, whose probabilities are given respectively by Q υ P 2 and (1 − Q υ )P 2 , υ = D, E. If no other events are used for inference, the general expression (14) for Chernoff information can be simplified to When the overall probability of a two-click event is small, P 2 1, it is justified to expand the above expression up to the linear term in P 2 which gives C ≈ (η n) 2 ζ, where This yields the asymptotic expression for the error probability in the form depicted along numerical results in Fig. 5(b).In order to remove the effects of sublinear terms in the exponent of Eq. ( 17), in the inset of Fig. 5(b) we compare numerically calculated −(log P err )/(η n) 2  with ζ, which shows good asymptotic convergence.As discussed earlier, the factor (η n) 2 N specifies the effective number of events generated by pairs composed of photons from both Alice and Bob.Hence ζ is the effective Chernoff information per one such event.In Fig. 6(a,b) we depict the rescaled Chernoff information ζ for light sources with Poissonian statistics characterized by g (2) = 1 and single photon sources for which g (2) = 0. We have taken the indistinguishability parameter W = 0.98 and a rather broad range for the dark count contribution, 0 ≤ p d /(η n) ≤ 0.05.Calculations have been performed for the minimum relative Hamming distance ∆ min between 0.1 and 0.25.This parameter enters Eq. ( 11) through V = 1 − 2∆ min when calculating the fraction Q D of coincidence events for the hypothesis D of different input strings.It is seen that generally the rescaled Chernoff information for single photons ζ S is higher than for the Poissonian light ζ P .The enhancement can be attributed to higher visibility of two-photon interference reaching 100% for general quantum states of light while being limited to 50% for statistical mixtures of coherent states [21].This limit can be identified in the expression for the effective visibility V eff in Eq. ( 11) by taking the Poissonian statistics with g (2) = 1.Other imperfections described by the indistinguishability parameter W and dark count contribution p d /(η n) only lower further the effective visibility V eff .In Fig. 6(c) we show the ratio ζ S /ζ P , which can be assigned a simple operational interpretation.If we require the same average error probability for the Poissonian and single-photon optical signals with the same photon flux η n, the respective total numbers N P and N S of experimental runs satisfy N P ζ P = N S ζ S according to Eq. ( 17).Hence ζ S /ζ P = N P /N S describes the reduction of the number of experimental runs when single-photons are used in lieu of Poissonian signals with the same brightness.The benefit is most strongly pronounced for lower ∆ min when different strings in the worst-case scenario only modestly reduce the visibility V and when other imperfections, such as dark counts, do not significantly affect the observation of two-photon interference.

Conclusions
We have presented and discussed theoretically a quantum fingerprinting protocol based on two-photon interference which eliminates the need for sharing a phase reference inherent to the coherent-state [2,3] and single-particle protocols [8] exploiting standard first-order interference.The two-photon protocol requires a modification of the error correcting code to ensure that different strings can generate coincidence events.We have analyzed the impact of non-Poissonian photon statistics of optical signals and have taken into account a variety of imperfections, such as non-unit channel transmission and detection efficiency, dark counts, and residual distiguishability between interfering photons.The performance of the protocol has been quantified with the help of Chernoff information, which characterizes asymptotic behavior of the error probability.One should note that in the regime of very weak light sources and/or high channel losses the rate of useful two-click events scales quadratically as (η n) 2 with the photon flux η n which reflects the increasingly rare chance that both the photons from Alice and Bob will be received in the same experimental run.This deficiency could be in principle alleviated by the use of multimode quantum memories at Referee's node [22].It would be also interesting to investigate the effects of phase diffusion [23], either within the pulse sequences or between the two senders in the case of protocols based on first-order interference.
It is worth pointing out that in the coherent-state quantum fingerprinting protocol detecting clicks with temporal resolution would reveal locations at which individual symbols of the transmitted codewords are effectively compared.A click on a detector monitoring the b port of the beam splitter in a given time bin unambiguously heralds that the respective symbols were different.In the two-photon protocol, a temporally resolved two-click event can be associated with a pair of time bins.The type of the event -a coincidence or a double count on one detector -effectively compares the parity of the codeword elements at these two locations for the signals received from Alice and Bob [24].An analogous observation can be made in two-photon inferference for the spatial degree of freedom [25].Finally, let us note that the photons used by Alice and Bob to imprint codewords as phase sequences should not exhibit temporal correlations which are inherent to e.g.photon pair sources based on continuously pumped spontaneous parametric down-conversion.Such correlations could also play the role of shared prior randomness.The photons sent by Alice and Bob should be prepared in the form of narrowband wavepackets that guarantee coherence time over the entire codeword mapped onto the phase pattern.Narrowband photon sources are currently being developed for quantum communication systems that use quantum memories with restricted spectral bandwidth [26,27].

Fig. 1 .
Fig. 1.Quantum fingerprinting protocols using (a) coherent states and (b) photon pairs.Alice and Bob map error correcting codewords onto +/− phase modulation patterns for optical signals sent to the Referee, who combines them on a 50/50 beam splitter.(a) In the case of first order interference, a click on the detector monitoring the output port b of the beam splitter, where field amplitudes are subtracted, implies that the codewords were different.(b)The same conclusion can be drawn in the two-photon protocol when a coincidence between the two detectors is registered.

Fig. 2 .
Fig. 2. Modification of the error correcting code required for the two-photon quantum fingerprinting protocol.(a) A standard error correcting code of length m guarantees that the relative Hamming distance δ between any two different codewords used by Alice A and Bob B is between δ min and 1.Two extreme cases are shown.(b) Extension of the standard code by a fixed number of mδ min ensures that the relative Hamming distance ∆ for any two codewords in the modified code is bounded between δ min /(1 + δ min ) and 1/(1 + δ min ).

Fig. 3 .
Fig.3.(a) Maximum code rates r GV and R GV given by the Gilbert-Varshamov bound respectively for the coherent-state and the two-photon fingerprinting protocol.The minimum Hamming distances δ coh min and ∆ min for the two scenarios are chosen such that the misidentification probability has the same scaling with the number of transmitted photons and their dependence is shown in the inset.(b) The ratio of maximum code rates r GV /R GV which specifies the overhead in the codeword length for the two-photon protocol.

Fig. 5 .
Fig. 5. (a) The decision between hypotheses of different D and equal E inputs is made based on the observed number N c of coincidence events.The chosen hypothesis corresponds to the higher probability p D (N c ) or p E (N c ).(b) The error probability P err assuming equiprobable hypotheses for the minimum Hamming distance ∆ min = 0.1, dark count contribution p d /(η n) = 0.01, and indistinguishability W = 98%.Results for single photons (S, blue lines) corresponding to g(2) = 0 are compared to signals with Poissonian photon number statistics (P, red lines).Solid lines are numerical results and dotted lines are asymptotic expressions based on Chernoff information.The plots are parameterized with the effective number (η n) 2 N of pairs composed of photons received from both Alice and Bob.Note that the curves depicting numerical results lie below the lines corresponding to the asymptotic exponential expression.This is because of additional sublinear terms in N in the exponent of the exact error probability.

Fig. 6 .
Fig. 6.Rescaled Chernoff information for the fingerprinting protocol based on second-order interference using (a) single photons ζ S and (b) optical signals with Poissonian photon number statistics ζ P as a function of the dark count contribution p d /(η n) and the minimum Hamming distance ∆ min .Note different colour codings of numerical values in the panels.(c) The ratio ζ S /ζ P which quantifies the benefit of using single photons in the weak signal regime.