1. Introduction
Quantum imaging and sensing protocols offer enhanced measurement schemes compared to traditional schemes, finding applications in measuring light-sensitive samples under low illumination [
1,
2,
3,
4,
5,
6,
7,
8]. Quantum communication, particularly through quantum key distribution (QKD), offers a fundamentally secure approach to information transfer against attacks such as intercept resend, photon number splitting(PNS), and unambiguous state discrimination(USD) [
9,
10,
11,
12]. Quantum secure imaging and sensing are emerging disciplines that enable secure information transfer and measurements [
13,
14,
15,
16,
17,
18,
19,
20,
21]. However, for practical deployment, it is essential that these protocols remain robust during continuous operation, even in the presence of potential adversarial attacks, and are an active area of research [
22,
23,
24,
25,
26].
Weak coherent sources (WCS) and spontaneous parametric down-conversion (SPDC) based sources have been widely employed in QKD, quantum imaging, and sensing applications [
27,
28,
29,
30,
31,
32,
33,
34]. High-dimensional(HD) quantum states have also been explored to improve the quantum communication, imaging, and sensing protocols [
35,
36,
37,
38,
39,
40,
41]. At high operating speeds, generating all four quantum states (as in BB84 QKD protocol) becomes technically challenging due to the increased voltage demands of modulation devices. In contrast, two-state QKD protocols are more practical under such conditions, requiring less modulation effort. The two-state protocol, however, requires an additional monitoring detector to guard against advanced unambiguous state discrimination (USD) attacks [
12].
This work expands the quantum secure information transfer landscape by examining SPDC-based heralded single-photon sources (HSPS) and WCS under decoy and non-decoy QKD protocol configurations. Additionally, we investigate both BB84 and B92 QKD protocols, analyzing their performance in quantum secure information applications. To further enhance the resilience of these systems, we investigate high-dimensional QKD protocols (HD-B92) to improve resistance against PNS and USD attacks. We adapt these countermeasures to our mathematical modelling by drawing on solutions developed in the HD-QKD literature.
2. Mathematical Modelling and Methods
2.1. Photon Number Distribution for Quantum States of a Weak Coherent Source and a Heralded Single Photon Source
The equation describing the photon number distribution for WCS is given by equation 1, and for SPDC-based HSPS(thermal) is given by equation 2 [
42,
43]
.
where
is the mean photon number, knumber of photons,
represents the efficiency the source end,
is the dark count rate for the detectors,
is the post-selected probability given by
;
and
.
;
Figure 1 illustrates the photon number distributions for thermal, WCS (Poissonian), and HSPS(thermal) at various mean photon numbers: 0.0001, 0.001, 0.01, and 0.1. As observed, the vacuum component (zero-photon probability) is significantly suppressed in the heralded single-photon source. However, as the mean photon number increases, multiphoton components begin to appear across all sources, highlighting the growing probability of more than one photon per pulse, which is critical when assessing security and performance in quantum secure communication, imaging, and sensing protocols.
2.2. Security Analysis for Non-Ideal Conditions to Obtain Secure Bit Rate vs Loss in dB
The secure bit rate without decoy state for BB84 and B92 protocol is given by equations 3 and 4, respectively [
12,
44,
45,
46]
where q is parameter depending on QKD protocol,
for BB84 and
for B92;
is the overall gain, d is the dimension, H is the binary Shannon entropy,
is the error rate of single photons given by
; here
is the overall error rate,
is term considering multiphoton probablity against PNS attack.
; and
;
Here is the information leakage due to USD attack given by ;
N is the number of multiple qubit encoding which in high dimensional(hybrid encoding) terms is
,
is used by considering the contribution of 2 photon pulses in B92 protocol due to its robutness against PNS attack.
The secure bit rate with decoy state for BB84 and B92 protocol is given by equation 5 [
10,
38,
43]
where
;
;
;
;
The shared parameter values used in simulations are as follows: channel attenuation(= 0.21 (dB/km), detection efficiencyat receiver (= 0.045, heralding arm efficiency( = 0.8, dark count probablity in heralding detector=, misalignment error = 0.033.
3. Results and Discussion
Figure 2 presents the secure bit rate as a function of channel loss (in dB) for the BB84 QKD protocol using a WCS without decoy state analysis. Two scenarios are shown, corresponding to different dark count probabilities of Bob’s detector: (a)
and (b)
. A lower dark count probability enhances the signal-to-noise ratio, thereby improving the maximum quantum secure information transfer distance. This performance improvement demonstrates the importance of low-noise detectors in practical quantum communication. When such low-noise conditions are combined with high-dimensional encoding schemes, secure distance and bit rate gains can be expected.
Figure 3 shows the secure bit rate versus channel loss (in dB) for the BB84 protocol using a HSPS without decoy state analysis. The results are plotted for two different dark count probabilities of Bob’s detector: (a)
and (b)
. It can be observed that the HSPS remains effective even in the presence of relatively high detector noise (
), achieving a reasonable secure distance. This robustness to noise highlights one of the key advantages of HSPS in practical quantum secure information transfer scenarios, particularly when high-performance detectors are not available. It is observed that the BB84 protocol using HSPS demonstrates an advantage in secure distance of around 10 dB over WCS without decoy states.
Figure 4 presents the secure bit rate versus channel loss for the B92 protocol using a WCS. Subplot (a) shows the case where two-photon contributions are excluded, while (b)–(d) incorporate the two-photon components. WCS-based B92 protocol benefits from its intrinsic resistance to PNS attacks, allowing the secure bits to be extracted even in the presence of multiphoton pulses using high dimensional (hybrid encoding). This demonstrates that B92, when used with a WCS, can maintain security without decoy state analysis and avoid the protocol to stop under PNS attack.
Figure 5 presents the secure bit rate versus channel loss for the B92 protocol without decoy state analysis for HSPS. Plot (a) shows the case where two-photon contributions are excluded from the key rate calculation, while plots (b)–(d) incorporate two-photon contributions. In the HD B92 with WCS, d=8 over d=2 has an advantage of around 9dB, while the HSPS-based HD B92 protocol achieves around 15 dB advantage for the same high dimensional (hybrid encoding) upgrade. Moreover, in secure information transfer distance, HSPS outperforms WCS by around 6-7 dB in the HDB92 configuration in terms of quantum secure information transfer distance.
Figure 6 compares the performance of (a) WCS and (b) HSPS under decoy state analysis using the BB84 protocol. Including decoy states significantly enhances the secure distance and enables detection of PNS attacks. While HSPS achieves a longer secure transmission distance, WCS benefits from a much higher photon emission rate. As a result, although HSPS provides superior distance performance, the overall bit rate is often higher for WCS when the overall figure of merit is considered concerning the photon counts obtained from the source, making it a practical choice in many real-world systems. Finally, implementing decoy states provides a further gain of 15–20 dB compared to schemes without decoy states.
HD quantum states enhance both security and bits per pulse in quantum communication. In quantum imaging and sensing, samples may exhibit sensitivity to high-dimensional photon degrees of freedom, or multiple degrees of freedom, such as polarization and orbital angular momentum, can be exploited for probing. WCS can generate higher photon rates, which are advantageous for key generation rates in communication. Considering the WCS advantage of higher photon counts of about three orders based on current technology, it gives a higher secure bit rate of 1-2 orders when considering the overall figure of merit for secure bits with repetition rate of the source. In contrast, HSPS, which have reduced vacuum contributions, are more suitable to securely probing samples over longer distances at low photon illumination.
4. Conclusion
Our analysis focuses on the photon number statistics of WCS and HSPS, examining their roles in quantum secure imaging, sensing, and communication. Nonorthogonal two state protocols offer resilience to PNS attack to a certain threshold of multi-photon components without halting the quantum secure information transfer in non-ideal source conditions. HSPS is particularly beneficial in high-loss settings due to its reduced vacuum component, allowing for extended secure distances. However, their practical advantage relies on highly efficient and low-loss components in encoding, detection, and coupling. In contrast, WCSs produce higher photon rates, making them advantageous for high-throughput applications, including precision quantum sensing. Despite a higher vacuum component, their compatibility with GHz clock rates and decoy-state methods makes them suitable for secure communication, imaging and sensing scenarios. Combining HD state encoding introduces a trade-off: while it improves security and bits per pulse in ideal conditions, performance declines with increasing channel loss. Also, the modulation speed of devices to encode high dimensional quantum states need to improve to outperform low dimensional high-speed counterparts. Still, such configurations support a broader range of secure imaging and sensing applications. Resistance to both quantum and classical jamming attacks is possible, where the framework can adapt by subtracting mutual information of an adversary from the secure bit rate equation, to estimate secure distances accordingly. Moreover, these findings have direct implications for the design of quantum networks, where flexible combinations of source types dimensionality and protocol choices can be optimized based on channel conditions and application goals—whether it be quantum secure imaging, sensing, or communication. Thus, the proposed analysis supports resilient architectures for quantum networks operating in real-world noisy and lossy conditions.
Author Contributions
Both authors contributed equally to this work
Funding
This research received no external funding
Institutional Review Board Statement
Not applicable
Data Availability Statement
The data that support the findings of this study are available from the corresponding author upon reasonable request.
Acknowledgments
SV gratefully acknowledges PhD research financial support from MHRD, Government of India.
Conflicts of Interest
The authors declare no conflicts of interest
Abbreviations
The following abbreviations are used in this manuscript:
| PNS |
Photon number splitting attacks |
| QKD |
Quantum key distribution |
| HSPS |
Heralded single photon sources |
| WCS |
Weak coherent sources |
| HD |
High dimensional states |
| SPDC |
Spontaneous parametric down conversion |
| USD |
Unambiguous state discrimination attacks |
References
- Defienne, H.; Bowen, W.P.; Chekhova, M.; Lemos, G.B.; Oron, D.; Ramelow, S.; Treps, N.; Faccio, D. Advances in Quantum Imaging. Nat. Photonics 2024, 18, 1024–1036. [Google Scholar] [CrossRef]
- Vernekar, S.; Xavier, J. Quantum Correlation Enhanced Optical Imaging. Quantum Beam Sci. 2024, 8, 19. [Google Scholar] [CrossRef]
- Moodley, C.; Forbes, A. Advances in Quantum Imaging with Machine Intelligence. Laser Photonics Rev. 2024, 2300939. [Google Scholar] [CrossRef]
- Jones, C.; Xavier, J.; Vartabi Kashanian, S.; Nguyen, M.; Aharonovich, I.; Vollmer, F. Time-Dependent Mandel Q Parameter Analysis for a Hexagonal Boron Nitride Single Photon Source. Opt. Express 2023, 31, 10794. [Google Scholar] [CrossRef] [PubMed]
- Xavier, J.; Yu, D.; Vollmer, F.; Jones, C.; Zossimova, E. Quantum Nanophotonic and Nanoplasmonic Sensing: Towards Quantum Optical Bioscience Laboratories on Chip. Nanophotonics 2021, 10, 1387–1435. [Google Scholar] [CrossRef]
- Meda, A.; Losero, E.; Samantaray, N.; Scafirimuto, F.; Pradyumna, S.; Avella, A.; Ruo-Berchera, I.; Genovese, M. Photon-Number Correlation for Quantum Enhanced Imaging and Sensing. J. Opt. (United Kingdom) 2017, 19. [Google Scholar] [CrossRef]
- Berchera, I.R.; Degiovanni, I.P. Quantum Imaging with Sub-Poissonian Light: Challenges and Perspectives in Optical Metrology. Metrologia 2019, 56. [Google Scholar] [CrossRef]
- Genovese, M. Real Applications of Quantum Imaging. J. Opt. 2016, 18. [Google Scholar] [CrossRef]
- Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in Quantum Cryptography. Adv. Opt. Photonics 2020, 12, 1012. [Google Scholar] [CrossRef]
- Lo, H.K.; Ma, X.; Chen, K. Decoy State Quantum Key Distribution. Phys. Rev. Lett. 2005, 94, 15–18. [Google Scholar] [CrossRef] [PubMed]
- Dušek, M.; Jahma, M.; Lütkenhaus, N. Unambiguous State Discrimination in Quantum Cryptography with Weak Coherent States. Phys. Rev. A - At. Mol. Opt. Phys. 2000, 62, 9. [Google Scholar] [CrossRef]
- Ko, H.; Choi, B.S.; Choe, J.S.; Youn, C.J. Advanced Unambiguous State Discrimination Attack and Countermeasure Strategy in a Practical B92 QKD System. Quantum Inf. Process. 2018, 17, 1–14. [Google Scholar] [CrossRef]
- Malik, M.; Magaña-Loaiza, O.S.; Boyd, R.W. Quantum-Secured Imaging. Appl. Phys. Lett. 2012, 101, 1–10. [Google Scholar] [CrossRef]
- Zhao, Y.B.; Zhang, W.L.; Wang, D.; Song, X.T.; Zhou, L.J.; Ding, C.B. Proof-of-Principle Experimental Demonstration of Quantum Secure Imaging Based on Quantum Key Distribution. Chinese Phys. B 2019, 28. [Google Scholar] [CrossRef]
- Vernekar, S.; Xavier, J. Secure Quantum Imaging with Decoy State Heralded Single Photons. arXiv Prepr. 2024, arXiv:2402.11675, 1–4. [Google Scholar]
- Yin, P.; Takeuchi, Y.; Zhang, W.H.; Yin, Z.Q.; Matsuzaki, Y.; Peng, X.X.; Xu, X.Y.; Xu, J.S.; Tang, J.S.; Zhou, Z.Q.; et al. Experimental Demonstration of Secure Quantum Remote Sensing. Phys. Rev. Appl. 2020, 14, 1. [Google Scholar] [CrossRef]
- Heo, J.; Kim, J.; Jeong, T.; Ihn, Y.S.; Kim, D.Y.; Kim, Z.; Jo, Y. Quantum-Secured Single-Pixel Imaging with Enhanced Security. Optica 2023, 10, 1461. [Google Scholar] [CrossRef]
- Moore, S.W.; Dunningham, J.A. Secure Quantum Remote Sensing without Entanglement. AVS Quantum Sci. 2023, 5. [Google Scholar] [CrossRef]
- Rahim, M.T.; Khan, A.; Khalid, U.; Rehman, J. ur; Jung, H.; Shin, H. Quantum Secure Metrology for Network Sensing-Based Applications. Sci. Rep. 2023, 13, 1–7. [Google Scholar] [CrossRef] [PubMed]
- He, W.; Huang, C.; Guan, R.; Chen, Y.; Zhang, Z.; Wei, K. Experimental Secure Entanglement-Free Quantum Remote Sensing over 50 Km of Optical Fiber. Phys. Rev. A 2025, 111, 1–7. [Google Scholar] [CrossRef]
- Moore, S.W.; Dunningham, J.A. Secure Quantum-Enhanced Measurements on a Network of Sensors. Phys. Rev. A 2025, 111, 1–12. [Google Scholar] [CrossRef]
- Bash, B.A.; Gheorghe, A.H.; Patel, M.; Habif, J.L.; Goeckel, D.; Towsley, D.; Guha, S. Quantum-Secure Covert Communication on Bosonic Channels. Nat. Commun. 2015, 6. [Google Scholar] [CrossRef] [PubMed]
- Walter, D.; Pitsch, C.; Paunescu, G.; Lutzmann, P. Quantum Ghost Imaging for Remote Sensing. 2019, 2023, 32. [CrossRef]
- Gregory, T.; Moreau, P.A.; Mekhail, S.; Wolley, O.; Padgett, M.J. Noise Rejection through an Improved Quantum Illumination Protocol. Sci. Rep. 2021, 11. [Google Scholar] [CrossRef] [PubMed]
- Johnson, S.; Rarity, J.; Padgett, M. Transmission of Quantum-Secured Images. Sci. Rep. 2024, 14, 1–7. [Google Scholar] [CrossRef] [PubMed]
- Sternberg, J.; Voisin, J.; Roux, C.; Chassagneux, Y.; Amanti, M. Secure Communication Based on Sensing of Undetected Photons. EPJ Web Conf. 2024, 309. [Google Scholar] [CrossRef]
- Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Zhang, L.; Li, Y.; Ren, J.G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.P.; et al. Satellite-to-Ground Quantum Key Distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [PubMed]
- Li, Y.; Cai, W.Q.; Ren, J.G.; Wang, C.Z.; Yang, M.; Zhang, L.; Wu, H.Y.; Chang, L.; Wu, J.C.; Jin, B.; et al. Microsatellite-Based Real-Time Quantum Key Distribution. Nature 2025, 640, 47–54. [Google Scholar] [CrossRef] [PubMed]
- Yang, J.Z.; Li, M.F.; Chen, X.X.; Yu, W.K.; Zhang, A.N. Single-Photon Quantum Imaging via Single-Photon Illumination. Appl. Phys. Lett. 2020, 117. [Google Scholar] [CrossRef]
- Kim, J.; Jeong, T.; Lee, S.Y.; Kim, D.Y.; Kim, D.; Lee, S.; Ihn, Y.S.; Kim, Z.; Jo, Y. Heralded Single-Pixel Imaging with High Loss-Resistance and Noise-Robustness. Appl. Phys. Lett. 2021, 119. [Google Scholar] [CrossRef]
- Johnson, S.; McMillan, A.; Torre, C.; Frick, S.; Rarity, J.; Padgett, M. Single-Pixel Imaging with Heralded Single Photons. Opt. Contin. 2022, 1, 826. [Google Scholar] [CrossRef]
- Shafi, K.M.; Padhye, A.; Chandrashekar, C.M. Quantum Illumination Using Polarization-Path Entangled Single Photons for Low Reflectivity Object Detection in a Noisy Background. Opt. Express 2023, 31, 32093. [Google Scholar] [CrossRef] [PubMed]
- Ying, J.W.; Zhao, P.; Zhong, W.; Du, M.M.; Li, X.Y.; Shen, S.T.; Zhang, A.L.; Zhou, L.; Sheng, Y.B. Passive Decoy-State Quantum Secure Direct Communication with a Heralded Single-Photon Source. Phys. Rev. Appl. 2024, 22, 1. [Google Scholar] [CrossRef]
- Mahdavifar, M.; Hashemi Rafsanjani, S.M. Violating Bell Inequality Using Weak Coherent States. Opt. Lett. 2021, 46, 5998. [Google Scholar] [CrossRef] [PubMed]
- Sit, A.; Bouchard, F.; Fickler, R.; Gagnon-Bischoff, J.; Larocque, H.; Heshami, K.; Elser, D.; Peuntinger, C.; Günthner, K.; Heim, B.; et al. High-Dimensional Intracity Quantum Cryptography with Structured Photons. Optica 2017, 4, 1006. [Google Scholar] [CrossRef]
- Iqbal, H.; Krawec, W.O. Analysis of a High-Dimensional Extended B92 Protocol. Quantum Inf. Process. 2021, 20, 1–22. [Google Scholar] [CrossRef]
- Dutta, A.; Muskan; Banerjee, S.; Pathak, A. Analysis for Satellite-Based High-Dimensional Extended B92 and High-Dimensional BB84 Quantum Key Distribution. Adv. Quantum Technol. 2024, 2400149, 1–21. [Google Scholar] [CrossRef]
- Cañas, G.; Vera, N.; Cariñe, J.; González, P.; Cardenas, J.; Connolly, P.W.R.; Przysiezna, A.; Gómez, E.S.; Figueroa, M.; Vallone, G.; et al. High-Dimensional Decoy-State Quantum Key Distribution over Multicore Telecommunication Fibers. Phys. Rev. A 2017, 96, 1–8. [Google Scholar] [CrossRef]
- Otte, E.; Nape, I.; Rosales-Guzmán, C.; Denz, C.; Forbes, A.; Ndagano, B. High-Dimensional Cryptography with Spatial Modes of Light: Tutorial. J. Opt. Soc. Am. B 2020, 37, A309. [Google Scholar] [CrossRef]
- Nape, I.; Sephton, B.; Ornelas, P.; Moodley, C.; Forbes, A. Quantum Structured Light in High Dimensions. APL Photonics 2023, 8. [Google Scholar] [CrossRef]
- Nothlawala, F.; Moodley, C.; Gounden, N.; Nape, I.; Forbes, A. Quantum Ghost Imaging by Sparse Spatial Mode Reconstruction. Adv. Quantum Technol. 2025, 8, 1–10. [Google Scholar] [CrossRef]
- Wang, S.; Zhang, S.L.; Li, H.W.; Yin, Z.Q.; Zhao, Y.B.; Chen, W.; Han, Z.F.; Guo, G.C. Decoy-State Theory for the Heralded Single-Photon Source with Intensity Fluctuations. Phys. Rev. A - At. Mol. Opt. Phys. 2009, 79, 1–5. [Google Scholar] [CrossRef]
- Wang, Q.; Chen, W.; Xavier, G.; Swillo, M.; Zhang, T.; Sauge, S.; Tengner, M.; Han, Z.F.; Guo, G.C.; Karlsson, A. Experimental Decoy-State Quantum Key Distribution with a Sub-Poissionian Heralded Single-Photon Source. Phys. Rev. Lett. 2008, 100, 1–4. [Google Scholar] [CrossRef] [PubMed]
- Schiavon, M.; Vallone, G.; Ticozzi, F.; Villoresi, P. Heralded Single-Photon Sources for Quantum-Key-Distribution Applications. Phys. Rev. A 2016, 93, 1–10. [Google Scholar] [CrossRef]
- Scarani, V.; Acín, A.; Ribordy, G.; Gisin, N. Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations. Phys. Rev. Lett. 2004, 92, 4. [Google Scholar] [CrossRef] [PubMed]
- Acín, A.; Gisin, N.; Scarani, V. Coherent-Pulse Implementations of Quantum Cryptography Protocols Resistant to Photon-Number-Splitting Attacks. Phys. Rev. A - At. Mol. Opt. Phys. 2004, 69, 16. [Google Scholar] [CrossRef]
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).