1. College of Electronic and Optical Engineering, & College of Flexible Electronics (Future Technology), Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2. College of Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
3. School of Physics, Hangzhou Normal University, Hangzhou 311121, China
shengyb@njupt.edu.cn
Show less
History+
Received
Accepted
Published Online
2026-03-03
2026-03-31
2026-04-24
PDF
(2401KB)
Abstract
Quantum secure direct communication (QSDC) enables the direct transmission of confidential information without pre-shared keys. However, device imperfections in practical systems can lead to information leakage. The Trojan-horse attack (THA), a stealthy side-channel threat, steals information by injecting photons into encoding devices and analyzing the reflected light. This paper focuses on the single-photon-based (DL04) protocol, establishing for the first time a comprehensive THA model against it. By combining weak coherent pulse (WCP) sources with the decoy-state method, we systematically analyze the security under THA during both the first and second rounds of transmission, derive analytical expressions for the secrecy message capacity, and quantitatively evaluate the impact of attack strength on system performance through numerical simulations. Our results demonstrate that the system’s security is highly sensitive to the average number of reflected Trojan photons, . For a first-round attack, the secrecy message capacity remains nearly identical to the attack-free case when , but drops to zero when increases to . In contrast, the second round of attacks had a weaker impact. Even at the strongest attack intensity (), the system could still maintain a certain level of secrecy message capacity. When THA simultaneously targets both the first and second rounds, the overall security of the system is predominantly governed by the more sensitive first-round attack, whose security boundary remains largely comparable to that observed in a single first-round attack scenario. Furthermore, We perform parameter optimization to achieve the optimal secrecy message capacity for each channel attenuation. Our study provides the first quantitative security bound for THA on DL04 protocol, offering practical guidance for encoder isolation requirements in future implementations.
Quantum secure direct communication (QSDC) constitutes a vital branch of quantum communication, enabling the direct transmission of confidential information without relying on pre-shared keys or complex key management infrastructures. The concept was originally introduced by Long et al. [1], and its foundational framework was further refined by Deng et al. [2]. Over the subsequent decades, QSDC has witnessed substantial theoretical progress, as evidenced by a series of influential works [3–20]. In addition, considerable developments have been made across several subfields, such as continuous-variable protocols [21–23], quantum error-correcting codes [24, 25], quantum networks [26–29], and quantum-memory-free protocols [30]. Experimentally, the field has also achieved significant milestones, including the realization of single-photon-based [31–34], entanglement-based [35, 36], and continuous-variable QSDC systems [37–39], along with advances in quantum network implementations [40, 41].
Although QSDC is theoretically absolutely secure, information leaks may occur in practical applications due to imperfect devices. Imperfect light sources and detectors, in particular, introduce vulnerabilities that eavesdroppers can exploit. In response, a range of robust protocols has been developed. Notable among these are measurement-device-independent (MDI) QSDC [42–50] and device-independent (DI) QSDC [51–55]. The former removes detector-side vulnerabilities by relaying measurements to an untrusted third party, while the latter certifies security through the violation of Bell’s inequality, thus ensuring robustness against general eavesdropping strategies. In theory, DI protocols are capable of resisting all side-channel attacks targeting implementation devices. However, such protocols currently face severe limitations in photon transmission loss and transmission distance [56, 57]. Moreover, experimental realizations of device-independent quantum key distribution (DI-QKD) were not achieved until 2022 [58–60], and experimental DI-QSDC has yet to be realized. Therefore, considering the practical complexity involved, the QSDC protocols that are currently approaching practical application are predominantly grounded in single-photon-based (DL04) protocol.
Currently, the DL04 protocol has been proven secure against photon-number-splitting (PNS) attacks and collective attacks [61–63]. However, to date, no quantitative analysis has been conducted on the security of this protocol against optical injection attacks, such as Trojan-horse attack (THA) triggered by device reflections. During the THA process, an eavesdropper injects concealed photons into the transmitting device. These photons interact with internal optical components—such as modulators or phase shifters—and are subsequently reflected out of the system. By collecting and analyzing these reflected photons, the eavesdropper can extract confidential information without triggering conventional security monitoring. Such attacks often evade detection by mimicking legitimate signal patterns, employing techniques such as collecting back-reflected light, manipulating source characteristics, or exploiting timing vulnerabilities [64–69]. In addition, THA also poses a serious threat to multi-party quantum communication, including measurement-device-independent quantum key distribution (MDI-QKD) [70], quantum secure sharing (QSS) [71], quantum conference key agreement (QCKA) [72] and quantum cryptographic conferencing (QCC) [73].
To investigate the impact of THA on QSDC systems, this paper conducted a comprehensive analysis, covering attack principles, security analysis using a weak coherent pulse (WCP) source combined with the decoy-state method, and numerical simulations. Our work aims to: (i) establish a THA model targeting the DL04 QSDC protocol; (ii) derive the secrecy message capacity under THA and extend the formulation to incorporate decoy-state analysis; and (iii) quantitatively evaluate the relationship between attack intensity and system performance through numerical simulations.
This paper is structured as follows. In Section 2, we begin with a concise overview of the DL04 protocol steps, along with Eve’s attack strategy. Subsequently, a security analysis is conducted for the first and second rounds of transmission under THA, leading to the derivation of secrecy message capacity expressions for both rounds under such attacks. Furthermore, the analysis is extended by incorporating decoy-state techniques, establishing the estimated single-photon error rate and single-photon yield. In Section 3, we perform numerical simulations to examine how THA affects the secrecy message capacity and the maximum communication distance. In Section 4, we provide a discussion of the results and summarize the conclusions.
2 Trojan horse attack on DL04 protocol
2.1 DL04 protocol
This paper presents an analysis of a THA targeting the DL04 protocol, and the corresponding system structure is illustrated in Fig. 1. We begin by outlining the DL04 protocol, which involves two parties — the sender Bob and the receiver Alice — and consists of five steps in total.
(i) Bob performs random phase encoding on the initial single-photon state , where and denote the horizontal and vertical polarization states, respectively. Subsequently, this state is processed by the encoding device, which generates four single-photon states , corresponding to with phase values . The basis comprises the states ; the basis is defined as . Then, Bob sends these encoded single photons to Alice.
(ii) Upon receiving the photons, Alice randomly selects a subset of them as samples for an eavesdropping check. For each sampled photon, she randomly selects a measurement basis ( or ), performs the measurement, and then announces the photon’s position, her chosen basis, and the measurement outcome. Using an authenticated classical channel, Alice and Bob compare their results to estimate the detection bit error rate (DBER).
(iii) If the DBER remains below a pre-agreed threshold, Alice proceeds with the following steps. First, she randomly selects a subset of the received photons for random encoding, which is a process used for error estimation. Subsequently, she performs information encoding on the remaining photons. Specifically, Alice applies a operation to , where the phase value is chosen from the set to encode a secret information bit: corresponds to bit 0, and corresponds to bit 1. Then, Alice returns the encoded sequence of photons to Bob.
(iv) Bob receives and stores the photon sequence. Subsequently, Alice announces the position of the randomly encoded photon within the sequence. Bob then randomly selects either the basis or the basis for measurement. After the measurement succeeds, Alice announces the specific details of the random encoding performed in Step 3. Then, Bob extracts these designated photons to perform the second round of security testing and compute the quantum bit error rate (QBER).
(v) Upon successful completion of the second security check, Bob infers Alice’s encoded information based on his initial state information and the decoded information.
2.2 Attack strategy
As shown in Fig. 1, for Eve, she has two opportunities to execute THA, including attacking on both the first-round transmission and the second-round transmission.
During the first-round transmission, Eve can execute the THA. Specifically, during Step 1 of the protocol, she injects a bright pulse of Trojan photons (, prepared as coherent states ) into Bob’s encoding device to probe the secret phase . These externally injected photons co-propagate with Bob’s own single-photon signal and experience the same phase modulation. Due to the reflectivity of the encoding device, a fraction of the modulated Trojan photons (, where and quantifies the optical isolation of the encoding device) is reflected out of the encoder. By collecting and analyzing the phase of these reflected photons, Eve can influence the results of basis selection measurements, causing Alice’s basis selection measurements to deviate, thereby affecting the error rate and leading Alice to underestimate the error rate. By combining collective attacks, Eve can obtain more information.
During the second-round transmission, Eve executes THA by sending a large number of Trojan photons to Alice’s encoding device in the third step. After undergoing encoding operations, some Trojan photons are similarly reflected outward due to the reflection mechanism. Eve gathers these reflected photons (when is 0 or , it corresponds to the values +1 and −1, respectively). Therefore, Eve can use appropriate measurements to distinguish between the resulting coherent states and . This allows her to gain access to the encoded information.
2.3 Security analysis
In this section, we analyze the secrecy message capacity of the protocol under Eve’s attacks during the first and second rounds of transmission.
2.3.1 First-round transmission
In the first round, Eve inputs Trojan photons into Bob’s encoding device. Then, these photons undergo the same phase encoding as the initial state . After performing the encoding operation, the encoded Trojan photons become coupled with the four single-photon states generated by Bob’s encoding, the portion of reflected photons collected by Eve can be expressed as tensor products:
where is the average number of reflected photons from Bob’s encoding device. The subscript indicates that the quantum state belongs to Bob and Eve.
First, the original DL04 protocol secrecy message capacity formula can be expressed as [8]
where is the overall signal gain of Bob after a round-trip BAB, and is the QBER. denotes the gain of -photon events from Eve. and are the single-photon error rates under the basis and basis, respectively. Similarly, and are the two photon error rates under the basis and basis, respectively. is the binary entropy function, which is defined as .
Additionally, since the two-photon component contributes less to the protocol, we cite the simplified formula in Ref. [9] to analyze the secrecy message capacity of the protocol, which can be represented as follows:
Since THA causes measurement inaccuracies in the protocol, it leads to deviations in Alice’s basis selection, thereby affecting the single-photon error rate. Therefore, the secrecy message capacity formula for the DL04 protocol after suffering a THA is
The term () is the single-photon error rate estimated in a virtual protocol, where Alice measures in the basis and Bob announces the basis, defined as [76]
where , and are the single-photon yields in the and basis, respectively. In practice, Bob selects either the basis or basis with equal probability when encoding single photons. When subjected to a THA at Bob’s end, this equilibrium is disrupted. Therefore, we utilize the “quantum coin” [76] to quantify the severity of the attack. Since quantum coins are affected by the actual yield obtained from the or basis, the communicating parties must accordingly renormalize to , referred to as the effective coin imbalance (see Appendix B for details).
2.3.2 Second-round transmission
In the second transmission round, Eve inputs Trojan photons into Alice’s encoding device. Then, Alice performs encoding operations, which involve applying an operation to . When is 0, the phase remains unchanged, equivalent to an operation; when is , the phase is inverted, equivalent to a operation. Therefore, the output from Alice’s encoding device can be represented as
The subscripts and indicate that the reflected photons belong to Alice and Eve, respectively. After Eve performs the THA operation in the second round, since Alice’s encoding operation is state-independent, Eve’s system becomes independent from both Alice’s and Bob’s systems. This means Eve’s attack will not cause any errors. In this scenario, Eve’s eavesdropping remains undetected by Alice and Bob, and she merely needs to discriminate between the two coherent states and , to obtain the encoded bit information from Alice’s end.
The information entropy accessible to Eve can be determined from the eigenvalues of the corresponding Gram matrix [74]. For the states under consideration, the Gram matrix is given as follows:
The eigenvalues of the Gram matrix are and . Then, the amount of information leakage caused by Eve executing THA in the second round is expressed as .
Therefore, the secrecy message capacity formula for Eve after performing THA only on the second round of transmission can be expressed as
where denotes the gain when Eve intercepts the photon and Alice completes the encoding operation.
2.3.3 Two-round transmission
Considering the worst-case scenario, we assume that the information obtained from the first round of attacks and the second round of attacks is non-overlapping. Attacking with both rounds can be regarded as the cumulative effect of the first and second rounds of attacks. Therefore, when Eve performs THA during both the first and second rounds, the secrecy message capacity for the QSDC system is derived from Eqs. (4) and (7) as follows:
2.4 Decoy-state method
In this section, we estimated the single-photon error rate for the first round and the second round using the decoy-state method.
In this paper, we assume that the single-photon error rates under the basis and basis are equal, i.e., . The use of the decoy-state method in QSDC can effectively defend against PNS attacks and collective attacks. In here, we employ four decoy states with intensities , , , and (where denotes the signal-state intensity). The upper bounds of single photon DBER are given by [8]
where
In addition, the signal state and decoy state intensity we utilize must also satisfy the following conditions:
3 Numerical simulation
In numerical simulations, based on the inequality conditions in Eq. (12), we set the strength of the decoy state as: , , and . The parameters in Table 1 are primarily used for numerical simulations [8].
Figure 2(a) illustrates the secrecy message capacity during the first round of the THA attack. It is worth noting that the secrecy message capacity corresponding to the value of remains indistinguishable from the no attack case () over almost the entire range of transmission. In addition, we note that when increases to , the secrecy message is still all stolen by Eve, i.e., the secrecy message capacity vanishes entirely. Finally, when the attack intensity is applied, the maximum secrecy message capacity achievable is bit/pulse, with a maximum secure communication distance of 6.97 km.
Figure 2(b) illustrates the secrecy message capacity during the second round of the THA attack. As shown in Fig. 2(b), we observe that for an average reflected photon number reaches the magnitude of , the secrecy message capacity remains nearly indistinguishable from the unattacked case over almost the entire transmission distance. Compared with Fig. 2(a), when is uniformly set to , the system can still achieve a maximum secrecy message capacity of bit/pulse and a maximum secure communication distance of 16.68 km. Unlike the scenario where the THA targets only the first round, selecting the maximum attack strength allows the system to attain a maximum secrecy message capacity of bit/pulse and a maximum secure communication distance of 9.18 km. These results collectively indicate that confining the THA to the second transmission round substantially reduces its effectiveness relative to an attack launched solely in the first round. From a physical standpoint, this is because Eve’s attack in the first round affects Bob’s quantum state, and by combining it with a coherent attack, she can obtain a greater amount of information. But when Eve conducts a THA during the second transmission round, although her activities remain undetectable to the legitimate parties, she can only extract information by distinguishing among a constrained number of reflected photons. Consequently, the amount of information she acquires is substantially reduced compared to an attack mounted in the first round.
Figure 3(a) illustrates the secrecy message capacity of the first round of the THA attack after numerical optimization. There is a trade-off between the total gain and the error rate . A larger increases the probability of photon reception, thereby improving the response rate; however, it also increases the multiphoton component, leading to more information leakage to Eve. These two influences contribute positively and negatively to the secrecy message capacity, and our so-called numerical optimization is to find an appropriate value of in the channel attenuation such that the equilibrium point between the two effects can be achieved at a specific . As shown in Fig. 3(a), when the attack is relatively weak, the impact is minimal. For instance, when and , at a channel attenuation of 6 dB, the message capacities are bit/pulse and bit/pulse, respectively, with maximum communication distances of 17.80 km and 17.46 km. For comparison, when , the secrecy message capacity is bit/pulse, and the maximum communication distance is 17.96 km. As attack intensity gradually increases, both secrecy message capacity and maximum communication distance decrease accordingly. For example, at an attack intensity of and , the secrecy message capacities at a channel attenuation of 5 dB are bit/pulse and bit/pulse, respectively, with maximum communication distances of 13.71 km and 16.46 km. Notably, when the attack strength increases again to the magnitude, the secrecy message is still all stolen by Eve, i.e., the secrecy message capacity is always zero.
Figure 3(b) illustrates the secrecy message capacity of the second round of the THA attack after numerical optimization. Numerical simulation results indicate that when is set to and under a 7 dB channel attenuation, the secrecy message capacities are and bit/pulse, respectively. With maximum communication distances of 17.80 and 17.63 km, respectively. Therefore, we conclude that when attack intensity is low, the impact is minimal. However, as attack intensity increases, the resulting impact grows rapidly. When attack intensity reaches , the maximum secrecy message capacity is bit/pulse, and the maximum secure communication distance reaches 9.85 km.
Figure 4 illustrates the secrecy message capacity of the THA attack over two rounds under finite decoy states and infinite decoy states following numerical optimization. Here, we employ Eqs. (A3) and (A7) to calculate the error rate and yield under the theoretical model, respectively. The values calculated by this theoretical model are equivalent to those computed under conditions of infinite decoy states. Provided that the stolen secrecy message is non-repeating, Fig. 4 can be regarded as a simple accumulation of Figs. 3(a) and (b). For example, when , at a channel attenuation of 6 dB, the secrecy message capacity under finite and infinite decoy-state conditions is bit/pulse and bit/pulse, respectively, with maximum communication distances of 17.32 km. As attack intensity gradually increases, both secrecy message capacity and maximum communication distance decrease accordingly. For example, at an attack intensity of , the secrecy message capacities at a channel attenuation of 5 dB are bit/pulse and bit/pulse, respectively, with maximum communication distances of 16.32 km. Similar to Fig. 3(a), when the attack intensity increases again to , the secrecy message capacity is zero. In summary, under infinite decoy states, the secrecy message capacity is slightly higher than under finite decoy states, while the maximum secure communication distance remains consistent.
4 Discussion and conclusion
In this work, we have presented a comprehensive security analysis of THA on the DL04 protocol. By developing a detailed threat model and combining WCP source with the decoy-state method, we derived analytical expressions for the secrecy message capacity under attacks targeting the first round, the second round. Our numerical simulations are based on practical experimental parameters and are visualized in Figs. (2), (3) and (4). They yield several key, quantifiable insights into the system’s security.
First, the system’s security is highly sensitive to the average number of reflected Trojan photons, . We identify a critical boundary: In the first round, for , the secrecy message capacity and maximum communication distance remain nearly identical to the attack-free case (). In contrast, when increases to , the secrecy message capacity drops to zero, indicating compromised security. This threshold underscores the necessity of stringent optical isolation in encoder design to suppress below . In the second round, when , the secrecy message capacity and maximum communication distance are nearly identical to those under no attack conditions. Therefore, this threshold range slightly reduces the requirements for optical isolators.
Second, we reveal a pronounced and operationally significant asymmetry in vulnerability between the two transmission rounds. Figure 2 provides a direct comparison: a first-round attack at strongest () nullifies the secrecy message capacity [Fig. 2(a)], whereas a second-round attack at the same intensity still supports a maximum secrecy message capacity of bit/pulse and extends the maximum secure distance to 9.18 km [Fig. 2(b)]. This stark contrast arises from a fundamental difference in Eve’s information-gain mechanism. During a first-round attack, she influences the quantum state and matches collective attacks to obtain more information. Consequently, this significantly compromises security. In the second round, she could theoretically steal more information undetected. However, in practice, she can only obtain information by distinguishing a limited number of reflected photons, resulting in substantially less information compared to the first round.
Finally, Fig. 3 demonstrates the practical value of numerical optimization for the system. Figure 4 illustrates the secrecy message capacity of the THA attack over two rounds under finite decoy states and infinite decoy states following numerical optimization. By strategically adjusting the signal strength according to channel attenuation, we can balance the trade-off between higher photon reception probability and increased multi-photon leakage. Figure 3(a) shows that optimization recovers performance even under moderate attack strength (e.g., achieving bit/pulse at 5 dB for ). By comparison, Fig. 3(b) shows that when attack strength is , a performance of bit/pulse can still be achieved at 7 dB. Therefore, the second round of attacks has a relatively minor impact on the protocol’s secrecy message capacity. The values in Fig. 4 can be regarded as a simple summation of those in Figs. 3(a) and (b). Numerical simulations show that when , the secrecy message capacity becomes zero under 3 dB channel attenuation conditions. This result further demonstrates that when THA attacks both the first and second transmission rounds, the first round of attacks is dominant.
Our results bridge a critical gap in QSDC security analysis, as prior work on THA has focused primarily on QKD [64–67]. Unlike QKD, where THA targets detector vulnerabilities, QSDC’s direct encoding of the secrecy message into quantum states makes it uniquely susceptible to phase leakage via reflected photons. This distinction underscores the necessity of tailored security frameworks for QSDC, such as the one presented here. Our research findings provide guidance on safety boundaries for practical system design.
As captured by Eq. (1) and Eq. (6), the overall effect of the THA is fully characterized by the parameter . Therefore, the derived secrecy message capacity holds for any QSDC system that enforces a strict upper bound on the number of Trojan photons reflected back to Eve at the transmitter. Traditionally, to prevent THA attacks at their source, typical countermeasures include the use of optical isolators or optical power limiters [77, 78]. These components significantly attenuate externally injected optical signals, thereby reducing the effectiveness of such attacks. However, recent studies indicate that under high power optical illumination, the attenuation of optical attenuators and the isolation of optical isolators degrade, potentially allowing Eve to resume light injection attacks [79]. When combined with THA, this compromises the security of QSDC systems. Fortunately, significant advances have been made in THA defense strategies. For example, in 2022, Chen et al. [80] employed reference technology to enhance the security of four-phase MDI-QKD protocols under imperfect real-world light sources. By constructing a reference state representation, this method systematically characterizes and quantifies potential vulnerabilities such as light source preparation defects, mode-dependent side channels, pulse correlations, and THA, correlating these parameters with experimentally measurable data. In 2026, Chen et al. [81] proposed and experimentally verified an improved coherent one-way quantum key distribution (COW-QKD) protocol. By employing quantum state modulation using only vacuum and coherent states, this method avoids potential side-channel leaks caused by imperfections in light sources, a common issue in traditional decoy-state protocols. In addition, Wei et al. [82] proposed a numerical method to enhance the security boundary of decoy-state QKD systems under THA. Lastly, fully passive QSDC protocols [83] — which avoid active modulation of quantum states — offer a promising approach to mitigate side-channel risks introduced by THA. In terms of experiments, Avesani et al. [84] developed a polarization encoder capable of producing predefined polarization states with a fixed reference frame in free space, achieving long-term stability without requiring calibration at either the transmitter or receiver. Building on this work, Toni et al. [85] introduced an adaptive countermeasure that utilizes such a polarization encoder to effectively suppress THA. In practice, these methods intrinsically suppress the value of , and when combined with decoy-state techniques, they collectively improve the practical security of the system. This direction aligns with recent progress in passive quantum communication protocols [86–92], reflecting a growing research focus on achieving robust, device-agnostic security.
It should be noted that our analytical framework is not directly applicable to other types of quantum communication protocols without modification. For example, the MDI-QSDC protocol introduces additional complexity due to its reliance on untrusted third parties and a measurement-device-agnostic architecture. In such a setting, THA may target not only the encoding devices of the legitimate users but also the measurement stations. Although the current model does not extend straightforwardly to the measurement side, the core methodology — bounding information leakage via reflected photons from the encoding module — remains transferable. Specifically, by examining the encoding operations of both Alice and Bob, as well as the characteristics of the corresponding reflected optical signals, analogous adaptation strategies can be developed. Hence, future work could aim to generalize this framework to accommodate MDI-QSDC systems.
Notably, our security analysis is based on asymptotic assumptions, whereas practical systems must account for finite-key effects. Therefore, our results should be regarded as upper bounds on performance under ideal conditions. A more comprehensive finite-key analysis will be addressed in future research. We plan to address this limitation in future work by incorporating finite-key effects into the security model [93, 94]. This will enable us to derive more precise estimates of the secrecy message capacity and security thresholds, thereby providing more practical guidance for selecting experimental parameters.
5 Appendix A: System model
To analyze the security of QSDC systems under THA, we establish a comprehensive system model encompassing the light source, quantum channel, and detection components, with key parameters defined as follows.
The transmission efficiency of the quantum channel is characterized by signal attenuation, expressed as
where denotes the quantum channel losses and , where denotes the initial transmission path and denotes the two-way path (Bob Alice Bob) involving round-trip photon transmission.
The total transmission efficiency, accounting for both channel loss and device imperfections, is
where are the specific device’s inherent optical losses and denotes the detection efficiency associated with either Alice or Bob, i.e., .
The channel’s yield and gain are determined to ascertain the secrecy message capacity. The yields of -photon signals at the locations of Alice and Bob, respectively, can be represented as and , which can be expressed as
where is the zero-photon yield. means that all photons are lost during quantum channel transmission and no dark count occurs.
We can ascertain the overall signal gain and error rate by developing the aforementioned channel model. The overall signal gain can be expressed as follows:
where is the Poisson distribution of photon numbers with average , and are the -photon signal gain at Alice or Bob.
According to Ref. [8], the total signal gain of Eve can be computed as follows:
where represents the total transmission efficiency of the information that Eve acquires after Alice receives and encodes the photon, and symbolizes the total transmission efficiency of the photon that Alice receives and measures. Similarly, we can calculate the error rate of our QSDC protocol as follows:
Here, we construct the error model as
where is the error rate resulting from dark counts, and is the detector error response rate. is assumed to be 0.5, which means when no photons arrive, one of the two detectors may produce an erroneous reading due to dark counting, with a probability of 0.5.
6 Appendix B: Rate equations for Trojan horse attack on QSDC
Here, we employ entanglement-based quantum state preparation [76]. The states to be prepared are given in Eq. (1). We rewrite them here for convenience:
The basis states can be prepared by Bob by measuring in the basis the following entangled state:
The basis states of Eq. (B1) can be prepared by Bob by measuring in the basis the following entangled state:
where the states and are hard to distinguish when . Using
we find
When , the inner product of and approaches 1. This implies that the states and largely overlap. Consequently, it becomes difficult to distinguish whether the emitted state originated from the choice of the X basis or the Y basis. Meanwhile, since the attack analysis considers the single-photon scenario, we consider the worst-case scenario, i.e., two-photon and above information leakage is taken as 1. Therefore, the secrecy message capacity for the DL04 protocol using or basis random preparation would be [9]
where is the overall signal gain of Bob after a round-trip BAB. is the QBER. denotes the gain of -photon events from Eve. The terms and denote the single-photon error rates under the basis and basis, respectively.
In our worst-case scenario analysis, we attribute full information leakage () to multi-photon events (). This is a standard and conservative approach in quantum cryptography, justified by the PNS attack, where Eve can perfectly split off and store one photon from a multi-photon pulse without introducing detectable loss. While this might overestimate Eve’s actual information gain, it ensures the unconditional security of the remaining secrecy message capacity.
When the preparation is not perfect, the states and will become basically distinguishable, and the above secrecy message capacity formula needs to be replaced by the following:
where the term () is the single-photon error rate, where Alice chooses -based measurements while Bob declares basis (or Alice chooses basis measurements while Bob declares basis). In other words, the terms and are upper bounds on the single-photon error rate.
To find the relationship between the upper limit of the single-photon error rate and , we can assume that Bob owns a private bidimensional quantum system, the “quantum coin” [76], and prepares the following state:
where the subscript denotes the quantum coin. and denote the two quantum states prepared in the basis, respectively. Bob can then prepare the states in Eq. (B1) by first measuring the quantum coins in the basis of , and then based on the results of the measurements of the states or obtained by measuring them based on or , respectively.
To quantify how Bob’s emitted state depends on the basis choice, we examine the imbalance of the quantum coin. First, we rewrite Eq. (B9) in the basis:
In addition, we also need to evaluate the probability that two states and are different. A useful way to do this is to consider what would happen if Bob measured each of his coins based on the eigenstates rather than the eigenstates; the result (associated with the state ) would then occur with probability that
It should be emphasized that quantifies the degree of leakage of the “basis correlation” at the source end, and Eve exploits this correlation to enhance the efficiency of her attacks.
By combining Eq. (B5), we can further derive the probability of [75]
We can find that when , , the quantum state emitted by Bob is independent of the basis. However, when , is positive, and the quantum state carries some basis information out of Bob’s device. Eve can utilize some basic information to enhance her attack strategy. Specifically, since not all signals from the source are necessarily detected, Eve can replace the actual channel with a lossless one. Then, it will selectively drop some states that are unfavorable until the loss rates measured by both communicating parties match. To account for this possibility, we must consider the worst-case scenario in which all undetected events come from the eigenstates of the quantum coin, and adjust accordingly:
where , and denote the single-photon yields measured under the basis and basis, respectively. The relationship between the estimated upper limit of the single-photon error rate, , and the theoretical single-photon error rate, , can be obtained by utilizing the Bloch sphere bound [95] and the effective coin imbalance .
We now introduce the relevant mathematical objects. Let and denote the density matrices of the and basis states, respectively, when preparation errors are taken into account. Let represent a POVM set [96]. The fidelity between these two density operators, which relates to the statistical overlap of measurements, satisfies the following inequality:
We make the following assumptions for our security analysis. For each signal state that Bob sends: If Bob announces the X basis, the joint state of his qubit and the bosonic mode is . If Bob announces the Y basis, the joint state is . Alice’s detection efficiency is independent of the basis choice. Under these conditions, let and denote the measurement probabilities corresponding to the joint states and , respectively. In addition, there are three kinds of results in the POVM set: one is to output “Uncertain” when Alice’s measurement result is uncertain; the other is to output “Consistent” when Alice utilizes basis to make a measurement and the result is certain and consistent with Bob’s basis result; the other is to output “Consistent” when Alice utilizes basis to make a measurement and the result is certain and consistent with Bob’s basis result. Third, when Alice’s basis measurement result is certain, but the result is consistent with Bob’s basis measurement result, the output is “consistent”. When Alice’s basis measurement result is certain but inconsistent with Bob’s basis measurement result, the output is “inconsistent”. Then inequality (B14) is further written as
For fixed values of , the right-hand side of the inequality obtains its maximum value when . Thus, defining further yields
Note that Eve’s attack does not increase the distinguishability of and , so we have
where quantifies the dependence of Bob’s sending signaling state on the basis. By combining Eq. (B13), Eq. (B16) and Eq. (B17) can be obtained:
If further using the Cauchy−Schwartz inequality [97], the upper bound for can be estimated as
G. L. Long and X. S. Liu, Theoretically efficient high-capacity quantum-key-distribution scheme, Phys. Rev. A65(3), 032302 (2002)
[2]
F. G. Deng, G. L. Long, and X. S. Liu, Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block, Phys. Rev. A68(4), 042317 (2003)
[3]
F. G. Deng and G. L. Long, Secure direct communication with a quantum one-time pad, Phys. Rev. A69(5), 052319 (2004)
[4]
C. Wang, F. G. Deng, Y. S. Li, X. S. Liu, and G. L. Long, Quantum secure direct communication with high-dimension quantum superdense coding, Phys. Rev. A71(4), 044305 (2005)
[5]
C. Wang, F. G. Deng, and G. L. Long, Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state, Opt. Commun.253(1–3), 15 (2005)
[6]
X. F. Zou and D. W. Qiu, Three-step semiquantum secure direct communication protocol, Sci. China Phys. Mech. Astron.57(9), 1696 (2014)
[7]
T. Li and G. L. Long, Quantum secure direct communication based on single-photon Bell-state measurement, New J. Phys.22(6), 063017 (2020)
[8]
D. Pan, Z. S. Lin, J. W. Wu, H. R. Zhang, Z. Sun, D. Ruan, L. G. Yin, and G. L. Long, Experimental free-space quantum secure direct communication and its security analysis, Photon. Res.8(9), 1522 (2020)
[9]
X. Liu, Z. J. Li, D. Luo, C. F. Huang, D. Ma, M. M. Geng, J. W. Wang, Z. R. Zhang, and K. J. Wei, Practical decoy-state quantum secure direct communication, Sci. China Phys. Mech. Astron.64(12), 120311 (2021)
[10]
G. L. Long and H. Zhang, Drastic increase of channel capacity in quantum secure direct communication using masking, Sci. Bull. (Beijing)66(13), 1267 (2021)
[11]
Y. B. Sheng, L. Zhou, and G. L. Long, One-step quantum secure direct communication, Sci. Bull. (Beijing)67(4), 367 (2022)
[12]
Y. X. Xiao, L. Zhou, W. Zhong, M. M. Du, and Y. B. Sheng, The hyperentanglement-based quantum secure direct communication protocol with single-photon measurement, Quantum Inform. Process.22(9), 339 (2023)
[13]
J. F. Liu, X. F. Zou, X. Wang, Y. Chen, Z. B. Rong, Z. M. Huang, S. G. Zheng, X. Y. Liang, and J. X. Wu, Discussion on the initial states of controlled bidirectional quantum secure direct communication, Quantum Inform. Process.22(12), 426 (2023)
[14]
K. X. Liang, Z. W. Cao, X. L. Chen, L. Wang, G. Chai, and J. Y. Peng, A quantum secure direct communication scheme based on intermediate-basis, Front. Phys. (Beijing)18(5), 51301 (2023)
[15]
D. Pan, G. L. Long, L. G. Yin, Y. B. Sheng, D. Ruan, S. X. Ng, J. H. Lu, and L. Hanzo, The evolution of quantum secure direct communication: On the road to the qinternet, IEEE Commun. Surv. Tutor.26(3), 1898 (2024)
[16]
Q. Zhang, M. M. Du, W. Zhong, Y. B. Sheng, and L. Zhou, Single-photon based three-party quantum secure direct communication with identity authentication, Ann. Phys. (Berlin)536, 2300407 (2024)
[17]
X. F. Zou, X. Wang, S. G. Zheng, Z. B. Rong, Z. M. Huang, Y. Chen, J. F. Liu, X. Y. Liang, and J. X. Wu, Problems of a quantum secure direct communication scheme based on intermediate-basis, Quantum Inform. Process.23(6), 218 (2024)
[18]
P. Zhao, W. Zhong, M. M. Du, X. Y. Li, L. Zhou, and Y. B. Sheng, Quantum secure direct communication with hybrid entanglement, Front. Phys. (Beijing)19(5), 51201 (2024)
[19]
C. Liu, C. Zhang, S. P. Gu, X. F. Wang, L. Zhou, and Y. B. Sheng, Receiver-device-independent quantum secure direct communication, Sci. China Phys. Mech. Astron.68(5), 250311 (2025)
[20]
L. Wang, G. Chai, Z. W. Cao, and X. L. Chen, Highly reliable quantum secure direct communication based on concatenated GKP- QLDPC codes, Sci. China Inf. Sci. (2026)
[21]
G. Chai, Z. W. Cao, W. Q. Liu, M. H. Zhang, K. X. Liang, and J. Y. Peng, Novel continuous-variable quantum secure direct communication and its security analysis, Laser Phys. Lett.16(9), 095207 (2019)
[22]
Z. W. Cao, L. Wang, K. X. Liang, G. Chai, and J. Y. Peng, Continuous-variable quantum secure direct communication based on Gaussian mapping, Phys. Rev. Appl.16(2), 024012 (2021)
[23]
Z. Y. Zuo, Z. T. Liang, N. Y. Mao, Y. J. Wang, and Y. Guo, Continuous-variable quantum secure direct communication against dual-sequence Gaussian attacks with quantum memory, Sci. China Phys. Mech. Astron.69(4), 240314 (2026)
[24]
K. Wen and G. L. Long, One-party quantum-error-correcting codes for unbalanced errors: principles and application to quantum dense coding and quantum secure direct communication, Int. J. Quant. Inf.8(4), 697 (2010)
[25]
C. W. Ding, W. Y. Wang, W. D. Zhang, L. Zhou, and Y. B. Sheng, Quantum secure direct communication based on quantum error correction code, Appl. Phys. Lett.126(2), 024002 (2025)
[26]
F. G. Deng, X. H. Li, C. Y. Li, P. Zhou, and H. Y. Zhou, Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs, Phys. Lett. A359(5), 359 (2006)
[27]
F. G. Deng, X. H. Li, C. Y. Li, P. Zhou, and H. Y. Zhou, Quantum secure direct communication network with superdense coding and decoy photons, Phys. Scr.76(1), 25 (2007)
[28]
L. H. Gong, Y. Liu, and N. R. Zhou, Novel quantum virtual private network scheme for PON via quantum secure direct communication, Int. J. Theor. Phys.52(9), 3260 (2013)
[29]
C. Shukla, J. ur Rehman, and S. Chatzinotas, Quantum network applications in 6G paradigm, AAPPS Bull.35(1), 28 (2025)
[30]
Z. Sun, L. Y. Song, Q. Huang, L. G. Yin, G. L. Long, J. H. Lu, and L. Hanzo, Toward practical quantum secure direct communication: A quantum-memory-free protocol and code design, IEEE Trans. Commun.68(9), 5778 (2020)
[31]
J. Y. Hu, B. Yu, M. Y. Jing, L. T. Xiao, S. T. Jia, G. Q. Qin, and G. L. Long, Experimental quantum secure direct communication with single photons, Light Sci. Appl.5(9), e16144 (2016)
[32]
H. R. Zhang, Z. Sun, R. Y. Qi, L. G. Yin, G. L. Long, and J. H. Lu, Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states, Light Sci. Appl.11(1), 83 (2022)
[33]
X. Liu, D. Luo, G. S. Lin, Z. H. Chen, C. F. Huang, S. Z. Li, C. X. Zhang, Z. R. Zhang, and K. J. Wei, Fiber-based quantum secure direct communication without active polarization compensation, Sci. China Phys. Mech. Astron.65(12), 120311 (2022)
[34]
D. Pan, Y. C. Liu, P. H. Niu, H. R. Zhang, F. H. Zhang, M. Wang, X. T. Song, X. W. Chen, C. Zheng, and G. L. Long, Simultaneous transmission of information and key exchange using the same photonic quantum states, Sci. Adv.11(8), eadt4627 (2025)
[35]
F. Zhu, W. Zhang, Y. B. Sheng, and Y. D. Huang, Experimental long distance quantum secure direct communication, Sci. Bull. (Beijing)62(22), 1519 (2017)
[36]
W. Zhang, D. S. Ding, Y. B. Sheng, L. Zhou, B. S. Shi, and G. C. Guo, Quantum secure direct communication with quantum memory, Phys. Rev. Lett.118(22), 220501 (2017)
[37]
Z. W. Cao, Y. Lu, G. Chai, H. Yu, and K. X. Liang, Realization of quantum secure direct communication with continuous variable, Research6, 0193 (2023)
[38]
I. Paparelle, F. Mousavi, F. Scazza, A. Bassi, M. Paris, and A. Zavatta, Experimental direct quantum communication with squeezed states, Opt. Express33(14), 28917 (2025)
[39]
L. Wang, G. Chai, Z. W. Cao, X. L. Chen, K. X. Liang, and J. Y. Peng, Quantum purification for coherent states and its application, Sci. China Phys. Mech. Astron.68(2), 220313 (2025)
[40]
Z. T. Qi, Y. H. Li, W. Y. Huang, J. Feng, Y. L. Zheng, and X. F. Chen, A 15-user quantum secure direct communication network, Light Sci. Appl.10(1), 183 (2021)
[41]
Y. L. Yang, Y. H. Li, H. Li, C. N. Wu, Y. L. Zheng, and X. F. Chen, A 300-km fully-connected quantum secure direct communication network, Sci. Bull. (Beijing)70(9), 1445 (2025)
[42]
P. H. Niu, Z. R. Zhou, Z. S. Lin, Y. B. Sheng, L. G. Yin, and G. L. Long, Measurement-device-independent quantum communication without encryption, Sci. Bull. (Beijing)63(20), 1345 (2018)
[43]
Z. Gao, T. Li, and Z. Li, Long-distance measurement-device-independent quantum secure direct communication, Europhys. Lett.125(4), 40004 (2019)
[44]
Z. R. Zhou, Y. B. Sheng, P. H. Niu, L. G. Yin, G. L. Long, and L. Hanzo, Measurement-device-independent quantum secure direct communication, Sci. China Phys. Mech. Astron.63(3), 230362 (2020)
[45]
Z. K. Zou, L. Zhou, W. Zhong, and Y. B. Sheng, Measurement-device-independent quantum secure direct communication of multiple degrees of freedom of a single photon, Europhys. Lett.131(4), 40005 (2020)
[46]
X. D. Wu, L. Zhou, W. Zhong, and Y. B. Sheng, High-capacity measurement-device-independent quantum secure direct communication, Quantum Inform. Process.19(10), 354 (2020)
[47]
J. W. Ying, L. Zhou, W. Zhong, and Y. B. Sheng, Measurement-device-independent one-step quantum secure direct communication, Chin. Phys. B31(12), 120303 (2022)
[48]
Y. P. Hong, L. Zhou, W. Zhong, and Y. B. Sheng, Measurement-device-independent three-party quantum secure direct communication, Quantum Inform. Process.22(2), 111 (2023)
[49]
J. F. Liu, X. F. Zou, X. Wang, Y. Chen, Z. B. Rong, Z. M. Huang, S. G. Zheng, X. Y. Liang, and J. X. Wu, Applying a class of general maximally entangled states in measurement-device-independent quantum secure direct communication, Phys. Rev. Appl.21(4), 044010 (2024)
[50]
C. Zhang, L. Zhou, W. Zhong, M. M. Du, and Y. B. Sheng, Measurement-device-independent quantum dialogue based on entanglement swapping and phase encoding, Quantum Inform. Process.23(2), 52 (2024)
[51]
L. Zhou, Y. B. Sheng, and G. L. Long, Device-independent quantum secure direct communication against collective attacks, Sci. Bull. (Beijing)65(1), 12 (2020)
[52]
L. Zhou and Y. B. Sheng, One-step device-independent quantum secure direct communication, Sci. China Phys. Mech. Astron.65(5), 250311 (2022)
[53]
L. Zhou, B. W. Xu, W. Zhong, and Y. B. Sheng, Device-independent quantum secure direct communication with single-photon sources, Phys. Rev. Appl.19(1), 014036 (2023)
[54]
P. Roy, S. Bera, S. Gupta, and A. S. Majumdar, Device-independent quantum secure direct communication under non-Markovian quantum channels, Quantum Inform. Process.23(5), 170 (2024)
[55]
H. Zeng, M. M. Du, W. Zhong, L. Zhou, and Y. B. Sheng, High-capacity device-independent quantum secure direct communication based on hyper-encoding, Fundam. Res. (Beijing)4(4), 851 (2024)
[56]
A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Device independent security of quantum cryptography against collective attacks, Phys. Rev. Lett.98(23), 230501 (2007)
[57]
S. Pironio, A. Acín, N. Brunner, N. Gisin, S. Massar, and V. Scarani, Device independent quantum key distribution secure against collective attacks, New J. Phys.11(4), 045021 (2009)
[58]
D. P. Nadlinger, P. Drmota, B. C. Nichol, G. Araneda, D. Main, R. Srinivas, D. M. Lucas, C. J. Ballance, K. Ivanov, E. Y. Z. Tan, P. Sekatski, R. L. Urbanke, R. Renner, N. Sangouard, and J. D. Bancal, Experimental quantum key distribution certified by Bell’s theorem, Nature607(7920), 682 (2022)
[59]
W. Zhang, T. van Leent, K. Redeker, R. Garthoff, R. Schwonnek, F. Fertig, S. Eppelt, W. Rosenfeld, V. Scarani, C. C. W. Lim, and H. Weinfurter, A device-independent quantum key distribution system for distant users, Nature607(7920), 68 (2022)
[60]
W. Z. Liu, Y. Z. Zhang, Y. Z. Zhen, M. H. Li, Y. Liu, J. Y. Fan, F. H. Xu, Q. Zhang, and J. W. Pan, Toward a photonic demonstration of device-independent quantum key distribution, Phys. Rev. Lett.129(5), 050502 (2022)
[61]
J. W. Wu, Z. S. Lin, L. G. Yin, and G. L. Long, Security of quantum secure direct communication based on Wyner’s wiretap channel theory, Quantum Eng.1(4), e26 (2019)
[62]
R. Y. Qi, Z. Sun, Z. S. Lin, P. H. Niu, W. T. Hao, L. Y. Song, Q. Huang, J. C. Gao, L. G. Yin, and G. L. Long, Implementation and security analysis of practical quantum secure direct communication, Light Sci. Appl.8(1), 22 (2019)
[63]
D. Pan, Z. Lin, J. W. Wu, H. R. Zhang, Z. Sun, D. Ruan, L. G. Yin, and G. L. Long, Experimental free-space quantum secure direct communication and its security analysis, Photon. Res.8(9), 1522 (2020)
[64]
A. Vakhitov, V. Makarov, and D. R. Hjelme, Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography, J. Mod. Opt.48(13), 2023 (2001)
[65]
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, Trojan-horse attacks on quantum-key-distribution systems, Phys. Rev. A73(2), 022320 (2006)
[66]
N. Jain, B. Stiller, I. Khan, V. Makarov, C. Marquardt, and G. Leuchs, Risk analysis of Trojan-horse attacks on practical quantum key distribution systems, IEEE J. Sel. Top. Quantum Electron.21(3), 168 (2015)
[67]
M. Lucamarini, I. Choi, M. B. Ward, J. F. Dynes, Z. L. Yuan, and A. J. Shields, Practical security bounds against the trojan-horse attack in quantum key distribution, Phys. Rev. X5(3), 031030 (2015)
[68]
S. E. Vinay and P. Kok, Extended analysis of the Trojan-horse attack in quantum key distribution, Phys. Rev. A97(4), 042335 (2018)
[69]
I. S. Sushchev, D. S. Bulavkin, K. E. Bugai, A. S. Sidelnikova, and D. A. Dvoretskiy, Trojan-horse attack on a real-world quantum key distribution system: Theoretical and experimental security analysis, Phys. Rev. Appl.22(3), 034032 (2024)
[70]
Y. Fu, H. L. Yin, T. Y. Chen, and Z. B. Chen, Long-distance measurement-device-independent multiparty quantum communication, Phys. Rev. Lett.114(9), 090501 (2015)
[71]
Y. R. Xiao, H. L. Yin, W. J. Hua, X. Y. Cao, and Z. B. Chen, Experimental efficient source-independent quantum secret sharing against coherent attacks, Phys. Rev. Lett.135(15), 150801 (2025)
[72]
Y. S. Lu, H. L. Yin, Y. M. Xie, Y. Fu, and Z. B. Chen, Repeater-like asynchronous measurement-device-independent quantum conference key agreement, Rep. Prog. Phys.88(6), 067901 (2025)
[73]
Y. F. Du, Y. F. Liu, C. D. Yang, X. D. Zheng, S. N. Zhu, and X. S. Ma, Experimental measurement-device-independent quantum cryptographic conferencing, Phys. Rev. Lett.134(4), 040802 (2025)
[74]
R. Jozsa and J. Schlienz, Distinguishability of states and von Neumann entropy, Phys. Rev. A62(1), 012301 (2000)
[75]
D. Gottesman, H. K. Lo, N. Lütkenhaus, and J. Preskill, Security of quantum key distribution with imperfect devices, Quantum Inf. Comput.4(5), 325 (2004)
[76]
M. Koashi, Simple security proof of quantum key distribution based on complementarity, New J. Phys.11(4), 045018 (2009)
[77]
H. Tan, W. Li, L. K. Zhang, K. J. Wei, and F. H. Xu, Chip-based quantum key distribution against trojan-horse attack, Phys. Rev. Appl.15(6), 064038 (2021)
[78]
A. Ponosova, D. Ruzhitskaya, P. Chaiwongkhot, V. Egorov, V. Makarov, and A. Q. Huang, Protecting fiber-optic quantum key distribution sources against light-injection attacks, PRX Quantum3(4), 040307 (2022)
[79]
A. Q. Huang, R. P. Li, V. Egorov, S. Tchouragoulov, K. Kumar, and V. Makarov, Laser-damage attack against optical attenuators in quantum key distribution, Phys. Rev. Appl.13(3), 034017 (2020)
[80]
J. Gu, X. Y. Cao, Y. Fu, Z. W. He, Z. J. Yin, H. L. Yin, and Z. B. Chen, Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources, Sci. Bull. (Beijing)67(21), 2167 (2022)
[81]
X. Y. Cao, X. R. Sun, M. Y. Li, Y. S. Lu, H. L. Yin, and Z. B. Chen, Experimental coherent one-way quantum key distribution with simplicity and practical security, Sci. Adv.12(1), eaec2776 (2026)
[82]
Z. J. Li, B. B. Zheng, C. X. Zhang, Z. R. Zhang, H. B. Xie, and K. J. Wei, Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution, Quantum Inform. Process.23(2), 40 (2024)
[83]
J. W. Ying,Q. Zhang,S. P. Gu,X. F. Wang,L. Zhou,Y. B. Sheng, Fully passive quantum secure direct communication. arXiv: 2025)
[84]
M. Avesani, C. Agnesi, A. Stanco, G. Vallone, and P. Villoresi, Stable, low-error, and calibration-free polarization encoder for free-space quantum communication, Opt. Lett.45(17), 4706 (2020)
[85]
A. De Toni,A. C. Aka,C. Agnesi,D. G. Marangon,G. Vallone,P. Villoresi, Countermeasures for Trojan-horse attacks on self-compensating all-fiber polarization modulator, arXiv: 2025)
[86]
W. Y. Wang, R. Wang, C. Q. Hu, V. Zapatero, L. Qian, B. Qi, M. Curty, and H. K. Lo, Fully passive quantum key distribution, Phys. Rev. Lett.130(22), 220801 (2023)
[87]
C. Q. Hu, W. Y. Wang, K. S. Chan, Z. H. Yuan, and H. K. Lo, Proof-of-principle demonstration of fully passive quantum key distribution, Phys. Rev. Lett.131(11), 110801 (2023)
[88]
X. Wang, F. Y. Lu, Z. H. Wang, Z. Q. Yin, S. Wang, J. Q. Geng, W. Chen, D. Y. He, G. C. Guo, and Z. F. Han, Fully passive measurement-device-independent quantum key distribution, Phys. Rev. Appl.21(6), 064067 (2024)
[89]
J. J. Li, W. Y. Wang, and H. K. Lo, Fully passive measurement-device-independent quantum key distribution, Phys. Rev. Appl.21(6), 064056 (2024)
[90]
J. W. Ying,Q. Zhang,S. P. Gu,X. F. Wang,L. Zhou,Y. B. Sheng, Fully passive quantum key distribution with parametric down-conversion source, arXiv: 2025)
[91]
J. W. Ying, S. P. Gu, X. F. Wang, L. Zhou, and Y. B. Sheng, Fully passive reference frame independent quantum key distribution, Sci. China Inf. Sci. (2025)
[92]
J. W. Ying, J. Y. Wang, Y. X. Xiao, S. P. Gu, X. F. Wang, L. Zhou, and Y. B. Sheng, Passive decoy state quantum secure direct communication, Fundam. Res. (Beijing) (2025)
[93]
J. W. Wu, G. L. Long, and M. Hayashi, Quantum secure direct communication with private dense coding using a general preshared quantum state, Phys. Rev. Appl.17(6), 064011 (2022)
[94]
Z. Z. Sun, D. Pan, Y. B. Cheng, Y. C. Liu, D. Ruan, and G. L. Long, Multi-intensity quantum secure direct communication relying on finite block-length, IEEE Trans. Commun.72(8), 4633 (2024)
[95]
K. Tamaki, M. Koashi, and N. Imoto, Unconditionally secure key distribution based on two nonorthogonal states, Phys. Rev. Lett.90(16), 167904 (2003)
[96]
M. Oszmaniec, L. Guerini, P. Wittek, and A. Acín, Simulating positive-operator-valued measures with projective measurements, Phys. Rev. Lett.119(19), 190501 (2017)
[97]
M. Pereira, G. Kato, A. Mizutani, M. Curty, and K. Tamaki, Quantum key distribution with correlated sources, Sci. Adv.6(37), eaaz4487 (2020)