1 Introduction

One of the outstanding problems of quantum key distribution (QKD) is the question of how to distribute key over arbitrarily long distances. The transmittivity of an optical channel decreases rapidly as the length of the channel grows (exponentially, in the case of fiber). This imposes a strong limit on the secret key rate achievable when photons are directly transmitted from Alice to Bob over long distances. Takeoka, Guha, and Wilde have shown that, when multi-mode signals are sent through a pure-loss bosonic channel with transmittivity \(\eta _{\text {ch}}\), the secret key rate can be no greater than \(\log _2[(1+\eta _{\text {ch}})/(1-\eta _{\text {ch}})]\) bits per mode per channel use [1]. This is proportional to \(\eta _{\text {ch}}\) for small \(\eta _{\text {ch}}\), meaning that the key rate, too, decreases rapidly with distance. In order to improve this scaling behavior and achieve even a modest key rate at very long distances, it is necessary to look beyond direct transmission.

One way to surpass the Takeoka–Guha–Wilde (TGW) bound is by using quantum repeaters [2]. First described in [3], these are auxiliary quantum devices placed along the channel between the communicating parties, effectively breaking it up into multiple low-loss channels. A full repeater scheme might involve the use of many stations, each containing multiple qubits [311]. These resource requirements are too demanding for such a scheme to be practical at present. Conceptually, then, quantum repeaters represent a path to transcending the limit imposed by the TGW bound, but their implementation remains a subject of intense research. No experiment has been performed that beats the TGW bound over any distance.

In this paper, we propose a simplified scheme which has the potential to beat the TGW bound. Two parties perform QKD by measuring photons sent from a central station containing two quantum memories (Fig. 1). If the station is placed midway between the parties, each photon need only travel half the distance between them. Moreover, the presence of the memories means that the probability of one party successfully measuring a photon is independent of the success of the other party. Together, these imply that the secret key rate for our protocol is expected to scale as \(\sqrt{\eta _{\text {ch}}}\). Such scaling would be a fundamental improvement over any scheme relying on direct transmission, and gives it the potential to surpass the TGW bound. Our paper explores whether this scheme can beat the TGW bound in practice, taking into account experimental imperfections such as memory dephasing (whose effect on quantum repeaters was studied in, e.g., [12]).

Fig. 1
figure 1

Schematic of the proposed protocol. One QM sends entangled photons to Alice, the other to Bob. Once both parties successfully measure photons using BB84 measurements, a Bell measurement (BSM) is performed on the QMs

The protocol is basically a rudimentary quantum repeater scheme, but it can be implemented using currently available technology. Though not directly scalable, it represents a step toward the full implementation of quantum repeaters. It is similar in spirit to the protocol described in [13], except that in their proposal single photons or weak laser pulses are sent toward the central station instead of being emitted from the QMs. Our protocol thus simplifies the experimental requirements.

The remainder of this paper is organized as follows. Section 2 describes our proposed protocol, and Sect. 3 lists the benchmarks we will compare it to. Section 4 describes how we mathematically model each component in our protocol; these models are assembled in Sect. 5 to produce an expression for the secret key rate of our protocol. In Sect. 6, we discuss the behavior of the key rate of our protocol as a function of the distance between the communicating parties. We also discuss variations of our protocol and describe the parameter regimes required to beat the benchmarks listed in Sect. 3. In particular, we show that beating the TGW bound is within reach. Finally, we present some concluding remarks in Sect. 7.

2 Description of the protocol

The protocol we propose in this paper is illustrated in Fig. 1. It uses two quantum memories (QMs) in a central station placed between Alice and Bob, who wish to establish a secret key via QKD. We do not assume a particular implementation of the QMs, but we do require that each QM can be entangled with a single photon (as in, for example, ion–photon entanglement [14] or the DLCZ scheme [4]). The photonic degree of freedom used to encode qubits can be freely chosen; examples include polarization or time-bin encoding. We further assume that the two QMs can be jointly measured in the Bell basis, either by applying a CNOT gate and directly measuring them or by mapping the memory states onto photons and performing an optical Bell measurement. Alice and Bob are connected to the central station by lossy optical channels, and each have measurement apparatuses that allow them to measure incoming photons in one of two settings which correspond to mutually unbiased bases of the qubit subspace (as in BB84). We will call the bases X and Z.

The procedure to produce one bit of raw key is as follows:

  1. 1.

    An entangled memory-photon state is prepared in one of the QMs and the photon sent to Alice, who performs a BB84 measurement on the photon. This is repeated until she successfully detects a photon.

  2. 2.

    Same as the previous step, but with Bob and the other QM.

  3. 3.

    A Bell measurement is performed on the two QMs and the result announced to Bob.

  4. 4.

    If Bob measured in the Z basis, he applies a bit flip to his BB84 measurement if the Bell measurement yielded \(\left| \varPsi ^+\right\rangle \) or \(\left| \varPsi ^-\right\rangle \). Similarly, if he measured in the X basis, he applies a bit flip if the Bell measurement yielded \(\left| \varPhi ^-\right\rangle \) or \(\left| \varPsi ^-\right\rangle \).

This procedure is repeated until a sufficient amount of raw key is obtained. The rest of the protocol is the same as in efficient BB84 [15].

The protocol described here admits of a few variations: the QMs could either be concurrently or sequentially loaded by performing steps 1 and 2 either at the same time or in sequence, and the position of the central station can be changed. In Sect. 6, we will explore the difference between con and sequential loading as well as the effect of changing the position of the central station.

3 Benchmarks

In comparing our protocol to schemes based on the direct transmission of photons from Alice to Bob, the TGW bound [1] is the most stringent standard of comparison. We will, however, compare our protocol to other scenarios as well; this will make it easier to see how well it matches up to concrete schemes that can be performed in a lab. The direct transmission benchmarks with which we will compare our protocol are as follows:

  1. 1.

    The TGW bound on the secret key rate per mode,

    $$\begin{aligned} R_{\text {TGW}} = \log _2 \left( \frac{1+\eta _{\text {ch}}}{1-\eta _{\text {ch}}} \right) , \end{aligned}$$
    (1)

    where \(\eta _{\text {ch}}\) is the channel transmittivity. For small \(\eta _{\text {ch}}\), this reduces to \(R_{\text {TGW}} \approx {} (2/\ln 2)\eta _{\text {ch}} \approx 2.89\eta _{\text {ch}}\).

  2. 2.

    BB84 with an ideal single-photon source and an ideal detector setup (no errors and no losses other than channel loss).

  3. 3.

    BB84 with an ideal single-photon source and a realistic detector setup (nonzero misalignment error and dark counts, imperfect detector efficiency).

  4. 4.

    Decoy-state BB84 with a laser and a realistic detector setup.

  5. 5.

    BB84 using a quantum memory as a single-photon source and a realistic detector setup.

Throughout this paper, we will use the efficient variant of BB84 in which the Z basis is measured much more frequently than the X basis [15].

Fig. 2
figure 2

Key rate per channel use per mode versus distance for the benchmarks listed in Sect. 3. The thick curve corresponds to the TGW bound (benchmark 1). Parameter values are as given in Sect. 6

The figure of merit to be considered is the key rate per mode. Because BB84 requires two optical modes when implemented with the usual polarization or time-bin encoding, its key rate expression takes on a factor of 1/2. We may compare the key rate per mode of our protocol to those of the benchmarks above either on a per time unit or a per channel use basis. In this paper we will compare key rates per channel use only, though the ultimate goal is of course to compete on a per time unit basis. Any reference to “key rates” in the remainder of this paper, then, should be taken to mean “key rates per mode per channel use.” Expressions for the key rates of benchmarks 2–5 are given in Appendix 1.

Figure 2 shows plots of key rate per channel use as a function of the distance between Alice and Bob. Note that all of these benchmarks are proportional to \(\eta _{\text {ch}}\) (within certain limits, depending on the benchmark).

4 Component modeling

In this section, we present a simple model of the behavior of each component in the setup described in Sect. 2 in the absence of eavesdropping.

4.1 Quantum memories

In this paper, we consider QMs that are adequately described by the following model. A photon-memory entangled state can be generated in a QM with probability \(\eta _p\); each attempt to do so requires a preparation time of \(T_p\). When a photon is successfully generated, it is maximally entangled with the QM; without loss of generality, we may take the initial memory-photon state to be the Bell state \(\left| \varPhi ^+\right\rangle \).

The memory-channel photon coupling efficiency is \(\eta _c\). This includes not only the probability of a photon entering the optical channel, but the success probability of any process that occurs between the memory and the channel. For example, it contains the probability of successfully performing a wavelength conversion (if such is necessary).

The QM dephasing time is \(T_2\). We will model dephasing using the following map [8], which takes as input the initial state \(\rho \) of the QM and returns the state of the QM after it has dephased for time t:

$$\begin{aligned} \varGamma _t(\rho ) := [1 - \lambda _{\text {dp}}(t)] \rho + \lambda _{\text {dp}}(t) Z\rho Z \end{aligned}$$
(2)

where

$$\begin{aligned} \lambda _{\text {dp}}(t) := \frac{1 - e^{-t/T_2}}{2} \end{aligned}$$
(3)

and Z is the Pauli Z operator. In this model, the off-diagonal elements of \(\rho \) go to zero as \(t \rightarrow \infty \).

4.2 Channels

Alice and Bob are connected to the central station by optical channels of lengths \(L_A\) and \(L_B\), respectively; the length of the total channel is therefore \(L = L_A + L_B\). The speed of light through these channels is c. The transmittivity of a channel of length l is

$$\begin{aligned} \eta _{\text {ch}}(l) = e^{-l/L_{\text {att}}} \end{aligned}$$
(4)

where \(L_{\text {att}}\) is the attenuation length.

The probability of error due to setup misalignment between Alice and the central station is \(e_{mA}\). Setup misalignment rotates the qubit state of the photon; if we assume the rotation angle to be random and symmetrically distributed about 0, the initial memory-photon state \(\left| \varPhi ^+\right\rangle \) becomes

$$\begin{aligned} (1-e_{mA})\left| \varPhi ^+\right\rangle \left\langle \varPhi ^+\right| + e_{mA}\left| \varPsi ^-\right\rangle \left\langle \varPsi ^-\right| \end{aligned}$$
(5)

when the photon reaches a detector. This holds for Bob as well, with misalignment error \(e_{mB}\).

4.3 Detectors

For their BB84 measurements, Alice and Bob each use a detector setup consisting of an optical element that can distinguish photonic qubit states in the X and Z bases (such as a polarizing beam splitter for polarization qubits) and two threshold detectors. We assume that they actively choose the basis in which to measure. Each detector has a dark count probability of \(p_d\); each setup has efficiency \(\eta _d\).

If a photon heading toward one of the setups is in the state \(\rho \), the effect of dark counts can be mimicked by photons which are effectively in the modified state

$$\begin{aligned} \alpha (\eta ) \rho + [1-\alpha (\eta )] \frac{\mathbbm {1}}{2}, \end{aligned}$$
(6)

where

$$\begin{aligned} \alpha (\eta ) := \frac{\eta (1-p_d)}{1-(1-\eta )(1-p_d)^2} \end{aligned}$$
(7)

and \(\eta \) is the probability that the photon reaches the detector setup. This assumes the use of a squashing map [16] which randomly assigns a measurement outcome to events in which both detectors click, reflected by \(\rho \) being mapped into the maximally mixed state.

4.4 Bell state measurement

The probability of successfully performing a Bell state measurement (BSM) on the two QMs is \(p_{\text {BSM}}\).

We model errors in the BSM by applying the depolarizing channel

$$\begin{aligned} \Delta _{\lambda _{\text {BSM}}}(\rho ) = \lambda _{\text {BSM}} \rho + (1-\lambda _{\text {BSM}})\frac{\mathbbm {1}}{4} \end{aligned}$$
(8)

to the QMs before a perfect BSM. The parameter \(\lambda _{\text {BSM}}\) indicates how close the actual BSM is to an ideal BSM. When \(\rho \) is pure, \(\lambda _{\text {BSM}}\) is related to the fidelity by

$$\begin{aligned} F_{\text {BSM}} = \sqrt{\frac{3\lambda _{\text {BSM}} + 1}{4}}. \end{aligned}$$
(9)

Because the fidelity is jointly concave, this is the minimum fidelity with which a BSM can be achieved.

5 Key rate analysis

The secret key rate is lower bounded by [15, 17]

$$\begin{aligned} R = \frac{Y}{2} [1 - h(e_X) - f h(e_Z)]. \end{aligned}$$
(10)

Here, the yield Y is the probability per channel use that Alice and Bob’s measurements, as well as the BSM, were successful. h(e) is the binary entropy function, \(e_X\) and \(e_Z\) are the quantum bit error rates (QBERs) between Alice and Bob in the X and Z bases, and f is the error correction inefficiency. The factor of 1/2 comes from the fact that our protocol requires the use of two optical modes.

Because the total channel between Alice and Bob is divided in two by the central station and because the number of signals sent over each segment of the channel may in general be different, it is not immediately clear how to count channel uses. To be conservative, we define the number of channel uses required to produce one bit of raw key to be the greater of the number of times Alice or Bob used their segments of the channel during the production of that bit. (Note that this is not the sum of the number of times Alice and Bob used their segments of the channel, even in the case of sequential loading.)

5.1 Yield

The probability that a photon emitted from the central station is detected by Alice is

$$\begin{aligned} \eta _A := \eta _{\text {tot}} e^{-L_A/L_{\text {att}}}. \end{aligned}$$
(11)

where we have defined

$$\begin{aligned} \eta _{\text {tot}} := \eta _p \eta _c \eta _d. \end{aligned}$$
(12)

Due to the effect of dark counts, the probability that her detector clicks is

$$\begin{aligned} \eta _A' := 1 - (1-\eta _A)(1-p_d)^2. \end{aligned}$$
(13)

Let \(N_A\) denote the number of photons that need to be sent to Alice so that her detector clicks once; it is a geometrically distributed random variable with success probability \(\eta _A'\). Expressions similar to the above apply for Bob.

The average number of channel uses required for both Alice and Bob’s detectors to click is \(\mathbb {E}[\max (N_A,N_B)]\) where \(\mathbb {E}\) is the expected value operator. The yield is therefore

$$\begin{aligned} Y&= \frac{p_{\text {BSM}}}{\mathbb {E}[\max (N_A,N_B)]} \nonumber \\&= p_{\text {BSM}} \left( \frac{1}{\eta '_A} + \frac{1}{\eta '_B} - \frac{1}{\eta '_A + \eta '_B - \eta '_A \eta '_B} \right) ^{-1} . \end{aligned}$$
(14)

The expectation value was evaluated in [13].

5.2 Quantum bit error rates

Taking into account all the parameters listed in Sect. 4, we find (in the absence of eavesdropping) that

$$\begin{aligned} e_X =&\lambda _{\text {BSM}} \alpha (\eta _A) \alpha (\eta _B) [\varepsilon _m(1-\varepsilon _{\text {dp}}) + (1-\varepsilon _m)\varepsilon _{\text {dp}}] \nonumber \\&+ \frac{1}{2} [1 - \lambda _{\text {BSM}} \alpha (\eta _A) \alpha (\eta _B)] \end{aligned}$$
(15)
$$\begin{aligned} e_Z =&\lambda _{\text {BSM}} \alpha (\eta _A) \alpha (\eta _B) \varepsilon _m + \frac{1}{2} [1 - \lambda _{\text {BSM}} \alpha (\eta _A) \alpha (\eta _B)] \end{aligned}$$
(16)

where

$$\begin{aligned} \varepsilon _m&= e_{mA} (1-e_{mB}) + (1-e_{mA}) e_{mB} \end{aligned}$$
(17)
$$\begin{aligned} \varepsilon _{\text {dp}}&= \mathbb {E}\big [ \lambda _{\text {dp}}(t_A)[1-\lambda _{\text {dp}}(t_B)] + [1-\lambda _{\text {dp}}(t_A)]\lambda _{\text {dp}}(t_B) \big ]. \end{aligned}$$
(18)

We may interpret \(\varepsilon _m\) and \(\varepsilon _{\text {dp}}\) as the total misalignment and dephasing errors, respectively, between Alice and Bob. Here \(t_A\) and \(t_B\) are the times that Alice and Bob’s QMs are left to dephase for.

At this point, we have fully determined \(e_Z\) in terms of the parameters set out in Sect. 4. In order to evaluate \(e_X\), we need only two more quantities: the dephasing time intervals \(t_A\) and \(t_B\). These are the subject of the following subsection.

5.2.1 Dephasing

Each time a QM emits a photon toward Alice, she must signal whether or not she successfully measured her photon before the QM prepares another one. This constrains the amount of time that elapses between photons to be at least

$$\begin{aligned} \tau _A = T_p + \frac{2 L_A}{c}. \end{aligned}$$
(19)

Similar remarks apply to Bob.

If it happens that \(L_A \ne L_B\), then (19) allows the QMs to run at different rates. Throughout this paper, we will assume that each QM runs at the maximum rate allowed by (19). It is possible to choose the rates to be the same, but we will not do so in this paper.

For both sequential and con loading, we may assume without loss of generality that Bob signals a successful measurement later than Alice does. The BSM is performed as soon as he does, so the QM that sends him photons dephases for a time

$$\begin{aligned} t_B = \frac{2 L_B}{c}. \end{aligned}$$
(20)

The QM that sends photons to Alice dephases for a longer period of time because it must wait for Bob to make a successful measurement. If the QMs are sequentially loaded, Alice’s QM dephases for

$$\begin{aligned} t_A^{\text {seq}} = N_B \tau _B + \frac{2 L_A}{c}. \end{aligned}$$
(21)

If they are loaded concurrently, then it dephases for

$$\begin{aligned} t_A^{\text {con}} = |N_B - N_A| \tau _B + \frac{2 L_A}{c}. \end{aligned}$$
(22)

In (18), because of the linearity of the operator \(\mathbb {E}\), we need only evaluate \(\mathbb {E}[e^{-t_A/T_2}]\). For sequential loading,

$$\begin{aligned} \mathbb {E} \big [ e^{-t_A^{\text {seq}}/T_2} \big ] = \frac{\eta '_B \exp \big ( {-\frac{2 L_A}{c T_2}} \big )}{e^{\tau _B/T_2} + \eta '_B - 1}. \end{aligned}$$
(23)

For con loading, a result from [13] gives

$$\begin{aligned} \mathbb {E} \big [ e^{-t_A^{\text {con}}/T_2} \big ] =&\frac{\eta '_A \eta '_B \exp \big ( {-\frac{2 L_A}{c T_2}} \big )}{\eta '_A + \eta '_B -\eta '_A \eta '_B} \Bigg [ \frac{1}{1 - e^{-\tau _B/T_2}(1-\eta '_A)} \nonumber \\&+ \frac{1}{1 - e^{-\tau _B/T_2}(1-\eta '_B)} - 1 \Bigg ] . \end{aligned}$$
(24)

6 Results

Unless otherwise noted, the following parameter values were used for the results in this section. They are plausible values for an implementation of our protocol using trapped-ion quantum memories connected to Alice and Bob via optical fiber. A single ion fluorescence collection efficiency of 4.2 % has been demonstrated in [18], a trapped-ion qubit was measured to have a dephasing time of 2.5 s in [19], and a two-qubit gate was used to entangle two ions with a fidelity of 99.3 % (corresponding to \(\lambda _{\text {BSM}} = 0.99\)) in [20].

  • \(\eta _p\) (preparation efficiency) \(= 0.66\)

  • \(T_p\) (preparation time) \(= 2\) \(\mu \)s

  • \(\eta _c\) (photon-fiber coupling efficiency \(\times \) wavelength conversion) \(= 0.04 \times 0.3\)

  • \(T_2\) (dephasing time) \(= 1\) s

  • c (speed of light in optical fiber) \(= 2 \times 10^8\) m/s

  • \(L_{\text {att}}\) (attenuation length) \(= 22\) km

  • \(e_{mA}\) (misalignment error) \(= e_{mB} = 0.01\)

  • \(p_d\) (dark count probability per detector) \(= 10^{-8}\)

  • \(\eta _d\) (detector efficiency) \(= 0.3\)

  • \(p_{\text {BSM}}\) (BSM success probability) \(= 1\)

  • \(\lambda _{\text {BSM}}\) (BSM ideality parameter) \(= 0.97\)

  • f (error correction inefficiency) \(= 1.16\)

For decoy-state BB84 (benchmark 4), we will set the mean photon number of the signal states equal to 1. For the above numbers, we find that \(\eta _{\text {tot}} = \eta _p \eta _c \eta _d = 0.0024\).

6.1 Protocol variations

6.1.1 Simultaneous versus sequential loading

For this comparison, the central station is located halfway between Alice and Bob.

We have found, for the parameter values given above, that con and sequential loading of QMs in our protocol yield almost indistinguishable key rates per channel use over all values of L for which the rates are nonzero (Fig. 3). A rough comparison of the dephasing time intervals \(t_A^{\text {seq}}\) and \(t_A^{\text {con}}\) suggests that this holds whenever \(\tau _B/(T_2 \eta _{\text {tot}})\) is small over all values of L for which the key rates are nonzero. The parameters we have used are within this regime: \(\tau _B/(T_2 \eta _{\text {tot}}) = 0.140\) at \(L = 66\) km. Outside of it, however, the difference can be dramatic: there are cases where the key rate is nonzero for con loading but not for sequential loading.

Fig. 3
figure 3

Key rate per channel use versus distance for con and sequential loading. The two curves are virtually indistinguishable

Because we will always be well within the parameter regime where con and sequential loading give nearly the same key rate, we will consider only sequential loading in the remainder of this paper.

6.1.2 Optimization of central station position

When the QMs are sequentially loaded, it need not be true that placing the central station halfway between Alice and Bob will yield the maximum key rate. This is because there is an inherent asymmetry in our protocol in this case: Bob only begins making measurements after Alice has finished hers.

Figure 4 shows the behavior of the key rate (per channel use) as a function of L when the central station is placed at L / 2 and when it is placed at the position that maximizes the key rate. For small L, both key rates are approximately the same, and both scale proportionally to \(\sqrt{\eta _{\text {ch}}} = e^{-L/(2 L_{\text {att}})}\). When L becomes so large that the dephasing time interval \(t_A^{\text {seq}}\) is a significant fraction of \(T_2\), the unoptimized key rate drops to zero. (The value of L for which dephasing becomes significant can be quantified using (35) of Appendix 2, which gives a value of 96 km in the case of Fig. 4.) Around that same point, the optimized key rate transitions from \(e^{-L/(2 L_{\text {att}})}\) scaling to \(\eta _{\text {ch}} = e^{-L/L_{\text {att}}}\) scaling—which is the same as for direct transmission—and continues thus until L is so large that detector dark counts become significant, at which it too drops to zero.

Fig. 4
figure 4

Key rate versus distance when the central station is at L / 2 and when its position is optimized. (We have increased \(\eta _c\) to 0.3 to better show the features of the curves.) Near 96 km, the unoptimized key rate begins to drop to 0 and the optimized key rate transitions from \(e^{-L/(2 L_{\text {att}})}\) scaling to \(e^{-L/L_{\text {att}}}\) scaling

Fig. 5
figure 5

Optimal central station position as a function of the total distance L. (Alice’s position is taken to be at \(L=0\). Again, we have increased \(\eta _c\) to 0.3 to better show the features of the curves.) Near where the scaling changes from \(e^{-L/(2 L_{\text {att}})}\) to \(e^{-L/L_{\text {att}}}\), around \(L = 96\) km, the optimal position moves away from L / 2 and remains a fixed distance away from Bob

For greater insight into this behavior, consider Fig. 5, which shows the optimal central station position as a fraction of L as L is varied. For lower values of L, the station remains near the middle. Once dephasing becomes significant, the optimal position moves closer to Bob. This keeps dephasing errors low because Bob’s link runs quicker, giving Alice’s QM less time to dephase. At longer distances, the optimal position is a fixed distance away from Bob, just far enough away that the dephasing in Alice’s QM does not overwhelm the system with errors. The price of suppressing dephasing errors in this way is that the key rate scales with the transmittivity of the longer link in the setup, so the key rate scaling is degraded.

6.2 Beating direct transmission

We are now in a position to determine the conditions under which our protocol can beat the direct transmission benchmarks listed in Sect. 3. First, note that at \(L=0\) the performance of our protocol may be worse than that of the benchmarks because the central station introduces additional sources of loss. However, because the key rate for our protocol scales better with distance than the benchmark key rates when L is not too large, crossover with one or more of them is possible at some \(L > 0\).

When the central station position is optimized, crossover can only occur in the \(e^{-L/(2 L_{\text {att}})}\) regime (excluding marginal cases)—that is, when the optimal position is near the midpoint between Alice and Bob. Equivalently, crossover can only occur when the unoptimized key rate is nonzero. For this reason, we will fix the central station at L / 2 for the remainder of this section instead of optimizing its position. It is worth mentioning that crossover with a certain benchmark does not mean that our protocol beats it for all L beyond the crossover point; the interval over which our protocol is superior may be quite small. But optimizing the central station position can potentially increase the range of distances over which our protocol beats the benchmark compared to the leaving the station at L / 2.

We identify two parameters, the combined efficiency \(\eta _{\text {tot}}\) and the dephasing time \(T_2\), which are crucial in determining whether crossover occurs with any of the benchmarks and which can be improved from the values given at the beginning of this section. For example, the photon-fiber coupling efficiency in \(\eta _c\) could be pushed from 0.04 to as high as 0.3 [21] (leading to \(\eta _{\text {tot}} = 0.0178\)), while a \(T_2\) of 50 s has already been demonstrated [22]. Figure 6 shows the regions in \(\eta _{\text {tot}}\)-\(T_2\) space in which we can beat each of the benchmarks. It is clear from the figure that we cannot beat any of the benchmarks with the parameters given at the beginning of the section, and that from our perspective, improving \(\eta _{\text {tot}}\) is more likely to result in crossover than improving \(T_2\).

Fig. 6
figure 6

Shaded regions indicate values of \(\eta _{\text {tot}}\) and \(T_2\) for which our protocol beats each of the benchmarks listed in Sect. 3. Dashed lines indicate approximations to the boundaries of these regions obtained using (25). For benchmark 5 (quantum memory as single-photon source), we have fixed \(\eta _c = 0.3 \times 0.3\)

Fig. 7
figure 7

Approximating the crossover point using the scaling behavior of the key rates. Note that the intersection point of the approximating curves coincides with the crossover point of the key rate curves, and that the intersection occurs before dephasing becomes significant and the key rate of our protocol goes to 0. (We have set \(\eta _c = 0.3\).)

Each region may be explained in the following way. When L is small enough for errors to be negligible, the key rate of our protocol is \(R \approx R_0 e^{-L/(2 L_{\text {att}})}\) while that of the benchmark of interest is \(R_b \approx R_{b,0} e^{-L/L_{\text {att}}}\), where \(R_0\) and \(R_{b,0}\) are the key rates at \(L=0\) of our protocol and of the benchmark respectively.Footnote 1 These curves intersect at a distance \(L_{\text {int}}\). If \(L_{\text {int}}\) is smaller than some characteristic distance \(L_{\text {dp}}\) beyond which dephasing becomes significant, then there is a crossover. The boundary of the crossover region corresponds to \(L_{\text {int}} = L_{\text {dp}}\). These ideas are illustrated in Fig. 7.

Based on this explanation, we can derive an approximate formula for the boundary of the region in which crossover occurs with a given benchmark with key rate \(R_b\):

$$\begin{aligned} T_2 = K \left[ \frac{Q T_p}{\eta _{\text {tot}}^2} + \frac{2 L_{\text {att}} \ln (Q/\eta _{\text {tot}})}{c} \left( 1 + \frac{Q}{\eta _{\text {tot}}^2} \right) \right] . \end{aligned}$$
(25)

Here

$$\begin{aligned} Q = \frac{3 R_{b,0}}{2 R_0^{\eta _{\text {tot}}=1}}, \end{aligned}$$
(26)

\(R_0^{\eta _{\text {tot}}=1}\) denotes the key rate of our protocol when \(L=0\) and \(\eta _{\text {tot}} = 1\), and K is a fitting parameter characterizing how long the QMs must dephase for, as a fraction of \(T_2\), before dephasing becomes significant. It needs to be chosen to fit the exact crossover region boundary; empirically, \(K = 14\) gives a good fit. This approximation is valid when \(T_p \ll T_2\) and \(p_d \ll \eta _{\text {tot}}^2/Q\). A derivation is given in Appendix 2.

The dashed lines in Fig. 6 are the boundary approximations given by (25).

6.2.1 Attenuation length; the high-loss limit

Let us now consider the high-loss limit, where the attenuation length \(L_{\text {att}}\) is very small. This limit is interesting in the context of hybrid quantum-classical networks. In passive optical networks, where multiple users are connected to a source, each user is effectively connected to the source via a high-loss channel. The limit is also applicable when the wavelength of the photons emitted by the QMs happens to be greatly attenuated by the optical channel.

Fig. 8
figure 8

Boundaries of regions in \(\eta _{\text {tot}}\)-\(T_2\) space where our protocol beats the TGW bound for various attenuation lengths

The effect of reducing the attenuation length is to make it easier to beat the benchmarks, as shown in Fig. 8 and predicted in (25). This is because the photons cannot travel as far, so there is less dephasing. However, because of the nonzero preparation time \(T_p\), beating the benchmarks is still nontrivial in the \(L_{\text {att}} \rightarrow 0\) limit. The high-loss limit thus represents a regime in which experimental requirements are relaxed, yet the benchmarks can still meaningfully be beaten.

Fig. 9
figure 9

Boundaries of regions in \(\eta _{\text {tot}}\)-\(T_2\) space where our protocol beats the TGW bound in the limit \(L_{\text {att}} \rightarrow 0\). Solid lines indicate \(p_d = 10^{-8}\), dashed lines \(p_d = 10^{-5}\). Blue, orange, green, and red lines indicate \(T_p = 100\), 10, 5, and 0 \(\mu \)s respectively

Figure 9 shows the effect of changing the preparation time \(T_p\) and the dark count probability \(p_d\) on the \(\eta _{\text {tot}}\)-\(T_2\) regions in which our protocol can beat the TGW bound. As expected from (25), the benchmarks become easier to beat as \(T_p\) goes down. (This is true whatever the value of \(L_{\text {att}}\).) We also see that when \(T_p = 0\) and \(L_{\text {att}} \rightarrow 0\), they can be beat for any value of \(T_2\). Because there is no dephasing at all in this case, \(T_2\) plays no role in determining whether there is a crossover.

Equation (25) suggests that when \(T_p = 0\) and \(L_{\text {att}} \rightarrow 0\), crossover can happen for any value of \(\eta _{\text {tot}}\). However, Fig. 9 shows that crossover can happen only when \(\eta _{\text {tot}}\) is sufficiently large. There is no contradiction: when \(\eta _{\text {tot}}\) is too low, the condition \(p_d \ll \eta _{\text {tot}}^2/Q\) is violated and (25) no longer holds. It turns out that there is no crossover when \(\eta _{\text {tot}}\) is small because dark counts become significant. Using reasoning similar to that employed in deriving (25) (with the characteristic dephasing length \(L_{\text {dp}}\) replaced with a characteristic dark count length \(L_d\)), we can obtain the following approximation to the minimum \(\eta _{\text {tot}}\) necessary for our protocol to beat a given benchmark:

$$\begin{aligned} \eta _{\text {tot}}^{\text {min}} = \sqrt{\frac{Q p_d (2-p_d)(1-\xi )}{(1-p_d)(p_d+\xi -p_d\xi )}}. \end{aligned}$$
(27)

The quotient of key rates at zero distance, Q, is as defined in (26), and depends on the choice of benchmark. The fitting parameter \(\xi \) is a measure of how much error due to dark counts our system can tolerate before the key rate drops to zero. For the parameter values given at the beginning of the section, \(\xi = 0.012\) fits well. This equation is valid when \(T_p \ll T_2\) and \(p_d \ll \eta _{\text {tot}}\). The derivation is in Appendix 2.

7 Conclusion

In this paper, we have analyzed a QKD protocol in which Alice and Bob exchange signals with a central station consisting of two quantum memories: a rudimentary quantum repeater node. We have also introduced a number of benchmarks to which our protocol can be compared, the most important of them being the Takeoka–Guha–Wilde bound on the secret key rate. We showed that our protocol can, in principle, beat the benchmarks because of its improved rate-versus-distance scaling: the key rate of all protocols relying on direct transmission between Alice and Bob scales at best with \(e^{-L/L_{\text {att}}}\), while our protocol scales ideally as \(e^{-L/(2 L_{\text {att}})}\). In effect, our protocol doubles the attenuation length when imperfections, particularly memory dephasing, are not too prominent. Finally, we explored the conditions under which we can beat the benchmarks in practice.

Because our protocol uses only one intermediate station with only two memories, we do not obtain the full scalability that quantum repeaters can offer us in theory. However, because it is so simple, it is feasible to implement using currently available technology while still exhibiting the rate improvement of a full quantum repeater scheme and the ability to beat the TGW bound. Beating the bound, or even demonstrating an improvement over the standard \(e^{-L/L_{\text {att}}}\) key rate scaling, would be a fundamental experimental achievement. We have shown that these achievements are within reach, particularly in the high-loss limit. And we have shown what physical parameters need to be reached in order to attain these goals. In sum, our analysis helps point the way toward an experimental implementation of quantum repeaters.