Composable Security of Decoy-State BB84 with Semiconductor Laser Phase Noise: A Unified Source–Channel Model and Parameter-Dependent Key-Rate Bounds
Author affiliations
DOI:
https://doi.org/10.15625/0868-3166/24012Abstract
Decoy-state BB84 security proofs often assume fully phase-randomized coherent pulses, yet gain-switched semiconductor lasers exhibit parameter-dependent phase diffusion that leaves inter-pulse correlations. We present a unified source–channel model that maps measurable linewidth, pulse spacing, and intensity modulation to effective photon-number statistics and state overlaps, and integrate it into a finite-size, composable security analysis against general attacks. The resulting key-rate bounds depend explicitly on phase-noise parameters, revealing how residual phase memory tightens decoy estimates and increases privacy amplification. Simulations with 0.2 dB/km fiber loss, InGaAs APDs (10% efficiency, 6×10^−7 dark counts/gate), misalignment 5×10^−3, and 10^8–10^12 pulses show reach reductions of tens of km, while MHz linewidths enable secure 100–130 km operation at total security ≈10^−15.
Downloads
References
[1] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus and M. Peev, The security of practical quantum key distribution, Rev. Mod. Phys. 81 (2009) 1301.
[2] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, Quantum cryptography, Rev. Mod. Phys. 74 (2002) 145.
[3] W.-Y. Hwang, Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett. 91 (2003) 057901.
[4] H.-K. Lo, X. Ma and K. Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94 (2005) 230504.
[5] X.-B. Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94 (2005) 230503.
[6] J. Müller-Quade and R. Renner, Composability in quantum cryptography, New J. Phys. 11 (2009) 085006.
[7] C. Portmann and R. Renner, Security in quantum cryptography, Rev. Mod. Phys. 94 (2022) 025008.
[8] V. Scarani and R. Renner, Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing, Phys. Rev. Lett. 100 (2008) 200501.
[9] M. Tomamichel, C. C. W. Lim, N. Gisin and R. Renner, Tight finite-key analysis for quantum cryptography, Nat. Commun. 3 (2012) 634.
[10] M. Lucamarini, J. F. Dynes, B. Fröhlich, Z. L. Yuan and A. J. Shields, Efficient decoy-state quantum key distribution with quantified security, Opt. Express 21 (2013) 24550.
[11] H.-L. Yin, M.-G. Zhou, J. Gu, Y.-M. Xie, Y.-S. Lu and Z.-B. Chen, Tight security bounds for decoy-state quantum key distribution, Sci. Rep. 10 (2020) 14312.
[12] A. Quince and A. Valle, Phase diffusion in gain-switched semiconductor lasers for quantum random number generation, Opt. Express 29 (2021) 39473.
[13] B. Septriani, O. de Vries, F. Steinlechner and M. Gräfe, Parametric study of the phase diffusion process in a gain-switched semiconductor laser for randomness assessment in quantum random number generator, AIP Adv. 10 (2020) 055022.
[14] R. Shakhovoy, M. Puplauskis, V. Sharoglazova, A. Duplinskiy, D. Sych, E. Maksimova et al., Phase randomness in a semiconductor laser, Phys. Rev. A 107 (2023) 012616.
[15] Y.-L. Tang, H.-L. Yin, X. Ma, C.-H. F. Fung, Y. Liu, H.-L. Yong et al., Source attack of decoy-state quantum key distribution using phase information, Phys. Rev. A 88 (2013) 022308.
[16] S. Nahar, A. Upadhyaya, D. Elkouss and S. G. Razavi, Imperfect phase randomization and generalized decoy-state quantum key distribution, Phys. Rev. Applied 20 (2023) 064031.
[17] K. Tamaki, M. Curty, G. Kato, H.-K. Lo and K. Azuma, Loss-tolerant quantum cryptography with imperfect sources, Phys. Rev. A 90 (2014) 052314.
[18] M. Tomamichel and R. Renner, Uncertainty relation for smooth entropies, Phys. Rev. Lett. 106 (2011) 110506.
[19] M. Tomamichel, C. Schaffner and A. Smith, Leftover hashing against quantum side information, IEEE Trans. Inf. Theory 57 (2011) 5524.
[20] X. Ma, B. Qi, Y. Zhao and H.-K. Lo, Practical decoy state for quantum key distribution, Phys. Rev. A 72 (2005) 012326.
[21] H.-K. Lo and J. Preskill, Security of quantum key distribution using weak coherent states with nonrandom phases, Quantum Inf. Comput. 7 (2007) 431.
[22] Z. Cao, Z. Zhang, H.-K. Lo and X. Ma, Discrete-phase-randomized coherent state source and its application in quantum key distribution, New J. Phys. 17 (2015) 053014.
[23] T. Kobayashi and A. Tomita, Evaluation of phase randomness in a light source for quantum-key-distribution systems, Phys. Rev. A 90 (2014) 032320.
[24] G. Currás-Lorenzo, S. Nahar, N. Lütkenhaus, K. Tamaki and M. Curty, Security of quantum key distribution with imperfect phase randomisation, Quantum Sci. Technol. 9 (2024) 015025.
[25] C. H. Henry, Theory of the linewidth of semiconductor lasers, IEEE J. Quantum Electron. 18 (1982) 259.
[26] A. Valle, Divergence of the variance of the optical phase in gain-switched semiconductor lasers described by stochastic rate equations, Phys. Rev. Applied 19 (2023) 054005.
[27] A. Mizutani, C. C. W. Lim, N. Imoto, M. Curty and K. Tamaki, Quantum key distribution with setting-choice-independently correlated sources, npj Quantum Inf. 5 (2019) 8.
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Communications in Physics

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Communications in Physics is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright on any research article published in Communications in Physics is retained by the respective author(s), without restrictions. Authors grant VAST Journals System (VJS) a license to publish the article and identify itself as the original publisher. Upon author(s) by giving permission to Communications in Physics either via Communications in Physics portal or other channel to publish their research work in Communications in Physics agrees to all the terms and conditions of https://creativecommons.org/licenses/by-sa/4.0/ License and terms & condition set by VJS.



