Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Wireless quantum key distribution in indoor environments

Open Access Open Access

Abstract

We propose and study the feasibility of wireless quantum key distribution (QKD) in indoor environments. Such systems are essential in providing wireless access to the developing quantum communications networks. We find a practical regime of operation, where, in the presence of external light sources and loss, secret keys can be exchanged. Our findings identify the trade-off between the acceptable amount of background light and the receiver field of view, where the latter specifies the type of equipment needed for the end user and its range of movements. In particular, we show that, using a proper setting, we can provide mobility for the QKD users without imposing stringent conditions on beam steering.

Published by The Optical Society under the terms of the Creative Commons Attribution 4.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.

1. INTRODUCTION

Quantum key distribution (QKD) is a promising technology for achieving security in the quantum era [1]. It provides a secure way of distributing secret keys between two users over an optical channel [2,3]. The security is guaranteed by the properties of quantum mechanics rather than computational complexity [4]. The latter is at the core of public key cryptography schemes, whose security is threatened by advanced algorithms that can be run on quantum computers [58]. QKD offers a solution to this problem and will possibly be the most imminent application of quantum technologies in our daily life. It is important to utilize the advantages of this scheme not only in niche markets but also for the general public [9,10]. This necessitates developing hybrid quantum-classical networks that support many users. This requires revisiting the requirements at both access and core parts of the network. This work focuses on the access networks, and, in particular, it addresses the wireless mode of access in indoor environments for such QKD networks. This would resemble a quantum Li-Fi system, possibly in parallel with a classical Li-Fi, that enables end users to exchange secret keys with other network users in a convenient way [11].

The current dominant approach for ensuring data security over the Internet is based on a combination of public-key cryptography, e.g., the Rivest–Shamir–Adleman (RSA) protocol [12], for exchanging a secret key/seed, and symmetric-key cryptography protocols, such as advanced encryption standard (AES) or secure hash algorithm, for encryption, decryption, and authentication. The security of RSA is, however, based on the computational complexity of the factoring problem. The latter does not have any known efficient solutions on classical computers, but there exists a quantum algorithm using which one can solve the factoring problem in polynomial time [5]. This is a huge threat to the security of our online communications, such as email correspondence and banking transactions, especially considering the progress made in the past few years in quantum computing [68]. Note that, although symmetric-key algorithms such as AES may now be considered safe against quantum attacks [13], the initial input keys to such algorithms are currently distributed between two remote users using public-key schemes, which are vulnerable to quantum attacks. This would necessitate the implementation of alternative solutions, such as QKD, at large scale to offer data security to every individual user.

Since its introduction by Bennett and Brassard in 1984 [14], QKD has seen many field realizations [1517] with the capacity to generate verifiable security in data transmission even in the presence of an eavesdropper, Eve, who is assumed to have an unlimited computational power. In the original BB84 protocol [14], the light source was assumed to emit perfect single photons. However, in practice, it is now possible to use, without enduring a severe penalty, weak coherent laser pulses to approximate single-photon pulses. The progress with single-photon detectors has also been tremendous, with quantum efficiencies as high as 93% and dark counts as low as one per second now achievable [18]. Such developments have resulted in QKD being demonstrated over both optical fiber and free-space channels [2,3]. Today, various QKD systems are also commercially available. Examples are Clavis by ID Quantique in Switzerland [19] and various products by QuantumCTek in China [20] that contributes to the 2000-km-long QKD link between Beijing and Shanghai. Other companies, such as Toshiba Research Europe Limited [21] and British Telecom, who are contributing to the UK national quantum network, are also heavily involved with the R&D aspects of the technology. The latter examples represent QKD networks that are being developed across the world, in order to support a wider group of end users. The focus of most of these efforts is, however, mainly on the core networks [16], or the wired access to such a backbone [22]. This work widens the QKD adoption by looking into wireless indoor QKD.

Wireless access to a communications network is often taken for granted. This is not the case, however, for quantum communications. Most of QKD experiments are fiber-based in which point-to-point communication is established. In addition, the single photons enjoy traveling through a very low-loss channel. Through-the-air QKD experiments have also been point to point, therefore not offering mobility, and often require expensive and bulky optics equipment. However, nowadays, wireless connection is a necessity because of its convenience and also, because of the ever-increasing use of handheld devices. In order that QKD will ever become ubiquitously used, wireless mobile QKD needs to be developed. While it is hard to envisage, at the moment, that wireless quantum access can be offered anywhere anytime, there are certain scenarios in which wireless QKD can be both possible and beneficial. For instance, customers in a bank office may wish to exchange secret keys with the bank wirelessly without the need for waiting for a teller or a cash machine. While conventional solutions based on direct optical links do not necessarily provide immunity against skimming frauds, QKD can guarantee the detection of any possible eavesdropping attacks [23]. Handheld prototypes have already been made, which enable a user to securely exchange a key with a cash machine [23,24]. It would be desirable to remove the constraint of being in the vicinity of a bank machine. In such a scenario, wireless indoor QKD is an attractive solution. In the long term, such indoors solutions can be part of a home/office network, which is equipped with wireless optical communications and is connected via fiber to its main service provider [11]. This is in line with the developing Li-Fi technologies in data communications connected to passive optical networks for high data rate transmissions. Our proposed wireless QKD link will be using the same infrastructure while complementing the range of services offered to the user by adding quantum-enabled security.

Wireless indoor QKD would not be without its own implementation challenges. Such a system is expected to suffer from the background noise, loss, and the implications of the mobility requirements. Ambient light, caused by the Sun and artificial sources of light, is the primary hindrance to the successful operation of QKD in indoor environments. Essentially, QKD is a noise-dependent scheme, in which a secret key cannot be exchanged when the noise level exceeds a certain level. Another possible downside of indoor environments is the existence of severe loss, in comparison to fiber-based QKD, when the transmitted beam’s angle is wide. For instance, the non-directed line-of-sight configuration, which suits most a mobile user, would suffer most from the background noise and loss. This is because, in this configuration, the receiver’s field of view (FOV) should be sufficiently wide in order to collect sufficient power to operate. This would result in more background noise to sneak in. A wide beam angle at the transmitter would also result in a high channel loss, which may not be tolerable in the single-photon regime that most QKD schemes operate. Beam steering could be a possible solution to such problems, but it would add to the complexity of the system and the cost of handheld devices.

In this paper, we assess the feasibility of employing QKD in indoor environments by using the known techniques in optical wireless communications (OWC). One distinctive feature of the setups we consider in our work is the use of phase encoding, which, as compared to polarization encoding used in [23,24], offers higher resilience to alignment issues. This would, in principle, enables us to use wider beams and fields of view, which are important factors for the mobility feature. Under such a setting, we find the feasibility regime for QKD in a single-room single-user scenario. Multiple users can also be supported by using relevant multiple-access techniques [10,25]. The system is mainly examined in the presence of background noise induced by an artificial lighting source, as well as the loss in indoor environments. We also account for possible imperfections in the encoder and decoder modules. Our results confirm that there exists a practical regime of operation where secret keys can be exchanged using wireless QKD links. Our results specify to what extent beam steering may or may not be needed. This investigation paves the road for any experimental realization of wireless indoor QKD [24].

The remainder of this paper is organized as follows. In Section 2, the system is described and in Section 3 the channel model is explained. We present secret key rate analysis in Section 4 and numerical results are discussed in Section 5. Section 6 concludes the paper.

2. SYSTEM DESCRIPTION

In this section, we describe the setup and the components used in our wireless QKD system. Here we consider a particular scenario in which we have an empty windowless room of X×Y×Z dimensions, which has been illuminated by an artificial source of light; see Fig. 1. While this may not be exactly the case in a practical scenario, this particular setting allows us to properly study the resilience of the system to background noise. More realistic cases can also be investigated by properly adjusting the lighting source characteristics. The lighting source is assumed to be a Lambertian one with a semi-angle at half power of ϕ1/2 located at the center of the ceiling. The contribution of the light source is calculated via its power spectral density (PSD), denoted by S, at the operating wavelength of the QKD link, denoted by λ.

 figure: Fig. 1.

Fig. 1. Wireless QKD link in an indoor setup. The transmitter is mobile, while the QKD receiver is fixed on the ceiling. For illustration purposes, the QKD receiver is depicted away from the center. In practice, it should be optimally placed at the center of the ceiling.

Download Full Size | PDF

We assume that the QKD link is composed of two components. The QKD receiver, or Bob’s box, is fixed and located at the center of the ceiling, while the QKD transmitter, or Alice’s device, can be anywhere on the floor with a semi-angle at half power of Θ1/2. This setting has the practical advantage that the mobile user is only equipped with the encoder module for QKD, which is often less expensive and bulky than the decoder module. With regards to the QKD receiver and the artificial light source, we assume that the QKD receiver would just receive the reflected light from the walls and the floor and no light would enter the receiver directly from the bulb. This is achievable in practice by using certain reflectors that confine the radiation of the light source toward the floor. For simplicity, however, we assume that the lamp position is at the same level of the ceiling as the QKD receiver, and that the path between the QKD transmitter and receiver is not blocked. We also implicitly assume that the QKD source shines light in an upward direction toward the ceiling. This requires a minimal alignment, which can be done by the users the same way that a mobile user may avoid being in a deep fading point when using their mobile phones. If the light beams used are not too narrow, then the total performance is expected to be tolerant of some movements. If they are narrow, however, then active beam steering would be required. We will see what range of beam angles we can use in our numerical results section. We assume that the QKD receiver has a detection area A and an optical filter bandwidth Δλ. The unwanted light is filtered out best if the filter’s bandwidth matches 1/T, where T is the width of the transmitted pulses by the QKD user.

We assume that the decoy-state variation of the BB84 protocol is in use [26]. The key advantage of the decoy-state protocol is in allowing us to use weak laser pulses, instead of ideal single-photon sources, at the source. This, while being immune to potential photon-number splitting (PNS) attacks [27], offers a practical inexpensive solution for QKD encoders.

We employ time-bin encoding/decoding [28], rather than polarization, to implement the BB84 protocol. In this scheme, the information is encoded onto the phase difference between two consecutive pulses. The possible advantage over polarization encoding is that we do not need to establish an identical polarization reference frame between a mobile device and the receiver. This can much simplify the alignment requirement and would allow us to use wider beams at the transmitter. We use passive decoders for our time-bin encoded signals, which includes a Mach–Zehnder interferometer with a delay corresponding to the time difference between the two time bins, followed by two single-photon detectors. The detectors are time gated so that they only pick up the signal when the two time bins are interfering.

We consider three cases with regards to the QKD encoders. We first assume that the QKD encoding is carried out perfectly; that is, the phase difference between the two consecutive pulses is exactly as the protocol requires. We consider both cases of infinitely many and vacuum + weak [26] decoy states in this scenario. We also consider the case of using imperfect encoders. In this scenario, we assume that the device can be either characterized, in the sense that the QKD source has known flaws [29], or uncharacterized but has a fixed deviation from the ideal setting. In the latter case, we use the reference-frame independent (RFI) QKD protocol [30], which has also been used in recent demonstrations of polarization-encoded handheld QKD [23,24]. The difference here is that, in the latter experiments, we need to at least know the reference for one polarization axis. In time-bin encoding protocols, the equivalent requirement would be to have two distinct time bins known to the receiver. The latter requirement is expected to be easier to achieve in practice for users that carry and move their QKD encoders. Other techniques have also been proposed to handle the basis mismatch problem, which may turn useful in certain scenarios [31]. In Section 4, the secret key rate analysis for each case will be given.

We consider the regime of operation when the reflected pulses off the walls are not overlapping in time with the main direct signal. This happens when the transmitted pulses are short in comparison to the transmission delay. This is the case in the practical regime of operation when high rate communications is desired. In this case, we neglect to collect the reflected QKD signals off the walls. We also assume that none of these reflected pulses will interfere with the forthcoming QKD pulses. That would imply that the repetition rate of the QKD link must be of the order of 100 MHz or lower, which is suitable for our scheme.

Two scenarios are considered in this work. We first look at the case where the lighting source is turned off, in which case the background noise is assumed to be isotropic ambient light noise with a spectral irradiance denoted by pn. The variation in the receiver’s FOV in this case would affect the corresponding value of the channel transmittance of the QKD link. In the second scenario, we consider the effect of the artificial light source by accounting for the reflections from the walls and the floor, whose reflection coefficients are denoted by r1 and r2, respectively. The background noise at the QKD receiver, from the lighting source, will go up with increase in S as well as that of the QKD receiver’s FOV. The latter would determine how much mobility may be allowed. We therefore look at the trade-off between these two parameters in determining the secure versus insecure regimes of operations. Before doing that, in the following section, we first employ the propagation models in OWC for estimating path loss and background noise in the room.

3. CHANNEL CHARACTERIZATION

Indoor environments can impose severe conditions for the operation of a QKD system, such as that in Fig. 1. This includes the issues of path loss, especially if a wide beam needs to be used, and the background noise, which also affects the performance of the scheme by increasing the error rate. In this section, we estimate the path loss and the background noise collected by the QKD receiver using established OWC models.

A. Path Loss Estimation

Due to path loss, the recipient, Bob, would receive a portion of the photons sent by the sender, Alice. This is estimated by the channel DC-gain, denoted by HDC, in OWC channels. The received power depends on the distance between the sender and the receiver, as well as the degree of directionality and the alignment. For the line-of-sight link between the QKD transmitter and receiver, the DC-gain is given by [32]

HDC={A(m+1)2πd2cos(ϕ)mTs(ψ)×g(ψ)cos(ψ),0ψΨc,0elsewhere,
where A is the detector physical area; d is the distance between the QKD source and the QKD receiver; ψ represents the incidence angle with reference to the receiver axis, while ϕ specifies the irradiance angle; see Fig. 1. These two parameters specify the relative location and orientation of the transmitter and receiver modules. Ts(ψ) is the filter signal transmission; m and g(ψ) are, respectively, the Lambert’s mode number used to specify the directivity of the source beam and the concentrator gain, given by
m=ln2ln(cos(Θ1/2))
and
g(ψ)={n2sin2(Ψc),0ψΨc0ψ>Ψc,
where n is the refractive index of the concentrator, Ψc is the receiver’s FOV, and Θ1/2 is the semi-angle at half power of the light source. We neglect here the reflected pulses from the walls, which, as mentioned earlier, will arrive at a later time.

B. Background Noise Analysis

Two sources of background noise are accounted for in our analysis. Ambient light noise is considered first, which is due to blackbody radiation in the surrounding environment. The ambient light is assumed to be isotropic. The second source of background noise is the artificial lighting source in the room.

Let us first assume that the lighting source is off. The background noise in this case is due to isotropic ambient light. The received power for such isotropic ambient light is given by [32]

Pn,isotropic(λ)=pn(λ)ΔλTsAn2.

The average number of detected photons over a time period τ, corresponding to the width of a time bin, for each detector in a passive time-bin decoder is given by

nB(1)=Pn,isotropic(λ)τηd/2hc/λ,
where c is the speed of light in the vacuum, ηd is the single-photon detector efficiency, and h is Planck’s constant. Note that the background noise in two consecutive time bins, at the input of the decoder, would contribute to noise in the measured time bin at the output of the decoder. The passive decoder would, however, introduce an additional 1/2 loss factor, and the background noise is split evenly between the two detectors. The factor 1/2 in Eq. (5) accounts for the aggregate effect.

Next, the background noise at the QKD receiver due to the lighting source is calculated. The light from the source can indirectly enter our QKD receiver via reflections off the walls and the floor. We obtain the amount of reflected power that may enter the QKD receiver by partitioning the floor and the walls into surface elements of area dA and then calculating the contribution from each of these elements at the QKD receiver. The walls and the floor are modeled as diffuse reflectors, and we use the model presented in [33] to approximate the reflection pattern of the walls and the floor. Suppose the incident and reflected angles that the beams make with respect to the wall and the floor normal are α and β, respectively; see Fig. 1. The reflected beams would enter the QKD receiver if the receiving angle, ψ, with respect to the receiver normal, is less than Ψc. The portion of this reflected light that may enter the receiver is estimated by calculating the DC-gain for the reflected beam, HRef, and is given by [33,34]

HRef={A(m1+1)2π2d12d22cos(ϕ)m1rTs(ψ)g(ψ)×dAcos(α)cos(β)cos(ψ),0ψΨc,0elsewhere,
where ϕ is the incidence angle with respect to the lighting source axis; d1 and d2 are, respectively, the distance from the lighting source to the surface element, and from there to the QKD receiver; r is the reflection coefficient of the wall or the floor; and m1 is the Lambert’s mode number, which is calculated from Eq. (2), but with semi-angle at half power of ϕ1/2 for the lighting source (rather than Θ1/2). By integrating over the walls and the floor, the average number of detected photons, per detector, at the QKD receiver due to the lighting source is then given by
nB(2)=S(λ)Δλτηd/2hc/λwalls,floorHRef.

Different sources of background noise have different spectral irradiance over different ranges of wavelength. The ambient light caused by the Sun or an incandescent lamp covers a wide range of wavelengths and could generate a large number of background photons within a pulse period. In contrast, some common artificial sources, such as white LED bulbs, transmit mostly within the visible spectrum, possibly extended to the first window of infrared. For QKD systems operating at 880 nm of wavelength, the latter can then be a more tolerable source of noise. In order to accurately estimate the impact of white LED bulbs, we measured the irradiance of two randomly selected white LED bulbs, with an equivalent brightness to a 60-W incandescent lamp. The measurements were conducted by Photometric and Optical Testing Services. Spectral irradiance measurements have been done at a distance of 50 cm from the center of each bulb, from which the bulb’s PSD has been calculated; see Fig. 2. The latter is measured to be of the order of 105(W/nm) at 880 nm. In this case, for the parameter values in Table 1, the estimated value in Eq. (7), at FOV=20°, is equal to 1.8×105. This is comparable to the dark count rate and it turns out, as will be shown later, that QKD operation can be feasible for such levels of external noise. The spectral irradiance for the Sun is 3 orders of magnitude higher than that of the LED bulbs; hence, the QKD system may only work under daylight exposure if the FOV is extremely narrow. On the other hand, the typical room temperature blackbody radiation in the room is orders of magnitude weaker than that of LED bulbs.

Tables Icon

Table 1. Nominal Values Used for Our System Parameters

 figure: Fig. 2.

Fig. 2. Power spectral density of two LED bulbs, equivalent to a 60-W incandescent lamp: a 650-lumen cool white LED manufactured by AURAGLOW (dashed), and a 805-lumen warm white LED bulb manufactured by INTEGRAL (solid). The wriggly form of the curves at the two far ends of the spectrum is due to the measurement precision.

Download Full Size | PDF

4. SECRET KEY RATE ANALYSIS

In this section, we present the rate analysis for our QKD system. The secret key generation rate, defined here as the probability of obtaining a secret key bit per transmitted quantum signal, is one of the key figures of merit for QKD systems. It will be affected by the amount of quantum bit error rate (QBER) of the system. The latter depends on the ambient noise and eavesdropping activities. QBER is defined as the ratio of non-identical bits in the sifted bits of Alice and Bob and the total number of sifted bits. In QKD protocols, if QBER is above a certain level, the protocol is aborted. In this section, we calculate the relevant key rate parameters for the three encoding techniques described in Section 2, in the normal operating mode of the system, when there is no eavesdropper present.

A. Decoy-State BB84 with Perfect Encoders

The decoy-state technique, as mentioned earlier, was proposed in [35] to combat the PNS attack [27]. The idea is that in addition to the signal pulses, Alice randomly sends decoy pulses with different intensities. This helps us gather more information about the quantum channel in order to discover the presence of Eve. Roughly speaking, as compared to the signal pulses, decoy pulses often have a lower multi-photon component, due to having a lower average number of photons per pulse as compared to the signal pulses. In this case, if Eve launches the PNS attack, Bob would receive a different portion of decoy pulses than signal pulses. As a result, if Alice and Bob examine separately both the decoy and signal pulses, the attack can be detected [26].

The secret key generation rate for the employed decoy-state protocol is lower bounded by [26,36]

Rdecoyq{Q1(1h(e1)fQμh(Eμ)},
where q is the basis sift factor, which is equal to 1/2 in the original BB84 protocol. This is due to discarding half of the detection events in X and Z bases after the sifting procedure. Here, we use the efficient BB84 protocol [37], which allows us to choose unevenly between X and Z bases, in which case q can approach 1. If infinite number of decoy states are used, the parameters in Eq. (8) are given as follows: Q1, which is called the single-photon gain, is the probability that Alice sends one photon and Bob gets a click, and it is given by
Q1=Y1μeμ,
where μ is the average number of photons per pulse for the signal state and Y1 is the yield of single photons. The latter is defined as the probability of getting a click provided that Alice has sent exactly a single photon, which is given by
Y1=1(1η)(1nN)2,
where η is the total system transmittance given by ηdHDC/2 (the factor 1/2 represents the loss incurred in a passive time-bin decoder), and nN is the total noise per detector given by nB+nD, where nD is the dark count rate per pulse for each of the two single-photon detectors at the Bob’s receiver and nB=nB(1)+nB(2); e1 is the error probability in the single-photon case, and is given by
e1=e0Y1(e0ed)η(1nN)Y1,
where e0=1/2 and ed models the error, caused by channel distortions, in the relative phase between the two pulses generated by the phase encoder. In Eq. (8), f represents the error correction inefficiency and Qμ is the probability that Bob gets a click when Alice sends a coherent state with an average number of photons, μ, and it is given by [38]
Qμ=1eημ(1nN)2.

The overall QBER is represented by Eμ in Eq. (8), and it is given by

Eμ=e0Qμ(e0ed)(1eημ)(1nN)Qμ.

Finally, h(x) is the Shannon binary entropy function given by

h(x)=xlog2x(1x)log2(1x).

If we use a two-decoy-state protocol, such as vacuum + weak, Y1, Q1, and e1 are, respectively, bounded by [26]

Y1Y1L,ν1,ν2=μμν1μν2ν12+ν22[Qν1eν1Qν2eν2ν12ν22μ2(QμeμY0L)],
Q1Q1L,ν1,ν2=μ2eμμν1μν2ν12+ν22[Qν1eν1Qν2eν2ν12ν22μ2(QμeμY0L)],
and
e1e1U,ν1,ν2=Eν1Qν1eν1Eν2Qν2eν2(ν1ν2)Y1L,ν1,ν2,
where ν1 and ν2 are the average number of photons per pulse for the decoy states signals; Qν1 and Qν2 can be obtained from Eq. (12); Eν1 and Eν2 are the overall QBER for decoy-state signals given by Eq. (13). In the above equations, Y0 is the probability of having a click due to the background and/or dark count noise, whose lower bound is given by
Y0Y0L=max{ν1Qν2eν2ν2Qν1eν1ν1ν2,0}.

The above lower (L) or upper (U) bounds can be used in Eq. (8) to find a lower bound on the key rate.

B. Decoy-State QKD with Known Source Flaws

We investigate here the case of using non-ideal QKD encoders, for which the amount of deviation in state preparation is assumed to be known. This concerns a user/manufacturer that has characterized the QKD devices. In order to obtain a fair comparison with the previous case, we assume that the quantum states in the Z basis, from which the secret keys are generated, are well aligned. In this basis, |0Z and |1Z represent single-photon states corresponding to the first and second time bin, respectively. For the sake of modeling the source flaws, however, we assume that the basis states in the X basis, |0X and |1X, are, respectively, given by cos(π4+δ2)|0Z+sin(π4+δ2)|1Z and cos(π4+δ2)|0Zsin(π4+δ2)|1Z, where δ models the deviation from the ideal state. At δ=0, |0X and |1X describe two consecutive pulses with phase differences of 0° and 180°, respectively, as expected in the ideal case.

The asymptotic key rate in this case is given by [29]

R=Q1[1h(ex(1))]Qμfh(Eμ),
where Q1, Qμ, and Eμ are the same as those given for the decoy-state BB84. The phase error rate ex(1) is expressed in terms of the conditional probabilities as [29]
ex(1)=Y1X|0X+Y0X|1XY1X|0X+Y0X|1X+Y1X|1X+Y0X|0X,
where YsX|jX, for single-photon states, in our channel model is given by
YsX|jX=η[PsX|jX(1nN)+12nN]+(1η)[nN(1nN)+nN2/2],
where P0X|0X=P1X|1X=12[1+sin(π2+δ)] and P0X|1X=P1X|0X=12[1sin(π2+δ)].

C. Decoy-State QKD with Unknown Source Flaws

If the encoder imperfections are unknown, but correspond to fixed rotations, we can use the RFI-QKD protocol [30], instead of BB84, with the decoy-state technique. This case corresponds to scenarios where the users cannot characterize their devices and/or the manufacturers have not specified the extent of possible imperfections in the encoders. In the RFI-QKD protocol, one basis, Z, is supposed to be known and identical to both users, while X and Y bases can be different. In our time-bin encoding, the Z basis is defined by each of the time-bin modes, whereas X and Y eigenstates are, respectively, given by superposition states (|0Z±|1Z)/2 and (|0Z±i|1Z)/2. We model the difference between the X (Y) operator on Alice side, XA (YA), and that of Bob’s side XB (YB) by a rotation parameter ξ, which gives us the following:

XB=cos(ξ)XA+sin(ξ)YAandYB=cos(ξ)YAsin(ξ)XA.

In RFI-QKD, the correlation quantity, C, is used to estimate Eve’s information, and it is defined by [30]

C=XAXB2+XAYB2+YAXB2+YAYB2,
which can be written as [39]
C=(12EXX)2+(12EXY)2+(12EYX)2+(12EYY)2,
where E terms represent error rates in different scenarios. It can be shown that C is independent of ξ. For our numerical analysis, ξ is then assumed to be zero. In this case, we can assume that EXY=EYX=1/2, and EXX=EYY=EZZ=e1, where e1 is the error probability in the single-photon case as calculated in Eq. (11). The parameter C can then be calculated by
C=2(12e1)2.

Eve’s information is bounded by [30]

IE=(1e1)h[1+νmax2]+e1h[1+f(νmax)2],
where νmax and f(νmax), respectively, are given by
νmax=min[11e1C/2,1]
and
f(νmax)=C/2(1e1)2νmax2e1.

By substituting Eq. (25) in the above equations, IE is then given by

IE=e1+(1e1)h[(13e1/2)(1e1)].

The key generation rate for RFI-QKD with the decoy-state technique is then bounded by [39]

RQ1(1IE)Qμfh(Eμ),
where Qμ, Eμ, e1, and Q1 are the same as those given for the decoy-state BB84 protocol.

5. NUMERICAL RESULTS

In this section, we numerically study the feasibility of wireless indoor QKD by looking at different scenarios. Table 1 summarizes the nominal values used in our numerical results. These parameter values are based on the available technology for QKD systems. For instance, the values used for detector efficiency and dark count can be achieved by silicon avalanche photodiodes (APDs) [40]. Recent gigahertz-rate QKD demonstrations have also used pulse durations of the order of hundreds of picoseconds with a correspondingly narrow filter at the receiver [41]. We use 0.5 photons per signal pulse, which is the near optimal value for μ in the decoy-state BB84 protocol. The room dimensions are representing a typical room with higher reflections from the walls than the floor, which might have carpeting. In a large partitioned office space, this can represent one cubicle in the room, or the area that can be covered by one QKD receiver. We also assume a rather large semi-angle at half power for both the lighting source and the QKD source, which overestimates the errors we may have in a practical setup. The latter will, however, be crucial for mobility features.

Before analyzing the key rate performance, let us start by illustrating how the position of the QKD source and its beam size, as well as the receiver’s FOV, would affect the path loss. Figure 3 shows that the position of the QKD source with respect to its receiver can harshly affect the channel loss. In our case, moving from the center of the room to one of its corners adds nearly 10 dB to the channel loss. This is partly because of the additional distance, but mainly because of the loose alignment we have adopted for our system. In our setup, we have assumed that the QKD source emits light upward, at a right angle with the floor, to the ceiling. There is also the interplay between the source semi-angle and the total loss. The lower the source semi-angle is the larger m would be in Eq. (1). This means that for small values of ϕ, i.e., when the QKD source is near the center of the room, there may be some gain in the channel transmissivity proportional to m+1, but once ϕ increases, by moving toward the corners, that benefit may be washed away by the cos(ϕ)m term in Eq. (1). The receiver’s FOV would also affect the loss in a negative way. One may assume that a larger FOV would result in higher power collection, but, quite the opposite, because of the concentrator gain, the larger the FOV is, the higher the channel loss would be. This is evident from all the curves in Fig. 3. A larger FOV would, however, enable the QKD source to be seen over a wider range. That advantage could, however, come with additional background noise that may sneak into the receiver. Overall, Fig. 3 indicates that, without beam steering, the QKD system may need to tolerate a large amount of propagation loss in the wireless channel.

 figure: Fig. 3.

Fig. 3. Total loss, 10log10(ηdHDC/2), for the QKD source in center and corner positions. Path loss depends on the semi-angle at half power, the position of the QKD source, and the receiver’s FOV.

Download Full Size | PDF

In the following, we first assess the in-principle feasibility of wireless QKD using the decoy-state BB84 protocol with perfect encoders. We then consider the effect of encoder imperfections in our analysis.

A. Secure versus Insecure Regions

In this section, two scenarios of wireless QKD in indoor environments are examined, and the corresponding secret key generation rates are obtained using loss and background noise calculations in the previous sections. In the first scenario, only the background noise due to the isotropic ambient light is included. The key generation rate is then presented versus a range of FOVs as the latter has an impact on path loss, as shown in Fig. 3. In the second scenario, we account for the background noise induced by the lighting source. In such a case, the amount of background noise would depend on the PSD of the lighting source and the QKD receiver’s FOV. In both cases, we use the decoy-state encoding with infinitely many decoy states as described in Section 4.A.

Figure 4 shows the secret key generation rate in a dark room when the QKD transmitter is either at the center of the room or at a corner. In both cases, the QKD receiver is fixed at the center of the ceiling. When the QKD source is located at the center of the room, the system would tolerate spectral irradiance of ambient noise of the order of 108W/nm/m2, as shown in Fig. 4. Due to additional loss, the scheme would tolerate less ambient noise when the QKD source is located at a corner of the room. The ambient light noise considered in this case is due to blackbody radiation in the surrounding environment, whose effect is calculated via Eq. (5). This implies that the resulting background noise is constant in this case, and the drop in rate in Fig. 4 is merely because of the loss in the system, as seen in Fig. 3. The spectral intensity emitted at room temperature (300 K) from objects, such as the human body, is expected to be low at the operating wavelength of our scheme. According to Planck’s formula, the spectral irradiance at room temperature at 880 nm is of the order of 1018W/nm/m2, which is far below the tolerable amount of ambient noise in our scheme. This is mainly because we assume that there would be no sun light in the room, which can adversely affect system performance. In the case of our windowless room, however, it is safe to neglect the effect of isotropic ambient noise in our system. We next consider the effect of the lighting source on our QKD operation.

 figure: Fig. 4.

Fig. 4. Secret key rate per transmitted pulse when the lighting source is off, and the background noise is only due to the ambient noise. The QKD source is sending light upward with Θ1/2=30°. The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are employed here.

Download Full Size | PDF

When the lighting source is on, additional background noise would sneak into the QKD receiver. The choice of FOV to some extent affects the amount of background noise. Figure 5 shows the effect of FOV on the background noise, as well as on HDC and the overall QBER, Eμ. It is interesting to see that, at the beginning, the background noise would slightly drop until the FOV reaches near 34°, from which point it gradually increases with FOV. For narrow FOVs, the concentrator gain is rather high, but it sharply approaches 1 when the FOV increases. This can be seen in the behavior of HDC as well. The drop in the concentrator gain can justify the initial decline of the background noise. Another contributing factor is that for FOV <34°, the collected power at the QKD receiver is mainly induced by the reflection from the floor, whereas for FOV >34°, the reflection from the four walls would also matter. We have chosen much higher reflection coefficient from the walls (0.7) than the floor (0.1), which justifies the increase in the background noise. From the QBER curves in Fig. 5 it can be seen that the QBER is larger than its acceptable threshold for large FOVs. It is then fair to assume that within the region of interest for the FOV, the background noise is nearly constant while the channel gain drops with the increase in the FOV.

 figure: Fig. 5.

Fig. 5. (a) Background noise (BN) in count per pulse (c/p), generated by the artificial light source, collected by the QKD receiver versus FOV. (b) The channel loss, 1/HDC, and QBER, Eμ, versus FOV. The QKD source is located either at the center or at the corner of the room floor. The PSD of the bulb is 105W/nm.

Download Full Size | PDF

Figure 6 shows the secret key generation rate per transmitted pulse when the lighting source is on and the QKD source is placed at the center of the room’s floor facing up toward the receiver. The figure shows the trade-off between the receiver’s FOV and the PSD of the light source. The higher the PSD is, the lower the FOV should be in order to improve the signal-to-noise ratio at the QKD receiver. This restriction partitions the xy plane in Fig. 6 into secure and insecure regions. The insecure region is when the lower bound on the key rate is zero, i.e., when the secure exchange of keys cannot be guaranteed. The secure region then specifies when QKD operation is feasible within the setting in our setup. Figure 6 implies that with a PSD of 105W/nm, corresponding to white LED bulbs, the QKD receiver’s FOV should be less than 7°.

 figure: Fig. 6.

Fig. 6. Secret key rate per transmitted pulse for a QKD source (Θ1/2=30°) at the center of the floor in the presence of a lighting source. The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are assumed here.

Download Full Size | PDF

Figure 7 shows the secret key generation rate per transmitted pulse when the transmitter has moved to a corner of the room. We assume that the QKD source has a rather large transmission angle (30°), in which case a portion of its beam has the chance to be received by the receiver. This can possibly be achieved by a diffuser, if the source beam is too narrow. We assume that the source is again sending light up toward the ceiling. Being at the corner of the room, the channel DC-gain is lower than that of a transmitter at the center of the room. This would imply that lower amounts of background noise can be tolerated in this case. The trade-off between the FOV and PSD has been shown in Fig. 7. In this case, at a PSD of 105W/nm, the QKD receiver’s FOV should be less than 4°.

 figure: Fig. 7.

Fig. 7. Secret key rate per transmitted pulse for a QKD source with (Θ1/2=30°) in a corner of the room in the presence of a lighting source. The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are employed.

Download Full Size | PDF

Figures 6 and 7 imply that while there are certain regions in which secret key exchange is possible with minimal beam alignment, additional beam steering can substantially improve the system performance. At the source, this can be achieved by narrowing the light beam and directing it toward the QKD receiver [42]. Here, we simulate this effect by directing a beam with Θ1/2=5° toward the QKD receiver, while the receiver’s telescope orientation is fixed facing downward. As shown in Fig. 8, the system can now tolerate a larger amount of PSD in comparison to Fig. 7, where the QKD source is sending light in a non-direct manner with respect to the QKD receiver. Alternatively, in this case, one can use a larger FOV at the receiver, which allows us to cover a larger area for a mobile user.

 figure: Fig. 8.

Fig. 8. Secret key rate per transmitted pulse for the QKD source in a corner of the room with additional beam steering: the QKD beam is directed into the receiver with Θ1/2=5°. The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are employed.

Download Full Size | PDF

B. More Practical Encoding Techniques

After assessing the feasibility of wireless indoor QKD using perfect encoders, here we study the practical cases presented in Section 2. We consider the vacuum + weak decoy-state QKD, QKD with known source flaws, and RFI-QKD when the source flaws are not known. We use the results of Section 4 to calculate the key rate in each case. Figures 9(a) and 9(b) show the secret key generation rate in each case where the QKD source is, respectively, at the center and the corner of the room. There is only loose alignment between the source and the receiver, but here we have assumed a lower PSD for the lighting source at 106W/nm. In the case of known source flaws we have assumed 10% error in the X basis, whereas, in the RFI-QKD case, X and Y bases are rotated by a fix, but unknown, phase. In Fig. 9(a), when the source is at the center of the room, the performance in all cases with an imperfect encoder is very close to the perfect case. This is expected as this case is less vulnerable to the alignment condition. When the source moves to the corner of the room, the sensitivity to the FOV becomes higher. But still with an FOV of 7°, it is still possible to exchange secret keys. At this FOV, the drop in key rate is around 1 order of magnitude when we, instead of perfect encoders, use RFI-QKD. This implies that by the proper choice of protocol we can make the system quite resilient to possible imperfections at its encoders.

 figure: Fig. 9.

Fig. 9. Secret key rate per transmitted pulse versus the QKD receiver FOV for different QKD protocols (PE, perfect encoding; DS, decoy state; SF, source flaw; V + W, vacuum + weak). (a) The QKD source is located at the center of the room. (b) The QKD source is located at a corner of the room. The PSD of the bulb is 106W/nm.

Download Full Size | PDF

The above cases illustrate the possibility of using QKD in certain indoor environments. Whether or not we need to employ extensive beam steering in our scheme would depend on the application scenario and its target key rate. One can think of certain scenarios in which the amount of keys generated by loose beam steering would still be sufficient for the application in mind. For instance, consider a bank customer that uses an AES protocol, supplemented by QKD generated seeds, for his/her banking transactions. Assuming that each session roughly requires 1 kb of secret key, the user can store the amount of keys required for nearly 600 sessions within 100 s in one trip to the bank, where according to Fig. 6, a key rate of 6 kbps, at a pulse repetition rate of 100 MHz, can be achieved when the receiver’s FOV and PSD are, respectively, 5° and 105W/nm. For applications with higher key usage, e.g., secure video streaming, one may need higher key rates only achievable if the transmitter–receiver pair are fully aligned. In such cases, one possible solution is to use docking stations, which ensures alignment without implementing all the necessary optical elements on a portable/mobile device.

6. CONCLUSIONS AND DISCUSSION

We studied the feasibility of wireless indoor QKD in a windowless room lit by an artificial source. Such systems could provide the first link within a larger quantum network or facilitate the use of QKD in common areas for many users. We showed that there would exist a practical regime of operation within which such a wireless QKD system could generate secret keys in indoor environments. We used optical wireless communications models to characterize the path loss and background noise in the channel. Our results showed that with even mild assumptions on the alignment of the QKD transmitter and receiver, it would be possible to exchange secret keys if the room is lit by white LED bulbs. Such light sources have very little power spectral density at the operating wavelengths of interest for a QKD system, and because of their low energy consumption are expected to be ubiquitously used in the future. Our results further showed that additional enhancement could be obtained if beam steering techniques were employed.

The type of equipment needed for the above setup is within reach of our current quantum and classical technologies. With recent progress in integrated QKD devices [4345], it is possible to think of a portable device equipped with QKD capabilities. A handheld QKD prototype has, in fact, already been implemented for short-range handheld-to-ATM key exchange [23,24]. Because of high path loss in integrated optics systems, the integration requirement for time-bin encoding may be harsher than that of polarization encoding. One can, however, think of hybrid solutions where an integrated dual-rail setup is used for the initial encoding, which will then be converted to a single-rail time-bin encoding using an external delay line. We also need random number generators [46]. In many scenarios, we can generate random bits offline, store them on the device, and use them during the key-exchange protocol. As for the QKD receiver, we can use some of the existing technologies for Li-Fi for collection and alignment. For instance, we can use a non-imaging optical concentrator, such as a compound parabolic collector, followed by a bandpass filter at the receiver. The output of the phase-decoding interferometer is then passed to one of the two single-photon avalanche photodiodes. Such detectors have also been considered for use in Li-Fi systems [47]. Overall, with the progress made toward implementing QKD modules with integrated optics along with the progress in beam steering in classical optical communications [42], our proposed system can enable high-rate wireless access to future quantum-classical networks [11].

Funding

UK Engineering and Physical Sciences Research Council (EPSRC) (EP/M013472/1, EP/M506953/1); Ministry of Higher Education and Scientific Research (MHESR) in Libya.

Acknowledgment

The authors would like to thank Z. Ghassemlooy and D. Bitauld for fruitful discussions. All data generated in this paper can be reproduced by the provided methodology and equations.

REFERENCES

1. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81, 1301–1350 (2009). [CrossRef]  

2. H.-L. Yin, T.-Y. Chen, Z.-W. Yu, H. Liu, L.-X. You, Y.-H. Zhou, S.-J. Chen, Y. Mao, M.-Q. Huang, W.-J. Zhang, H. Chen, M. J. Li, D. Nolan, F. Zhou, X. Jiang, Z. Wang, Q. Zhang, X.-B. Wang, and J.-W. Pan, “Measurement-device-independent quantum key distribution over a 404 km optical fiber,” Phys. Rev. Lett. 117, 190501 (2016). [CrossRef]  

3. T. Schmitt-Manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J. G. Rarity, A. Zeilinger, and H. Weinfurter, “Experimental demonstration of free-space decoy-state quantum key distribution over 144 km,” Phys. Rev. Lett. 98, 010504 (2007). [CrossRef]  

4. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145–195 (2002). [CrossRef]  

5. P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in 35th Annual Symposium on Foundations of Computer Science (IEEE, 1994), pp. 124–134.

6. M. Johnson, M. Amin, S. Gildert, T. Lanting, F. Hamze, N. Dickson, R. Harris, A. Berkley, J. Johansson, P. Bunyk, E. M. Chapple, C. Enderud, J. P. Hilton, K. Karimi, E. Ladizinsky, N. Ladizinsky, T. Oh, I. Perminov, C. Rich, M. C. Thom, E. Tolkacheva, C. J. S. Truncik, S. Uchaikin, J. Wang, B. Wilson, and G. Rose, “Quantum annealing with manufactured spins,” Nature 473, 194–198 (2011). [CrossRef]  

7. R. Barends, A. Shabani, L. Lamata, J. Kelly, A. Mezzacapo, U. Las Heras, R. Babbush, A. Fowler, B. Campbell, Y. Chen, Z. Chen, B. Chiaro, A. Dunsworth, E. Jeffrey, E. Lucero, A. Megrant, J. Y. Mutus, M. Neeley, C. Neill, P. J. J. O’Malley, C. Quintana, P. Roushan, D. Sank, A. Vainsencher, J. Wenner, T. C. White, E. Solano, H. Neven, and J. M. Martinis, “Digitized adiabatic quantum computing with a superconducting circuit,” Nature 534, 222–226 (2016). [CrossRef]  

8. C. C. Moran, “Quintuple: a python 5-qubit quantum computer simulator to facilitate cloud quantum computing,” arXiv preprint arXiv:1606.09225 (2016).

9. M. Razavi, “Multiple-access quantum-classical networks,” in Quantum Communication, Measurement and Computing (QCMC): The Tenth International Conference (AIP, 2011), Vol. 1363, pp. 39–42.

10. M. Razavi, “Multiple-access quantum key distribution networks,” IEEE Trans. Commun. 60, 3071–3079 (2012). [CrossRef]  

11. O. Elmabrok and M. Razavi, “Quantum-classical access networks with embedded optical wireless links,” in IEEE Global Communications Conference (GLOBECOM) (IEEE, 2016).

12. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM 21, 120–126 (1978). [CrossRef]  

13. M. Campagna, L. Chen, O. Dagdelen, J. Ding, J. Fernick, N. Gisin, D. Hayford, T. Jennewein, N. Lütkenhaus, M. Mosca, B. Neill, M. Pecen, R. Perlner, G. Ribordy, J. M. Schanc, D. Stebila, N. Walenta, W. Whyte, Z. Zhang, S. Kaise, A. Petzold, and D. Smith-Tone, “Quantum safe cryptography and security: an introduction, benefits, enablers and challengers,” Tech. Rep., ETSI (European Telecommunications Standards Institute), June 2015, http://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf.

14. C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in International Conference on Computer System and Signal Processing (IEEE, 1984), pp. 175–179.

15. M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. Dynes, S. Fasel, S. Fossier, M. Fürst, J.-D. Gautier, O. Gay, N. Gisin, P. Grangier, A. Happe, Y. Hasani, M. Hentschel, H. Hübel, G. Humer, T. Länger, M. Legré, R. Lieger, J. Lodewyck, T. Lorünser, N. Lütkenhaus, A. Marhold, T. Matyus, O. Maurhart, L. Monat, S. Nauerth, J.-B. Page, A. Poppe, E. Querasser, G. Ribordy, S. Robyr, L. Salvail, A. W. Sharpe, A. J. Shields, D. Stucki, M. Suda, C. Tamas, T. Themel, R. T. Thew, Y. Thoma, A. Treiber, P. Trinkler, R. Tualle-Brouri, F. Vannel, N. Walenta, H. Weier, H. Weinfurter, I. Wimberger, Z. L. Yuan, H. Zbinden, and A. Zeilinger, “The SECOQC quantum key distribution network in Vienna,” New J. Phys. 11, 075001 (2009). [CrossRef]  

16. M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. F. Dynes, A. R. Dixon, A. W. Sharpe, Z. L. Yuan, A. J. Shields, S. Uchikoga, M. Legré, S. Robyr, P. Trinkler, L. Monat, J.-B. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Länger, M. Peev, and A. Zeilinger, “Field test of quantum key distribution in the Tokyo QKD network,” Opt. Express 19, 10387–10409 (2011). [CrossRef]  

17. F. Xu, W. Chen, S. Wang, Z. Yin, Y. Zhang, Y. Liu, Z. Zhou, Y. Zhao, H. Li, D. Liu, Z. Han, and G. Guo, “Field experiment on a robust hierarchical metropolitan quantum cryptography network,” Chin. Sci. Bull. 54, 2991–2997 (2009). [CrossRef]  

18. F. Marsili, V. B. Verma, J. A. Stern, S. Harrington, A. E. Lita, T. Gerrits, I. Vayshenker, B. Baek, M. D. Shaw, R. P. Mirin, and S. W. Nam, “Detecting single infrared photons with 93% system efficiency,” Nat. Photonics 7, 210–214 (2013). [CrossRef]  

19. Visit http://www.idquantique.com/.

20. Visit http://www.quantum-info.com/English/about/.

21. Visit https://www.toshiba.eu/eu/Cambridge-Research-Laboratory/.

22. B. Fröhlich, J. F. Dynes, M. Lucamarini, A. W. Sharpe, Z. Yuan, and A. J. Shields, “A quantum access network,” Nature 501, 69–72 (2013). [CrossRef]  

23. J. L. Duligall, M. S. Godfrey, K. A. Harrison, W. J. Munro, and J. G. Rarity, “Low cost and compact quantum key distribution,” New J. Phys. 8, 249 (2006). [CrossRef]  

24. H. Chun, I. Choi, G. Faulkner, L. Clarke, B. Barber, G. George, C. Capon, A. Niskanen, J. Wabnig, D. O’Brien, and D. Bitauld, “Handheld free space quantum key distribution with dynamic motion compensation,” Opt. Express 25, 6784–6795 (2017). [CrossRef]  

25. S. Bahrani, M. Razavi, and J. A. Salehi, “Orthogonal frequency-division multiplexed quantum key distribution,” J. Lightwave Technol. 33, 4687–4698 (2015). [CrossRef]  

26. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72, 012326 (2005). [CrossRef]  

27. G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85, 1330–1333 (2000). [CrossRef]  

28. J. Brendel, N. Gisin, W. Tittel, and H. Zbinden, “Pulsed energy-time entangled twin-photon source for quantum communication,” Phys. Rev. Lett. 82, 2594–2597 (1999). [CrossRef]  

29. K. Tamaki, M. Curty, G. Kato, H.-K. Lo, and K. Azuma, “Loss-tolerant quantum cryptography with imperfect sources,” Phys. Rev. A 90, 052314 (2014). [CrossRef]  

30. A. Laing, V. Scarani, J. G. Rarity, and J. L. O’Brien, “Reference-frame-independent quantum key distribution,” Phys. Rev. A 82, 012304 (2010). [CrossRef]  

31. Z.-Q. Yin, C.-H. F. Fung, X. Ma, C.-M. Zhang, H.-W. Li, W. Chen, S. Wang, G.-C. Guo, and Z.-F. Han, “Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources,” Phys. Rev. A 90, 052319 (2014). [CrossRef]  

32. J. M. Kahn and J. R. Barry, “Wireless infrared communications,” Proc. IEEE 85, 265–298 (1997). [CrossRef]  

33. F. R. Gfeller and U. Bapst, “Wireless in-house data communication via diffuse infrared radiation,” Proc. IEEE 67, 1474–1486 (1979). [CrossRef]  

34. Z. Ghassemlooy, W. Popoola, and S. Rajbhandari, Optical Wireless Communications: System and Channel Modelling with MATLAB (CRC Press, 2012).

35. W.-Y. Hwang, “Quantum key distribution with high loss: toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003). [CrossRef]  

36. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94, 230504 (2005). [CrossRef]  

37. H.-K. Lo, H.-F. Chau, and M. Ardehali, “Efficient quantum key distribution scheme and a proof of its unconditional security,” J. Cryptol. 18, 133–165 (2005). [CrossRef]  

38. C. Panayi, M. Razavi, X. Ma, and N. Lütkenhaus, “Memory-assisted measurement-device-independent quantum key distribution,” New J. Phys 16, 043005 (2014). [CrossRef]  

39. C. Wang, S.-H. Sun, X.-C. Ma, G.-Z. Tang, and L.-M. Liang, “Reference-frame-independent quantum key distribution with source flaws,” Phys. Rev. A 92, 042319 (2015). [CrossRef]  

40. R. H. Hadfield, “Single-photon detectors for optical quantum information applications,” Nat. Photonics 3, 696–705 (2009). [CrossRef]  

41. K. A. Patel, J. F. Dynes, M. Lucamarini, I. Choi, A. W. Sharpe, Z. L. Yuan, R. V. Penty, and A. J. Shields, “Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks,” Appl. Phys. Lett. 104, 051123 (2014). [CrossRef]  

42. A. Gomez, K. Shi, C. Quintana, M. Sato, G. Faulkner, B. C. Thomsen, and D. O’Brien, “Beyond 100-Gb/s indoor wide field-of-view optical wireless communications,” IEEE Photonics Technol. Lett. 27, 367–370 (2015). [CrossRef]  

43. P. Sibson, C. Erven, M. Godfrey, S. Miki, T. Yamashita, M. Fujiwara, M. Sasaki, H. Terai, M. G. Tanner, C. M. Natarajan, R. H. Hadfield, J. L. O’Brien, and M. G. Thompson, “Chip-based quantum key distribution,” Nat. Commun. 8, 13984 (2017). [CrossRef]  

44. C. Ma, W. D. Sacher, Z. Tang, J. C. Mikkelsen, Y. Yang, F. Xu, T. Thiessen, H.-K. Lo, and J. K. S. Poon, “Silicon photonic transmitter for polarization-encoded quantum key distribution,” Optica 3, 1274–1278 (2016). [CrossRef]  

45. G. Vest, M. Rau, L. Fuchs, G. Corrielli, H. Weier, S. Nauerth, A. Crespi, R. Osellame, and H. Weinfurter, “Design and evaluation of a handheld quantum key distribution sender module,” IEEE J. Sel. Top. Quantum Electron. 21, 131–137 (2015). [CrossRef]  

46. B. Sanguinetti, A. Martin, H. Zbinden, and N. Gisin, “Quantum random number generation on a mobile phone,” Phys. Rev. X 4, 031056 (2014). [CrossRef]  

47. D. Chitnis and S. Collins, “A SPAD-based photon detecting system for optical communications,” J. Lightwave Technol. 32, 2028–2034 (2014). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (9)

Fig. 1.
Fig. 1. Wireless QKD link in an indoor setup. The transmitter is mobile, while the QKD receiver is fixed on the ceiling. For illustration purposes, the QKD receiver is depicted away from the center. In practice, it should be optimally placed at the center of the ceiling.
Fig. 2.
Fig. 2. Power spectral density of two LED bulbs, equivalent to a 60-W incandescent lamp: a 650-lumen cool white LED manufactured by AURAGLOW (dashed), and a 805-lumen warm white LED bulb manufactured by INTEGRAL (solid). The wriggly form of the curves at the two far ends of the spectrum is due to the measurement precision.
Fig. 3.
Fig. 3. Total loss, 10 log 10 ( η d H DC / 2 ) , for the QKD source in center and corner positions. Path loss depends on the semi-angle at half power, the position of the QKD source, and the receiver’s FOV.
Fig. 4.
Fig. 4. Secret key rate per transmitted pulse when the lighting source is off, and the background noise is only due to the ambient noise. The QKD source is sending light upward with Θ 1 / 2 = 30 ° . The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are employed here.
Fig. 5.
Fig. 5. (a) Background noise (BN) in count per pulse (c/p), generated by the artificial light source, collected by the QKD receiver versus FOV. (b) The channel loss, 1 / H DC , and QBER, E μ , versus FOV. The QKD source is located either at the center or at the corner of the room floor. The PSD of the bulb is 10 5 W / nm .
Fig. 6.
Fig. 6. Secret key rate per transmitted pulse for a QKD source ( Θ 1 / 2 = 30 ° ) at the center of the floor in the presence of a lighting source. The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are assumed here.
Fig. 7.
Fig. 7. Secret key rate per transmitted pulse for a QKD source with ( Θ 1 / 2 = 30 ° ) in a corner of the room in the presence of a lighting source. The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are employed.
Fig. 8.
Fig. 8. Secret key rate per transmitted pulse for the QKD source in a corner of the room with additional beam steering: the QKD beam is directed into the receiver with Θ 1 / 2 = 5 ° . The decoy-state BB84 protocol with an infinite number of decoy states and perfect encoders are employed.
Fig. 9.
Fig. 9. Secret key rate per transmitted pulse versus the QKD receiver FOV for different QKD protocols (PE, perfect encoding; DS, decoy state; SF, source flaw; V + W, vacuum + weak). (a) The QKD source is located at the center of the room. (b) The QKD source is located at a corner of the room. The PSD of the bulb is 10 6 W / nm .

Tables (1)

Tables Icon

Table 1. Nominal Values Used for Our System Parameters

Equations (30)

Equations on this page are rendered with MathJax. Learn more.

H DC = { A ( m + 1 ) 2 π d 2 cos ( ϕ ) m T s ( ψ ) × g ( ψ ) cos ( ψ ) , 0 ψ Ψ c , 0 elsewhere ,
m = ln 2 ln ( cos ( Θ 1 / 2 ) )
g ( ψ ) = { n 2 sin 2 ( Ψ c ) , 0 ψ Ψ c 0 ψ > Ψ c ,
P n , isotropic ( λ ) = p n ( λ ) Δ λ T s A n 2 .
n B ( 1 ) = P n , isotropic ( λ ) τ η d / 2 h c / λ ,
H Ref = { A ( m 1 + 1 ) 2 π 2 d 1 2 d 2 2 cos ( ϕ ) m 1 r T s ( ψ ) g ( ψ ) × d A cos ( α ) cos ( β ) cos ( ψ ) , 0 ψ Ψ c , 0 elsewhere ,
n B ( 2 ) = S ( λ ) Δ λ τ η d / 2 h c / λ walls , floor H Ref .
R decoy q { Q 1 ( 1 h ( e 1 ) f Q μ h ( E μ ) } ,
Q 1 = Y 1 μ e μ ,
Y 1 = 1 ( 1 η ) ( 1 n N ) 2 ,
e 1 = e 0 Y 1 ( e 0 e d ) η ( 1 n N ) Y 1 ,
Q μ = 1 e η μ ( 1 n N ) 2 .
E μ = e 0 Q μ ( e 0 e d ) ( 1 e η μ ) ( 1 n N ) Q μ .
h ( x ) = x log 2 x ( 1 x ) log 2 ( 1 x ) .
Y 1 Y 1 L , ν 1 , ν 2 = μ μ ν 1 μ ν 2 ν 1 2 + ν 2 2 [ Q ν 1 e ν 1 Q ν 2 e ν 2 ν 1 2 ν 2 2 μ 2 ( Q μ e μ Y 0 L ) ] ,
Q 1 Q 1 L , ν 1 , ν 2 = μ 2 e μ μ ν 1 μ ν 2 ν 1 2 + ν 2 2 [ Q ν 1 e ν 1 Q ν 2 e ν 2 ν 1 2 ν 2 2 μ 2 ( Q μ e μ Y 0 L ) ] ,
e 1 e 1 U , ν 1 , ν 2 = E ν 1 Q ν 1 e ν 1 E ν 2 Q ν 2 e ν 2 ( ν 1 ν 2 ) Y 1 L , ν 1 , ν 2 ,
Y 0 Y 0 L = max { ν 1 Q ν 2 e ν 2 ν 2 Q ν 1 e ν 1 ν 1 ν 2 , 0 } .
R = Q 1 [ 1 h ( e x ( 1 ) ) ] Q μ f h ( E μ ) ,
e x ( 1 ) = Y 1 X | 0 X + Y 0 X | 1 X Y 1 X | 0 X + Y 0 X | 1 X + Y 1 X | 1 X + Y 0 X | 0 X ,
Y s X | j X = η [ P s X | j X ( 1 n N ) + 1 2 n N ] + ( 1 η ) [ n N ( 1 n N ) + n N 2 / 2 ] ,
X B = cos ( ξ ) X A + sin ( ξ ) Y A and Y B = cos ( ξ ) Y A sin ( ξ ) X A .
C = X A X B 2 + X A Y B 2 + Y A X B 2 + Y A Y B 2 ,
C = ( 1 2 E X X ) 2 + ( 1 2 E X Y ) 2 + ( 1 2 E Y X ) 2 + ( 1 2 E Y Y ) 2 ,
C = 2 ( 1 2 e 1 ) 2 .
I E = ( 1 e 1 ) h [ 1 + ν max 2 ] + e 1 h [ 1 + f ( ν max ) 2 ] ,
ν max = min [ 1 1 e 1 C / 2 , 1 ]
f ( ν max ) = C / 2 ( 1 e 1 ) 2 ν max 2 e 1 .
I E = e 1 + ( 1 e 1 ) h [ ( 1 3 e 1 / 2 ) ( 1 e 1 ) ] .
R Q 1 ( 1 I E ) Q μ f h ( E μ ) ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.