{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:41:32Z","timestamp":1771234892206,"version":"3.50.1"},"reference-count":41,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,12,26]],"date-time":"2019-12-26T00:00:00Z","timestamp":1577318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61531003, 61771439"],"award-info":[{"award-number":["61531003, 61771439"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61531003"],"award-info":[{"award-number":["61531003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Twin-field quantum key distribution (TF-QKD) is proposed to achieve a remote key distribution with a maximum secure transmission distance up to over 500 km. Although the security of TF-QKD in its detection part is guaranteed, there are some remaining problems in the source part. The sending-or-not-sending (SNS) protocol is proposed to solve the security problem in the phase post-selection process; however, the light source is still assumed to be an ideal coherent state. This assumption is not satisfied in real-life QKD systems, leading to practical secure issues. In this paper, we discuss the condition that the photon number distribution (PND) of the source is unknown for the SNS protocol, demonstrate that the security analysis is still valid under a source with unknown PND, and show that with light source monitoring, the performance of the SNS protocol can remain almost unchanged.<\/jats:p>","DOI":"10.3390\/e22010036","type":"journal-article","created":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T05:37:08Z","timestamp":1577425028000},"page":"36","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Sending-or-Not-Sending Twin-Field Quantum Key Distribution with Light Source Monitoring"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9167-1958","authenticated-orcid":false,"given":"Yucheng","family":"Qiao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8343-8029","authenticated-orcid":false,"given":"Ziyang","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6162-4066","authenticated-orcid":false,"given":"Yichen","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Bingjie","family":"Xu","sequence":"additional","affiliation":[{"name":"Science and Technology on Security Communication Laboratory, Institute of Southwestern Communication, Chengdu 610041, China"}]},{"given":"Hong","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","article-title":"Quantum cryptography","volume":"74","author":"Gisin","year":"2002","journal-title":"Rev. Mod. Phys."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1038\/nphoton.2014.149","article-title":"Secure quantum key distribution","volume":"8","author":"Lo","year":"2014","journal-title":"Nat. Photonics"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"150403","DOI":"10.1103\/PhysRevLett.97.150403","article-title":"Macroscopic entanglement by entanglement swapping","volume":"97","author":"Pirandola","year":"2006","journal-title":"Phys. Rev. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","article-title":"Side-channel-free quantum key distribution","volume":"108","author":"Braunstein","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-Device-Independent Quantum Key Distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"113007","DOI":"10.1088\/1367-2630\/15\/11\/113007","article-title":"Practical aspects of measurement-device-independent quantum key distribution","volume":"15","author":"Xu","year":"2013","journal-title":"New J. Phys."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.89.052325","article-title":"Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100%","volume":"89","author":"Zhou","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"042324","DOI":"10.1103\/PhysRevA.93.042324","article-title":"Making the decoy-state measurement-device-independent quantum key distribution practically useful","volume":"93","author":"Zhou","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"062319","DOI":"10.1103\/PhysRevA.86.062319","article-title":"Alternative schemes for measurement-device-independent quantum key distribution","volume":"86","author":"Ma","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"130501","DOI":"10.1103\/PhysRevLett.111.130501","article-title":"Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks","volume":"111","author":"Rubenok","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"090501","DOI":"10.1103\/PhysRevLett.114.090501","article-title":"Long-Distance Measurement-Device-Independent Multiparty Quantum Communication","volume":"114","author":"Fu","year":"2015","journal-title":"Phys. Rev. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"190501","DOI":"10.1103\/PhysRevLett.117.190501","article-title":"Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber","volume":"117","author":"Yin","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"052301","DOI":"10.1103\/PhysRevA.89.052301","article-title":"Continuous-variable measurement-device-independent quantum key distribution","volume":"89","author":"Li","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.90.052325","article-title":"Continuous-variable measurement-device-independent quantum key distribution using squeezed states","volume":"90","author":"Zhang","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1038\/nphoton.2015.83","article-title":"High-rate measurement-device-independent quantum cryptography","volume":"9","author":"Pirandola","year":"2015","journal-title":"Nat. Photonics"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"025013","DOI":"10.1088\/2058-9565\/ab0fd9","article-title":"High speed continuous variable source-independent quantum random number generation","volume":"4","author":"Xu","year":"2019","journal-title":"Quantum Sci. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum key distribution with high loss: Toward global secure communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate-distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"062323","DOI":"10.1103\/PhysRevA.98.062323","article-title":"Twin-field quantum key distribution with large misalignment error","volume":"98","author":"Wang","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_23","first-page":"031043","article-title":"Phase-Matching Quantum Key Distribution","volume":"8","author":"Ma","year":"2018","journal-title":"Phys. Rev. X"},{"key":"ref_24","unstructured":"Tamaki, K., Lo, H.-K., Wang, W.Y., and Lucamarini, M. (2018). Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound. arXiv."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1038\/s41534-019-0175-6","article-title":"Simple security proof of twin-field type quantum key distribution protocol","volume":"5","author":"Curty","year":"2019","journal-title":"NPJ Quantum Inform."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"073001","DOI":"10.1088\/1367-2630\/ab2b00","article-title":"Practical decoy-state method for twin-field quantum key distribution","volume":"21","author":"Grasselli","year":"2019","journal-title":"New J. Phys."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3080","DOI":"10.1038\/s41598-019-39225-y","article-title":"Sending-or-not-sending twin-field quantum key distribution in practice","volume":"9","author":"Yu","year":"2019","journal-title":"Sci. Rep."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1038\/s41566-019-0377-7","article-title":"Experimental quantum key distribution beyond the repeaterless secret key capacity","volume":"13","author":"Minder","year":"2019","journal-title":"Nat. Photonics"},{"key":"ref_29","first-page":"021046","article-title":"Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System","volume":"9","author":"Wang","year":"2019","journal-title":"Phys. Rev. X"},{"key":"ref_30","unstructured":"Wang, X.-B., Hu, X.-L., and Yu, Z.-W. (2018). Effective Eavesdropping to Twin-Field Quantum Key Distribution. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"052301","DOI":"10.1103\/PhysRevA.75.052301","article-title":"Decoy-state quantum key distribution with large random errors of light intensity","volume":"75","author":"Wang","year":"2007","journal-title":"Phys. Rev. A"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","article-title":"Trojan-horse attacks on quantum-key-distribution systems","volume":"73","author":"Gisin","year":"2006","journal-title":"Phys. Rev. A"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"052327","DOI":"10.1103\/PhysRevA.77.052327","article-title":"Quantum key distribution with an unknown and untrusted source","volume":"77","author":"Zhao","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2077","DOI":"10.1364\/OL.33.002077","article-title":"Experimental quantum-key distribution with an untrusted source","volume":"33","author":"Peng","year":"2008","journal-title":"Opt. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"042320","DOI":"10.1103\/PhysRevA.81.042320","article-title":"Passive-scheme analysis for solving the untrusted source problem in quantum key distribution","volume":"81","author":"Peng","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"042301","DOI":"10.1103\/PhysRevA.82.042301","article-title":"Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system","volume":"82","author":"Xu","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"9300110","DOI":"10.1109\/JQE.2018.2827569","article-title":"Light Source Monitoring in Quantum Key Distribution With Single-Photon Detector at Room Temperature","volume":"54","author":"Wang","year":"2018","journal-title":"IEEE J. Quantum Electron."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"052302","DOI":"10.1103\/PhysRevA.99.052302","article-title":"Monitoring an untrusted light source with single-photon detectors in measurement-device-independent quantum key distribution","volume":"99","author":"Qiao","year":"2019","journal-title":"Phys. Rev. A"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"042311","DOI":"10.1103\/PhysRevA.77.042311","article-title":"General theory of decoy-state quantum cryptography with source errors","volume":"77","author":"Wang","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"023024","DOI":"10.1088\/1367-2630\/12\/2\/023024","article-title":"Security analysis of an untrusted source for quantum key distribution: passive approach","volume":"12","author":"Zhao","year":"2010","journal-title":"New J. Phys."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"062309","DOI":"10.1103\/PhysRevA.80.062309","article-title":"Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system","volume":"80","author":"Xu","year":"2009","journal-title":"Phys. Rev. A"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/1\/36\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:45:49Z","timestamp":1760190349000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/1\/36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,26]]},"references-count":41,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["e22010036"],"URL":"https:\/\/doi.org\/10.3390\/e22010036","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,26]]}}}