Quantum Key Distribution
Quantum key distribution is a protocol family for generating shared secret key material from quantum signals and authenticated public discussion. It is not a direct replacement for encryption, signatures, endpoint security, or network operations. Its job is narrower: Alice and Bob either abort or output a shared random key whose secrecy is certified by observed quantum-channel statistics and a stated device model.
This page combines the existing SJ Wiki overview with Nielsen and Chuang's Chapter 12 treatment. Nielsen and Chuang emphasize three linked ideas: nonorthogonal states cannot be distinguished without disturbance, Holevo's theorem bounds accessible classical information from quantum states, and BB84 security can be proved by reducing an entanglement-distillation protocol based on CSS codes to ordinary prepare-and-measure BB84. The modern engineering variants below extend that foundation to weak coherent sources, side channels, finite-key security, and network deployment.
Definitions
QKD protocol means the full key-generation procedure: quantum transmission, public sifting, parameter estimation, information reconciliation, verification, privacy amplification, and transcript authentication.
Authenticated classical channel is mandatory. Alice and Bob may discuss bases, check bits, syndromes, hash choices, and abort decisions publicly, but Eve must not be able to forge or rewrite those messages undetected. Without authentication, Eve can run two separate QKD sessions and impersonate each endpoint.
Accessible information is the maximum classical mutual information obtainable by measuring a quantum ensemble. If Alice chooses with probability and sends , Bob or Eve chooses a POVM and receives a classical outcome . The accessible information is the maximum of over all measurements.
Holevo information for the ensemble is
Holevo's theorem gives the upper bound
for every measurement outcome . Nielsen and Chuang use this as the quantitative expression of the "hidden" nature of quantum information: nonorthogonal quantum states can carry a classical label, but a measurement need not reveal the full label.
Security criterion in the N&C presentation says, informally, that for chosen security parameters, a QKD protocol either aborts or succeeds with high probability and leaves Eve with exponentially small mutual information about an essentially random final key. Modern composable security usually states this with a trace-distance parameter , but the operational demand is the same: the real key should be substitutable for an ideal secret key in later cryptographic use.
Information reconciliation is classical error correction between Alice's and Bob's correlated strings. It leaks public information and must be charged against the final key length.
Privacy amplification is public randomized compression, usually implemented with a universal hash family, that maps the reconciled string to a shorter key about which Eve has negligible information.
Bit errors and phase errors are the two error types separated by CSS-code analyses. In prepare-and-measure BB84, bit errors are directly sampled by comparing check bits. Phase errors are not directly observed in the same run, but the proof relates them to measurements in the conjugate basis.
Collective attack means Eve interacts with signals individually but may store quantum side information and measure it jointly later. Coherent attack means Eve may attack many signals jointly. Security claims must state which attack model and finite-key reduction are being used.
Key results
The foundational proposition is information gain implies disturbance. If Eve could distinguish two nonorthogonal states without disturbing them, she could learn the encoded information while leaving Alice and Bob's statistics unchanged. Nielsen and Chuang prove the contrapositive by modeling Eve's operation as a unitary interaction with an ancilla. If the operation leaves both nonorthogonal input states unchanged, preservation of inner products forces the corresponding ancilla states to be identical, so Eve has gained no distinguishing information.
Holevo's theorem gives the information-theoretic ceiling behind this intuition. For Bob's received ensemble ,
and for Eve's ensemble ,
When Alice and Bob have an advantage over Eve, reconciliation and privacy amplification can convert correlated data into a secret key. A classical one-way expression with the right shape is the Csiszar-Korner bound
In a quantum proof, is replaced or bounded by an appropriate quantum side-information quantity, often passing through Holevo information, entropic uncertainty, or smooth min-entropy. A modern finite-key expression is commonly written schematically as
where is the final key length. This formula expresses the same accounting principle as the N&C discussion: certified uncertainty for Eve minus public leakage and proof margins.
For ideal asymptotic BB84 with one-way postprocessing and symmetric bit and phase error rate , the familiar secret fraction is
where
The first entropy term corresponds to information reconciliation for bit errors; the second corresponds to privacy amplification against phase-error information. This is the clean textbook expression, not a deployed rate formula.
Nielsen and Chuang's secure-BB84 proof proceeds by reduction. First, an EPR-based protocol is manifestly secure if Alice and Bob can distill high-fidelity Bell pairs. Second, random sampling bounds the number of errors. Third, CSS codes correct bit and phase errors. Fourth, the CSS protocol is simplified: Bob can measure immediately, becomes an ordinary classical reconciliation code, and the coset becomes the privacy-amplified key. The final protocol is BB84 up to cosmetic differences.
The major QKD protocol families can be read as variations on which quantum states are sent, what parameters are estimated, and what device assumptions are trusted.
| Protocol family | Quantum resource | Security emphasis | Main advantage | Main limitation |
|---|---|---|---|---|
| BB84 | Four states in two mutually unbiased bases | Nonorthogonality, sampling, CSS reduction | Canonical and simple | Source and detector assumptions matter |
| B92 | Two nonorthogonal states | Impossibility of perfect state discrimination | Minimal state alphabet | Lower conclusive rate and loss sensitivity |
| Six-state | Eigenstates of , , and | More complete qubit error sampling | Better symmetry for some analyses | More basis settings |
| E91 | Entangled pairs | Bell correlations and entanglement | Connects QKD to entanglement tests | Requires high-quality entanglement distribution |
| Decoy-state BB84 | Weak coherent pulses with varied intensity | Bounds single-photon contribution | Practical laser-source security | Requires statistical intensity analysis |
| MDI-QKD | Two sources and untrusted Bell measurement | Removes detector side channels | Measurement device can be untrusted | Lower rate and demanding interference |
| TF-QKD | Phase-coherent fields at middle station | High-loss scaling improvements | Can scale like in favorable regimes | Phase stabilization and finite-key complexity |
| DI-QKD | Bell violation | Minimal internal device trust | Strongest conceptual side-channel resistance | Extremely demanding efficiency and statistics |
Nielsen and Chuang's Chapter 8 noise model is also relevant. Real QKD channels are quantum operations: loss, depolarization, phase damping, detector dark counts, and source imperfections change the ensemble reaching Bob and Eve. The proof must connect observed classical statistics back to a bounded family of quantum states or channels. That bridge is where ideal textbook protocols become engineering security analyses.
Comprehensive security proofs and practical attacks
Recent review work is useful as a checklist for the gap between theorem and device. Jha, Parakh, and Subramaniam [1] organize QKD around protocol families, security-proof styles, practical attacks, error correction, and quantum-augmented networks. Nair [2] gives the deployment-facing companion view: QKD is inserted into classical networks with authenticated control channels, trusted relays or special-purpose quantum links, and ordinary key-management policy rather than replacing the rest of cryptography.
A compact security workflow is:
choose protocol family and device model
collect quantum-channel statistics
bound single-photon, phase-error, or covariance parameters
subtract public reconciliation leakage
privacy-amplify to a composable key length
abort if the finite-key lower bound is nonpositive
For weak coherent BB84, the first hardware-specific issue is photon-number statistics. With phase-randomized mean photon number ,
At , , so emitted pulses contain about multi-photon pulses in expectation. That is why photon-number-splitting attacks are not a corner case and why decoy states are part of the proof model, not a performance tweak.
Side-channel attacks are best classified by which assumption they break. A Trojan-horse attack probes device settings through back-reflections; detector blinding and timing attacks make Bob's click model false; local-oscillator manipulation corrupts CV-QKD shot-noise calibration; jamming raises QBER or suppresses detections without necessarily learning the key. A simple availability model mixes the intended state with injected noise:
For a polarization rotation , a teaching estimate of induced error is
A rotation gives , which can force aborts even if Eve gains no clean key information. This separates confidentiality failures from service availability failures.
The error-correction language also needs care. In link-level QKD, information reconciliation corrects Alice's and Bob's classical strings and leaks public information that must be subtracted. Quantum error-correcting codes, including CSS and stabilizer codes reviewed in [1], become central when the network is preserving quantum states or entanglement before measurement, as in repeaters, DI-QKD testbeds, and quantum memories. They do not retroactively protect a key that has already leaked through a bad device model.
Visual
The diagram distinguishes three QKD architectures that have different trust boundaries. E91 relies on measured entanglement correlations, MDI-QKD moves detector trust to an untrusted Bell-measurement station, and twin-field QKD uses single-photon interference at a middle station to improve distance scaling. All three feed the same classical post-processing path where parameter estimates decide between abort and reconciliation plus privacy amplification.
| Quantity | Formula | What it controls in QKD |
|---|---|---|
| Shannon mutual information | Alice-Bob correlation after the quantum stage | |
| Holevo information | Upper bound on accessible information from a quantum ensemble | |
| Binary entropy | Error-correction and phase-error penalties | |
| Reconciliation leakage | Public information revealed to align strings | |
| Final key length | How many secret bits remain after proof margins |
Worked example 1: Holevo bound for two nonorthogonal states
Problem. Alice chooses one of two pure qubit states with equal probability:
Let , so the overlap is . Compute the Holevo upper bound on Bob's accessible information about Alice's bit.
Method.
- Because both signal states are pure,
- The average density operator is
- For two equally likely pure states with real overlap , the eigenvalues of are
- Substitute :
- Since the signal entropies are zero, the Holevo quantity is
- Compute
Using and ,
Checked answer. Bob's accessible information is at most about bits. It is less than one bit because the two states are nonorthogonal. If , the states are orthogonal, , the eigenvalues are , and the Holevo bound becomes one bit.
Worked example 2: Key-length accounting after reconciliation
Problem. A simplified asymptotic BB84 postprocessing block has sifted unrevealed bits and observed QBER . Use the phase-error estimate , reconciliation leakage
and a fixed proof margin of bits. Estimate
Method.
- Compute the binary entropy:
- Approximate the logarithms:
- Substitute:
- Compute the phase-uncertainty term:
- Compute reconciliation leakage:
- Subtract leakage and the fixed margin:
Checked answer. The simplified block yields about final secret bits. The result is lower than because the reconciliation efficiency factor is larger than one and because we subtracted an explicit margin. A real finite-key calculation would derive the phase-error bound and margin from confidence parameters rather than inserting them by hand.
Code
import math
import numpy as np
def entropy_from_eigenvalues(values):
total = 0.0
for value in values:
if value > 1e-12:
total -= float(value) * math.log2(float(value))
return total
def binary_entropy(q):
if q <= 0.0 or q >= 1.0:
return 0.0
return -q * math.log2(q) - (1.0 - q) * math.log2(1.0 - q)
def holevo_two_pure_states(theta):
ket0 = np.array([[1.0], [0.0]])
ket1 = np.array([[math.cos(theta)], [math.sin(theta)]])
rho0 = ket0 @ ket0.T
rho1 = ket1 @ ket1.T
rho = 0.5 * rho0 + 0.5 * rho1
eigenvalues = np.linalg.eigvalsh(rho)
return entropy_from_eigenvalues(eigenvalues), eigenvalues
def bb84_key_length(n, qber, reconciliation_efficiency=1.15, margin=10_000):
h = binary_entropy(qber)
leak_ec = reconciliation_efficiency * n * h
length = n * (1.0 - h) - leak_ec - margin
return max(0, int(length)), leak_ec
chi, eigs = holevo_two_pure_states(math.pi / 3)
print(f"Holevo chi={chi:.4f} bits, eigenvalues={eigs}")
for qber in [0.01, 0.03, 0.08, 0.11]:
length, leak = bb84_key_length(1_000_000, qber)
print(f"QBER={qber:.1%} leak={leak:,.0f} final_length={length:,}")
This NumPy sketch computes the Holevo quantity for two pure qubit states and a simplified BB84 key length. It deliberately avoids pretending to be a full QKD stack: it has no random sampling bound, no detector model, no decoy-state estimation, and no composable security proof object.
Common pitfalls
- Treating QKD as message encryption. QKD generates shared random keys; messages are still protected by one-time pads, authenticated encryption, or other classical mechanisms.
- Forgetting the authenticated channel. Public discussion is safe only against listening, not against undetected rewriting.
- Assuming every QKD claim is device independent. Most practical protocols trust some source, detector, timing, isolation, and random-number-generator assumptions.
- Equating Holevo information with the final key rate. Holevo bounds accessible information for an ensemble; a security proof must still connect observed data to Eve's possible quantum state and subtract public leakage.
- Comparing protocols without units. Secret bits per pulse, per detected signal, per second, and per finite block are different quantities.
- Ignoring weak coherent pulse statistics. Multi-photon emissions enable photon-number-splitting attacks unless decoy-state analysis or another countermeasure is used.
- Over-reading asymptotic thresholds. The often cited BB84 threshold near 11% comes from an ideal proof setting; practical finite-key and device assumptions can be stricter.
- Calling a trusted-node network end-to-end quantum-secure. Trusted relays can be useful, but relay compromise is a trust assumption.
- Treating TF-QKD or DI-QKD as drop-in upgrades. Their theoretical advantages come with demanding phase, loss, efficiency, and finite-statistics requirements.
Connections
- BB84 Protocol for the detailed prepare-and-measure protocol and Nielsen-Chuang CSS-code security reduction.
- Quantum Communication for the no-cloning, wrong-basis, and QBER intuition.
- Quantum Network for trusted-node networks and stack-level integration.
- Quantum Internet, Entanglement, and Quantum Repeater for entanglement distribution beyond direct QKD links.
- Quantum Error Correction for CSS codes, bit/phase error separation, and the link between QKD security and coding.
- Classical Cryptography, Computational Security Definitions, and Message Authentication Codes for protocol-security language and authentication.
- Post-Quantum Cryptography and Quantum-Safe Cryptography for the classical alternative to deploying QKD.
- Primary textbook reference: Nielsen and Chuang, Quantum Computation and Quantum Information, Chapters 8 and 12, especially quantum operations, Holevo's theorem, privacy amplification, and the BB84 security proof.
References
[1] N. Jha, A. Parakh, M. Subramaniam. Quantum Key Distribution: Bridging Theoretical Security Proofs, Practical Attacks, and Error Correction for Quantum-Augmented Networks. arXiv:2511.20602v1, 2025. [2] V. Nair. Exploring Quantum Key Distribution (QKD) Protocols for Secure Communication Over Classical Networks. Journal of Recent Trends in Computer Science and Engineering 13(2), 20-29, 2025.