Passive BB84 Transmitter for Secure QKD
- Passive BB84 transmitters are optical devices that use intrinsic quantum randomness and post-selection techniques to generate secure qubit states without active modulation.
- They integrate gain-switched lasers, beam splitter networks, and classical monitor arms to encode polarization states while mitigating modulator side-channel vulnerabilities.
- Experimental results show that passive implementations achieve cost-effective, high-rate QKD over metropolitan distances with performance comparable to active systems.
A passive transmitter for the BB84 quantum key distribution protocol is an optical device that generates BB84 qubit states and (optionally) decoy-state intensities through intrinsic quantum randomness and optical post-selection, eliminating all high-speed active modulators and quantum random number generators. Its architecture combines linear optics, gain-switched or phase-randomized laser sources, and classical monitor arms to produce qubits suitable for secure QKD without externally driven switching. Passive transmitters mitigate modulator side-channels and simplify system complexity, offering a viable pathway for cost-effective, high-rate, and hardware-secure QKD deployments (Kurochkin et al., 2024, Zapatero et al., 2023, Wang et al., 2022, Rani et al., 2024, Zapatero et al., 2022, Curty et al., 2011).
1. Principles of Passive State Preparation in BB84
Passive transmitters exploit quantum or classical randomness in the physical generation of optical pulses rather than selecting basis and bit actively via RNGs and EOMs. Common methods include:
- Gain-switched lasers, where phase diffusion during the off period randomizes the optical phase of each pulse, yielding stochastically prepared qubit states (Kurochkin et al., 2024).
- Beam splitter networks, where the probabilistic splitting of photons and their polarization transformations encode the basis and bit passively (e.g., using half-wave plates and multiple arms) (Rani et al., 2024).
- Post-selection via classical measurement of monitor signals (intensity, polarization, phase) to tag qubits as valid BB84 states and/or decoy settings (Zapatero et al., 2022, Curty et al., 2011).
A critical property is that no externally controlled, high-speed electro-optic switches or modulator signals touch the quantum channel, significantly reducing side-channel vulnerability.
2. Optical Architectures
Passive BB84 transmitters fall into several experimentally validated architectures:
- Single gain-switched laser pair and fiber delay loop: A laser emits pulse pairs with randomized relative phase. Polarization mapping via a 90° rotated delay in polarization-maintaining fiber converts phase differences () into one of (Kurochkin et al., 2024). Local tomography confirms true phase randomness via arcsine-statistics over the phase histogram.
- Multi-laser interferometric networks: Four independent gain-switched lasers, grouped into “right-circular” and “left-circular” arms, undergo interference in symmetric and polarizing beam splitters; the combined output pulse is characterized by random intensity and polarization angles on the Bloch sphere. Attenuation and monitor arms enable both signal encoding and decoy-state selection (Zapatero et al., 2023, Zapatero et al., 2022, Wang et al., 2022).
- Heralded single-photon sources and beam splitters: An SPDC source produces paired photons; the heralded idler is sent through a network of 50:50 beam splitters and HWPs for passive polarization encoding, generating all four BB84 states with equal probability and no active control (Rani et al., 2024).
- Sum-frequency generation network: Two frequencies of strong coherent light (random phased) undergo interference and nonlinear mixing before polarization recombination and post-selection, enabling decoy and BB84 state preparation by classical monitor measurement (Curty et al., 2011).
3. Quantum-State Characterization and Mathematical Model
In the passive regime, the quantum state produced is a mixture dictated by the fundamental unpredictability of quantum phase and photon statistics. For gain-switched-pair mapping (Kurochkin et al., 2024):
After polarization mapping, these correspond to , , , . The physical system ensures uniform phase sampling, so prior to post-selection, the mixed state is:
Monitor arm measurements select discrete “windows” on the Bloch equator (of width ), post-selecting events that closely approximate the ideal BB84 states. The single-photon post-selected density matrix has the form:
where quantifies finite window fidelity.
4. Post-Selection, Decoy-State Generation, and Security Implications
Passive transmitters substitute post-selection of classical monitor signals for explicit random number generator-driven modulation. The monitor arm records intensity and polarization angles for every emission event, binning results into acceptance regions corresponding to BB84 logical basis and (optionally) decoy-state intensity (Zapatero et al., 2022, Zapatero et al., 2023, Wang et al., 2022, Curty et al., 2011).
The protocol achieves decoy-state security by:
- Partitioning intensity measurements into signal, decoy, and vacuum bins. Jointly with polarization angle selection, this yields distinct classes without an intensity modulator.
- Finite-key security leveraging composable proofs. Statistical fluctuation bounds (e.g., Kato’s and Serfling’s inequalities) relate monitor events to underlying quantum yields and error rates, accommodating the absence of active tunability (Zapatero et al., 2023).
All key rate and security formulas strictly account for the altered photon number statistics and post-selection probabilities. For instance, in (Kurochkin et al., 2024), the SKR per signal is:
where is the single-photon yield, is the overall gain, and is the binary entropy function.
5. Experimental Performance and System Implementation
Recent prototypes have demonstrated practical transmission over metropolitan fiber links, achieving key rates suitable for key refresh in secure networks:
- Single-laser passive transmitter achieved 110 bit/s (asymptotic) over 10 km SMF at QBER ≈ 5%, with a sifted rate of 2.5 kb/s. A 1.5 MHz pulse-pair rate with μ=0.15 photons/qubit was used (Kurochkin et al., 2024).
- Heralded SPS-based passive BB84 achieved 5 kbps secure key at QBER=7% in laboratory conditions, with coincident detection protocol suppressing multi-photon contributions to (Rani et al., 2024).
- Multi-laser passive schemes reach cutoff distances of 100 km (for rounds), with passive key rates within a factor of active decoy-state benchmarks (Zapatero et al., 2023).
The experimental setups vary from single-laser polarization-maintaining fiber networks to multi-laser interferometric architectures and SPDC heralded photon sources. Common elements include variable attenuators, passive classical monitor arms, comparator-based post-selection logic, and polarization tomography stages.
6. Security Analysis and Side-Channel Immunity
Passive BB84 dramatically reduces the modulator-based side-channel attack surface:
- Absence of active modulators and external RNGs means Eve cannot probe modulator settings via Trojan-horse methods or exploit imperfections and cross-talk in fast switching electronics (Kurochkin et al., 2024, Zapatero et al., 2023, Wang et al., 2022, Rani et al., 2024).
- All quantum randomness is intrinsic (phase diffusion, optical network branching), rendering electrical or optical side-band leaks ineffective.
- Photonic monitor measurements are performed on bright classical light prior to attenuation, so no quantum information about key bits leaks.
Security proofs depend on the assumption of perfect phase randomization and trusted monitor arms; current models account for collective and coherent attacks with adversary memory restricted to classical registers controlling unitary actions per round (Zapatero et al., 2023).
7. Comparative Performance and Practical Impact
Passive BB84 transmitters match or closely approach the key rates and secure distances of active sources:
| Distance (km) | Passive BB84 () | Active ideal BB84 |
|---|---|---|
| 50 | ||
| 80 | ||
| 100 |
Rates in secret bits per pulse (Zapatero et al., 2023). In practice, post-selection reduces throughput but enables higher clock rates due to modulator-free architecture. Passive transmitters are especially suited for “last-mile” secure urban QKD and integration into measurement-device-independent QKD protocols (Kurochkin et al., 2024, Wang et al., 2022).
Passive architectures are compatible with various protocols (standard BB84, reference-frame-independent BB84, six-state QKD), and can be combined with decoy-state and MDI-QKD frameworks. For certain classes of practical SPS, passive setups may even marginally exceed the secure transmission distance of actively modulated approaches due to more favorable single-photon fidelity against multi-photon noise under post-selection (Curty et al., 2010, Rani et al., 2024).
References
- (Kurochkin et al., 2024) A practical transmitter device for passive state BB84 quantum key distribution
- (Zapatero et al., 2023) Finite-key security of passive quantum key distribution
- (Zapatero et al., 2022) A fully passive transmitter for decoy-state quantum key distribution
- (Rani et al., 2024) Passive polarization-encoded BB84 protocol using a heralded single-photon source
- (Wang et al., 2022) Fully-Passive Quantum Key Distribution
- (Curty et al., 2011) A passive transmitter for quantum key distribution with coherent light
- (Curty et al., 2010) Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals