z-logo
open-access-imgOpen Access
Reference frame independent twin field quantum key distribution with source flaws
Author(s) -
Comfort Sekga,
Mhlambululi Mafu
Publication year - 2021
Publication title -
journal of physics communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.407
H-Index - 17
ISSN - 2399-6528
DOI - 10.1088/2399-6528/abf472
Subject(s) - quantum key distribution , reference frame , field (mathematics) , key (lock) , frame (networking) , computer science , quantum , mathematics , physics , telecommunications , computer security , quantum mechanics , pure mathematics
The trade-off between distance and secret key generation rate remains one of the major challenges in the practical implementation of quantum key distribution (QKD). As a solution, a twin field QKD protocol was proposed by Lucamarini et al (2018) to address this challenge. In this protocol, the achievable secret key rate scales with the square root of channel transmittance and can surpass the secret key capacity for repeaterless QKD. However, the protocol exploits phase to encode information which presents the problem of active stabilization of interferometers. We propose a reference frame independent twin field quantum key distribution (RFITF QKD), which does not require the reference frames’ alignment. Thus, this reduces the complexity of practical QKD systems in achieving active stabilization of phase. Moreover, we employ the loss-tolerant method proposed by Tamaki et al (2014) which allows us to prove the security of the protocol by considering imperfections in the state preparation. Our simulation results show that our proposed protocol can extract a secure key over a transmission distance of l = 505 km, l = 516 km and l = 530 km for deviation of 8.42°, 7.28° and 5.15°, respectively from the desired phase encoding angle. These results demonstrate that despite the state preparation flaws, the key rates achieved are still comparable to the perfect encoding scenario. When our proposed protocol is implemented with an imperfect source, it achieves a transmission distance beyond the secret key capacity bound for repeaterless QKD.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here