Papers
Topics
Authors
Recent
Search
2000 character limit reached

Passive BB84 Transmitter for Secure QKD

Updated 29 January 2026
  • Passive BB84 transmitters are optical devices that use intrinsic quantum randomness and post-selection techniques to generate secure qubit states without active modulation.
  • They integrate gain-switched lasers, beam splitter networks, and classical monitor arms to encode polarization states while mitigating modulator side-channel vulnerabilities.
  • Experimental results show that passive implementations achieve cost-effective, high-rate QKD over metropolitan distances with performance comparable to active systems.

A passive transmitter for the BB84 quantum key distribution protocol is an optical device that generates BB84 qubit states and (optionally) decoy-state intensities through intrinsic quantum randomness and optical post-selection, eliminating all high-speed active modulators and quantum random number generators. Its architecture combines linear optics, gain-switched or phase-randomized laser sources, and classical monitor arms to produce qubits suitable for secure QKD without externally driven switching. Passive transmitters mitigate modulator side-channels and simplify system complexity, offering a viable pathway for cost-effective, high-rate, and hardware-secure QKD deployments (Kurochkin et al., 2024, Zapatero et al., 2023, Wang et al., 2022, Rani et al., 2024, Zapatero et al., 2022, Curty et al., 2011).

1. Principles of Passive State Preparation in BB84

Passive transmitters exploit quantum or classical randomness in the physical generation of optical pulses rather than selecting basis and bit actively via RNGs and EOMs. Common methods include:

  • Gain-switched lasers, where phase diffusion during the off period randomizes the optical phase of each pulse, yielding stochastically prepared qubit states (Kurochkin et al., 2024).
  • Beam splitter networks, where the probabilistic splitting of photons and their polarization transformations encode the basis and bit passively (e.g., using half-wave plates and multiple arms) (Rani et al., 2024).
  • Post-selection via classical measurement of monitor signals (intensity, polarization, phase) to tag qubits as valid BB84 states and/or decoy settings (Zapatero et al., 2022, Curty et al., 2011).

A critical property is that no externally controlled, high-speed electro-optic switches or modulator signals touch the quantum channel, significantly reducing side-channel vulnerability.

2. Optical Architectures

Passive BB84 transmitters fall into several experimentally validated architectures:

  • Single gain-switched laser pair and fiber delay loop: A laser emits pulse pairs with randomized relative phase. Polarization mapping via a 90° rotated delay in polarization-maintaining fiber converts phase differences (Δϕ\Delta\phi) into one of {D,A,R,L}\{|D\rangle, |A\rangle, |R\rangle, |L\rangle\} (Kurochkin et al., 2024). Local tomography confirms true phase randomness via arcsine-statistics over the phase histogram.
  • Multi-laser interferometric networks: Four independent gain-switched lasers, grouped into “right-circular” and “left-circular” arms, undergo interference in symmetric and polarizing beam splitters; the combined output pulse is characterized by random intensity and polarization angles on the Bloch sphere. Attenuation and monitor arms enable both signal encoding and decoy-state selection (Zapatero et al., 2023, Zapatero et al., 2022, Wang et al., 2022).
  • Heralded single-photon sources and beam splitters: An SPDC source produces paired photons; the heralded idler is sent through a network of 50:50 beam splitters and HWPs for passive polarization encoding, generating all four BB84 states with equal probability and no active control (Rani et al., 2024).
  • Sum-frequency generation network: Two frequencies of strong coherent light (random phased) undergo interference and nonlinear mixing before polarization recombination and post-selection, enabling decoy and BB84 state preparation by classical monitor measurement (Curty et al., 2011).

3. Quantum-State Characterization and Mathematical Model

In the passive regime, the quantum state produced is a mixture dictated by the fundamental unpredictability of quantum phase and photon statistics. For gain-switched-pair mapping (Kurochkin et al., 2024):

ϕ=(a1+eiϕa2)/2vac,ϕ{0,π/2,π,3π/2}|\phi\rangle = (a_1^\dagger + e^{i\phi} a_2^\dagger)/\sqrt{2} |{\rm vac}\rangle, \quad \phi \in \{0, \pi/2, \pi, 3\pi/2\}

After polarization mapping, these correspond to D|D\rangle, A|A\rangle, R|R\rangle, L|L\rangle. The physical system ensures uniform phase sampling, so prior to post-selection, the mixed state is:

ρ=14π202πdϕ102πdϕ2 μ/2eiϕ1,μ/2eiϕ2\rho = \frac{1}{4\pi^2} \int_0^{2\pi} d\phi_1 \int_0^{2\pi} d\phi_2 \ |\sqrt{\mu/2}e^{i\phi_1}, \sqrt{\mu/2}e^{i\phi_2}\rangle\langle\dots|

Monitor arm measurements select discrete “windows” on the Bloch equator (of width δϕ\delta\phi), post-selecting events that closely approximate the ideal BB84 states. The single-photon post-selected density matrix has the form:

ρϕ0(1)=1+Δ2ϕ0ϕ0+1Δ2ϕ0+π2ϕ0+π2\rho^{(1)}_{\phi_0} = \frac{1+\Delta}{2} |\phi_0\rangle\langle\phi_0| + \frac{1-\Delta}{2} |\phi_0+\frac{\pi}{2}\rangle\langle\phi_0+\frac{\pi}{2}|

where Δ=sinδϕ/δϕ\Delta = \sin\delta\phi/\delta\phi quantifies finite window fidelity.

4. Post-Selection, Decoy-State Generation, and Security Implications

Passive transmitters substitute post-selection of classical monitor signals for explicit random number generator-driven modulation. The monitor arm records intensity and polarization angles for every emission event, binning results into acceptance regions corresponding to BB84 logical basis and (optionally) decoy-state intensity (Zapatero et al., 2022, Zapatero et al., 2023, Wang et al., 2022, Curty et al., 2011).

The protocol achieves decoy-state security by:

  • Partitioning intensity measurements into signal, decoy, and vacuum bins. Jointly with polarization angle selection, this yields distinct classes without an intensity modulator.
  • Finite-key security leveraging composable proofs. Statistical fluctuation bounds (e.g., Kato’s and Serfling’s inequalities) relate monitor events to underlying quantum yields and error rates, accommodating the absence of active tunability (Zapatero et al., 2023).

All key rate and security formulas strictly account for the altered photon number statistics and post-selection probabilities. For instance, in (Kurochkin et al., 2024), the SKR per signal is:

r=Y1[1h(QBERY1)]Qfh(QBER)r = Y_1\left[1-h\left(\frac{\rm QBER}{Y_1}\right)\right] - Qf\,h(\rm QBER)

where Y1Y_1 is the single-photon yield, QQ is the overall gain, and h()h(\cdot) is the binary entropy function.

5. Experimental Performance and System Implementation

Recent prototypes have demonstrated practical transmission over metropolitan fiber links, achieving key rates suitable for key refresh in secure networks:

  • Single-laser passive transmitter achieved 110 bit/s (asymptotic) over 10 km SMF at QBER ≈ 5%, with a sifted rate of 2.5 kb/s. A 1.5 MHz pulse-pair rate with μ=0.15 photons/qubit was used (Kurochkin et al., 2024).
  • Heralded SPS-based passive BB84 achieved 5 kbps secure key at QBER=7% in laboratory conditions, with coincident detection protocol suppressing multi-photon contributions to g(2)(0)=0.0408±0.0008g^{(2)}(0) = 0.0408\pm0.0008 (Rani et al., 2024).
  • Multi-laser passive schemes reach cutoff distances of \sim100 km (for N1012N\sim 10^{12} rounds), with passive key rates within a factor <10<10 of active decoy-state benchmarks (Zapatero et al., 2023).

The experimental setups vary from single-laser polarization-maintaining fiber networks to multi-laser interferometric architectures and SPDC heralded photon sources. Common elements include variable attenuators, passive classical monitor arms, comparator-based post-selection logic, and polarization tomography stages.

6. Security Analysis and Side-Channel Immunity

Passive BB84 dramatically reduces the modulator-based side-channel attack surface:

  • Absence of active modulators and external RNGs means Eve cannot probe modulator settings via Trojan-horse methods or exploit imperfections and cross-talk in fast switching electronics (Kurochkin et al., 2024, Zapatero et al., 2023, Wang et al., 2022, Rani et al., 2024).
  • All quantum randomness is intrinsic (phase diffusion, optical network branching), rendering electrical or optical side-band leaks ineffective.
  • Photonic monitor measurements are performed on bright classical light prior to attenuation, so no quantum information about key bits leaks.

Security proofs depend on the assumption of perfect phase randomization and trusted monitor arms; current models account for collective and coherent attacks with adversary memory restricted to classical registers controlling unitary actions per round (Zapatero et al., 2023).

7. Comparative Performance and Practical Impact

Passive BB84 transmitters match or closely approach the key rates and secure distances of active sources:

Distance (km) Passive BB84 (N=1012N=10^{12}) Active ideal BB84
50 5×1055\times10^{-5} 2×1042\times10^{-4}
80 3×1063\times10^{-6} 1×1051\times10^{-5}
100 5×1085\times10^{-8} 5×1075\times10^{-7}

Rates in secret bits per pulse (Zapatero et al., 2023). In practice, post-selection reduces throughput but enables higher clock rates due to modulator-free architecture. Passive transmitters are especially suited for “last-mile” secure urban QKD and integration into measurement-device-independent QKD protocols (Kurochkin et al., 2024, Wang et al., 2022).

Passive architectures are compatible with various protocols (standard BB84, reference-frame-independent BB84, six-state QKD), and can be combined with decoy-state and MDI-QKD frameworks. For certain classes of practical SPS, passive setups may even marginally exceed the secure transmission distance of actively modulated approaches due to more favorable single-photon fidelity against multi-photon noise under post-selection (Curty et al., 2010, Rani et al., 2024).

References

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Passive Transmitter BB84.