{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:24:36Z","timestamp":1760243076271,"version":"build-2065373602"},"reference-count":64,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T00:00:00Z","timestamp":1434067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett\u2013Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.<\/jats:p>","DOI":"10.3390\/e17064064","type":"journal-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T10:56:00Z","timestamp":1434106560000},"page":"4064-4082","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Passive Decoy-State Quantum Key Distribution with Coherent Light"],"prefix":"10.3390","volume":"17","author":[{"given":"Marcos","family":"Curty","sequence":"first","affiliation":[{"name":"Escuela de Ingenier\u00eda de Telecomunicaci\u00f3n, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, Vigo 36310, Pontevedra, Spain"}]},{"given":"Marc","family":"Jofre","sequence":"additional","affiliation":[{"name":"ICFO-Institut de Ci\u00e8ncies Fot\u00f2niques, Mediterranean Technology Park, Castelldefels 08860, Barcelona, Spain"}]},{"given":"Valerio","family":"Pruneri","sequence":"additional","affiliation":[{"name":"ICFO-Institut de Ci\u00e8ncies Fot\u00f2niques, Mediterranean Technology Park, Castelldefels 08860, Barcelona, Spain"},{"name":"ICREA-Instituci\u00f3 Catalana de Recerca i Estudis Avanc\u00b8ats, Barcelona 08010, Spain"}]},{"given":"Morgan","family":"Mitchell","sequence":"additional","affiliation":[{"name":"ICFO-Institut de Ci\u00e8ncies Fot\u00f2niques, Mediterranean Technology Park, Castelldefels 08860, Barcelona, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2015,6,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1038\/nphoton.2014.149","article-title":"Secure quantum key distribution","volume":"8","author":"Lo","year":"2014","journal-title":"Nat. Photonics."},{"key":"ref_3","first-page":"109","article-title":"Cipher printing telegraph systems for secret wire and radio telegraphic communications","volume":"45","author":"Vernam","year":"1926","journal-title":"J. Am. Inst. Elect. Eng."},{"key":"ref_4","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 10\u201312). Quantum cryptography: Public key distribution and coin tossing. Bangalore, India."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum Key Distribution with High Loss: Toward Global Secure Communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","article-title":"Decoy State Quantum Key Distribution","volume":"94","author":"Lo","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","article-title":"Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography","volume":"94","author":"Wang","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"070502","DOI":"10.1103\/PhysRevLett.96.070502","article-title":"Experimental Quantum Key Distribution with Decoy States","volume":"96","author":"Zhao","year":"2006","journal-title":"Phys. Rev. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"010503","DOI":"10.1103\/PhysRevLett.98.010503","article-title":"Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber","volume":"98","author":"Rosenberg","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"010505","DOI":"10.1103\/PhysRevLett.98.010505","article-title":"Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding","volume":"98","author":"Peng","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"011118","DOI":"10.1063\/1.2430685","article-title":"Unconditionally secure one-way quantum key distribution using decoy pulses","volume":"90","author":"Yuan","year":"2007","journal-title":"Appl. Phys. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"18790","DOI":"10.1364\/OE.16.018790","article-title":"Gigahertz decoy quantum key distribution with 1 Mbit\/s secure key rate","volume":"16","author":"Dixon","year":"2008","journal-title":"Opt. Express."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"11354","DOI":"10.1364\/OE.16.011354","article-title":"Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization","volume":"16","author":"Tanaka","year":"2008","journal-title":"Opt. Express."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"045009","DOI":"10.1088\/1367-2630\/11\/4\/045009","article-title":"Practical long-distance quantum key distribution system using decoy levels","volume":"11","author":"Rosenberg","year":"2009","journal-title":"New J. Phys."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"161102","DOI":"10.1063\/1.3385293","article-title":"Continuous operation of high bit rate quantum key distribution","volume":"96","author":"Dixon","year":"2010","journal-title":"Appl. Phys. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"8587","DOI":"10.1364\/OE.18.008587","article-title":"Decoy-State quantum key distribution with polarized photons over 200 km","volume":"18","author":"Liu","year":"2010","journal-title":"Opt. Express."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"10387","DOI":"10.1364\/OE.19.010387","article-title":"Field test of quantum key distribution in the Tokyo QKD Network","volume":"19","author":"Sasaki","year":"2011","journal-title":"Opt. Express."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1038\/nphoton.2013.89","article-title":"Direct and full-scale experimental verifications towards ground-satellite quantum key distribution","volume":"7","author":"Wang","year":"2013","journal-title":"Nat. Photonics."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1038\/nature09008","article-title":"Random numbers certified by Bell\u2019s theorem","volume":"464","author":"Pironio","year":"2010","journal-title":"Nature"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"23584","DOI":"10.1364\/OE.18.023584","article-title":"Fast physical random number generator using amplified spontaneous emission","volume":"18","author":"Williams","year":"2010","journal-title":"Opt. Express."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"20665","DOI":"10.1364\/OE.19.020665","article-title":"True random numbers from amplified quantum vacuum","volume":"19","author":"Jofre","year":"2011","journal-title":"Opt. Express."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1364\/OE.22.001645","article-title":"Ultra-Fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode","volume":"22","author":"Amaya","year":"2014","journal-title":"Opt. Express."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1364\/OL.35.000312","article-title":"High-Speed quantum random number generation by measuring phase noise of a single-mode laser","volume":"35","author":"Qi","year":"2010","journal-title":"Opt. Lett."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Hughes, R.J., Nordholt, J.E., Derkacs, D., and Peterson, C.G. (2002). Practical free-space quantum key distribution over 10 km in daylight and at night. New J. Phys., 4.","DOI":"10.1364\/NLO.2002.FA2"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kurtsiefer, C., Zarda, P., Halder, M., Weinfurter, H., Gorman, P.M., Tapster, P.R., and Rarity, J.G. (2002). Quantum cryptography: A step towards global key distribution. Nature, 419.","DOI":"10.1038\/419450a"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","article-title":"Experimental Quantum Cryptography","volume":"5","author":"Bennett","year":"1992","journal-title":"J. Cryptol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1209\/0295-5075\/23\/6\/001","article-title":"Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1 km","volume":"23","author":"Muller","year":"1993","journal-title":"Europhys. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1038\/378449a0","article-title":"Underwater quantum coding","volume":"378","author":"Muller","year":"1995","journal-title":"Nature"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/68.681313","article-title":"Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems","volume":"10","author":"Townsend","year":"1998","journal-title":"IEEE Photonics Tech. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"045015","DOI":"10.1088\/1367-2630\/11\/4\/045015","article-title":"Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation","volume":"11","author":"Xavier","year":"2009","journal-title":"New J. Phys."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"063009","DOI":"10.1088\/1367-2630\/16\/6\/063009","article-title":"Security analysis of the decoy method with the Bennett\u2013Brassard 1984 protocol for finite key lengths","volume":"16","author":"Hayashi","year":"2014","journal-title":"New J. Phys."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","article-title":"Concise security bounds for practical decoy-state quantum key distribution","volume":"89","author":"Lim","year":"2014","journal-title":"Phys. Rev. A."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1080\/09500349414552281","article-title":"Quantum Random-number Generation and Key Sharing","volume":"41","author":"Rarity","year":"1994","journal-title":"J. Mod. Opt."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"050305(R)","DOI":"10.1103\/PhysRevA.75.050305","article-title":"Quantum key distribution with passive decoy state selection","volume":"75","author":"Mauerer","year":"2007","journal-title":"Phys. Rev. A."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"180503","DOI":"10.1103\/PhysRevLett.99.180503","article-title":"Simple and Efficient Quantum Key Distribution with Parametric Down-Conversion","volume":"99","author":"Adachi","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"073018","DOI":"10.1088\/1367-2630\/10\/7\/073018","article-title":"Quantum key distribution with triggering parametric down-conversion sources","volume":"10","author":"Ma","year":"2008","journal-title":"New J. Phys."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3238","DOI":"10.1364\/OL.34.003238","article-title":"Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution","volume":"34","author":"Curty","year":"2009","journal-title":"Opt. Lett."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"022310","DOI":"10.1103\/PhysRevA.81.022310","article-title":"Passive decoy-state quantum key distribution with practical light sources","volume":"81","author":"Curty","year":"2010","journal-title":"Phys. Rev. A."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"113033","DOI":"10.1088\/1367-2630\/11\/11\/113033","article-title":"Boosting up quantum key distribution by learning statistics of practical single-photon sources","volume":"11","author":"Adachi","year":"2009","journal-title":"New J. Phys."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"012309","DOI":"10.1103\/PhysRevA.63.012309","article-title":"Long-Distance entanglement-based quantum key distribution","volume":"63","author":"Ribordy","year":"2000","journal-title":"Phys. Rev. A."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"4737","DOI":"10.1103\/PhysRevLett.84.4737","article-title":"Quantum Cryptography Using Entangled Photons in Energy-Time Bell States","volume":"84","author":"Tittel","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.82.052325","article-title":"Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals","volume":"82","author":"Curty","year":"2010","journal-title":"Phys. Rev. A."},{"key":"ref_43","unstructured":"Boyd, R.W. (2008). Nonlinear Optics, Academic Press."},{"key":"ref_44","unstructured":"Shen, Y.R. (1984). The Principles of Nonlinear Optics, Wiley-Interscience."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1476","DOI":"10.1364\/OL.15.001476","article-title":"Quantum frequency conversion","volume":"15","author":"Kumar","year":"1990","journal-title":"Opt. Lett."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2153","DOI":"10.1103\/PhysRevLett.68.2153","article-title":"Observation of quantum frequency conversion","volume":"68","author":"Huang","year":"1992","journal-title":"Phys. Rev. Lett."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.1103\/PhysRevLett.86.1370","article-title":"Quantum Teleportation of a Polarization State with a Complete Bell State Measurement","volume":"86","author":"Kim","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"043602","DOI":"10.1103\/PhysRevLett.94.043602","article-title":"Nonlinear Interactions with an Ultrahigh Flux of Broadband Entangled Photons","volume":"94","author":"Dayan","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"073601","DOI":"10.1103\/PhysRevLett.94.073601","article-title":"Temporal Shaping of Entangled Photons","volume":"94","author":"Dayan","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"16452","DOI":"10.1364\/OE.16.016452","article-title":"Amplitude and phase modulation of time-energy entangled two-photon states","volume":"16","author":"Halder","year":"2008","journal-title":"Opt. Express."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1038\/nature04009","article-title":"A photonic quantum information interface","volume":"437","author":"Tanzilli","year":"2005","journal-title":"Nature"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"071104","DOI":"10.1063\/1.2969067","article-title":"Tunable upconversion photon detector","volume":"93","author":"Thew","year":"2008","journal-title":"Appl. Phys. Lett."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"120403","DOI":"10.1103\/PhysRevLett.106.120403","article-title":"Faithful Entanglement Swapping Based on Sum-Frequency Generation","volume":"106","author":"Sangouard","year":"2011","journal-title":"Phys. Rev. Lett."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1103\/RevModPhys.79.135","article-title":"Linear optical quantum computing with photonic qubits","volume":"79","author":"Kok","year":"2007","journal-title":"Rev. Mod. Phys."},{"key":"ref_55","first-page":"325","article-title":"Security of quantum key distribution with imperfect devices","volume":"4","author":"Gottesman","year":"2004","journal-title":"Quantum Inf. Comput."},{"key":"ref_56","first-page":"413","article-title":"Getting something out of nothing","volume":"5","author":"Lo","year":"2005","journal-title":"Quantum Inf. Comput."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","article-title":"Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security","volume":"18","author":"Lo","year":"2005","journal-title":"J. Cryptol."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Helleseth, T. (1994). Advances in Cryptology EUROCRYPT\u201993, Springer.","DOI":"10.1007\/3-540-48285-7"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","article-title":"Practical decoy state for quantum key distribution","volume":"72","author":"Ma","year":"2005","journal-title":"Phys. Rev. A."},{"key":"ref_60","unstructured":"Bazaraa, M.S., Jarvis, J.J., and Sherali, H.D. (2004). Linear Programming and Network Flows, Wiley. [3rd]."},{"key":"ref_61","unstructured":"Arfken, G. (1985). Mathematical Methods for Physicists, Academic Press. [3rd]."},{"key":"ref_62","unstructured":"Abramowitz, M., and Stegun, I.A. (1972). Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, Dover. [9th]."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1038\/nphoton.2009.28","article-title":"Green light emission in silicon through slow-light enhanced third-harmonic generation in photonic-crystal waveguides","volume":"3","author":"Corcoran","year":"2009","journal-title":"Nat. Photonics."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"043103","DOI":"10.1063\/1.3469936","article-title":"Sum-frequency generation in doubly resonant GaP photonic crystal nanocavities","volume":"97","author":"Rivoire","year":"2010","journal-title":"Appl. Phys. Lett."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/6\/4064\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:47:48Z","timestamp":1760215668000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/6\/4064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,12]]},"references-count":64,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2015,6]]}},"alternative-id":["e17064064"],"URL":"https:\/\/doi.org\/10.3390\/e17064064","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2015,6,12]]}}}