More optimal relativistic quantum key distribution

feature-image

Play all audios:

Loading...

Download PDF Article Open access Published: 13 September 2022 More optimal relativistic quantum key distribution Georgi Bebrov1  Scientific Reports volume 12, Article number: 15377 (2022)


Cite this article


1175 Accesses


1 Altmetric


Metrics details

Subjects Information theory and computationQuantum information Abstract


A great challenge in the field of quantum cryptography is the design and implementation of optimal quantum key distribution (QKD) scheme. An optimal scheme in terms of security is the


so-called relativistic quantum key distribution; it ensures the security of the system by using both quantum phenomena and relativity. However, the existing relativistic schemes have not


demonstrated optimality in terms of efficiency and rate (including secret key rate). Here we report two point-to-point relativistic quantum key distribution schemes implemented with weak


coherent pulses. Both schemes rely on high-dimensional quantum systems (phase and polarization encodings are utilized for establishing key bits). One of the proposed schemes is a system


comprised of two sequentially connected interferometers, as the first (interferometer) controls the behavior of the second one. The other proposed scheme represents a setup of a classic


relativistic QKD, but with slight modification. Both of the proposed schemes are characterized with high secret key rate. The latter scheme has the highest secret key rate of all the


relativistic QKD protocols. However, the values for the secret key rate are relevant for distances of up to 150 km. The former scheme has lower secret key rate, but longer operating


distances (the work could operate at distances of up to 320 km). Those values of rate are obtained without disturbing the security. Secret-key-rate comparison between distinct models is


reported. The proposed relativistic models are compared to twin-field QKD protocols. Furthermore, the work proposes a metric for evaluating the optimality of a QKD. It is defined as a ratio


between the secret key rate (at a given distance) and the amount of quantum resources (qubits) used in the QKD of concern. It is shown that one of the proposed schemes in this article is the


most optimal relativistic key distribution and more optimal than the original twin-field. It is also verified that the proposed schemes excels the original twin-field in terms of secret key


rate, but for short distances.

Similar content being viewed by others Higher-rate relativistic quantum key distribution Article Open access 07 December 2021 Optimized protocol for


twin-field quantum key distribution Article Open access 28 August 2020 Tight finite-key analysis for mode-pairing quantum key distribution Article Open access 21 September 2023 Introduction


The quantum key distribution1,2,3,4,5,6,7,8,9 (QKD) is a communication model with information-theoretic security. Its security is provided by the laws of quantum physics. The existing QKD


models are mainly divided into two groups: discrete-variable (DV) schemes1,2,3,4,5,6,7,8,9 and continuous-variable (CV) schemes10,11,12. Detailed reviews on these two types of QKD are given


in Refs.13,14. In this paper, we are concerned with the discrete-variable implementation of the quantum key distribution. Due to practical difficulties in implementing the standard DV QKD


protocols, researchers resort to developing novel models and techniques, which are used to improve the existing schemes and mitigate the effects of the practical loopholes. For instance, for


overcoming some security issues, the so-called measurement-device-independent or just device-independent schemes9,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35 are


developed. A practical issue for the DV QKD protocols is the lack of existing a true single-photon source, which is required for the proper work of the above-mentioned models. For this


reason, the well-known decoy-state technique is introduced36,37. It is used to implement the existing models with weak coherent pulse (WCP) states instead of single-photons without


deteriorating the behavior of the QKD process. In this regard, WCP protocols are developed6,38,39,40,41. Nowadays, the state of the art is the so-called twin-field QKD, which is initially


introduced in Ref.39 and later modified in the works of Refs.40,41,42,43. The twin-field QKD protocols manifest a secure key rate that scales with the square root of the channel


transmittance, as stated in Ref.39. It represents a practical counterpart of the measurement-device-independent model. The point-relay-point structure of such protocols allows a


higher-distance quantum key distribution implementation9,39.


The main parameter of the QKD schemes is the secret key rate, which in general is illustrated as a function of the operating distance. It shows the reach and the capacity of a given QKD. So


far, the twin-field protocols are characterized with the best secret key rate behavior—they demonstrate a balanced rate-to-distance graph (these models maintain satisfactory rate for longer


distances). The secret key rate is actually an expression yielding a rate value when as many as possible (or almost all) negative practical QKD effects are taken into account. In this


connection, many works are introduced44,45,46,47, which involve tight security bounds and finite-key analysis. The latter allows for better modelling the practical realizations of the QKD


system.


Optical interference is one of the practical tools for constructing secure quantum key distribution systems between two parties38,39,48. The process of interference allows the development of


the so-called relativistic quantum key distribution48,49,50,51. This type of QKD relies mainly on interferometric setup and the principles of relativity52,53,54 in order to provide a way to


detect the presence of a third party (eavesdropper). The other quantum phenomena (such as the uncertainty principle) are profitable resources, which could be used in the implementation of


the relativistic models. So, they could be used for further improving such schemes. Throughout the years, several relativistic schemes are introduced48,49,50,51. In Ref.49, a single-photon


interferometric setup together with delay lines is proposed. The authors state that the usage of orthogonal states are sufficient for ensuring a secure quantum key distribution of this type.


The system manifests a rate of one bit per setup use. However, the work of Ref.49 is based on single-photon interferometry, it is not practical one. Ref.50 presents a single-photon (or WCP)


relativistic scheme, which relies upon the random choice of unitary operator (selecting one operator out of two) independently performed by the participants (sender and recipient).


Reference48 introduces a setup in which two WCP states (signal and reference states) prepared by the sender interfere at the recipient. The sender controls the phase of the signal state


whereas the recipient controls the phase of the reference state. This scheme is characterized with a rate of 1 bit per relevant setup use. A relevant setup use implies a transfer and


interference processes, which produce a click at the recipient’s detector. The work of Ref.51 reports a setup in which two high-dimensional WCP states (both polarization and phase encoding


are applied on the WCPs) interfere at the recipient. It is characterized with a rate of 2 bits per relevant setup use. As just mentioned, the implementation of a relativistic scheme requires


a distribution of two quantum signals over two distinct paths. This is accompanied with lowering the rate-to-distance behavior and resource efficiency of the communication system. Another


drawback of the relativistic schemes is the need of reliable and precise synchronization system, which is fundamental for this kind of key distribution48. In order to compensate the


complexity of the synchronization system, the relativistic communication link needs to be as practical as possible. Also, in order for the relativistic key distribution to be as secure as


possible, its transfer rate acquires relatively low values48,50. A way to increase the rate is to incorporate quantum phenomena into the transfer process of the relativistic quantum key


distribution51.


In this article, we present a relativistic key distribution scheme, which is more optimal than the existing ones in terms of rate as well as efficiency. By rate it is meant not only the


communication (or transfer) rate mentioned above (measured in [bits/use]), but also the secure key rate (rate-to-distance behavior). The implementation of this QKD is based on weak coherent


pulses (WCP), i.e., it is as practical as possible. Note that the security of the novel QKD is not influenced by introducing improvements in the transfer process.

Results


For the sake of the paper’s aim, in this section, we propose two interferometric schemes appropriate for relativistic quantum key distribution.


Scheme I:

Table 1 Encoding/decoding table of Scheme I.Full size tableFigure 1


Mach–Zehnder interferometric scheme of the proposed relativistic QKD model. PSA phase shift possessed by Alice, PSB phase shift possessed by Bob, \(\alpha\) signal coherent state, \(\beta\)


reference coherent state, BS beam splitter, M mirror, cM controlled mirror, T terminator, PSA phase shift possessed by Alice, D detector, Z Z-basis measurement system, X X-basis measurement


system.

Full size image


The proposed scheme, which could be regarded as a combination of the setups introduced in Refs.38,48,51, is characterized with the illustration in Fig. 1. At the input of the interferometric


scheme, two WCP states are fed: \(\alpha\) (at time \(t_1\)) and \(\beta\) (at time \(t_0\)). The state \(\beta\) is a reference state and \(\alpha\) is a signal state, as \(\beta\) is two


times “stronger” than \(\alpha\) (this is a requirement for the proper operation of the scheme), see Refs.38,51. Both WCP states could reside in one of the following polarization states:


\({|{z+}\rangle }\), \({|{z-}\rangle }\), \({|{x+}\rangle }\), \({|{x-}\rangle }\). The states \({|{z+}\rangle }\), \({|{z-}\rangle }\) are the eigenstates of the Z polarization basis,


whereas the states \({|{x+}\rangle }\), \({|{x-}\rangle }\) are the eigenstates of the X polarization basis. Note that \(\alpha\) and \(\beta\) are prepared in identical polarization state.


The key bits established by \(\alpha\) depends on the polarization state and the phase shifts PSA (phase shift of Alice), PSB (phase shift of Bob), see Table 1 for reference. As can be seen


from the table, Alice sends to Bob a \({|{x\pm }\rangle }\) state only if \(\phi _a\) = 0 (PSA = 0-deg) and a \({|{z\pm }\rangle }\) state only if \(\phi _a\) = \(\pi\) (PSA = 180-deg).


For the sake of clarity, we describe the way in which Alice and Bob establish correlated key bits. To begin the key distribution, Alice generates weak coherent pulses \(\alpha\) (signal


state) and \(\beta\) (reference state). She at random selects the polarization state in which they will be transferred (one of the polarization states \({|{z+}\rangle }\), \({|{z-}\rangle


}\), \({|{x+}\rangle }\), \({|{x-}\rangle }\) ). Alice selects the phase shift PSA (PSA \(\in\) {0-deg,180-deg}), which will be applied to \(\alpha\) during its transfer along the


interferometric communication scheme. The selection is made according to the following principles: PSA = 0-deg if \({|{x\pm }\rangle }\) is prepared; PSA = 180-deg if \({|{z\pm }\rangle }\)


is prepared. Alice then sends \(\beta\) to Bob at time \(t_0\) along the lower arm of the interferometric scheme of Fig. 1. At time \(t_1\), Alice sends \(\alpha\) to Bob along the upper arm


of the interferometric scheme of Fig. 1. Slightly after \(t_1\), the phase shift PSA (\(\phi _a\)) is applied to \(\alpha\). This results in the transformation: \(\alpha\) \(\rightarrow\)


\(e^{i\phi _{a}}\alpha\). At the receiving side of the interferometer, \(\beta\) is sent through a mainly transmitting beam splitter (BS1). A fraction of \(\beta\) (denoted by \(\beta '\)),


which is equal to \(\alpha\), is reflected off (BS1) and forwarded to the beam splitter BS2. Then, \(\beta '\) is subjected to a phase shift PSB (PSB \(\in\) {0-deg,180-deg}), which is


randomly chosen by Bob. The phase state of \(\beta '\) is equal to \(e^{i\phi _b}e^{i\frac{\pi }{2}}\beta '\), where \(e^{i\frac{\pi }{2}}\) = i identifies the reflection off BS1 and


\(e^{i\phi _b}\) is the phase inherited from PSB. In other words, it is situated in the state \(ie^{i\phi _b}\beta '\). The other fraction, denoted by \(\beta ''\), is forwarded to a mirror,


which navigates \(\beta ''\) to a controllable mirror (cM). The mirror is controlled via a signal produced by a detector system D (\(\delta\) state should be present at the detector, see


Fig. 3): if \(\delta\) is present, cM gets enabled and \(\beta ''\) is directed towards a terminator (T); otherwise, cM is disabled [Note: In this description, we neglect the time delay in


generating a signal for the sake of controlling cM. If we take into account such a delay, delay lines should be incorporated into \(\gamma\) and \(\beta ''\) paths; only then the delay is


compensated and the proposed scheme is completely compliant with the nature of space-time]. At time \(t_2\), the signal state \(e^{i\phi _a}\alpha\) and the reference state \(ie^{i\phi


_b}\beta '\) interfere at BS2 as follows:

$$\begin{aligned} e^{i\phi _{a}}\alpha \circ ie^{i\phi _b}\beta ' = {\left\{ \begin{array}{ll} \delta &{} \text {if }e^{i0}\alpha \circ ie^{i\pi


}\beta ',\\ -\delta &{} \text {if }e^{i\pi }\alpha \circ ie^{i0}\beta ',\\ i\gamma &{} \text {if }e^{i0}\alpha \circ ie^{i0}\beta ', \\ -i\gamma &{} \text {if }e^{i\pi }\alpha \circ ie^{i\


pi }\beta ', \end{array}\right. } \end{aligned}$$ (1)


where “\(\circ\)” denotes the operation interference, \(\gamma\) identifies the state characterizing the upper output of BS2, and \(\delta\) identifies the state characterizing the lower


output of BS2. If \(\phi _a\) and \(\phi _b\) are so chosen that \(\pm \delta\) occurs after the interference process, a signal is forwarded to the detector system D. If \(\phi _b\) = 0, D


is adjusted to the Z-basis measurement system, else (\(\phi _b\) = \(\pi\)) D is adjusted to play the role of a X-basis measurement system. A click is interpreted as a message (a two-bit


symbol) according to Table 1. As mentioned in the above lines, the triggered detector of D generates a signal, which makes \(\beta ''\) to be reflected off the controllable mirror cM. Then,


the state \(\beta ''\) is directed to the terminator T. In this scenario, Bob accounts no click at either X or Z measurement basis of BS3, see Fig. 1. If \(\phi _a\) and \(\phi _b\) are so


chosen that \(\pm i\gamma\) occurs after the interference process, the controllable mirror cM is disabled and \(\beta ''\) moves to BS3. Note that \(\beta ''\) reaches BS3 as \(e^{i\frac{\pi


}{2}}\beta ''\), where \(e^{i\frac{\pi }{2}}\) is induced from reflection off a mirror M. Therefore, the phase state of \(\beta ''\) at BS3 is \(i\beta ''\). On the other hand, at the upper


output of BS2 \(\pm i\gamma\) gets an additional phase of \(e^{i\frac{\pi }{2}}\) by reflecting off a mirror M: \(\pm ie^{i\frac{\pi }{2}}\gamma\) \(\rightarrow\) \({\mp } \gamma\), where


\(+\gamma\) = \(e^{i0}\gamma\) and \(-\gamma\) = \(e^{i\pi }\gamma\). Then, \(\gamma\) is forwarded to BS3. At this beam splitter, the following interference occurs:

$$\begin{aligned}


{\mp }\gamma \circ i\beta '' = {\left\{ \begin{array}{ll} \eta &{} \text {if }e^{i0}\gamma \circ i\beta '',\\ -i\zeta &{} \text {if }e^{i\pi }\gamma \circ i\beta '', \end{array}\right. }


\end{aligned}$$ (2)


where \(\eta\) identifies the state characterizing the upper output of BS3, and \(\zeta\) identifies the state characterizing the lower output of BS3. The upper output of BS3 is connected to


X-basis measurement system, while its lower output is connected to Z-basis measurement system. The key string of Bob is constructed according to the measurements (detections) taken place


and the relations “phase-polarization” introduced in Table 1: a detection corresponds to a given phase and polarization. Therefore, based on any detection (present at D or X-basis


measurement system or Z-basis measurement system), Bob extracts two-bit key symbols. We should point out that after obtaining his key Bob announces the outputs of BS2 at which each signal is


detected (\(\gamma\) \(\rightarrow\) 0; \(\delta\) \(\rightarrow\) 1). Based on the information announced by Bob, her phase shifts PSA, and the polarization states in which distinct


\(\alpha\)s and \(\beta\)s are prepared, Alice constructs her sifted key. If no errors are present in the communication channel connecting Alice and Bob, they would have totally correlated


sifted keys. Since a noiseless channel does not exist in reality, the sifted keys of Alice and Bob differ from each other. In order to be established a completely correlated, secure key


between the two parties, they perform parameter estimation, key reconciliation55, and privacy amplification56. In this relativistic communication between Alice and Bob, both parties are


aware of the time at which the communication begins and the time interval between sequential signals \(\alpha\) (or \(\beta\)). This implies that if the spatial measures (e.g., length L) of


the scheme are preliminary known, Bob (the recipient) is aware of the time instances at which he could detect signal at either D or X and Z measurement systems. Based on this knowledge, Bob


determines whether or not a given measurement (detection) is retarded. If a measurement is retarded, it is considered as eavesdropped and its result is discarded. Note that Bob announces the


discarded measurements; this is included in the process of correlating the keys of Alice and Bob.


Scheme II:


This scheme operates as follows. Alice generates two WCP states \(\alpha\) and \(\beta\) (\(\alpha\) = \(\beta\)). Alice feeds \(\alpha\) into the upper arm of the interferometric setup of


Fig. 2, whereas \(\beta\) is fed into the lower arm. Alice at random selects the phase shift \(\phi _{\alpha }\) (\(\phi _{\alpha }\) \(\in\) {0-deg,180-deg}), which is applied to


\(\alpha\). Based on the phase shift, Alice at random selects a polarization state for both \(\alpha\) and \(\beta\): if \(\phi _{\alpha }\) = 0-deg, X-basis polarization state


(\({|{x+}\rangle }\), \({|{x-}\rangle }\)) is chosen; if \(\phi _{\alpha }\) = 180-deg, Z-basis polarization state (\({|{z+}\rangle }\), \({|{z-}\rangle }\)) is chosen. For instance, if


Alice selects \(\phi _{\alpha }\) = 0-deg, then a possible polarization state is \({|{x+}\rangle }\) (diagonal polarization state). The WCP states travel from Alice to Bob. Bob performs a


random phase shift \(\phi _{\beta }\) on \(\beta\) (\(\phi _{\beta }\) \(\in\) {0-deg,180-deg}). Also, based on \(\phi _{\beta }\), Bob adjusts his polarizing beam splitter PBS: if \(\phi


_{\beta }\) = 0-deg, Z-basis polarization measurement is conducted at PBS; if \(\phi _{\beta }\) = 180-deg, X-basis polarization measurement is conducted at PBS. As can be easily verified,


in half of the times the interference \(e^{i\phi _{\alpha }}\alpha \circ ie^{i\phi _{\beta }}\beta\) at the beam splitter BS leads to a click at one of the detectors D, see Fig. 2 for


reference. The click is considered as a signal for establishing a key symbol. Bob records a two-bit key symbol, which is related to his phase shift \(\phi _{\beta }\) and a detector click:


\(\phi _{\beta }\) = 0-deg, upper detector clicks \(\rightarrow\) ‘00’; \(\phi _{\beta }\) = 180-deg, upper detector clicks \(\rightarrow\) ‘10’; \(\phi _{\beta }\) = 0-deg, lower detector


clicks \(\rightarrow\) ‘01’; \(\phi _{\beta }\) = 180-deg, lower detector clicks \(\rightarrow\) ‘11’. For the sake of clarity, we present the way of establishing a key symbol in Table 2.


Bob announces the instances at which the detector clicks; the other instances (delayed clicks, inconclusive measurements or no clicks at certain time instances) are discarded (sifted): ‘0’


\(\rightarrow\) click (conclusive measurement); ‘1’ \(\rightarrow\) no click (inconclusive measurement). Based on this message, Alice records a key symbol according to Table 2: knowing her


phase shift \(\phi _{\alpha }\) as well as the polarization state of \(\alpha\) and \(\beta\), Alice learns the phase shift \(\phi _{\beta }\) of Bob. That is, Alice obtains a correlated key


symbol with Bob.

Figure 2


Modified Ref.48 relativistic quantum key distribution scheme. BS beam splitter, M mirror, \(\alpha\),\(\beta\) weak coherent states (\(\mu _{\beta }\) = \(\mu _{\alpha }\)), D detector, PBS


polarizing beam splitter, \(\phi _{\alpha }\),\(\phi _{\beta }\) independent phase operators (\(\phi _{\alpha }\),\(\phi _{\beta }\) \(\in\) {0-deg,180-deg}).

Full size imageTable 2


Encoding/decoding table of Scheme II. We assume that the polarization state \({|{x(z)+}\rangle }\) is reflected off the Bob’s PBS, while \({|{x(z)-}\rangle }\) is passed towards the lower


detector D.Full size tableDiscussion


In this section, we present an analysis of the proposed relativistic schemes. The analysis consists of discussing the behaviour of the schemes in terms of security, transfer rate, transfer


efficiency, secret key rate, and resource optimality.


The security of the proposed schemes is analyzed with regard to coherent and intercepting attacks (e.g., intercept-resend attack or intercept-resend attack with preliminary prepared state).


As noted in Ref.51, a relativistic scheme, which uses two encodings (phase and polarization encodings), is secure against intercepting attacks if it meets the following requirements: (i) the


relativistic quantum key distribution utilizes a two-arm interferometric setup; (ii) the scheme utilizes two or more polarization bases when polarization encoding is utilized. Requirement


(i) ensures that the presence of an eavesdropper will be revealed if an ordinary intercept-resend attack or intercept-resend attack with preliminary prepared systems is launched. This is due


to the fact that the act of interception leads to distorting the space-time paths of the transferred WCPs. The distortion causes delayed measurement results being taken into account by the


participants (sender and recipient) of the scheme. In the Supplementary Material, we give details on the way how an interception attack distorts the space-time path of an intercepted WCP


state. Also, we give a proof on that an eavesdropper cannot intercept the transferred states in an unhindered manner. Requirement (ii) ensures that the presence of an eavesdropper will be


revealed if an ancilla is appended to the signal state. Note that if one polarization basis is used in the scheme, the eavesdropper will in an unhindered manner append ancilla and gain


information about the polarization of the signal state51,57. More details on this attack are given in the Supplementary Material.

Figure 3


Space-time diagram of a communication scheme proposed for relativistic QKD. \(\alpha\) signal (weak) state, \(\beta\) reference (strong) state, PSA phase shift possessed by Alice, PSB phase


shift possessed by Bob, BS beam splitter, D detector, M mirror, cM controlled mirror, T terminator.

Full size image


In the following lines, we calculate the transfer efficiency and rate of the proposed schemes. The so-called transfer efficiency of quantum systems (weak coherent pulses) is expressed


as

$$\begin{aligned} E = \frac{k}{q}, \end{aligned}$$ (3)


where k is the amount of relevant quantum systems (weak coherent pulses) and q is the overall amount of quantum systems used in a relativistic quantum key distribution scheme. By relevant


quantum systems we mean those, which are used to establish the so-called sifted key in a quantum key distribution. The transfer rate, in [bits/use], is given by51

$$\begin{aligned} R =


\frac{n}{m}, \end{aligned}$$ (4)


where n is the size (length) of the sifted key established in a relativistic quantum key distribution and m is the number of instances in which the setup (Fig. 1) is used for transferring


n-bit key. In the following, we determine both E and R of Scheme I and Scheme II. As described in Scheme I, any transferred quantum system is a relevant system, because each system is used


to transfer 2 bits of information, as mentioned in the previous section. [Note: In determining E we neglect the presence of an eavesdropper so that we do not take into account the


measurements (detections), whose space-time features are disturbed (the time of measurement is delayed due to the presence of an eavesdropper)]. This implies that the efficiency of Scheme I


is \(E_{\text {I}}\) = 1. Taking into consideration the information carriage of the transferred weak coherent pulses at each use of the setup, the transfer rate is therefore \(R_{\text


{I}}\) = \(\frac{m\cdot 2}{m}\) = 2 [bits/use]. In Scheme II, half of the transferred systems are sifted. Also, the non-sifted systems are used to establish 2 bits of information (two


non-sifted systems are involved in establishing a two-bit key symbol). This implies that the efficiency of Scheme II is \(E_{\text {II}}\) = 0.5. The communication (transfer) rate of Scheme


II is \(R_{\text {II}}\) = \(\frac{\frac{m}{2}\cdot 2}{m}\) = 1 [bit/use].


In order to show the novelty of the work presented in this article, we compare the proposed relativistic schemes to existing ones48,50,51. The comparison is carried out in terms of transfer


rate and efficiency. To show the comparison between the proposed and existing relativistic schemes, we present Table 3 in which their rates and efficiencies are collated. Herein, we omit


calculating the efficiencies and rates of Refs.48,50,51. They can be concluded from the analysis introduced in Ref.51. Note that a scheme has a value of efficiency E = 0.5 because of


discarding quantum systems (weak pulses) in the sifting procedure. As can be seen from the table, the proposed relativistic schemes have the highest transfer rates and efficiencies. Scheme I


excels Scheme II in terms of these quantities.

Table 3 Comparison between proposed and existing48,50,51 relativistic QKD protocols in terms of rate and efficiency. For detailed rate and


efficiency analyses of Refs.48,50,51, see Ref.51.Full size tableSecret key rate


We evaluate the proposed relativistic schemes in terms of the following secret-key-rate evaluations39

$$\begin{aligned} S_{\text {I}} = q\{\underline{Q}_1 |_{\mu ,L}[I -


h(\overline{e}_1|_{\mu ,L})]-fQ_{\mu ,L}h(E_{\mu ,L})\}, \end{aligned}$$ (5)


which is used for Scheme I, and58,59,60

$$\begin{aligned} S_{\text {II}} = q[I - h(\text {QBER}) - fh(\text {QBER})], \end{aligned}$$ (6)


which is used for Scheme II. In these expressions, h(.) is the binary Shannon entropy, q is the sifting parameter37, I is the information carriage, and f is the efficiency of the error


correction algorithm. The information carriage represents the amount of bits transferred by one use of the QKD setup, i.e., it coincides with R of Eq. 4. More details on these expressions


are given in the Supplementary Material.


We choose to evaluate Scheme I with Eq. (5) because it is used to characterize an identical scheme (twin-field QKD). Scheme I resembles Ref.39 in encoding (phase encoding) and setup [both


outputs of the interferometric beam splitter BS2 (see Fig. 1 for reference) are used in establishing key bits]. In Fig. 4, we present a comparison between distinct relativistic and


twin-field QKD schemes. We suppose that the relativistic models use decoy-state approach. As can be seen from Fig. 4, the proposed scheme displays the best key rate graph from the presented


relativistic models. It also excels the point-to-point twin field protocol in terms of rate and distance. We should emphasize on that Scheme I is even better than the original twin-field


QKD, but only for distances up to around 50km, as can be easily verified in Fig. 4. A problem of the work presented in this paper is the fact that two encodings (phase and polarization


encoding) are utilized. As can be seen in the Supplementary Material (Eq. 8), the usage of two encodings leads to higher error rates. For this reason, it is of utmost importance to use a QKD


with one encoding. The higher the error rate, the lower the key rate and operating distance. Also, the higher the intrinsic (not caused by an eavesdropper) error rate, the lower the


security threshold. In this regard, in future work, we would pay attention to introduce a relativistic scheme relying only on one encoding and having the same rate behavior as the scheme


presented in the current paper.


We choose to evaluate Scheme II with Eq. (6) because it resembles the work of Ref.48, where identical setup is used and no decoy-state approach is applied. The only difference between Scheme


II and Ref.48 is that two parameters are used for encoding data into quantum systems in Scheme II: phase and polarization are employed. In Fig. 5, we present a comparison between Scheme II


and the work of Ref.48.

Figure 4


Key rates of different relativistic schemes. Details on the parameters used to evaluate the rates of the distinct schemes are given in the Supplementary Material. We should note that for the


proposed scheme, as well as for the work of Ref.51, the following relation between \(\mu _{\alpha }\) and \(\mu _{\beta }\) is used: 2\(\mu _{\alpha }\) = \(\mu _{\beta }\). Also, \(\mu\)


in Eq. (5) is defined as \(\mu\) = \(\mu _{\alpha }\) + \(\mu _{\beta }\), as proposed in Ref.39. The “p2p Twin field” is a twin field protocol conducted only between two parties; no relay


node is used, as illustrated in Fig. 2b of Ref.39. The “Twin-field” presents the original model of Ref.39. Note that we omit the so-called slice sifting in the rate calculation of the


twin-field QKD schemes presented in the figure.

Full size imageFigure 5


Key rates of classic relativistic schemes. Details on the parameters used to evaluate the rates of the distinct schemes are given in the Supplementary Material.

Full size image


A way to assess the optimality of a QKD is to use the secure key rate (or the way of using quantum resources) in the following ratio:

$$\begin{aligned} \frac{S(d)}{Q} = F(d),


\end{aligned}$$ (7)


where S(d) is the secure key rate of the scheme at a given distance d and Q is the number of quantum WCPs transferred per setup use. As pointed out in the above expression, this evaluation


of the optimality is a function of the operating distance. Based on this parameter, we compare Scheme I and Scheme II to other QKD models. In Table 4, we compare Scheme I to the relativistic


model of Ref.51 and twin-field model of Ref.39. In Table 5, we compare Scheme II to the relativistic model of Ref.48. As can be readily verified by Table 4, Scheme I is the most optimal one


in terms of secure key rate for lower distances if it could be implemented with only one encoding mechanism, as mentioned above. Actually, as shown in the third column of Table 4, Scheme I


is almost as optimal as the original twin-field QKD and more optimal than Ref.51. In Table 5, we verify that the proposed scheme (Scheme II) is more optimal than the work of Ref.48. We can


therefore conclude that the proposed relativistic schemes of this paper excels in terms of rate and optimality the setups of the existing relativistic QKD protocols48,51. Also, it is evident


from Tables 4 and 5 that Scheme II is the most optimal QKD of those involved in this analysis: Scheme II has the highest value of F(d) for the examined d (d = 10 km). As can be verified by


Figs. 4 and 5, Scheme II will be more optimal than the other QKD models for distance of up to 150 km (this is the distance limit of Scheme II). So, for short distance, one should prefer


using Scheme II for the case of relativistic QKD. However, if one needs a QKD system for longer distances, Scheme I is to be employed.

Table 4 Comparison between Scheme I and existing QKD


protocols in terms of optimality F(d) for d = 10 km. When high-dimensionality (usage of two encodings) is accounted, the amount Q (Eq. 7) is doubled.Full size tableTable 5 Comparison


between Scheme II and existing relativistic QKD protocol48 in terms of optimality F(d) for d = 10 km. When high-dimensionality (usage of two encodings) is accounted, the amount Q (Eq. 7) is


doubled.Full size tableSummary


In summary, we propose two relativistic quantum key distribution schemes (Scheme I and Scheme II), which are more optimal in terms of secure key rate, transfer rate and efficiency than the


existing ones48,50,51. This is achieved by using modified interferometric setups. Scheme I consists of two sequentially connected interferometers, as the first one controls the operation of


the second one. Scheme II is identical to Ref.48 with the difference that both phase and polarization are used for establishing key symbols in the work of this paper. As a result, we obtain


transfer rate (information carriage) of 2 [bits/relevant use] for Scheme I and Scheme II, which is the highest value achieved so far. However, Scheme II is characterized with a sifting


process, which implies that the actual (averaged) rate is 1 [bit/use]. In Fig. 4, we present the secret-key-rate graphs of the distinct relativistic QKD models (Scheme I is included in the


figure). Moreover, the graphs of twin-field QKD models39 are depicted; this is done for the sake of finding out the position of the relativistic schemes compared to the state-of-the-art QKD


setup, namely, the twin-field model. As seen from Fig. 4, the Scheme I excels the twin-field approach for distances up to 50 km. In Fig. 5, we present the secret-key-rate graphs of


relativistic protocols, which do not rely on decoy-state approach (Scheme II is included in the figure). It is shown that the proposed relativistic model (Scheme II) has higher secret key


rate as well as operating distance than the work of Ref.48. In Tables 4 and 5, we introduce a comparison between distinct models in terms of a function F(d), which could be used to represent


a way of assessing the optimality of QKD protocols. As shown, Scheme II excels in terms of F(d) its relativistic counterparts48,51 as well as existing twin-field models39 for operating


distances of up to 150 km. The improvement in efficiency and rate does not influence in a negative way the security of the proposed scheme. Also, the implementation setups proposed for the


novel relativistic quantum key distributions are practical—they are based on generating, transferring, and processing weak coherent pulses. We should point out that the current work achieves


the above-mentioned results at the cost of reducing its practicality. This is related to the fact that two encoding mechanisms (phase encoding and polarization encoding) are involved in the


proposed schemes of the current work. The use of two encoding mechanisms increases the error rate, which in turn decreases the secret key rate, the operating distance, and the optimality,


as shown in Tables 4 and 5.

Data availability


All data generated or analysed during this study are included in this published article. Further details concerning the current study are available in the Supplementary Material accompanying


this paper.


References Bennett, C. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems, and Signal


Processing, Bangalore 175–179 (1984).


Ekert, A. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991).


Article  ADS  MathSciNet  CAS  PubMed  MATH  Google Scholar 


Bennett, C., Brassard, G. & Mermin, N. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557 (1992).


Article  ADS  MathSciNet  CAS  PubMed  MATH  Google Scholar 


Bennett, C. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992).


Article  ADS  MathSciNet  CAS  PubMed  MATH  Google Scholar 


Inoue, K., Waks, E. & Yamamoto, Y. Differential phase shift quantum key distribution. Phys. Rev. Lett. 89, 037902 (2002).


Article  ADS  PubMed  CAS  Google Scholar 


Stucki, D., Brunner, N., Gisin, N., Scarani, V. & Zbinden, H. Fast and simple one-way quantum key distribution. Appl. Phys. Lett. 87, 194108 (2005).


Article  ADS  CAS  Google Scholar 


Mayers, D. & Yao, A. C.-C. Quantum cryptography with imperfect apparatus. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS98) (IEEE Computer Society,


1998) 503 (1998).


Acín, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).


Article  ADS  PubMed  CAS  Google Scholar 


Lo, H.-K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).


Article  ADS  PubMed  CAS  Google Scholar 


Lin, J. & Lütkenhaus, N. Trusted detector noise analysis for discrete modulation schemes of continuous-variable quantum key distribution. Phys. Rev. Appl. 14, 064030 (2020).


Article  ADS  CAS  Google Scholar 


Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 114, 070501 (2015).


Article  ADS  PubMed  CAS  Google Scholar 


Liu, W.-B. et al. Homodyne detection quadrature phase shift keying continuous-variable quantum key distribution with high excess noise tolerance. PRX Quantum 2, 040334 (2021).


Article  ADS  Google Scholar 


Pirandola, S. et al. Advances in quantum cryptography. Adv. Opt. Photon. 12, 1012 (2020).


Article  Google Scholar 


Xu, F., Ma, X., Zhang, Q., Lo, H.-K. & Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020).


Article  ADS  MathSciNet  CAS  Google Scholar 


Jo, Y. & Son, W. Key-rate enhancement using qutrit states for quantum key distribution with askew aligned sources. Phys. Rev. A 94, 052316 (2016).


Article  ADS  Google Scholar 


Dellantonio, L., Sørensen, A. & Bacco, D. High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces. Phys. Rev. A 98, 062301 (2018).


Article  ADS  Google Scholar 


Xu, F. Measurement-device-independent quantum communication with an untrusted source. Phys. Rev. A 92, 012333 (2015).


Article  ADS  CAS  Google Scholar 


Zhao, Y., Zhang, Y., Xu, B., Yu, S. & Guo, H. Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction. Phys. Rev. A 97, 042328 (2018).


Article  ADS  CAS  Google Scholar 


Zhang, C.-M. et al. Decoy-state measurement-device-independent quantum key distribution based on the Clauser–Horne–Shimony–Holt inequality. Phys. Rev. A 90, 034302 (2014).


Article  ADS  CAS  Google Scholar 


Liu, H. et al. Experimental demonstration of high-rate measurement-device-independent quantum key distribution over asymmetric channels. Phys. Rev. Lett. 122, 160501 (2019).


Article  ADS  CAS  PubMed  Google Scholar 


Ma, H.-X. et al. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction. Phys. Rev. A 97, 042329 (2018).


Article  ADS  CAS  Google Scholar 


Zhou, C. et al. Biased decoy-state measurement-device-independent quantum key distribution with finite resources. Phys. Rev. A 91, 022313 (2015).


Article  ADS  CAS  Google Scholar 


Zhang, Y.-C. et al. Continuous-variable measurement-device-independent quantum key distribution using squeezed states. Phys. Rev. A 90, 052325 (2014).


Article  ADS  CAS  Google Scholar 


Puthoor, I., Amiri, R., Wallden, P., Curty, M. & Andersson, E. Measurement-device-independent quantum digital signatures. Phys. Rev. A 94, 022328 (2016).


Article  ADS  MathSciNet  CAS  Google Scholar 


Zhang, C.-H., Zhang, C.-M. & Wang, Q. Efficient passive measurement-device-independent quantum key distribution. Phys. Rev. A 99, 052325 (2019).


Article  ADS  CAS  Google Scholar 


Cao, W.-F. et al. One-sided measurement-device-independent quantum key distribution. Phys. Rev. 97, 012313 (2018).


Article  CAS  Google Scholar 


Shan, Y.-Z. et al. Measurement-device-independent quantum key distribution with a passive decoy-state method. Phys. Rev. A 90, 042334 (2014).


Article  ADS  CAS  Google Scholar 


Yang, X. et al. Measurement-device-independent entanglement-based quantum key distribution. Phys. Rev. A 93, 052303 (2016).


Article  ADS  CAS  Google Scholar 


Abruzzo, S., Kampermann, H. & Bruß, D. Measurement-device-independent quantum key distribution with quantum memories. Phys. Rev. A 89, 012301 (2014).


Article  ADS  CAS  Google Scholar 


Wu, Y. et al. Continuous-variable measurement-device-independent multipartite quantum communication. Phys. Rev. A 93, 022325 (2016).


Article  ADS  CAS  Google Scholar 


Pirandola, S. et al. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 9, 397 (2015).


Article  ADS  CAS  Google Scholar 


Yin, H.-L. et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 117, 190501 (2016).


Article  ADS  PubMed  Google Scholar 


Wang, W., Xu, F. & Lo, H.-K. Asymmetric protocols for scalable high-rate measurement-device-independent quantum key distribution networks. Phys. Rev. X 9, 041012 (2019).


CAS  Google Scholar 


Yin, H.-L. & Chen, Z.-B. Coherent-state-based twin-field quantum key distribution. Sci. Rep. 9, 49 (2019).


Article  ADS  PubMed  PubMed Central  CAS  Google Scholar 


Yin, H.-L. & Fu, Y. Measurement-device-independent twin-field quantum key distribution. Sci. Rep. 9, 3045 (2019).


Article  ADS  PubMed  PubMed Central  CAS  Google Scholar 


Hwang, W.-Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).


Article  ADS  PubMed  CAS  Google Scholar 


Ma, X., Qi, B., Zhao, Y. & Lo, H.-K. Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005).


Article  ADS  CAS  Google Scholar 


Huttner, B., Imoto, N., Gisin, N. & Mor, T. Quantum cryptography with coherent states. Phys. Rev. A 51, 1863–1869 (1995).


Article  ADS  CAS  PubMed  Google Scholar 


Lucamarini, M., Yuan, Z., Dynes, J. & Shields, A. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 557, 400–403 (2018).


Article  ADS  CAS  PubMed  Google Scholar 


Yu, Z.-W., Hu, X.-L., Jiang, C., Xu, H. & Wang, X.-B. Sending-or-not-sending twin-field quantum key distribution in practice. Sci. Rep. 9, 3080 (2019).


Article  ADS  PubMed  PubMed Central  CAS  Google Scholar 


Curty, M., Azuma, K. & Lo, H.-K. Simple security proof of twin-field type quantum key distribution protocol. NPJ Quantum Inf. 5, 64 (2019).


Article  ADS  Google Scholar 


Li, B.-H. et al. Long distance twin-field quantum key distribution with entangled sources. Opt. Lett. 46, 5529 (2021).


Article  ADS  PubMed  Google Scholar 


Xie, Y.-M. et al. Overcoming the rate-distance limit of device-independent quantum key distribution. Opt. Lett. 46, 1632 (2021).


Article  ADS  PubMed  Google Scholar 


Tomamichel, M., Lim, Ch., Gisin, N. & Renner, R. Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012).


Article  ADS  PubMed  CAS  Google Scholar 


Lim, Ch., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014).


Article  ADS  CAS  Google Scholar 


Yin, H.-L. & Chen, Z.-B. Finite-key analysis for twin-field quantum key distribution with composable security. Sci. Rep. 9, 17113 (2019).


Article  ADS  PubMed  PubMed Central  CAS  Google Scholar 


Yin, H.-L. et al. Tight security bounds for decoy-state quantum key distribution. Sci. Rep. 10, 14312 (2020).


Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 


Kravtsov, K. et al. Relativisitc quantum key distribution system with one-way quantum communication. Sci. Rep. 8, 6102 (2018).


Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 


Goldenberg, L. & Vaidman, L. Quantum cryptography based on orthogonal states. Phys. Rev. Lett. 75, 1239–1243 (1995).


Article  ADS  MathSciNet  CAS  PubMed  MATH  Google Scholar 


Molotkov, S. Relativistic quantum cryptography. J. Exp. Theor. Phys. 112, 370–379 (2011).


Article  ADS  CAS  Google Scholar 


Bebrov, G. Higher-rate relativistic quantum key distribution. Sci. Rep. 11, 23543 (2021).


Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 


Einstein, A. Zur Elektrodynamik bewegter Körper. Ann. Phys. 17, 891–921 (1905).


Article  MATH  Google Scholar 


Minkowski, H. Raum und Zeit. Physikalische Zeitschrift 10, 104–111 (1909).


MATH  Google Scholar 


Minkowski, H. Das Relativitätsprinzip. Ann. Phys. 47, 927–938 (1915).


Article  MATH  Google Scholar 


Brassard, G. & Salvail, L. Secret-key reconciliation by public discussion. In Advances in Cryptology - EUROCRYPT ’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol. 765 (Springer,


1994).


Bennett, Ch., Brassard, G., Crepeau, C. & Maurer, U. Generalized privacy amplification. IEEE Trans. Inf. Theory 41, 1915–1923 (1995).


Article  MathSciNet  MATH  Google Scholar 


Yan, F. & Zhang, X. A scheme for secure direct communication using EPR pairs and teleportation. Eur. Phys. J. B 41, 75 (2004).


Article  ADS  CAS  Google Scholar 


Ribordy, G., Gautier, J.-D., Gisin, N., Guinnard, O. & Zbinden, H. Fast and user-friendly quantum key distribution. J. Mod. Opt. 47, 517–531 (1999).


Article  ADS  MathSciNet  Google Scholar 


Scherer, A., Sanders, B. & Tittel, W. Long-distance practical quantum key distribution by entanglement swapping. Opt. Express 19, 3004–3018 (2011).


Article  ADS  PubMed  Google Scholar 


Shor, P. W. & Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000).


Article  ADS  CAS  PubMed  Google Scholar 


Download references


Author informationAuthors and Affiliations Telecommunications Department, Technical University of Varna, 9010, Varna, Bulgaria


Georgi Bebrov


AuthorsGeorgi BebrovView author publications You can also search for this author inPubMed Google Scholar

Contributions


G.B. is involved in all procedures necessary for preparing the manuscript.


Corresponding author Correspondence to Georgi Bebrov.

Ethics declarations Competing interests


The author declares no competing interests.

Additional informationPublisher's note


Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary InformationSupplementary Information.Rights and


permissions


Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or


format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or


other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in


the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the


copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.


Reprints and permissions


About this articleCite this article Bebrov, G. More optimal relativistic quantum key distribution. Sci Rep 12, 15377 (2022). https://doi.org/10.1038/s41598-022-15247-x


Download citation


Received: 18 January 2022


Accepted: 21 June 2022


Published: 13 September 2022


DOI: https://doi.org/10.1038/s41598-022-15247-x


Share this article Anyone you share the following link with will be able to read this content:


Get shareable link Sorry, a shareable link is not currently available for this article.


Copy to clipboard Provided by the Springer Nature SharedIt content-sharing initiative