{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T02:41:18Z","timestamp":1762051278374,"version":"build-2065373602"},"reference-count":49,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,5,8]],"date-time":"2022-05-08T00:00:00Z","timestamp":1651968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871234","JZNY202104"],"award-info":[{"award-number":["61871234","JZNY202104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education","award":["61871234","JZNY202104"],"award-info":[{"award-number":["61871234","JZNY202104"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters. Its variant protocol, sending or not-sending quantum key distribution (SNS-QKD), not only fixes the security vulnerability of TF-QKD, but also can tolerate large misalignment errors. However, the current SNS-QKD protocol is based on the active decoy-state method, which may lead to side channel information leakage when multiple light intensities are modulated in practice. In this work, we propose a passive decoy-state SNS-QKD protocol to further enhance the security of SNS-QKD. Numerical simulation results show that the protocol not only improves the security in source, but also retains the advantages of tolerating large misalignment errors. Therefore, it may provide further guidance for the practical application of SNS-QKD.<\/jats:p>","DOI":"10.3390\/e24050662","type":"journal-article","created":{"date-parts":[[2022,5,8]],"date-time":"2022-05-08T08:04:21Z","timestamp":1651997061000},"page":"662","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method"],"prefix":"10.3390","volume":"24","author":[{"given":"Ke","family":"Xue","sequence":"first","affiliation":[{"name":"Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications (NUPT), Nanjing 210003, China"}]},{"given":"Zhigang","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications (NUPT), Nanjing 210003, China"}]},{"given":"Shengmei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications (NUPT), Nanjing 210003, China"},{"name":"Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing 210003, China"}]},{"given":"Qianping","family":"Mao","sequence":"additional","affiliation":[{"name":"Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing 210003, China"},{"name":"College of Computer Science and Technology, Nanjing Tech University, Nanjing 211816, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","article-title":"Unconditional security of quantum key distribution over arbitrarily long distances","volume":"283","author":"Lo","year":"1999","journal-title":"Science"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","article-title":"Unconditional security in quantum cryptography","volume":"48","author":"Mayers","year":"2001","journal-title":"J. ACM"},{"key":"ref_4","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 10\u201312). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"062319","DOI":"10.1103\/PhysRevA.86.062319","article-title":"Alternative schemes for measurement-device-independent quantum key distribution","volume":"86","author":"Ma","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"012320","DOI":"10.1103\/PhysRevA.87.012320","article-title":"Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors","volume":"87","author":"Wang","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"042324","DOI":"10.1103\/PhysRevA.93.042324","article-title":"Making the decoy-state measurement-device-independent quantum key distribution practically useful","volume":"93","author":"Zhou","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"052301","DOI":"10.1103\/PhysRevA.89.052301","article-title":"Continuous-variable measurement-device-independent quantum key distribution","volume":"89","author":"Li","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1038\/nature13303","article-title":"Practical quantum key distribution protocol without monitoring signal disturbance","volume":"509","author":"Sasaki","year":"2014","journal-title":"Nature"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/s11128-017-1550-x","article-title":"Round-robin diferential-phase-shift quantum key distribution with heralded pair-coherent sources","volume":"16","author":"Wang","year":"2017","journal-title":"Quantum Inf. Process."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-017-15777-9","article-title":"Plug-and-play round-robin differential phase-shift quantum key distribution","volume":"7","author":"Mao","year":"2017","journal-title":"Sci. Rep."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/ncomms15043","article-title":"Fundamental limits of repeaterless quantum communications","volume":"8","author":"Pirandola","year":"2017","journal-title":"Nat. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate-distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"062323","DOI":"10.1103\/PhysRevA.98.062323","article-title":"Twin-field quantum key distribution with large misalignment error","volume":"98","author":"Wang","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"042330","DOI":"10.1103\/PhysRevA.101.042330","article-title":"Sending-or-not-sending twin-field quantum key distribution: Breaking the direct transmission key rate","volume":"101","author":"Xu","year":"2020","journal-title":"Phys. Rev. A"},{"key":"ref_17","first-page":"031043","article-title":"Phase-matching quantum key distribution","volume":"8","author":"Ma","year":"2018","journal-title":"Phys. Rev. X"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-020-02920-1","article-title":"Multiple-pulse phase-matching quantum key distribution","volume":"19","author":"Chen","year":"2020","journal-title":"Quantum Inf. Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1364\/OE.404567","article-title":"Decoy-state phase-matching quantum key distribution with source errors","volume":"29","author":"Yu","year":"2021","journal-title":"Opt. Express"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"127702","DOI":"10.1016\/j.physleta.2021.127702","article-title":"Phase-matching quantum key distribution based on pulse-position modulation","volume":"418","author":"Yu","year":"2021","journal-title":"Phys. Lett. A"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"042332","DOI":"10.1103\/PhysRevA.98.042332","article-title":"Simple security analysis of phase-matching measurement-device-independent quantum key distribution","volume":"98","author":"Lin","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"034053","DOI":"10.1103\/PhysRevApplied.11.034053","article-title":"Twin-field quantum key distribution without phase postselection","volume":"11","author":"Cui","year":"2019","journal-title":"Phys. Rev. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"062337","DOI":"10.1103\/PhysRevA.100.062337","article-title":"Sending-or-not-sending twin-field protocol for quantum key distribution with asymmetric source parameters","volume":"100","author":"Hu","year":"2019","journal-title":"Phys. Rev. A"},{"key":"ref_24","first-page":"1","article-title":"Sending-or-not-sending twin-field quantum key distribution in practice","volume":"9","author":"Yu","year":"2019","journal-title":"Sci. Rep."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"024061","DOI":"10.1103\/PhysRevApplied.12.024061","article-title":"Unconditional security of sending or not sending twin-field quantum key distribution with finite pulses","volume":"12","author":"Jiang","year":"2019","journal-title":"Phys. Rev. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1468","DOI":"10.1364\/OL.44.001468","article-title":"Twin-field quantum key distribution with modified coherent states","volume":"44","author":"Zhang","year":"2019","journal-title":"Opt. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Chen, Z., Zhang, Y., Xu, B., and Guo, H. (2020). Sending-or-Not-Sending Twin-Field Quantum Key Distribution with Light Source Monitoring. Entropy, 22.","DOI":"10.3390\/e22010036"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-021-03259-x","article-title":"Plug-and-play sending-or-not-sending twin-field quantum key distribution","volume":"20","author":"Xue","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Lu, Y.-F., Wang, Y., Jiang, M.-S., Zhang, X.-X., Liu, F., Li, H.-W., Zhou, C., Tang, S.-B., Wang, J.-Y., and Bao, W.-S. (2021). Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources. Entropy, 23.","DOI":"10.3390\/e23091103"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4120","DOI":"10.1364\/OL.399137","article-title":"Hybrid protocol for sending-or-not-sending twin-field quantum key distribution","volume":"45","author":"Xu","year":"2020","journal-title":"Opt. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum key distribution with high loss: Toward global secure communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","article-title":"Practical decoy state for quantum key distribution","volume":"72","author":"Ma","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","article-title":"Decoy state quantum key distribution","volume":"94","author":"Lo","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","article-title":"Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography","volume":"94","author":"Wang","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"012322","DOI":"10.1103\/PhysRevA.72.012322","article-title":"Decoy-state protocol for quantum cryptography with four different intensities of coherent light","volume":"72","author":"Wang","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"023024","DOI":"10.1088\/1367-2630\/12\/2\/023024","article-title":"Security analysis of an untrusted source for quantum key distribution: Passive approach","volume":"12","author":"Zhao","year":"2010","journal-title":"New J. Phys."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"032326","DOI":"10.1103\/PhysRevA.94.032326","article-title":"Experimental asymmetric plug-and-play measurement-device-independent quantum key distribution","volume":"94","author":"Tang","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"032310","DOI":"10.1103\/PhysRevA.86.032310","article-title":"Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states","volume":"86","author":"Jiang","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"050305","DOI":"10.1103\/PhysRevA.75.050305","article-title":"Quantum key distribution with passive decoy state selection","volume":"75","author":"Mauerer","year":"2007","journal-title":"Phys. Rev. A"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"180503","DOI":"10.1103\/PhysRevLett.99.180503","article-title":"Simple and efficient quantum key distribution with parametric down-conversion","volume":"99","author":"Adachi","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"032312","DOI":"10.1103\/PhysRevA.93.032312","article-title":"Scheme for realizing passive quantum key distribution with heralded single-photon sources","volume":"93","author":"Wang","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.99.052325","article-title":"Efficient passive measurement-device-independent quantum key distribution","volume":"99","author":"Zhang","year":"2019","journal-title":"Phys. Rev. A"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"103017","DOI":"10.1088\/1367-2630\/abbab7","article-title":"Twin-field quantum key distribution with passive-decoy state","volume":"22","author":"Teng","year":"2020","journal-title":"New J. Phys."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"25921","DOI":"10.1364\/OE.26.025921","article-title":"Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss","volume":"26","author":"Zhang","year":"2018","journal-title":"Opt. Express"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3464","DOI":"10.1103\/PhysRevA.36.3464","article-title":"Obtainment of thermal noise from a pure quantum state","volume":"36","author":"Yurke","year":"1987","journal-title":"Phys. Rev. A"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"260501","DOI":"10.1103\/PhysRevLett.95.260501","article-title":"Generation of hyperentangled photon pairs","volume":"95","author":"Barreiro","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"053601","DOI":"10.1103\/PhysRevLett.94.053601","article-title":"Optical-fiber source of polarization-entangled photons in the 1550 nm telecom band","volume":"94","author":"Li","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"012309","DOI":"10.1103\/PhysRevA.63.012309","article-title":"Long-distance entanglement-based quantum key distribution","volume":"63","author":"Ribordy","year":"2000","journal-title":"Phys. Rev. A"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.optcom.2006.02.010","article-title":"On the distribution of 1550-nm photon pairs efficiently generated using a periodically poled lithium niobate waveguide","volume":"264","author":"Mori","year":"2006","journal-title":"Opt. Commun."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/5\/662\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:07:54Z","timestamp":1760137674000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/5\/662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,8]]},"references-count":49,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["e24050662"],"URL":"https:\/\/doi.org\/10.3390\/e24050662","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2022,5,8]]}}}