Forthcoming

Composable Security of Decoy-State BB84 with Semiconductor Laser Phase Noise: A Unified Source–Channel Model and Parameter-Dependent Key-Rate Bounds

Author affiliations

Authors

DOI:

https://doi.org/10.15625/0868-3166/24012

Abstract

Decoy-state BB84 security proofs often assume fully phase-randomized coherent pulses, yet gain-switched semiconductor lasers exhibit parameter-dependent phase diffusion that leaves inter-pulse correlations. We present a unified source–channel model that maps measurable linewidth, pulse spacing, and intensity modulation to effective photon-number statistics and state overlaps, and integrate it into a finite-size, composable security analysis against general attacks. The resulting key-rate bounds depend explicitly on phase-noise parameters, revealing how residual phase memory tightens decoy estimates and increases privacy amplification. Simulations with 0.2 dB/km fiber loss, InGaAs APDs (10% efficiency, 6×10^−7 dark counts/gate), misalignment 5×10^−3, and 10^8–10^12 pulses show reach reductions of tens of km, while MHz linewidths enable secure 100–130 km operation at total security ≈10^−15.

Downloads

Download data is not yet available.

References

[1] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus and M. Peev, The security of practical quantum key distribution, Rev. Mod. Phys. 81 (2009) 1301.

[2] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, Quantum cryptography, Rev. Mod. Phys. 74 (2002) 145.

[3] W.-Y. Hwang, Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett. 91 (2003) 057901.

[4] H.-K. Lo, X. Ma and K. Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94 (2005) 230504.

[5] X.-B. Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94 (2005) 230503.

[6] J. Müller-Quade and R. Renner, Composability in quantum cryptography, New J. Phys. 11 (2009) 085006.

[7] C. Portmann and R. Renner, Security in quantum cryptography, Rev. Mod. Phys. 94 (2022) 025008.

[8] V. Scarani and R. Renner, Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing, Phys. Rev. Lett. 100 (2008) 200501.

[9] M. Tomamichel, C. C. W. Lim, N. Gisin and R. Renner, Tight finite-key analysis for quantum cryptography, Nat. Commun. 3 (2012) 634.

[10] M. Lucamarini, J. F. Dynes, B. Fröhlich, Z. L. Yuan and A. J. Shields, Efficient decoy-state quantum key distribution with quantified security, Opt. Express 21 (2013) 24550.

[11] H.-L. Yin, M.-G. Zhou, J. Gu, Y.-M. Xie, Y.-S. Lu and Z.-B. Chen, Tight security bounds for decoy-state quantum key distribution, Sci. Rep. 10 (2020) 14312.

[12] A. Quince and A. Valle, Phase diffusion in gain-switched semiconductor lasers for quantum random number generation, Opt. Express 29 (2021) 39473.

[13] B. Septriani, O. de Vries, F. Steinlechner and M. Gräfe, Parametric study of the phase diffusion process in a gain-switched semiconductor laser for randomness assessment in quantum random number generator, AIP Adv. 10 (2020) 055022.

[14] R. Shakhovoy, M. Puplauskis, V. Sharoglazova, A. Duplinskiy, D. Sych, E. Maksimova et al., Phase randomness in a semiconductor laser, Phys. Rev. A 107 (2023) 012616.

[15] Y.-L. Tang, H.-L. Yin, X. Ma, C.-H. F. Fung, Y. Liu, H.-L. Yong et al., Source attack of decoy-state quantum key distribution using phase information, Phys. Rev. A 88 (2013) 022308.

[16] S. Nahar, A. Upadhyaya, D. Elkouss and S. G. Razavi, Imperfect phase randomization and generalized decoy-state quantum key distribution, Phys. Rev. Applied 20 (2023) 064031.

[17] K. Tamaki, M. Curty, G. Kato, H.-K. Lo and K. Azuma, Loss-tolerant quantum cryptography with imperfect sources, Phys. Rev. A 90 (2014) 052314.

[18] M. Tomamichel and R. Renner, Uncertainty relation for smooth entropies, Phys. Rev. Lett. 106 (2011) 110506.

[19] M. Tomamichel, C. Schaffner and A. Smith, Leftover hashing against quantum side information, IEEE Trans. Inf. Theory 57 (2011) 5524.

[20] X. Ma, B. Qi, Y. Zhao and H.-K. Lo, Practical decoy state for quantum key distribution, Phys. Rev. A 72 (2005) 012326.

[21] H.-K. Lo and J. Preskill, Security of quantum key distribution using weak coherent states with nonrandom phases, Quantum Inf. Comput. 7 (2007) 431.

[22] Z. Cao, Z. Zhang, H.-K. Lo and X. Ma, Discrete-phase-randomized coherent state source and its application in quantum key distribution, New J. Phys. 17 (2015) 053014.

[23] T. Kobayashi and A. Tomita, Evaluation of phase randomness in a light source for quantum-key-distribution systems, Phys. Rev. A 90 (2014) 032320.

[24] G. Currás-Lorenzo, S. Nahar, N. Lütkenhaus, K. Tamaki and M. Curty, Security of quantum key distribution with imperfect phase randomisation, Quantum Sci. Technol. 9 (2024) 015025.

[25] C. H. Henry, Theory of the linewidth of semiconductor lasers, IEEE J. Quantum Electron. 18 (1982) 259.

[26] A. Valle, Divergence of the variance of the optical phase in gain-switched semiconductor lasers described by stochastic rate equations, Phys. Rev. Applied 19 (2023) 054005.

[27] A. Mizutani, C. C. W. Lim, N. Imoto, M. Curty and K. Tamaki, Quantum key distribution with setting-choice-independently correlated sources, npj Quantum Inf. 5 (2019) 8.

Published

20-03-2026

How to Cite

[1]W. Al-Zofi, “Composable Security of Decoy-State BB84 with Semiconductor Laser Phase Noise: A Unified Source–Channel Model and Parameter-Dependent Key-Rate Bounds”, Comm. Phys., vol. 36, Mar. 2026.

Issue

Section

Papers