Point-to-Multipoint COW QKD Protocol
- The paper demonstrates a point-to-multipoint extension of the COW QKD protocol that enables simultaneous secret key distribution to multiple receivers using an efficient XOR key combination.
- It employs dual-SPD and dual-receiver configurations along with precise fiber-optic attenuation and optimized detector settings to enhance secret key rates while keeping QBER below 6%.
- The security analysis underscores that reducing photon intensity to around 0.2 mitigates collective beam-splitting attacks, supporting robust secure group communications.
The point-to-multipoint extension of the Coherent-One-Way (COW) Quantum Key Distribution (QKD) protocol is an experimentally validated architecture enabling a single quantum transmitter to distribute secret keys simultaneously to multiple receivers over separate channels. By leveraging component and post-processing optimizations, this protocol addresses experimental bottlenecks arising from detector limitations, while extending standard two-party QKD to a network regime suitable for secure group communication. Security analysis, implementation details, and empirical benchmarks demonstrate the protocol’s viability under realistic device constraints and collective attack models (Abhignan et al., 8 Jan 2026).
1. Fundamentals of the COW QKD Protocol
The Coherent-One-Way (COW) protocol encodes logical bits using time-bin qubits, where Alice—serving as the transmitter—sends either
or
in consecutive time bins and . With probability , Alice introduces "decoy" states to enable quantum channel monitoring. Here, is the mean photon number per pulse, and , with the system repetition rate.
After transmission, Bob(s) announce detected pulses (time bins), Alice identifies decoys, and sifting yields a sifted-basis rate (bits/s). The quantum bit error rate (QBER) is defined as
With error correction inefficiency (e.g., ), the asymptotic Devetak–Winter bound gives the secure key rate: where is the binary entropy and is the privacy amplification penalty.
2. Experimental Apparatus and Detector Enhancement
The experimental setup features a 1550.12 nm CW laser carved by an intensity modulator controlled at GHz, stabilized via a 1% bias-controller loop, and followed by two variable optical attenuators (VOA, VOA) to set . The attenuation is determined by
where is modulator output, nm.
Bob, the receiver, employs a 90:10 fiber beamsplitter (BS) to route 90% of incoming photons to the data line and 10% to a monitoring interferometer (not used for this improvement). On the data line, an additional (50:50) splitter feeds two InGaAs/InP single-photon detectors (SPDs), labeled SPD and SPD, each characterized by quantum efficiency and dead time .
Theoretical per-detector count rates (accounting for fiber loss dB/km and distance ) are given by
Factoring in detector dead time,
Experimental rates approach for a single SPD and for dual SPDs before saturation, thus the data line split between two SPDs mitigates the throughput limit imposed by detector dead time.
3. Point-to-Multipoint Network Architecture
Point-to-multipoint extension involves distributing Alice’s modulated quantum pulse train to two independent receivers (Bobs), establishing two parallel COW QKD channels. Post-attenuation, a 50:50 BS splits the modulated sequence, and each branch passes through individual attenuator chains and fiber spools of length . Synchronized by a shared FPGA clock (or calibrated with fixed delay), both Bobs maintain time alignment for coherent state detection.
Each Bob's measurement setup mirrors the single-receiver configuration: a 90:10 BS, a 50:50 splitter, and two SPDs. This two-channel extension is directly compatible with generic COW protocol deployments.
4. Secret-Key Generation and Post-Processing Workflow
The secret-key generation process for the dual-receiver architecture comprises the following steps:
- Sifting: Each Bob records counts in non-decoy time bins; decoy bins are excluded. Sifted key rate is (minus decoys).
- Error Correction: A disclosure ratio of sifted bits estimates . Error correction—via low-density parity-check codes—leaks bits.
- Privacy Amplification: With compression ratio (up to 90%), the final SKR per Bob is
- Key Combination: Alice aligns key lengths and broadcasts the XOR using one-time pad. Bob 1 can reconstruct ; Bob 2 reconstructs , and all three share of length .
- Aggregate Key Rate: Since one raw key is sacrificed by XOR, the end-user shared SKR is
5. Empirical Performance Benchmarks
Experimental benchmarking demonstrates efficiency gains from both dual-SPD and dual-Bob approaches:
| Channel Length () | (s) | 1 SPD SKR (kb/s) | 2 SPDs SKR (kb/s) | QBER (%) | |
|---|---|---|---|---|---|
| 80 km | 0.15 | 15 | 2.1 | 3.7 | 3–5 |
| 100 km | 0.20 | 20 | 1.8 | 2.9 | 4–6 |
| 120 km | – | – | – | 50–80% gain | <6 |
In the dual-Bob scenario at km:
- For , each Bob achieves SKR kb/s, QBER \%.
- For , SKR kb/s per Bob with improved QBER.
- The shared-key rate reflects ; aggregate SKR kb/s.
6. Security Analysis and Parameter Optimization
The security proof utilizes the asymptotic, collective-attack model (Devetak–Winter bound). The principal threat modeled is the collective beam-splitting attack (BSA), where Eve replaces the transmission line by a lossless channel and a beamsplitter of transmission , retaining a mode with amplitude and inter-bit overlap . The Holevo information per pulse is
and Bob’s per-pulse detection probability is . The per-pulse secure rate is
In the dual-Bob configuration, a worst-case scenario is assumed: Eve attacks both branches coherently, doubling her Holevo gain .
Optimizing is crucial: higher raises Bob’s click rate but increases , reducing long-distance security. For km in the dual-Bob scenario, offers superior security rates relative to . Detector settings (s, ) are adjusted to optimize throughput against QBER and loss constraints.
7. Conclusion and Practical Implications
By (i) splitting each data line into two SPDs to bypass detector saturation limits, and (ii) constructing a three-party shared key via the XOR of two independently generated keys, the point-to-multipoint COW QKD protocol demonstrates substantial increases in achievable secret-key rates and user scalability. Experimentally, QBER remains within the established threshold (6%), and the approach is generalizable to further COW implementations. Both empirical observation and theoretical BSA-derived limits confirm that lower values (around 0.2) are optimal under broadcast-channel and collective attack security conditions (Abhignan et al., 8 Jan 2026).