Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 Aug 25;15(1):31258.
doi: 10.1038/s41598-025-13508-z.

Decoherence-assisted quantum key distribution

Affiliations

Decoherence-assisted quantum key distribution

Daniel R Sabogal et al. Sci Rep. .

Abstract

We put forward and demonstrate a controllable decoherence-assisted quantum key distribution scheme. The protocol is based on the possibility of introducing controllable decoherence to polarization qubits using the spatial degree of freedom of light. We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack. We demonstrate experimentally that Alice and Bob can agree on a scheme that gives low values of the quantum bit error rate, despite the presence of a large amount of decoherence in the transmission channel of the BB84 protocol.

PubMed Disclaimer

Conflict of interest statement

Declarations. Competing interests: The authors declare no competing interests.

Figures

Fig. 1
Fig. 1
(a) Ideal BB84 protocol: Alice uses a light source that can be randomly prepared in a specific polarization state. Afterwards, Alice sends the light to Bob. On Bob’s side, he randomly chooses a basis to measure the state that Alice has sent. (b) BB84 protocol under the controllable decoherence-assisted scheme. formula image and formula image are parameters that tune the decoherence induced in Alice’s and Bob’s sides, respectively. (c) Entangling probe attack under the controllable decoherence-assisted scheme.
Fig. 2
Fig. 2
(a) Rényi information formula image as a function of formula image when Eve uses the entangling probe attack with the controllable decoherence-assisted scheme. Setting formula image, formula image. The inset shows the same function for a wider range of values of formula image. (b) Total Rényi information formula image as a function of the total formula image when Eve uses the entangling probe attack with the controllable decoherence-assisted scheme. For values of formula image, the total Rényi information available to Eve is lower due to the effect of the controllable decoherence-assisted scheme. Since the maximum attainable Rényi information occurs at higher QBER values for lower values of formula image, not only is Eve able to retrieve fewer information, but also obtains its maximal amount of information when introducing a higher amount of errors.
Fig. 3
Fig. 3
Secure key rate as a function of distance, using Eq. (23). We assume that the QBER in each basis increases linearly with distance: formula image and formula image. The parameters chosen were formula image (free space transmission), formula image (formula image is the base QBER at zero distance), and formula image (formula image is the coefficient that accounts for a linear increase in the QBER).
Fig. 4
Fig. 4
Experimental setup. A 407 nm laser pump is used to create photon pairs in a collinear 4 mm BBO type II crystal. The pump’s polarization state is adjusted using a half-wave plate (HWP) and the pump is focused into the crystal using a lens (formula image, with focal length formula image). After the crystal, the pump is removed using two long pass (LP) filters with cut-off wavelengths of 750 nm and an interference filter (IF) of 810formula image nm. The idler photon is transmitted in the BS and it is used to herald the presence of its pair taking into account polarization using formula image. The signal photon is reflected in the PBS and then collected into the SMF to obtain a Gaussian mode. The polarization controller (PC) is used to correct the polarization state of the idler photon. After the PC, the spatial mode has a beam waist of formula image mm that ensures that the light is collimated throughout its whole optical path during the experiment. A rotating half-wave plate (formula image) constitutes the preparation stage. Subsequently, decoherence is induced and reversed by inserting P-TBD-A and P-TBD-B, respectively. On Bob’s side, formula image and formula image constitute the measurement stage. All the detections are recorded by a time stamping device.
Fig. 5
Fig. 5
formula image in the controllable decoherence-assisted scheme. In (a-d) the formula image is plotted, for different values of formula image, as a function of formula image. Each data point in every figure was made by averaging the QBER of 1000 bits. From the different fits in (a)-(d), formula image was estimated to be 6.87 ± 0.08 mmformula image. In (e), the position of the value of formula image that minimizes the QBER is plotted against formula image. The minimum values of the QBER for every value of formula image are shown in the inset table. The horizontal and vertical error bars correspond to the resolution attained by the PTBD, i.e., formula image.

References

    1. Poppe, A. et al. Practical quantum key distribution with polarization entangled photons. Opt. Express12, 3865–3871. 10.1364/OPEX.12.003865 (2004). - PubMed
    1. Bennett, C. H., Bessette, F., Brassard, G., Salvail, L. & Smolin, J. Experimental quantum cryptography. J. Cryptol.5, 3–28. 10.1007/BF00191318 (1992).
    1. Bloch, M., McLaughlin, S. W., Merolla, J.-M. & Patois, F. Frequency-coded quantum key distribution. Opt. Lett.32, 301–303. 10.1364/OL.32.000301 (2007). - PubMed
    1. Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, P. & Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics7, 378–381. 10.1038/nphoton.2013.63 (2013).
    1. Mirhosseini, M. et al. High-dimensional quantum cryptography with twisted light. New J. Phys.17, 10.1088/1367-2630/17/3/033033 (2015).

LinkOut - more resources