Curator's Take
This article tackles a fascinating real-world challenge in satellite quantum key distribution by developing mathematical tools to analyze scenarios where eavesdroppers can't intercept the entire signal beam. The researchers found that while perfect single-photon BB84 doesn't benefit from these "bypass channels," practical implementations using weak laser pulses or imperfect detectors can actually achieve better security rates when some photons slip past potential eavesdroppers undetected. This work is particularly relevant as satellite QKD systems move toward deployment, since it provides a rigorous framework for calculating security guarantees when classical surveillance methods can detect large-scale interception attempts but smaller, partial eavesdropping remains possible. The numerical approach developed here could help optimize real satellite QKD systems by accounting for the unique threat models that exist in free-space quantum communications.
— Mark Eatherly
Summary
Satellite based quantum key distribution (QKD) aims to establish secure key exchange over long distances despite significant technological challenges. To alleviate some of these challenges, Ghalaii et al. [PRX Quantum 4, 040320 (2023)] proposed that any airborne eavesdropper up to a certain size can be detected by classical monitoring techniques, limiting the transmission efficiencies of any undetected Eve. This creates a new QKD scenario in which some of the transmitted signal from Alice to Bob bypasses Eve entirely. In this manuscript, we develop a general framework for computing key rates in this "bypass" scenario for discrete variable protocols. We first numerically support a conjecture that the performance of BB84 with single photons does not improve under bypass constraints, and go on to find new regimes that do. Specifically, we find improvements when the receiver's detectors have an efficiency mismatch and when BB84 is implemented using weak coherent pulses under certain squashing assumptions. Technically, our framework is realized by including marginal constraints on the source to account for bypass effects, combined with existing numerical approaches for minimizing the key rate and squashing and dimension reduction techniques to handle photonic states of unbounded dimension.