2025-11-18T19:49:13.756887

A Decoy-like Protocol for Quantum Key Distribution: Enhancing the Performance with Imperfect Single Photon Sources

Cholsuk, Ağlarcı, Oi et al.
Quantum key distribution (QKD) relies on single photon sources (SPSs), e.g. from solid-state systems, as flying qubits, where security strongly requires sub-Poissonian photon statistics with low second-order correlation values (\$g^{(2)}(0)\$). However, achieving such low \$g^{(2)}(0)\$ remains experimentally challenging. We therefore propose a decoy-like QKD protocol that relaxes this constraint while maintaining security. This enables the use of many SPSs with \$g^{(2)}(0) > \$0.1, routinely achieved in experiments but rarely considered viable for QKD. Monte Carlo simulations and our experiment from defects in hexagonal boron nitride show that, under linear loss, \$g^{(2)}(0)\$ remains constant, whereas photon-number-splitting (PNS) attacks introduce nonlinear effects that modify the measured \$g^{(2)}(0)\$ statistics. Exploiting this \$g^{(2)}(0)\$ variation as a diagnostic tool, our protocol detects PNS attacks analogously to decoy-state methods. Both single- and two-photon pulses consequently securely contribute to the secret key rate. Our protocol outperforms the Gottesman--Lo--Lutkenhaus--Preskill (GLLP) framework under high channel loss across various solid-state SPSs and is applicable to the satellite-based communication. Since \$g^{(2)}(0)\$ can be extracted from standard QKD experiments, no additional hardware is required. The relaxed \$g^{(2)}(0)\$ requirement simplifies the laser system for SPS generation. This establishes a practical route toward high-performance QKD without the need for ultra-pure SPSs.
academic

A Decoy-like Protocol for Quantum Key Distribution: Enhancing the Performance with Imperfect Single Photon Sources

Basic Information

  • Paper ID: 2510.09454
  • Title: A Decoy-like Protocol for Quantum Key Distribution: Enhancing the Performance with Imperfect Single Photon Sources
  • Authors: Chanaprom Cholsuk, Furkan Ağlarcı, Daniel K. L. Oi, Serkan Ateş, Tobias Vogl
  • Classification: quant-ph physics.comp-ph physics.optics
  • Publication Date: October 13, 2025
  • Paper Link: https://arxiv.org/abs/2510.09454

Abstract

Quantum key distribution (QKD) relies on single photon sources (SPSs) as flying qubits, with security strongly requiring sub-Poissonian photon statistics characterized by low second-order correlation values g^(2)(0). However, achieving such low g^(2)(0) values remains experimentally challenging. This paper proposes a decoy-like QKD protocol that relaxes this constraint while maintaining security. The protocol enables the use of various single photon sources with g^(2)(0) > 0.1, which are routinely implementable in experiments but rarely considered suitable for QKD. Monte Carlo simulations and hexagonal boron nitride (hBN) defect experiments demonstrate that g^(2)(0) remains constant under linear loss, while photon number splitting (PNS) attacks introduce nonlinear effects that alter the measured g^(2)(0) statistics. By utilizing g^(2)(0) variations as a diagnostic tool, the protocol detects PNS attacks similarly to decoy-state methods. Both single-photon and two-photon pulses can safely contribute to the key generation rate.

Research Background and Motivation

Problem Definition

The core challenge facing quantum key distribution is ensuring security under practical conditions. Traditional QKD protocols require extremely low g^(2)(0) values (typically <0.1) to suppress multi-photon events and prevent photon number splitting attacks. However:

  1. Experimental Challenges: Achieving ultra-low g^(2)(0) values is technically extremely difficult, requiring complex laser systems and perfect single photon sources
  2. Resource Limitations: Single photon sources achievable in many experiments have g^(2)(0) > 0.1 but are considered unsuitable for secure QKD
  3. Hardware Complexity: Traditional approaches require additional hardware components to monitor attacks, increasing system complexity

Research Motivation

The core insight of this paper is that g^(2)(0) remains constant under linear loss but changes under PNS attacks. This property can serve as an intrinsic indicator for attack detection without requiring additional hardware.

Core Contributions

  1. Novel Protocol Development: Develops a decoy-like QKD protocol that employs g^(2)(0) monitoring as a PNS attack detection mechanism
  2. Theoretical Framework Extension: Establishes key generation rate formulas incorporating two-photon contributions, extending beyond the traditional GLLP framework
  3. Experimental Verification: Validates using hexagonal boron nitride (hBN) defects, measuring complete photon statistics
  4. Performance Enhancement: Significantly outperforms GLLP protocol under high channel loss conditions, applicable to satellite communications
  5. Practical Enhancement: Requires no additional hardware; g^(2)(0) can be extracted from standard QKD experiments, simplifying laser system requirements

Methodology Details

Task Definition

Design a QKD protocol capable of:

  • Tolerating higher g^(2)(0) values (>0.1)
  • Real-time detection of PNS attacks
  • Safely utilizing both single-photon and two-photon pulses
  • Maintaining performance in high-loss channels

Protocol Architecture

1. Attack Detection Mechanism

The protocol's core utilizes g^(2)(0) as a diagnostic tool for PNS attacks:

Invariance Under Linear Loss:

g^(2)(0) = ⟨n(n-1)⟩/⟨n⟩²

Under pure linear loss, g^(2)(0) remains invariant to source characteristics.

Changes Under PNS Attacks:

  • Soft attack: Eavesdropper separates one photon from multi-photon pulses
  • Hard attack: Completely blocks single-photon pulses while separating multi-photon pulses

2. Key Generation Rate Formula

The extended key generation rate includes two-photon contributions:

R ≥ (1/2){-Q_μh₂(E_μ)f(E_μ) + Q₁(1-Φ(2e₁-1)) + Q₂(1-Φ((2e₂-1)²))}

Where:

  • Q_μ: Total gain
  • Q_n: n-photon state gain
  • h₂: Shannon entropy function
  • Φ(a) = h₂((1+a)/2)

3. Attack Models

Soft PNS Attack:

P'₀ = P₀
P'₁ = P₁ + xP₂
P'₂ = (1-x)P₂ + xP₃
P'₃ = (1-x)P₃ + xP₄

Hard PNS Attack:

P'₀ = P₀ + xP₁
P'₁ = (1-x)P₁ + xP₂
P'₂ = (1-x)P₂ + xP₃
P'₃ = (1-x)P₃ + xP₄

Technical Innovations

  1. g^(2)(0) Monitoring: First application of second-order correlation function as a real-time attack detection parameter
  2. Two-Photon Utilization: Safely incorporates two-photon pulses into key generation rather than treating them as security threats
  3. Hardware-Free Requirements: Utilizes existing components in standard QKD setups for monitoring
  4. Statistical Analysis: Establishes statistical thresholds for attack detection through Monte Carlo simulations

Experimental Setup

Experimental System

Uses hexagonal boron nitride (hBN) quantum emitters:

  • Excitation Conditions: 25 MHz repetition rate, 80.5 μW excitation power
  • Measurement Parameters: g^(2)(τ) and g^(3)(τ₁,τ₂) correlation functions
  • Quantum Efficiency: Approximately 3.63%

Photon Statistics Measurement

Measured via time-correlated single photon counting technique:

  • Second-order correlation: g^(2)(0) = 0.559
  • Third-order correlation: g^(3)(0,0) = 0.185
  • Integration window: 40 ns (corresponding to 1/f_rep)

Simulation Parameters

  • Sample Size: 10⁷ photon emission events
  • Repetitions: 100 independent simulations
  • Attack Intensity: x ranging from 0 (no attack) to 1 (full attack)
  • Statistical Threshold: 10⁵ photons for stable g^(2)(0) estimation

Experimental Results

Main Results

1. Photon Statistics Evolution

Systematic changes in photon number probability distributions of different single photon sources under PNS attacks:

hBN Source (This Work):

  • Pre-attack: P₀=0.963, P₁=0.036, P₂=0.00038, P₃=1.57×10⁻⁶
  • Under soft attack: P₁ remains constant, P₂, P₃ decrease monotonically
  • Under hard attack: P₁ decreases, P₀ increases slightly

2. g^(2)(0) Variation Characteristics

Variation patterns of g^(2)(0) under different attack modes:

  • Soft Attack: Approximately linear variation
  • Hard Attack: Nonlinear dependence relationship
  • Detection Sensitivity: Larger initial g^(2)(0) values yield more sensitive attack detection

3. Key Generation Rate Comparison

Performance comparison with GLLP protocol:

  • Low-Loss Region (<10 dB): Comparable performance
  • High-Loss Region (>10 dB): Significantly outperforms GLLP
  • Satellite Communications: Still functional at 38 dB loss (Micius satellite parameters)

Convergence Analysis

Statistical requirements for g^(2)(0) estimation:

  • 10³ Photons: Unstable estimation with large fluctuations
  • 10⁵ Photons: Convergence within 3% confidence interval
  • Waiting Time: Completable within satellite flyover time (273 seconds)

Multi-Source System Evaluation

Performance comparison across different solid-state single photon sources:

  • hBN-1,2: Room-temperature operation, easy integration
  • NV/SiV Diamond: Mature technology, good stability
  • GaN Defects: Telecom-band compatible
  • Quantum Dots: High quantum efficiency

All tested sources show waiting times shorter than flyover duration in satellite communication scenarios.

QKD Protocol Development

  1. Classical Protocols: BB84, B92 and other foundational protocols
  2. Decoy-State Methods: Lo-Ma-Chen protocol for WCP systems
  3. Single-Photon Source QKD: Implementations based on solid-state quantum emitters

Single Photon Source Technology

  1. Quantum Dot Systems: High purity but requiring cryogenic operation
  2. Diamond Color Centers: Mature applications of NV and SiV centers
  3. Two-Dimensional Material Defects: Emerging platforms including hBN and GaN
  4. Photon Statistics Theory: Quantum optical foundations of g^(n) functions

Security Analysis

  1. PNS Attack Theory: Pioneering work by Lütkenhaus and others
  2. GLLP Framework: Security analysis for imperfect devices
  3. Practical Security: Finite-length keys and statistical fluctuations

Conclusions and Discussion

Main Conclusions

  1. Technical Breakthrough: Successfully relaxes strict QKD requirements on g^(2)(0), extending from <0.1 to >0.1
  2. Security Assurance: Achieves reliable PNS attack detection through g^(2)(0) monitoring
  3. Performance Enhancement: Significantly outperforms traditional GLLP protocol under high-loss conditions
  4. Practical Value: Applicable to satellite communications without requiring additional hardware

Limitations

  1. Statistical Requirements: Requires sufficient photon numbers (≥10⁵) for reliable g^(2)(0) estimation
  2. Attack Models: Only considers PNS attacks; other attack methods require further investigation
  3. Channel Assumptions: Assumes linear-loss channels; actual channels may be more complex
  4. Quantum Efficiency Dependence: Performance improvement limited for low quantum efficiency sources

Future Directions

  1. Protocol Extension: Combine with other attack detection methods to enhance security
  2. Hardware Optimization: Develop specialized g^(2)(0) monitoring hardware
  3. Network Applications: Extend to quantum networks and multi-user scenarios
  4. Standardization: Establish QKD standards based on g^(2)(0) monitoring

In-Depth Evaluation

Strengths

  1. Strong Innovation: First proposal to use g^(2)(0) as a real-time attack detection parameter with novel concepts
  2. Rigorous Theory: Complete mathematical derivations and comprehensive security analysis
  3. Sufficient Experiments: Combines theoretical simulations with practical measurements, validating protocol feasibility
  4. High Practical Value: Addresses key technical bottlenecks in practical QKD systems
  5. Broad Applicability: Applicable across multiple solid-state single photon source platforms

Weaknesses

  1. Simplified Attack Models: PNS attack models are relatively idealized; actual attacks may be more complex
  2. Environmental Factors: Insufficient consideration of temperature, vibration, and other environmental effects on g^(2)(0)
  3. Long-Term Stability: Lacks verification of stability over extended operation periods
  4. Cost Analysis: Missing detailed system cost and complexity comparisons

Impact

  1. Academic Contribution: Provides new security assurance methods for the QKD field
  2. Technical Advancement: Lowers technical barriers for high-performance QKD systems
  3. Industrial Application: Likely to promote commercialization of QKD technology
  4. Standards Influence: May influence future QKD system design standards

Application Scenarios

  1. Satellite Communications: Particularly suitable for high-loss satellite-ground links
  2. Metropolitan Networks: Medium-distance quantum communication networks
  3. Mobile Platforms: Applications with high hardware simplification requirements
  4. Research Platforms: QKD research utilizing existing single photon sources

References

This paper cites 51 important references covering QKD theoretical foundations, single photon source technology, security analysis, and related topics. Key references include:

  1. Gisin et al. (2002) - QKD Review
  2. Lo, Ma, Chen (2005) - Decoy-State Protocol
  3. Gottesman et al. (2004) - GLLP Security Framework
  4. Multiple experimental works on hBN, quantum dots, and other single photon sources

Overall Assessment: This is a high-quality quantum information science paper with significant contributions in both theoretical innovation and experimental verification. This work is expected to substantially advance the practical implementation of QKD technology, particularly with important application prospects in satellite quantum communications.