Preprint
Article

This version is not peer-reviewed.

High-Dimensional Quantum Key Distribution with N-Qudits States in Optical Fibers

Submitted:

01 January 2026

Posted:

04 January 2026

You are already at the latest version

Abstract
We present a high-dimensional quantum key distribution protocol by using N-qudits quantum light states, that is, product states with N photons, each of them in a quantum superposition of dimension d which provides a high dimension dN and accordingly a very high security. We present the implementation of this protocol in different types of optical fibers where the mentioned states undergo perturbations under propagation in optical fibers; such perturbations can be notably reduced in a passive (autocompensation) or active way and importantly the N-qubits present a great robustness against such optical perturbations. Likewise, quantum states also undergo attenuation, that is, some photons are lost under propagation in the optical fibers and then effective N′ (< N)-qudits are obtained which also are used to generate secret keys. In fact, the detection of states combines standard projective measurements along with photon coincidences. Besides, we analyze the security of this high-dimensional protocol under an intercept and resend attack realized by Eve, and the resulting secure key rates are calculated showing a significative increasing with the dimension provided by the number N of photons.
Keywords: 
;  ;  

1. Introduction

Quantum Key Distribution (QKD) is considered as a key technology for future secure optical communications. The main reason is that the security of the present classical cryptography is based on mathematical algoritms, which will no longer be guaranteed when quantum computers become available. QKD, a branch of optical quantum communications, is a technology based on the properties of the quantum light that allows the exchange of secure information between two users, Alice and Bob, who share a random bit series or key transported by quantum light states. Such quantum states can not be cloned by an eavesdropper.
There are several QKD approachs which can be classified into Discrete Variable (DV) and Continuous Variable (CV) QKD [1,2,3]. DV-QKD is based on the measurement of quantum states by projective measurements, and CV-QKD is based on the measurement of the quadratures of the optical field by using, for example, a balanced homodyne detection. Furthermore, there are several types of DV-QKD protocols based on the use of one photon as BB84 [4], B92 [5] and so on, and on the other hand there are protocols with two photons as BBM92 [6], MDI-QKD [7] and so on. It is important to indicate that in the above cases with two photons, both Alice and Bob only possess one photon. Moreover many of the above protocols have been generalized to high-dimensional protocols by using freedom degrees of the single photons that can be implemented in both multimode optical fibers [8,9,10] and/or free-space [1,3]. Likewise, the use of more than two sparticles has atracted the attention, as for example the use of entanglement of product states (three photons) of single photon states to implement a long-distance MDI-QKD protocol (with Bell states) [11] or the proposal of multi-user protocols (with GHZ entangled states) [12].
It is well known that security is increased by using high-dimensional QKD, which is obtained as commented above by taking into account some degree of freedom of a single photon in a multimode optical fiber such as: different linear optical momentum (LOM) in few modes optical fibers (FMF), different paths in multicore optical fibers (MCF), different polarization, different orbital angular momentum (OAM) [13] an so on, that is, with 1-qudits. In this work we present a high-dimensional (HD) DV-QKD protocol in optical fibers by using a number N of photons. In particular, we use N-dimensional product states formed by N single photon states. Each photon can in turn be in a superposition state, therefore we will have d N states, that is, N-qudits, and accordingly a HD-DV-QKD protocol will be implemented, achieving thus both a greater security and larger secure key rate. As a clarification, we will consider that spatial channels , such as cores of a MCF, are not coupled, and importantly the protocol is independent of the relative phase between the single photon states. It is interesting to note that recently a continuous variable QKD protocol based on product states of weak coherent states has also been proposed [14].
On the other hand, some requirements to produce and detect product states are necessary. One of them is the use of sources of several single photons. There are several possibilities to achieve these states. For example, a series of SPDC (spontaneous parametric down conversion) sources which emit biphotons [15] or a series of SFWM (spontaneous four-wave mixing) sources also emitting biphotons [16], and then using one of the photons as a heralding signal to obtain states of N photons when N coincidences be detected. Another possibility is to use spatial demultiplexation of single photons from a single photons source [17]. Therefore, there are enough technological possibilities to produce these kind of product states. Likewise, the measurements of quantum states have to be made by standard projective measurements along with photon coincidences, although this last requirement of coincidences detecting would not be strictly necessary.
The plan of the paper is as follows: in Section 2 the QKD protocol with N-qudits in optical fibers is presented by taking account a realistic scenario (perturbations, losses, ...). In Section 3 different physical implementations of N-qudits in optical fibers are analysed. In Section 4 a detailed study of the quantum bit error rate (QBER) and secure key rates (SKR) is presented where an exhaustive analysis is made for an intercept and resend attack with losses and optical fiber perturbations. Finally, in Section 5 a discussion of results is presented.

2. QKD Protocol with N -Qudits in Optical Fibers

In this section we present the QKD protocol with N-qudits in optical fibers. Let us consider N photons excited, each of them in quantum superpositions implemented in d optical modes of optical fibers. These quantum superpositions are generated in two mutually unbiased bases (MUBs), that is, with coefficients a j m in the Basis a and b j m and the Basis b, where j = 1 , . . . , d indicates the base vector, m = 1 , . . . , d indicates the component of the vector, and consequently the following superpositions are obtained
B a s i s a | L 1 a = a 11 | 1 1 + a 12 | 1 2 + . . . + a 1 d | 1 d | L 2 a = a 21 | 1 1 + a 12 | 1 2 + . . . + a 1 d | 1 d | L d a = a d 1 | 1 1 + a d 2 | 1 2 + . . . + a d d | 1 d B a s i s b | L 1 b = b 11 | 1 1 + b 12 | 1 2 + . . . + b 1 d | 1 d | L 2 b = b 21 | 1 1 + b 12 | 1 2 + . . . + b 1 d | 1 d | L b n = b d 1 | 1 1 + b d 2 | 1 2 + . . . + b d d | 1 d .
If N photons are considered, then the following product states are obtained in the two bases, that is,
| L a = | L a ( 1 ) | L a ( 2 ) . . . | L a ( N ) , | L b = | L b ( 1 ) | L b ( 2 ) . . . | L b ( N ) ,
where | L a ( i ) and | L b ( i ) , with i = 1 , . . . , N , indicate some of the superpositions of basis states, given by Eq.(1), for each photon. It is obvious that we obtain a number d N of product states in each basis and therefore a dimension N = d N is obtained.
Alice sends N-qudit states, that is, N photons in a product state of N states of 1-qudit and, more importantly, all 1-qudits (chosen in a random way) are in the same base, that is, she sends states | L a or | L b . On the other hand Bob randomly chooses the measurement base of the 1-qudits and then the state of each photon is detected by a projective measurement. Each measurement in the right basis provides a string of m N bits, where m = log 2 d . Besides, if an intercept-resend attack is performed by Eve the QBER is related to the error of detecting the right state, that is, since the number of product states in each basis is N = d N then the QBER is given by
QBER e = ( N 1 ) 2 N = ( d N 1 ) 2 d N .
It is important to stress that the existence of a relative phase between states of a product state does not change the state, up to a global phase. This property provides a great robustness to these states. Obviously each photon is excited in a superposition states where perturbations on the relative phases and amplitudes are possible, and therefore some compensation technique would be required. This problem has been extensively studied in the past by usign both passive (plug&play) and active methods.
On the other hand, we take into account that the current optical fibers have a certain attenuation loss, that means that some photons will be lost, and therefore the N-qudits convert in N ( N ) -qudits, that is, N−1-qudits, N−2-qudits ..., 1-qudit. For that reason, we will also have to consider this most realistic scenario. Thus, in an optical fiber the probability P to detect a photon at a distance L is related to the attenuation, that is,
P ( L ) = 10 α a t t L / 10 ,
where α a t t is the attenuation coefficient in the optical fiber in dB/km. Typical values are α a t t = 0.2 0.4 dB/km for conventional fibers, however, in this analysis we will make use of an attenuation coefficient value α a t t 0.15 d B k m 1 which takes into account the new advances in fiber design technologies [18]. This value is chosen to emphasize that this protocol is feasible even without employing hollow core fibers whose coefficient is α a t t < 0.10 d B k m 1 [19] . Note that if we have product states of N photons then we obtain several effective N -qudits under attenuation. For example if we have N = 3 we obtain in the base a (the same for the base b)
| L a = | L a ( 1 ) | L a ( 2 ) | L a ( 3 ) ( N = 3 ) ,
| L a = | 0 | L a ( 2 ) | L a ( 3 ) , | L a ( 1 ) | 0 | L a ( 3 ) , | L a ( 1 ) | L a ( 2 ) | 0 ( N = 2 ) ,
L a = | 0 | 0 | L a ( 3 ) , | 0 | L a ( 2 ) | 0 , | L a ( 1 ) 0 | 0 ( N = 1 ) ,
therefore the probability to detect product states with three photons is given by P ( 3 ) = P 3 , with P P ( L ) , however the probability to detect product states with two photons is P ( 2 ) = 3 P 2 ( 1 P ) , and the probability to detect product states with one photon is given by P ( 1 ) = 3 P ( 1 P ) 2 . This result can be generalized to N photons of which N are detected, that is,
P ( N ) = ( N N N ) ( 1 P ) N N , 0 N N .
In short, the attenuation will introduce limitations to the total secure key rate and the maximum distances allowed. However, by using several photons we overcome this problem increasing the security significantly. For example, let us consider the case of 1-ququart (d=4), then the error produced by Eve is 37.5%, however if we use 2 or 3 photons, that is, 2 and 3-ququart respectively, we obtain an error 46.875% or 49.92%, that is, close to the maximum error of 50%.

3. Implementations in Optical Fibers

Different kinds of optical fibers can be used to implement the above protocol. Since non spatial modal coupling is required, the most interesting cases correspond to the use of a set of single mode fibers (SMF) or a multicore optical fiber (MCF) with N cores. A first approximation would be to use two polarization modes in each core and then N-qubit states can be implemented, that is, N photons are distributed into the N cores and, therefore, polarization qubits are implemented in each core resulting in a QKD of dimension 2 N .
Alternatively, we may employ N subsets of M cores in a MCF supporting N M spatial modes, where each photon is simultaneously excited across M cores. By exploiting polarization modes, each subset encodes a single qudit of dimension d = 2 M . Consequently, the system represents states of N-qudits, spanning a quantum space of dimension
N = ( 2 M ) N = ( 2 M ) 1 M N M .
The last expresion shows us that for a given number of cores C = N M , the highest dimension N = 2 C is achieved for M = 1 (qubits) or M = 2 (ququarts).
A key aspect of optical fibers is that the polarization state of the quantum states is changed during their propagation, which supposes a critical caveat in the real implementation of these QKD protocols. As a consequence, we have to deal with perturbations to ensure the stability of the polarization state. To compensate the perturbations in the polarization when the states are send from Alice to Bob, active compensation [20,21] or passive compensation (autocompensation) [10,22] techniques represent a plausible and suitable solution.

3.1. Product States with N-Qubits with Spatial and Polarization Modes

We start with the implementation of N-qubits, that is, we have N spatial modes j = 1 , . . . N of a MCF or N SMFs and, in each spatial mode, we excite a single photon and therefore N-qubits by using the polarization modes in each spatial mode. We choose, for example, the bases: Basis a: X (or diagonal) and Basis b: Y (or circular) basis (MUBs):
X j = { | 1 D j = 1 2 ( | 1 H j + | 1 V j ) , | 1 A j = 1 2 ( | 1 H j | 1 V j ) } , j = 1 , . . . , N ,
Y j = { | 1 L j = 1 2 ( | 1 H j + i | 1 V j ) , | 1 R j = 1 2 ( | 1 H j i | 1 V j ) } , j = 1 , . . . , N .
As an example, let us consider three photons ( N = 3 ) then we can use a three-core MCF or three SMFs. Therefore the product states in the bases X and Y are
X { | 1 D 1 | 1 D 2 | 1 D 3 , | 1 D 1 | 1 D 2 | 1 A 3 , | 1 D 1 | 1 A 2 | 1 D 3 , | 1 D 1 | 1 A 2 | 1 A 3 ,
| 1 A 1 | 1 D 2 | 1 D 3 , | 1 D 1 | 1 D 2 | 1 D 3 , | 1 D 1 | 1 D 2 | 1 D 3 , | 1 A 1 | 1 A 2 | 1 A 3 }
Y { | 1 L 1 | 1 L 2 | 1 L 3 , | 1 L 1 | 1 L 2 | 1 R 3 , | 1 L 1 | 1 R 2 | 1 L 3 , | 1 L 1 | 1 R 2 | 1 R 3 ,
| 1 R 1 | 1 L 2 | 1 L 3 , | 1 R 1 | 1 L 2 | 1 R 3 , | 1 R 1 | 1 R 2 | 1 L 3 , | 1 R 1 | 1 R 2 | 1 R 3 } .
The bits corresponding to the states can be, for example, | 1 D 1 : 0, | 1 A 1 : 1, | 1 L 1 : 0 and | 1 R 1 : 1. Note that with one photon we would need a space with eight optical modes. If we use an additional photon (four photons) we would obtain sixteen product states (with one photon we would need a space with sixteen optical modes) and so on.
In Figure 1 there is a depiction of a HD-DV-QKD system for polarization qubits. First of all, Alice uses N SPDC sources to generate a pair of photons for each mode: one of them will be used as a signal and the other one as a heralding photon to obtain N-qubits by detecting coincidences. After, by using electrooptical devices, Alice chooses a state for each signal photon, all of them in the same basis, for example, X or Y. The photons are coupled to SMFs, and by means of a fan-in (FI) are coupled to a MCF. The quantum states travel along the MCF to Bob system where by using a fan-out (FO) the photons are coupled to N single core fibers at Bob’s system. Finally, at Bob’s quantum projective measurement system, the same base is selected with an electrooptical device. Finally, the quantum states are measured using a polarization beam splitter (PBS) for each qubit.

3.2. Product States with N-Qudits with Spatial and Polarization Modes

We make clear the case of N-qudits with N-ququarts states. The ququarts states | L are generated by using two spatial modes 1 and 2 (two non-copled cores of a MCF, or two SMFs) and the polarization modes H and V, that is, they are given by the following quantum superposition
| L = c H 1 | 1 H 1 + c V 1 | 1 V 1 + c H 2 | 1 H 2 + c V 2 | 1 V 2 ,
where the coefficients are the vectors of the two MUBs. For example, the above diagonal and circular polarization basis can be used to obtain two MUBs for 1-ququarts, that is,
X 12 | 1 ± D = 1 2 ( | 1 D 1 ± | 1 D 2 ) , | 1 ± A = 1 2 ( | 1 A 1 ± | 1 A 2 )
Y 12 { | 1 ± L = 1 2 ( | 1 L 1 ± i | 1 L 2 ) , | 1 ± R = 1 2 ( | 1 R 1 ± i | 1 R 2 ) } .
If we have a second photons then we need a second pair of spatial modes cores of MCF or SMFs) 3 and 4, and so on for N-ququarts. The states in each pair of modes are again given by Eq.(). Examples of states 2-ququarts of the first and second pairs of modes would be: | 1 + D | 1 + D , | 1 + D | 1 D , | 1 + D | 1 + A , | 1 + D | 1 A , and so on up to sixteen states. This can be implemented by using a MCF with four cores (two cores for each photon). A similar procedure can be followed for 3-ququarts, that is, sixty-four states. It is clear the large dimension that can be achieved. Note that with a single photon we would need to use and manipulate quantum superposition states excited in sixteen or sixty-four optical modes respectively to achieve the same QKD dimension.

3.3. Product States with N-Qudits with Spatial and Other Optical Modes

There are other degrees of freedom for a single photon, that is, other optical modes to construct N-qudits. For example, we could use the modes of a few-mode optical fiber (FMF) [23], that is, with different Linear Optical Moment (LOM), or even to consider a MCF optical fiber where each core is a few-mode optical core, with LOMs { β 1 , . . . , β d , where { β 1 , . . . , β d } are the mode propagation constants. Likewise, we could consider an optical fiber with a few modes with different Orbital Angular Momentum (OAM) [24], or a MCF where each core has a few modes with different OAM, that is, with OAMs { l , . . . , 0 , . . . , + l } , where d = 2 l + 1 . It is important to underline the possibility of using polarization maintenance optical fibers [25] because it can sometimes have certain advantages. A single example would be N optical fibers (or cores) with the first three modes with OAMs 1 , 0 , + 1 , then we will obtain N-qutrits, and therefore dimension N = 3 N .

4. Study of Secure Key Rates

In this section a detailed study is presented about secure key rates with the proposed protocol. We will focus our study on product states of N-qubits and N-ququarts although more general N-qudits could be also considered. Obvioulsy qudits with d > 4 could be also considered but qubits and ququarts provide sufficient possibilities to implement HD-QKD. In order to evaluate the security properties of the protocol with product states we will assume the following realistic scenario: an eaversdropper attack under imperfect channel having both losses and optical perturbations which produce unpredictable polarization coupling and phase changes. We also assume the existence of phase and polarization compensation systems, which greatly will reduce these random perturbations but do not fully eliminate them. Next, we will model the QBER model including the aforementioned optical perturbations and the Eve’s presence under an intercept and resend attack. Finally, we present secure key rates with losses, that is, we will take into account the fact that quantum states can suffer from photon losses and we present new secure key rate curves under an intercept-resend attack. In particular, we prove that secure key rates are notably improved by using detections of N ( < N ) -qudits, that is, employing additional detections where some photons have been lost due to fiber losses.

4.1. Optical Perturbations Model

A model for the optical perturbations is needed to calculate the perturbation error for N-qudits, in particular, for the product of N-qubits and N-ququarts states. We calculate the effect of polarization modal coupling and phase perturbations, that is, the changes of a quantum state that experiences such perturbations under propagation along optical fibers.
Let us consider a polarization 1-qubit state propagating through a core j of a multicore optical fiber (or a single mode optical fiber j), as for example, an initial state | 1 D j given by Eq.(8) which is excited in a linear polarization diagonal mode ( D j ). It becomes the following perturbated state | 1 D j p = cos θ j | 1 D j + sin θ j e i γ j | 1 A j due to polarization modal coupling described by θ j between diagonal (D) and anti-diagonal (A) linear modes, and phase perturbations described by γ j . From now on we assume statistical independence in θ j and γ j , and the same statistical behaviour in all cores, then we choose θ j = θ and γ j = γ . Therefore, the probability of remaining in the initial state for an N-qubit state is given by
P | 1 D 1 . . . 1 D N = 1 D 1 . . . 1 D N | 1 D 1 . . . 1 D N p = < cos 2 θ > N
where < > represents an stadistical average over the posible values of θ . Note that Eq.(14) does not depend on the phase perturbation pertubation γ .
Analogously, let us consider 1-ququart | 1 + D j , j = ( 1 / 2 ) ( | 1 D j + | 1 D j ) excited in the pair of cores j and j , then under perturbation becomes the following perturbated state | 1 + D j , j p = c o s θ j | 1 D j + sin θ j e i γ j | 1 A j + e i φ j ( cos θ j | 1 D j + sin θ j e i γ j | 1 A j ) . By asssuming again statistical independence in θ j ( j ) , γ j ( j ) and φ j and the same statistical behaviour ( φ j = φ ), it can be easily obtained that the probability of an initial N-ququart state | 1 + D 1 , 1 . . . 1 + D N , N to remain unperturbed is given by
P | 1 + D 1 , 1 . . . 1 + D N , N = 1 + D 1 , 1 . . . 1 + D N , N | 1 + D 1 , 1 . . . 1 + D N , N p =
= < cos 2 θ > N < 1 + cos φ > N 2 N
Next we calculate the statistical average, of the previously obtained functions, that is, < cos 2 θ > and < 1 + cos φ > in Eqs.(14) and (15), over a normalized gaussian probability densities of variance α c L (polarization modal coupling) and α p L (phase) respectively, where L is the length and α c and α c are the coefficients characterizing the strength of the residual (non compensated) perturbations.Therefore we write
< cos 2 θ > = cos 2 θ 1 π α c L e θ 2 α c L d θ = 1 + e α c L 2
< 1 + cos φ > 2 = 1 2 ( 1 + cos φ ) 1 π α p L e φ 2 α p L d φ = 1 + e 1 4 α p L 2
where we use the interval ( , ) because we assume that θ and φ can take values over the entire real line (unwrapped angles), although in our case it is also justified due to the small variances obtained under compensation methods of these perturbations. Finally we get for N-qubits and N-ququarts
P N q b = P | 1 1 D . . . 1 N D = 1 + e α c L 2 N
P N q q = P | 1 D 1 , 1 . . . 1 D N , N = 1 + e α c L 2 N 1 + e 1 4 α p L 2 N
It is remarkable that Eq.(19) depends on α c and α p , therefeore, N-qubits technology would be more easily implemented in practical systems because they only depend on the polarization coupling pertubation, however, the proposed 1-ququarts also have phase perturbations, although obviously N-ququarts with a high performance could be also implemented. We could claim, from a technological point of view, that the use of qudits with d > 4 would have greater implementation difficulties due to the fragility of these states to optical perturbations. Thus for d = 8 we could use 3-qubits states (three photons), which would be most robust to optical perturbations since would be insensitive to phase perturbations.

4.2. QBER with Perturbations

In order to calculate the QBER, we have to take into account the sources of errors due to Eve’s attack and the before mentioned optical perturbations. The first one of them can be written as a e E where a is the fraction of attack, that is, the rate of bits intercepted by Eve and e E is Eve’s QBER. It is known that intercept-resend attack is the most direct QKD attack. We use this attack to describe the security properties of the QKD protocol with product states. As usual, Eve has to choose a measurement basis and, because she makes a wrong choices, the QBER is given by Eq.(3), that is, e E = ( d N 1 ) / 2 d N .
Next, we will calculate Bob’s QBER e B equations for N-qbits and N-ququarts. If we consider errors due to optical perturbations e p , then we can define an error e B = A + B P , with P = P N q b = 1 P N q b if we send qubit states or P = P N q q = 1 P N q q for ququarts. It represents the probability of getting a mistaken bit due to perturbations. A and B are constants to be determined by the following boundary conditions: e B ( L = 0 ) = a e E , where e E = ( N 1 ) / 2 N is the error due to the Eve’s attack, and e B ( L = ) = ( N 1 ) / N , therefore we obtain for the expression
A = a e E B = 1 N N 1 ( a e E )
Note that for qubits N = 2 N and for ququarts N = 4 N . Using this results we write down the expressions for Bob’s QBER
Q u b i t s e B = a e E + ( 1 N N 1 a e E ) ( 1 1 + e α c L 2 N )
Q u q u a r t s e B = a e E + ( 1 N N 1 a e E ) ( 1 1 + e α c L 2 N 1 + e 1 4 α p L 2 N )
For sake of illustrative purpose we choose a value α c 1.0 · 10 3 k m 1 which can be achieved by compesating techniques [26]. Moreover, we consider that the coefficient α p can takes values equal to several times α c because of the larger technological difficulty to compensate phase perturbations, in particular we take α p 4 α c and therefore both perturbations provide similar statatistical properties. In Figure 2 we show two examples of the QBER vs L for diferent product of qubits (left) and ququarts (right) states. It is clear that we gain more resilience to Eve when we increase dimension. We remind that although the security is higher for ququarts, their implementation is harder due to the phase parameter, on the contrary qubits are more implementable because they only depend on polarization modal coupling. In short, when the phase perturbation is important then the high-dimensional QKD could be implemented with N-qubits that do not present phase perturbation.

4.3. Secure Key Rate with N ( N ) -Qudits Under Attack in Line

As commented, we will consider that Eve is present and that the channel has an optical attenuation (attenuation coefficient α a t t 0.15 d B k m 1 ). The secure key rate R by using N-qudits can be calculated by taking into account the GLLP security analysis [27] and therefore by using the mutual information I A B between A and B with N = d N states where the information lost during error correction is f H ( x ) , with H ( x ) the Shannon entropy, x the total QBER and f the reconciliation efficiency. Therefore, under a fraction of attack a, the rate R can be written as follows
R ( d , N ) ( N ) = I A B f H ( e B ) I A E ( e E ) =
= 1 2 log 2 ( N ) + f ( 1 e B ) log 2 ( 1 e B ) + e B log 2 ( e B N 1 ) a log 2 ( N ) 2
where the second term term on the right side represents the information loss by Bob due to the channel error and the presence of Eve, and the third term is the mutual information I A E [28] multiplied by the attack fraction a, where as usual it is assumed that Eve has all the technology to eliminate the classical errors. From now on we will use an acceptable value f 1.15 [29].
As commented above we have to take into account the possible lost photons and therefore not detected by Bob, which means that despite the channel losses, the remaining photons, that is, remaining qudits of lower N < N dimension can still be employed to produce a secret key. By means of the probabilities given in Section 2, we can weight the secret key rates given by Eq.(22) according to the number of lost photons: 0 , 1 , . . . , N 1 , that is, R ( d , N ) ( d N ) = P ( N ) R ( d , N ) ( d N ) , R ( d , N 1 ) ( d N 1 ) = P ( N 1 ) R ( d , N 1 ) ( d N 1 ) , ... , R ( d , 2 ) ( d ) = P ( 2 ) R ( d , 2 ) ( d 2 ) , R ( d , 1 ) ( d ) = P ( 1 ) R ( d , 1 ) ( d ) . Consequently, the total secure key rate R d T ( d N ) is the sum of these ponderated secure key rates, that is,
R d T ( d N = N ) = R ( d , N ) ( d N ) + R ( d , N 1 ) ( d N 1 ) + . . . + R ( d , 2 ) ( d 2 ) + R ( d , 1 ) ( d ) .
Next we present a detailed analysis without and with attack in line for some N-qudits with a certain practical interest. We calculate, for the purpose of illustration, examples of secure key rates for the case of 1, 2 and 3-qubits (dimensions N = 2 , 4 , 8 ), that is, R 2 T ( N ) and 1-ququart (dimension N = 4 ), that is, R 4 T ( N ) . The ponderated sums of these secure keys rates are given by the following expressions for 1-qubit, 2-qubits and 3-qubits,
R 2 T ( 2 ) = P R 2 , 1 ( 2 ) , R 2 T ( 4 ) = P 2 R ( 2 , 2 ) ( 4 ) + 2 P ( 1 P ) R ( 2 , 1 ) ( 2 ) ,
R 2 T ( 8 ) = P 3 R 2 , 3 ( 8 ) + 3 P 2 ( 1 P ) R ( 2 , 2 ) ( 4 ) + 3 P ( 1 P ) 2 R ( 2 , 1 ) ( 2 )
and the following expression for the total secure key rate when 1-ququart, 2-ququarts and 3-ququarts are used
R 4 T ( 4 ) = P R ( 4 , 1 ) ( 4 ) , R 4 T ( 16 ) = P 2 R ( 4 , 2 ) ( 16 ) + ( 2 P ( 1 P ) ) R ( 4 , 1 ) ( 4 )
R 4 T ( 64 ) = P 3 R ( 4 , 3 ) ( 64 ) + ( 3 P 2 ( 1 P ) ) R ( 4 , 2 ) ( 16 ) + ( 3 P ( 1 P ) 2 ) R ( 4 , 1 ) ( 4 )
Note, for example, that the total secure key rate R 2 T ( 8 ) for 3-qubits consists of the weighted contribution of the secure key rates from a tri-photon channel, three bi-photon channels and another three single photon channels, which is equivalent to detect one triple coincidence (tri-photon-channel), three double coincidences (bi-photon channels) and three single detections (single photon channels). Analogously, similar considerations can be made for the rest of the cases. On the other hand, we must note that the losses in the optical fiber give rise to a small amount of N photon coincidences, what suggests that such coincidences could be used to check whether Eve is tapping. The main argument is that, although the N photons coincidences are very unlikely in longer distances and therefore their contribution to the total secure key is very small, they can detect quickly the presence of Eve because of the greater contribution to Bob’s quantum bit error rate (QBER) that increases with dimension.
Moreover, dimensionality implies a longer distance reached and secure key gain for the protocol. In Figure 3, two SKR curves vs L are depicted for qubits (left) and ququarts (right) for a rate of attack a = 0.55 (left). As expected, it is also interesting to indicate that a simple inspection shows that parallel single photon channels provide lower secure key rates, that is, 2 R ( 2 ) < R ( 4 ) , 3 R ( 2 ) < R ( 8 ) for qubits and 2 R ( 4 ) < R ( 16 ) , 3 R ( 4 ) < R ( 64 ) for ququarts. Finally, the SKRs sums results in the small down spikes in higher dimension curves. They are ocated at the distances where multiple photons coincidences become less probable than coincidences of lower number of photons.

5. Discussion

In this work, a high-dimensional discrete variable QKD protocol based on product states has been proposed, that is, by using N-qudits states formed by the product states of N photons each in 1-qudit states. Examples of N-qubits, N-ququarts have been presented and analyzed. The QKD states measurement combine projective measurements with photon coincidences, although such coincidences would not be strictly necessary. For the two products states technologies analysed in detail, that is, N-qubits and N-ququarts,the results show that security key rates improve notably when compared to the paralellization of N single photon channels. For this, we can obtain a total secure key rate as the weighted sum of secure key rates for N ( N ) -qudits ( N = N , N 1 , . . . , 1 ) . Moreover, the states with a maximum number of N photons, that is, the least probable states, can be used for checking the security of the quantum channel. Finally, if only compensation of polarization is achieved, then N-qubits high dimensional protocol is a suitable choice for implentation; if polarization and phase compensation is available then N-ququarts are also an adecuate proposal.

Author Contributions

Conceptualization, J.L., X.P-B. and A.V-M.; methodology, J.L., X.P-B. and A.V-M.; validation, J.L., X.P-B. and A.V-M.; formal analysis, J.L., X.P-B. and A.V-M.; investigation, J.L., X.P-B. and A.V-M.; writing—original draft preparation, J.L., X.P-B. and A.V-M.; writing—review and editing, J.L., X.P-B. and A.V-M.; supervision, J.L. and X.P-B.; project administration, J.L., X.P-B.; funding acquisition, J.L. and X.P-B. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the MICIN, European Union NextGenerationEU under Grant PRTR-C17.I1, and in part by the Galician Regional Government through Planes Complementarios de I+D+I con las Comunidades Autónomas in Quantum Communication. It was also funded by MCIU/ AEI / 10.13039/501100011033 / FEDER, UE under project PID2023-152607NB-I00.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
QKD Quantum Key Distribution
DV Discrete variable
CV Continuous variable
DV-QKD Discrete variable Quantum Key Distribution
CV-QKD Continuous variable Quantum Key Distribution
BB84 Bennet Brassard 1984 protocol
B92 Bennet 1992 protocol
BBM92 Bennet Brassard Mermin 1992 protocol
MDI-QKD Measurement-Device-Independent Quantum Key Distribution
GHZ Greenberger–Horne–Zeilinger state
LOM Linear optical momentum
FMF Few modes optical fibers
MCF Multicore optical fibers
OAM Orbital angular momentum
HD High dimensional
HD-DV-QKD High dimensional Discrete variable Quantum Key Distribution
SPDC Spontaneous parametric down conversion
SFWM Spontaneous four-wave mixing
MUB Mutually unbiased bases
QBER Quantum bit error rate
SMF Single mode fibers
PL Photonic lantern
EOSS Electrooptical states selector
EOBS Electrooptical basis selector
PBS Polarization beam splitter
GLLP Gottesman-Lo-Lutkenhaus-Preskill

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef]
  2. Shenoy-Hejamadi, A.; Pathak, A.; Radhakrishna, S. Quantum Cryptography: Key Distribution and Beyond. Quanta 2017, 6, 1–47. [Google Scholar] [CrossRef]
  3. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photon. 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  4. Bennet, C.H.; Brassard, G. Quantum Cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing; 1984; pp. 175–179. [Google Scholar]
  5. Bennett, C.H. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 1992, 68, 3121–3124. [Google Scholar] [CrossRef] [PubMed]
  6. Bennett, C.H.; Brassard, G.; Mermin, N.D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 1992, 68, 557–559. [Google Scholar] [CrossRef]
  7. Lo, H.K.; Curty, M.; Qi, B. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed]
  8. Cañas, G.; Vera, N.; Cariñe, J.; González, P.; Cardenas, J.; Connolly, P.W.R.; Przysiezna, A.; Gómez, E.S.; Figueroa, M.; Vallone, G.; et al. High-dimensional decoy-state quantum key distribution over multicore telecommunication fibers. Phys. Rev. A 2017, 96, 022317. [Google Scholar] [CrossRef]
  9. Ding, Y.; Bacco, D.; Dalgaard, K.; Cai, X.; Zhou, X.; Rottwitt, K.; Oxenlowe, L. High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits. npj Quantum Inf 2017, 3, 25. [Google Scholar] [CrossRef]
  10. Balado, D.; Liñares, J.; Prieto-Blanco, X.; Barral, D. Phase and polarization autocompensating N-dimensional quantum cryptography in multicore optical fibers. J. Opt. Soc. Am. B 2019, 36, 2793–2803. [Google Scholar] [CrossRef]
  11. Xu, F.; Qi, B.; Liao, Z.; Lo, H.K. Long distance measurement-device-independent quantum key distribution with entangled photon sources. Applied Physics Letters 2013, 103, 061101. [Google Scholar] [CrossRef]
  12. Hua, X.; Hu, M.; Guo, B. Multi-User Measurement-Device-Independent Quantum Key Distribution Based on GHZ Entangled State. Entropy 2022, 24. [Google Scholar] [CrossRef] [PubMed]
  13. Huang, H.; Milione, G.; Lavery, M.P.J.; Xie, G.; Ren, Y.; Cao, Y.; Ahmed, N.; An Nguyen, T.; Nolan, D.A.; Li, M.J.; et al. Mode division multiplexing using an orbital angular momentum mode sorter and MIMO-DSP over a graded-index few-mode optical fibre. Scientific Reports 2015, 5, 14931. [Google Scholar] [CrossRef]
  14. Vázquez-Martínez, A.; Prieto-Blanco, X.; Mateo, E.; Liñares, J. 2N-dimensional autocompensating discrete modulation CV-QKD protocol in optical fibers. arXiv: 6707418 [quant-ph] 2025.
  15. Collins, M.J.; Xiong, C.; Rey, I.H.; Vo, T.D.; He, J.; Shahnia, S.; Reardon, C.; Krauss, T.F.; Steel, M.J.; Clark, A.S.; et al. Integrated spatial multiplexing of heralded single-photon sources. Nature Communications 2013, 4, 2582. [Google Scholar] [CrossRef]
  16. Koefoed, J.G.; Friis, S.M.M.; Christensen, J.B.; Rottwitt, K. Spectrally pure heralded single photons by spontaneous four-wave mixing in a fiber: reducing impact of dispersion fluctuations. Opt. Express 2017, 25, 20835–20849. [Google Scholar] [CrossRef] [PubMed]
  17. Münzberg, J.; Draxl, F.; Covre da Silva, S.F.; Karli, Y.; Manna, S.; Rastelli, A.; Weihs, G.; Keil, R. Fast and efficient demultiplexing of single photons from a quantum dot with resonantly enhanced electro-optic modulators. APL Photonics 2022, 7, 070802. [Google Scholar] [CrossRef]
  18. Hasegawa, T.; Tamura, Y.; Sakuma, H.; Kawaguchi, Y.; Yamamoto, Y.; Koyano, Y. The first 0.14-dB/km ultra-low loss optical fiber. SEI Tech. Rev 2018, 86, 18–22. [Google Scholar]
  19. Petrovich, M.; Fokoua, E.; Chen, Y.; Sakr, H.; Adamu, A.; Hassan, R.; Wu, D.; Ando, R.; Papadimopoulos, A.; Sandoghchi, S.; et al. Broadband optical fibre with an attenuation lower than 0.1 decibel per kilometre. Nature Photonics 2025, 1–6. [Google Scholar] [CrossRef]
  20. Chen, W.; Han, Z.; Mo, X.; Xu, F.; Wei, G.; Guo, G. Active phase compensation of quantum key distribution system. Chinese Science Bulletin 2008, 53, 1310–1314. [Google Scholar] [CrossRef]
  21. Yuan, Z.; Shields, A. One-way quantum key distribution system with active phase compensation. In Proceedings of the 2005 European Quantum Electronics Conference, Los Alamitos, CA, USA, 2005; p. 306. [Google Scholar] [CrossRef]
  22. Bethune, D.S.; Risk, W.P. Autocompensating quantum cryptography. New Journal of Physics 2002, 4, 42. [Google Scholar] [CrossRef]
  23. Sillard, P.; Bigot-Astruc, M.; Molin, D. Few-Mode Fibers for Mode-Division-Multiplexed Systems. Journal of Lightwave Technology 2014, 32, 2824–2829. [Google Scholar] [CrossRef]
  24. Wang, J.; Zhang, X. Orbital Angular Momentum in Fibers. J. Lightwave Technol. 2023, 41, 1934–1962. [Google Scholar] [CrossRef]
  25. Fu, S.; Wang, Y.; Cui, J.; Mo, Q.; Chen, X.; Chen, B.; Tang, M.; Liu, D. Panda Type Few-Mode Fiber Capable of Both Mode Profile and Polarization Maintenance. Journal of Lightwave Technology 2018, 36, 5780–5785. [Google Scholar] [CrossRef]
  26. Liñares, J.; Prieto-Blanco, X.; Balado, D.; Carral, G.M. Fully autocompensating high-dimensional quantum cryptography by quantum degenerate four-wave mixing. Phys. Rev. A 2021, 103, 043710. [Google Scholar] [CrossRef]
  27. Gottesman, D.; Lo, H.K.; Lutkenhaus, N.; Preskill, J. Security of quantum key distribution with imperfect devices. In Proceedings of the International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings, 2004; p. 136. [Google Scholar] [CrossRef]
  28. Bourennane, M.; Karlsson, A.; Björk, G.; Gisin, N.; Cerf, N.J. Quantum key distribution using multilevel encoding: security analysis. Journal of Physics A: Mathematical and General 2002, 35, 10065. [Google Scholar] [CrossRef]
  29. Elkouss, D.; Martinez-Mateo, J.; Martin, V. Information reconciliation for quantum key distribution. Quantum Info. Comput. 2011, 11, 226–238. [Google Scholar]
Figure 1. A HD-QKD system for N-qubits with Alice and Bob connected by a MCF. List of elements from left to right: SPDC sources, Electrooptical States Selector (EOSS), SMFs, a MCF between a fan-in and a fan-out (FIFO), an Electrooptical Base Selector (EOBS), and PBSs to perform projective measurements.
Figure 1. A HD-QKD system for N-qubits with Alice and Bob connected by a MCF. List of elements from left to right: SPDC sources, Electrooptical States Selector (EOSS), SMFs, a MCF between a fan-in and a fan-out (FIFO), an Electrooptical Base Selector (EOBS), and PBSs to perform projective measurements.
Preprints 192559 g001
Figure 2. QBER curves vs L(km) for qubits (left) and ququarts (right). Parameters α = 0.15 d B k m 1 , α c = 10 3 k m 1 , α p = 4 · 10 3 k m 1 (for ququarts) and a = 0.55.
Figure 2. QBER curves vs L(km) for qubits (left) and ququarts (right). Parameters α = 0.15 d B k m 1 , α c = 10 3 k m 1 , α p = 4 · 10 3 k m 1 (for ququarts) and a = 0.55.
Preprints 192559 g002
Figure 3. Semilog SKR curves vs L(km) for qubits (left) and ququarts (right). Parameters α = 0.15 d B k m 1 , α c = 10 3 k m 1 , α p = 4 · 10 3 k m 1 (for ququarts) and a = 0.55.
Figure 3. Semilog SKR curves vs L(km) for qubits (left) and ququarts (right). Parameters α = 0.15 d B k m 1 , α c = 10 3 k m 1 , α p = 4 · 10 3 k m 1 (for ququarts) and a = 0.55.
Preprints 192559 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated