Paper The following article is Open access

Twin-field quantum key distribution with passive-decoy state

, , , , , , , , , and

Published 9 October 2020 © 2020 The Author(s). Published by IOP Publishing Ltd on behalf of the Institute of Physics and Deutsche Physikalische Gesellschaft
, , Citation Jun Teng et al 2020 New J. Phys. 22 103017 DOI 10.1088/1367-2630/abbab7

Download Article PDF
DownloadArticle ePub

You need an eReader or compatible software to experience the benefits of the ePub3 file format.

1367-2630/22/10/103017

Abstract

Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. phase-maching QKD, sending-or-not-sending QKD, and no phase post-selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater. The security proof of these protocols are based on decoy-state method, which is usually performed by actively modulating a variable optical attenuator together with a random number generator in practical experiments, however, active-decoy schemes like this may lead to side channel and could open a security loophole. To enhance the source security of TF-QKD, in this paper, we propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method. And we present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. This shows our work is meaningful in practice.

Export citation and abstract BibTeX RIS

Original content from this work may be used under the terms of the Creative Commons Attribution 4.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

1. Introduction

With the help of quantum key distribution (QKD), distant agents (Alice and Bob) are able to share secret keys with information-theoretic security which is guaranteed by quantum physics [13]. QKD has been developed rapidly both in theory and experiment over the decades [412]. However, a fundamental limit is that the secret key rate (SKR) is scaled by the transmittance η [1315], which is finally revealed as the linear key rate bound: R ⩽ −log2(1 − η) [14]. Fortunately, the TF-QKD protocol made a difference [16], in TF-QKD protocol, pairs of phase-randomized optical pulses are generated at Alice and Bob and then combined at a central measuring station Charlie, single-photon interference is produced at Charlie, this lets TF-QKD gain the square-root of the channel transmittance, which is the same as it with a quantum repeater. The reference [17] enhanced the security proof of that given in reference [16], it proposed a novel way to use decoy states by switching between decoy mode and code mode, by doing this, it confirmed the scaling properties of the original scheme and overcame the linear key bound at long distances.

Inspired by the original TF-QKD, many variants are proposed including phase-matching protocol [18], sending-or-not-sending protocol [19]. And reference [2022] removed active phase randomization and phase postselection in code mode, this proved to reach a higher final key rate. Yet, the security proof of all these protocols are based on decoy-state method [2325], the essential idea behind decoy-state method in TF-QKD is simple, the sender (Alice and Bob) varies the mean photon number of each pulse she transmits to the central station (Charlie), users can obtain a better estimation of the behavior of the quantum channel from the measurement results corresponding to different intensity settings, this helps to enhance the achievable SKR and communicating distance. In practical experiments, decoy-state method is usually performed by actively modulating a variable optical attenuator together with a random number generator [26]. However, these approaches may lead to side channel and can even break the security of the system [27], if the VOA, which changes the intensity of Alice's (Bob's) pulses, is not properly designed, it may happen that some physical parameters (for example frequency spectrum) of the pulses emitted by the sender depend on the particular setting selected, which could open a security loophole in the active schemes. Fortunately, passive-decoy protocol [2830] is able to remove certain side channel caused by actively modulating intensity of the source. Specifically, in our proposed scheme, this kind of side channel can be removed provided that Alice and Bob have perfect local detectors and there is no Trojan horse attack. Even though perfect detectors are not available in practical experiments, the side channel may still be significantly reduced when high-detection-efficiency local detectors are equipped. The original passive-decoy protocol utilizes a parametric downconversion source in conjunction with a photon number resolving detector to substitute an idealized single-photon source, the passive-decoy state selection can be accomplished without the need for any active optical elements. Besides, the references [31, 32] implemented passive-decoy method by using weak coherent pulses (WCPs), in which Alice and Bob treat click and no click of the detectors separately and distill a secret key from both of them.

To enhance the source security of TF-QKD, in this paper we propose passive-decoy TF-QKD, in our scheme, different decoy states are generated passively according to the mode of photon detectors. Our passive scheme can eliminate the side channel generated by active modulation of source intensities, simultaneously, it provides a performance as good as the active decoy method when the setup with four-intensity settings is applied. In section 2, we introduce our scheme and the setups. In section 3, we give the method to calculate SKR with two-intensity decoy setups and four-intensity setups. The conclusion and a discussion are given in section 4.

2. Passive-decoy TF-QKD protocol

The system of our passive-decoy TF-QKD scheme is given in figure 1(a). The setups on Alice have no difference from that on Bob, thus we take Alice as an example. Weak coherent pulse (WCP) is generated at Alice side, BS1 splits the pulses into two paths (path r and path s), the transmittance of BS1 is t1. Path r and path s are the same in length so the pulses at these two paths will interfere in the passive-decoy setup (PDS). After interference, the outcome mode a1 is sent to untrusted party Charlie. The PDS is the setup we designed to implement our passive-decoy scheme, it mainly consists of BSs and photon detectors, specifically, figures 1(b) and (c) are two PDSs with two-intensity settings and four-intensity settings. The specific steps of our passive-decoy TF-QKD scheme can be described as follows [20]:

Figure 1.

Figure 1. (a) Schematic diagram of the passive-decoy TF-QKD: PDS, passive-decoy setup; BS, beam splitter; PM, phase modulator; IM, intensity modulator. Alice and Bob have the same setup, BS1 splits the pulse into path s and path r, when code mode is selected, IM blocks the pulse on path s. When decoy mode is selected, PM1 and PM2 randomize the phase of the pulses on each path and leave the IM unmodulated. (b) Two-intensity setup of passive-decoy TF-QKD scheme. D1, single-photon detector. (c) Four-intensity setup of passive-decoy TF-QKD scheme.

Standard image High-resolution image

Step 1. Alice and Bob randomly choose code mode or decoy mode in each trial.

Step 2.a. When Alice (Bob) chooses code mode, the intensity modulator (IM) blocks the pulses on path s, here we choose Lithium Niobate-based Mach–Zehnder (LNMZ) intensity modulator for its advantages of low driving voltage, high bandwidth, adjustable chirp. The phase modular (PM1) on path r modulates the signal phase according to the random classical key bit 0 or 1. By doing these, Alice (Bob) prepares a weak coherent state $\vert {\pm}\sqrt{\mu }{\rangle }_{\mathrm{A}}$ ($\vert {\pm}\sqrt{\mu }{\rangle }_{\mathrm{B}}$) mentioned in reference [20].

Step 2.b. When Alice (Bob) chooses decoy mode, PM1 and PM2 randomize the phase of the pulses on each path and leave the IM on path s unmodulated, the randomized phase will never be publicly announced. By doing these, mixed state in Fock space is generated on path r and path s, and the photon distribution of the mixed state is depending on the mode of photon detectors in PDS.

Step 3. For each trial, Charlie publicly announces which detector (L or R) clicks or is a no click event.

Step 4. After repeating steps 1 to 3 for sufficient times, Alice and Bob publicly announce which trials are code modes and which trials are decoy modes. For the trials in which Alice and Bob both select the code mode and Charlie announces a click event, the raw key bits are generated. For the trials in which Alice and Bob both select decoy mode, Alice and Bob can estimate the yield Ynm, Ynm is the probability of Charlie announcing click event provided Alice emits an n-photon state and Bob emits an m-photon state in a decoy mode.

In step 2, the IM we choose is LNMZ intensity modulator. Since the only purpose of the IM is blocking the pulses on path s in code mode with no information encoded, thus it will not lead to side channel attacks. On the other hand, LNMZ intensity modulator has high bandwidth (usually GHz), making it suitable for systems with high repetition rate like ours. Besides, the extinction ratio of LNMZ intensity modulator is usually more than 25 dB, which means the error rate caused by the IM could be neglected compared with the code rate of our system (see detailed derivation in appendix A).

In the scheme, the secret key rate per trial in a code mode is given as follow

Equation (1)

Here h(x, y) = −x  log2xy  log2y + (x + y)log2(x + y), Qμ is the counting rate in code mode, erμ is the error rate of raw key bits, Qμ and erμ can be directly observed experimentally. ${I}_{\mathrm{A}\mathrm{E}}^{u}$ is the upper bound of the information leakage, and ${I}_{\mathrm{A}\mathrm{E}}^{u}$ can be solved by the following optimization problem

Equation (2)

in which Pk = eμμk/k! is Poissonian distribution. Pn (Pm) is determined by the input parameter μ, which is chosen by the parties prior to initiating the experiment.

3. Calculation of the key rates

To get the secret key rate R in code mode, we need to know the information leakage ${I}_{\mathrm{A}\mathrm{E}}^{u}$ in equation (2). For that Pn, Pm and Qμ in equation (2) can be observed in practical experiments, thus it is necessary to estimate Yn,m. In our scheme, Yn,m can be bounded with the passive-decoy state method. The gain of the decoy states satisfies

Equation (3)

Here Qd is the counting rate in decoy mode, Pra(n) (Prb(m)) is the n-photon (m-photon) distribution of the state on Alice (Bob) in decoy mode, which depends on the mode of photon detectors on PSD in our passive-decoy scheme. In ideal case with infinite decoy states, we can list infinite linear equations like equation (3) to calculate Yn,m accurately. On the other hand, finite decoy states can also help to estimate the lower bound for yields and it is more feasible in practical system.

In our scheme, when the two-intensity setup is implemented in PDS as shown in figure 1(b), pulses on path r and path s will interfere at BS2 with two outcomes a1 and a2, a1 is sent to Charlie and a2 is detected by D1. Denote the detect efficiency of D1 is η, the darkcount rate is ηd, we can get

Equation (4)

in which Pc(n) and Pu(n) are probabilities that detector click or not when n photons come. With these two probabilities, we have two different conditional photon number distributions according to the mode of D1 (see the details in the appendix B)

Equation (5)

and

Equation (6)

Here Pr1(k) is the probability of finding k photons in a1 when D1 produces a click, Pr0(k) is the probability of that when D1 does not click, P(q, k|μ1, μ2) is the conditional probability of finding k photons in a1 and q photons in a2 when the mean photon numbers of pulses in path s and path r are μ1 and μ2, P(q, k|μ1, μ2) is derived in appendix. Then substituting Pr1(k) and Pr0(k) into equation (3), we can have:

Equation (7)

in which ${Q}_{\mathrm{d}}^{0,0}$, ${Q}_{\mathrm{d}}^{0,1}$, ${Q}_{\mathrm{d}}^{1,0}$ and ${Q}_{\mathrm{d}}^{1,1}$ are counting rates on different detector modes in decoy mode. For example, in equation (7) ${Q}_{\mathrm{d}}^{0,1}$ is the counting rate when the detector on Alice does not click and the detector on Bob produces a click, ${\mathrm{Pr}}_{\mathrm{a}}^{0}\left(n\right)$ and ${\mathrm{Pr}}_{\mathrm{b}}^{0}\left(n\right)$ are defined as same as Pr0(n) while the subscripts a and b denote the distributions on Alice's and Bob's sides respectively.

In practice, after observing ${Q}_{\mathrm{d}}^{0,0}$, ${Q}_{\mathrm{d}}^{0,1}$, ${Q}_{\mathrm{d}}^{1,0}$ and ${Q}_{\mathrm{d}}^{1,1}$, we can give approximations to Y0,0, Y0,1, Y1,0, Y2,0, Y0,2 and Y2 by linear programming using equation (7), where Y2 denotes the yields that are from decoy trials in which Alice and Bob share two photons in total, which means n + m = 2. Then following the same technique in section 5 of reference [20], we substitute these yields into equation (2) to bound the information leakage ${I}_{\mathrm{A}\mathrm{E}}^{u}$ and calculate the final key rate R in equation (1).

After presenting the scheme of generating two-intensity decoy state passively, we decide to go further, thus we add BS3 and two photon detectors at the end, as shown in figure 1(c). There are four different modes with two photon detectors in the setup, thus we can get four different conditional photon distributions according to the modes of detector D1 and D2, which means four-intensity decoy states (see the details in the appendix B)

Equation (8)

Equation (9)

Equation (10)

Equation (11)

in which Pr00(k), Pr10(k), Pr01(k) and Pr11(k) are the photon distributions in a1 given that D1 and D2 are in different modes. For example, Pr10(k) is the probability of finding k photons in a1 when D1 produces a click and D2 does not. Note that when the transmittance of BS3 is t3 = 0.5, we will get Pr10(k) = Pr01(k), which means Pr10(k) and Pr01(k) are not independent. To get more useful constraints in linear program, we let 0.5 < t3 < 1. For readability we write Pr00, Pr10, Pr01, Pr11 as Pr1, Pr2, Pr3, Pr4, and define the following gains: ${Q}_{\mathrm{d}}^{4,4}$, ${Q}_{\mathrm{d}}^{1,4}$, ${Q}_{\mathrm{d}}^{2,4}$, ${Q}_{\mathrm{d}}^{3,4}$, ${Q}_{\mathrm{d}}^{4,1}$, ${Q}_{\mathrm{d}}^{4,2}$, ${Q}_{\mathrm{d}}^{4,3}$, ${Q}_{\mathrm{d}}^{1,1}$, ${Q}_{\mathrm{d}}^{2,2}$ and ${Q}_{\mathrm{d}}^{3,3}$. For example, ${Q}_{\mathrm{d}}^{1,4}$ is the counting rate when both D1 and D2 on Alice do not click and the both D1 and D2 on Bob produce click, then like what we do in two-intensity cases, after observing these gains, we can give approximations to Y0,0, Y0,1, Y1,0, Y2,0, Y0,2 and Y2 by linear programming, and we can get the final key rate R using equations (1) and (2). This's the passive scheme of generating four-intensity decoy state with two BS and two photon detectors.

Comparing figure 1(b) with figure 1(c), we can know that Alice could increase the mode of the detectors by adding a BS at the end to get more constrains in linear programing and improve key rates. Following this idea, we can actually generalize our setup to infinite passive-decoy case. we denote the joint photon number distribution of the passive setup with n (n = 1, 2, 3, ...) intensity settings is pn, we can get a recursive formula

Equation (12)

From equation (12), we can get the conditional probabilities of photon number distribution in a1 on each mode of the detectors, one may refer to the appendix for detailed derivations.

Now we carry out a numerical simulation to evaluate the performance of our two-intensity and four-intensity protocols. We focus on the symmetric case, which means that Charlie is at the middle of Alice and Bob and all other device parameters on Alice's side and Bob's side are identical. The simulation model can be found in the appendix of reference [20], the parameters in our simulation are listed in table 1.

Table 1. Experimental parameters used in the numerical simulation. η is the detect efficiency of single photon detectors, ηd is darkcount rate, f is the correction efficiency, ed is the misalignment error probability.

ηηdFiber lossfed
20%1 × 10−70.2 dB km−11.150.03

Our results are shown in figure 2. It shows that, in two-decoy settings, there is a gap between active decoy scheme and passive-decoy scheme, while in four-decoy settings, our passive-decoy scheme performs as good as the active one and even slightly better at a long distance. This shows that our passive-decoy state method can perform as good as the active one. Furthermore, our method can eliminate side channels on sources which may be caused by active modulation. Thus our scheme is very promising for applications of practical systems.

Figure 2.

Figure 2. Secret key rate in logarithmic scale of two-intensity, four-intensity, eight-intensity in passive decoy scheme and two-intensity, four-intensity in active decoy scheme. The infinite case in active decoy scheme and linear key rate bound are also shown in the figure.

Standard image High-resolution image

Besides, we also add a simulation of the passive setup with eight decoys, and compare it with the infinite decoy states.The result shows that the secret key rate of passive setup with the eight decoys surpasses that of the four decoys at a long range of distance. More importantly, the gap between the passive setup with the eight decoys and the infinite decoy states is narrow, which shows our protocol can present satisfactory performance with just a few detectors.

4. Conclusion and discussion

We have proposed the scheme of passive-decoy state TF-QKD, in which different decoy states are generated passively according to the modes of photon detectors. In this way, our scheme can eliminate side channel on source caused by actively modulating of the source intensity. Moreover we presented a simulation comparing the key generation rate with that in active-decoy, it shows our result can performs as good as that in active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. Thus our work provides a useful approach to improve the performance of TF-QKD in practical implementation.

Nevertheless, although our scheme can remove certain side channel caused by actively modulating intensity of the source, we can not remove all side channels, there are still further work to do. For example, the scheme is still threatened by Trojan horse attack although it is not easy in practice, and an imperfect real-life source may emit imperfect states with varied frequency spectra, which will also lead to side channel. Fortunately, imperfect states preparation may be remedied by reference [33], which proposed that an imperfect source S and a perfect source P are identical in side-channel space if there exists a quantum process that can map the S to P. Besides, the intensities of the photon pulses could be unstable. To solve this issue, references [34, 35] have discussed these issues. Reference [34] bounded the fraction of single-photon counts in the decoy-state QKD, while reference [35] proposed a theory that decoy-state QKD with an unstable source can work as if the source were stable provided the condition: $\underset{j}{\mathrm{max}}\left(\frac{{p}_{j}{a}_{kj}}{{p}_{j}^{\prime }{a}_{kj}^{\prime }}\right){\leqslant}\underset{j}{\mathrm{max}}\left(\frac{{p}_{j}{a}_{2j}}{{p}_{j}^{\prime }{a}_{2j}^{\prime }}\right){< }\underset{j}{\mathrm{max}}\left(\frac{{p}_{j}{a}_{1j}}{{p}_{j}^{\prime }{a}_{1j}^{\prime }}\right)$, for all k ⩾ 2 hold. In our scheme, this condition still holds by optimizing the transmittance of BS(s), therefore, our scheme can work under unstable source in principle. Moreover, there are still side channels in our scheme due to bases switching, i.e., different values in phase modulation in the code mode. It would be interesting to study this issue in the future.

Acknowledgments

This work has been supported by the National Key Research and Development Program of China (Grant No. 2016YFA0302600), the National Natural Science Foundation of China (Grant Nos. 61822115, 61961136004, 61775207, 61702469, 61771439, 61627820, 61675189), National Cryptography Development Fund (Grant No. MMJJ20170120) and Anhui Initiative in Quantum Information Technologies.

Appendix A.: The affection of IM in the system

We take Alice as an example, for simplicity, we let the extinction ratio of the IM be 20 dB, the intensity of the weak coherent pulses from laser be μ, the transmittance of BS1 is t1, thus we have

Equation (A1)

in which μs, μr are the intensity of the pulses at the two outputs of BS1, then pulses on path s will be blocked by the IM, the intensity of the output pulses is μs' = μs/100, thus we can get the probability

Equation (A2)

Where P(n = 0, μs') is the probability of finding no photons from the output of path s after blocking of the IM, $P\left(n\ne 0,{\mu }_{\mathrm{s}}^{\prime }\right)=1-{\text{e}}^{-{\mu }_{\mathrm{s}}^{\prime }}$ is the probability of finding at least one photon from the output of path s.

For simplicity, we take the error rate er = 0.5 on a1 as long as there are photons come from path s, thus we have the total error rate

Equation (A3)

Since μs' = μs/100, thus ertotal is a small value, we take μs = 0.1 for example, we get ertotal = 0.00005, it is a small value that it will not affect the performance of our system.

Appendix B.: Passively generate different photon number statistics

Here we focus on the PDS in the whole passive-decoy TF-QKD system, as shown in figure 3. Let us first consider the interference with two pure coherent states $\vert n\rangle ={{a}^{{\dagger}}}^{n}\vert 0\rangle $ and $\vert m\rangle ={{b}^{{\dagger}}}^{m}\vert 0\rangle $, where a and b are creation operators, n and m are photon numbers. For a and b at a BS:

Equation (B1)
Figure 3.

Figure 3. Passive-decoy state setup with two intensity settings.

Standard image High-resolution image

Here t is the transmittance of the BS2, c and d are creation operators of the quantum state of output a1 and a2. Denote ${U}_{{\mathrm{B}\mathrm{S}}_{2}}$ is the unitary operator of BS2, thus we have

Equation (B2)

from equation (2) we can get the probability of finding k photons at mode a1, it is a problem of statistics.

Here P(k|n, m) is the probability of finding k photons on a1 given the coherent states on path s and path r containing n and m photons respectively. With P(k|n, m) we can then get the joint probability P(k, n, m|μ1, μ2)

Equation (B3)

where P(k, n, m|μ1, μ2) means the pulses in path r, s are phase-randomized weak coherent states with mean photon number μ1 and μ2, P(μ, n) = eμμn/n! is Poissonian distribution. Summing up n and m and we can get

Equation (B4)

where P(k|μ1, μ2) is the photon distribution on mode a1 given two phase-randomized weak coherent states interfere at BS2. In figure 3, the photon distribution on mode a2 is the same as mode a1.

Equation (B5)

thus we can get P(k, q|μ1, μ2)

Equation (B6)

Here P(k, q|μ1, μ2) is the joint probability of finding k photons on mode a1 and q photons on mode a2. Denote η is detect efficiency, ηd is darkcount rate of photon detector D1, we have

in which Pc(n) and Pu(n) are probabilities that the detector D1 produces a click and no click when n photons come, thus there are two modes of the detector D1 according to its click event and no click event. consequently, there are two different conditional photon distribution on a1 according to the mode of D1

Equation (B7)

Equation (B8)

where the subscripts '1' and '0' of Pr1(k) and Pr0(k) means the detector clicks or not when pulses come.

The derivation above clarifies our passive setup with two-intensity settings, and we also investigate the four-intensity settings, the approach is to add a BS3 at the end and two detectors for the outcome signals as shown in figure 4. Thus there are four different conditional photon distributions on a1, Pr00(y), Pr01(y), Pr10(y), Pr11(y), according to the mode of the two detectors, We have get the probability of finding q photons on a2 in equation (5), denote the transmittance of BS3 is t3, we can get the probability of finding j, l photons at the two output of BS3 with q photons be splitted at BS3

Equation (B9)

thus we can get

Equation (B10)

Here P(j, l|μ1, μ2) is the probability of finding j photons on D1 and l photons on D2, when there are two weak coherent states with the mean photon number of μ1 and μ2 on path s and path r. Then we have the joint probability

Equation (B11)

Here P(k, j, l|μ1, μ2) is the joint probability of finding k on a1, j photons on D1 and l photons on D2, then we can get the conditional probabilities of photon number distribution on a1 according to the mode of the detectors D1 and D2

Equation (B12)

Equation (B13)

Equation (B14)

Equation (B15)
Figure 4.

Figure 4. Passive-decoy state setup with four intensity settings.

Standard image High-resolution image

The derivation above clarifies our passive-decoy setup with four-intensity settings, the main idea is adding a BS at the end of the setup with two-intensity settings and two detectors detecting the output pulses. Thus the modes of detectors have increased from two to four, which means we increased the number of passive decoy intensities from two to four.

Following this idea, we can generalize the setup to infinite passive-decoy case. First, we denote the joint probability of the passive-decoy setup with n − 1 (n = 1,2,3, ...) intensity settings is $P\left(k,{d}_{1},{d}_{2}\dots {d}_{n-1}\vert {\mu }_{1},{\mu }_{2}\right) \left.\right)$, which means we add n − 1 photon detectors at the end and the joint probability of finding k photons on mode a1 and finding dn photons on the corresponding photon detector Dn is P(k, d1, d2, ..., dn−1|μ1, μ2). Then if we add another BS at the end and two photon detectors at the output mode, the setup becomes a setup with n intensity settings, this means in the setup with n − 1 settings, the pulse on the Dn−1 is splitted by the added BS and detected by the add photons detectors, denote the transmittance of this BS is t, we can get

Equation (B16)

this is the same as given in equation (9), and in P(k, d1, d2, ..., dn−1|μ1, μ2), we have

Equation (B17)

Here P(dn−1|μ1, μ2) is the probability of finding dn−1 photons on detector Dn−1 in the setup with n − 1 intensity settings. Thus we can get

Equation (B18)

Here P(n, m|μ1, μ2) is the probability of finding n and m photons on the two output mode given two phase randomized weak coherent states on path s and path r, and the mean photon number of these two phase randomized WCP is μ1 and μ2

With the probability on equation (18), we can get the joint probability of the passive setup with n (n = 1,2,3, ...) intensity settings

Equation (B19)

For readability, we substitute n, m with dn−1 and dn, thus $P\left(k,{d}_{1}\dots {d}_{n-2},{d}_{n-1},{d}_{n}\vert {\mu }_{1},{\mu }_{2}\right) \left.\right)=P\left(k,{d}_{1}\dots {d}_{n-2},n,m\vert {\mu }_{1},{\mu }_{2}\right)$. And we denote Pn = P(k, d1, ..., dn−2, dn−1, dn|μ1, μ2) is the joint probability on passive setup with n intensity settings, Pn−1 = P(k, d1, ..., dn−1, n, m|μ1, μ2) is the joint probability on passive setup with n − 1 intensity settings, thus we have

Equation (B20)

Equation (20) is a recursive formula. In the setup with n intensity settings, there are n photon detectors, thus there are $\mathrm{M}=\sum _{m=0}^{n}{C}_{n}^{m}$ modes according to whether the detectors click or not, which means there are $\mathrm{M}=\sum _{m=0}^{n}{C}_{n}^{m}$ conditional probabilities of photon number distribution on a1 on each mode of detectors. We take Pr100...000(k) in equation (21) for example

Equation (B21)

Pr100...000(k) is the conditional probability of photon number distribution on a1 in the mode that only the detector D1 clicks and the rest do not among the n detectors added. For other modes of the detectors, the conditional probability of photon number distribution is similar to equation (21).

Please wait… references are loading.