1 Introduction

Quantum key distribution (QKD) can distribute secure key bit strings between two parties using information-theoretic security. In recent years, transmission distances have experimentally increased, with demonstrations distances exceeding 800 km [1].

However, theoretical security proofs rely on assumptions about the security of various devices, which may not accurately reflect the conditions of actual experiments. Fortunately, there are also implementation papers that bridge the gap between theory and experiment for device imperfections [2,3,4]. Among them, measurement-device-independent quantum key distribution (MDI-QKD) [5], which can be classified as a meet-in-the-middle (MM) architecture [6], is particularly noteworthy. This MM-type architecture has yielded numerous leading candidates for both QKDs and quantum repeaters and has achieved theoretical and experimental breakthroughs [7,8,9,10,11,12].

In the original MDI-QKD scheme, the key rate is strictly limited by the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound \(R=-\log _2 (1-\eta _{{\text {ch}}})\simeq \eta _{{\text {ch}}}/\ln 2\simeq 1.44\eta _{{\text {ch}}}\) for \(\eta _{{\text {ch}}}\ll 1\) [13], where \(\eta _{{\text {ch}}}\) represents the channel transmittance rate between the two users. To exceed the PLOB limit in QKD, twin-field QKD (TF-QKD) [14] and its variants, sending or not sending QKD [15], phase-matching QKD [16, 17], and mode-pairing QKD using asynchronous two-photon interference [7, 18] have been proposed. Additionally, memory-assisted MDI-QKD (MA-MDI-QKD) [19, 20] has been proposed and evaluated with quantum memory (QM) in various physical systems [21]. These architectures increase the key rate up to \(O(\sqrt{\eta _{{\text {ch}}}})\). Moreover, MA-MDI-QKD can be extended as an element of a single quantum-repeater node via improvement of QMs. Additionally, when analyzing/comparing the performance of quantum repeaters, it is useful to benchmark with the key rate in the QKD protocol [22, 23].

Beginning with the previously reported concept [24] of quantum repeaters, which are essential for long-distance quantum communication, various applications can be realized through the entanglement distribution, including QKD, distributed quantum computation [25], and world clocks [26]. Additionally, the proof-of-concept for a quantum internet—a communication network utilizing information-theoretic security—is being developed. It is crucial to develop quantum communication protocols that are ready for connection to the physical layer and higher layers of the network [27, 28].

The Duan–Lukin–Cirac–Zoller (DLCZ) protocol realizes a practical experimental implementation of quantum repeaters [29] and has been implemented in several physical systems, such as quantum dots [30], trapped ions [31], and protocols utilizing nitrogen-vacancy centers [11], as well as entanglement distribution using atomic frequency comb (AFC) QM in recent years [9, 10]. However, in the realistic protocols realized in the aforementioned experiments, multiplexing is necessary to achieve practical rates (on the order of Hz or higher) [32,33,34]. Therefore, our focus has been on the multimode storage of QM, and we propose a scheme that introduces new possibilities.

We adopt AFC as a QM [35] comprising two functions: multimode storage and on-demand storage. These two functions have a distinct impact on the key rate. To this end, we propose an experimentally implementable protocol, which is a one-element MDI type protocol, to analyze the impact of multimode QM on the key rate.

There are two primary methods for achieving a key rate of \(O(\sqrt{\eta _{{\text {ch}}}})\). The first is to utilize a one-photon interference scheme, as exemplified by proposals, such as TF-QKD [14] and mode-pairing schemes that alleviate phase-locking issues in one-photon interference [7, 18]. The second is a scheme akin to MA-MDI-QKD, in which QM allows Bell state measurements (BSMs) to be performed even if photons arrive asynchronously at the central interference system. As a practical proposal, protocols utilizing on-demand storage can achieve \(O(\sqrt{\eta _{{\text {ch}}}})\) within a certain range of distances, contingent upon the decoherence time \(T_2\) of the QM [19, 36].

Herein, we present an alternative approach, whereby we demonstrate that the key rate can be increased by \(O(m_{\text {s}}^2)\), with \(m_{\text {s}}\) representing the number of modes, through the incorporation of frequency multiplexing and frequency shifting in the middle BSM. Even after normalization by the number of modes, it is possible to benefit from frequency multiplexing.

The remainder of this paper is organized as follows. Section 2 describes the structure of the protocol incorporating the functions of QM and proposes a feasible setup for the mechanism. In Sect. 3, in addition to the on-demand storage of QM, the multimode storage of the frequency and spatial modes is incorporated into the calculation and analyzed as the key rate of the one-element MDI-QKD protocol. Finally, Sect. 4 summarizes the study and discusses future extensions to quantum-repeater networks.

2 System description

In this section, we first provide an overview of the fundamental principles of the on-demand/multimode protocol, which is predicated on the functionality of QM. Subsequently, we comprehensively explain the protocol.

2.1 Protocol description

We present a system of protocols that incorporates the functions of QM, specifically on-demand and multimode storage. The first protocol incorporates a QM with on-demand storage, as depicted in Fig. 1a, and the second protocol incorporates a QM with frequency (spatial) multimode storage, as depicted in Fig. 1b.

Fig. 1
figure 1

Schematic of the system of protocols incorporating QM functions, specifically on-demand and multimode storage. a On-demand protocol: We assume the presence of a QM with on-demand storage. This function allows the QM on Alice’s (Bob’s) side to determine whether a photon has been successfully absorbed and obtain its stored information. b Multimode protocol: A QM with frequency multiplexing is employed. The frequency mode of the photon that is successfully absorbed on Alice’s (Bob’s) side is read from the QM and shifted to a fixed frequency mode (depicted as green in the figure). The frequency mode used in the central BSM is consistently fixed

2.1.1 On-demand QM protocol

First, we describe a protocol that incorporates a QM with on-demand storage, as illustrated in Fig. 1a. The QM on Bob’s (Alice’s) side is notified of whether a photon has been successfully absorbed by the QM on Alice’s (Bob’s) side, allowing the determination of whether the photonic quantum state has been stored in the QM on Alice’s (Bob’s) side. If the presence of the photon is heralded by the successful loading of both QMs, the middle BSM is executed as usual. However, if the loading of the QM on Alice’s (Bob’s) side is unsuccessful, the QM on Bob’s (Alice’s) side stores the photon information and awaits the next successful loading of the QM on Alice’s (Bob’s) side.

2.1.2 Multimode QM protocol

We next describe the protocol incorporating a QM with frequency-multiplexing storage, as illustrated in Fig. 1b. The protocol utilizes a QM with the storage of frequency multiplexing, as demonstrated in the AFC [35]. The frequency mode of the photon successfully absorbed on Alice’s (Bob’s) side is retrieved from the QM and shifted to a fixed frequency mode with efficiency \(\eta _{{\text {f}}}\). The frequency mode utilized in the middle BSM is consistently fixed [37]. This protocol does not require on-demand storage and can be implemented with fixed-time storage.

2.2 Protocol setup

Here, we detail the implementation of the scheme depicted in Fig. 1 utilizing QM.

Fig. 2
figure 2

In a, the original MA-MDI-QKD protocol proposed in [19] is presented. In b, a heralding scheme utilizing quantum non-demolition (QND) measurement is presented. The QND nondestructively heralds the presence of a photon, indicating successful absorption into the QM. Once both QMs have completed their readings, the stored state of the QMs is retrieved as photons, and a BSM is executed in the middle. In c, a heralding scheme utilizing BSM is presented. In each round, entangled photons from the entangled photon source (EPS) are sent to the QM and a side-BSM (S-BSM), where the QM stores the photon information and the S-BSM performs a BSM with photons from Alice (Bob). If it is successful, the heralding of absorption of the photon stored in the QM is successful, the quantum state is taken as a photon from both QMs, and a BSM is performed in the middle

Fig. 3
figure 3

Process of writing and reading on-demand and multimode AFC QM is illustrated in Fig. 1. a Structure of an AFC with frequency-multiplexing storage, where photons are absorbed. b Write and read processes are depicted on the time axis. The interval between the peaks of the comb, which is referred to as \(\Delta \), depends on the structure of the AFC. A pulse is absorbed by the AFC as an input mode, followed by the application of a control pulse (CP). After a period of \(T_{{\text {st}}}\), a second CP is applied, and photons are regenerated as the output mode after a total of \(1/\Delta +T_{{\text {st}}}\)

In Fig. 1, the three functions required of the QM are the function of heralding, which nondestructively transmits the arrival of a photon; the on-demand storage; and the multimode storage. Specifically, in Fig. 1a, the QM requires the on-demand storage and the function of heralding, and in Fig. 1b, the QM requires the multimode storage and the function of heralding. However, there is currently no practical QM that possesses all three of these functions. Nevertheless, AFC QM has two of these functions: on-demand and multimode storage. Therefore, when utilizing AFC QM, which is suitable for multimode storage, it is necessary to incorporate the function of heralding separately in actual experiments. Figure 2 illustrates a scheme with heralding. Figure 2a depicts the basic MA-MDI-QKD scheme [19], and we extend the QM in this protocol by replacing it with an AFC.

Figure 3 illustrates the physical system that allows the on-demand and multimode storage of the AFC QM. As depicted in Fig. 3a, multiple AFCs can be created through inhomogeneous broadening, allowing absorption of photons of different modes. Additionally, as illustrated in Fig. 3b, the storage time \(T_{{\text {st}}}\) can be set to an arbitrary value through the timing of CP irradiation. However, the AFC alone cannot herald the arrival of a photon sent by Alice (Bob) without destroying the quantum information.

There are three conventional methods for heralding the arrival of a photon. The first is heralding with the QM alone, as shown in Fig. 2a. This method has been demonstrated using spin–photon interfaces, e.g., silicon–vacancy centers [38]. The second method is heralding with QND, as depicted in Fig. 2b. This approach incorporates QND [39] to realize the function of heralding external to the QM when the QM does not possess this function. However, QND in AFC has only been achieved at the classical light level—not at the single-photon level. As an alternative, heralding can be realized indirectly by incorporating S-BSM and EPS in Fig. 2c. This method allows the determination of whether a photon has been absorbed into the QM based on the outcome of the BSM, making it useful for ensemble-based QMs with multimode storage, as it is difficult to achieve the function of heralding with such QMs.

2.2.1 Device description

We now provide an overview of each component, assuming the absence of malicious third-party actors.

Photon source

In the proposed scheme, Alice and Bob’s single-photon source performs the calculation with a weak coherent pulse (WCP) and an optimized average photon number \(\mu ,\nu \). The utilization of EPSs has been actively studied in recent years. A high-fidelity degenerate EPS with a telecommunication wavelength was reported in a cavity two-photon configuration [40], as well as a non-degenerate EPS, where the signal and idler are the QM wavelength and telecommunication wavelength, respectively [10]. In practical examples of protocols using EPSs, linear improvements in the key rate have been achieved through multiplexing with existing EPS devices [41]. While the EPSs considered in this study do not take into account the probability of two-photon generation in each mode, simulation results indicate that for \(p_{2}>0\), a constant \(p_{2}\) range in a frequency-multiplexed quantum-repeater scheme has little effect on the key rate [33]. Alternative options have been proposed to replace quantum dot-based photon sources with low \(p_{2}\) values, such as the approach presented in reference [42] and the setup outlined in reference [21], which eliminates the EPS.

Quantum memory

Our scheme requires a QM with on-demand storage and multimode storage. With regard to the function of on-demand storage, if photon absorption in Bob’s (Alice’s) QM is unsuccessful, Alice (Bob) must store the quantum state in the QM until Bob (Alice) achieves a successful absorption. However, during this period, the QM becomes susceptible to dephasing due to \(T_2\); the initial state of the QM is \(\rho \), and the state of the QM after dephasing for a period of time t can be modeled using the Completely Positive and Trace Preserving map, as reported in [43].

$$\begin{aligned} \varepsilon (\rho )&= [1-\lambda _{{\text {dp}}}(t)]\rho +\lambda _{{\text {dp}}}(t)Z\rho Z. \end{aligned}$$
(1)

Here,

$$\begin{aligned} \lambda _{{\text {dp}}}(t)&= \frac{1-e^{-\frac{t}{T_2}}}{2}, \end{aligned}$$
(2)

where Z represents the Pauli Z operator. AFC QM, which is based on rare-earth doped crystals, is the first viable candidate for QM with multimode storage. In recent times, AFC QM has progressed to the experimental stage of multimode storage, and in the case of temporal multiplexing, 51-\(\upmu s\) has been achieved with \(\mathrm {^{151}Eu^{3+}{:}Y_2SiO_5}\) at 100 modes in fixed-time storage, and 0.541-ms at 50 modes in on-demand storage has been realized. In frequency multiplexing, \(\mathrm {Pr^{3+}{:}Y_2SiO_5}\) can achieve 100 modes in fixed-time storage [44, 45]. Furthermore, as an experimental example, entanglement distribution using the time-multimode storage has been reported [10].

Frequency shifter

In the scenario where photons of varying frequency modes are to be regenerated, frequency shifting can be accomplished using an electro-optic modulator to perform a BSM. The technology required for this process is serrodyne frequency shifting, which was demonstrated to have a conversion efficiency of 80% for a frequency shift of approximately 1 GHz in experiments utilizing an AFC [37].

Bell state measurement

In this study, there is a middle BSM and an S-BSM employed for heralding when a photon is successfully absorbed by the QM. The success probability for the middle BSM can be calculated using \(Y_{11}\), as described in Appendix 1:

$$\begin{aligned} P^{{\text {MBSM}}}&= Y_{11}(\eta _A,\eta _B), \end{aligned}$$
(3)

where \(\eta _A\) and \(\eta _B\) represent the probabilities of photons reaching the middle BSM on Alice’s and Bob’s sides, respectively. Similarly, the S-BSM used for heralding, which is depicted in Fig. 2c, can be viewed as an asymmetric MDI-QKD system:

$$\begin{aligned} P^{{\text {SBSM}}}_K&= Y_{11}(\eta _K,\eta _{{\text {ent}}}\eta _{{\text {d}}}) \quad (K=A,B). \end{aligned}$$
(4)

With regard to multiplexing, a BSM utilizing spatial modes [46] and a BSM utilizing temporal modes [47] have been proposed. Additionally, a BSM setup that exceeds 50% [48] has been proposed.

3 Key rate analysis

In this section, we calculate the key rate for the proposed scheme illustrated in Fig. 2c. In QKD experiments, it is commonly assumed that normal operation proceeds without interference from eavesdroppers and is only affected by system imperfections. Under these conditions, in the setting of an infinite key, the key rate in Fig. 2 setting is bound by the following:

$$\begin{aligned} R&= Y_{11}^{{\text {QM}}}[1-h(e_{X})-fh(e_{Z})], \end{aligned}$$
(5)

where \(e_{X}\) and \(e_{Z}\) represent the qubit error rates (QBERs) between Alice and Bob in the X and Z bases, respectively, and \(Y_{11}^{QM}\) represents the rate at which raw key bits are generated. Additionally, \(h(p)=-p\log _2(p)-(1-p)\log _2(1-p)\) is the Shannon’s binary entropy function. In this study, inefficiency is analyzed with \(f=0\), and other parameters are presented in Table 1.

Table 1 Parameters associated with the QKD protocol discussed in Sect. 3

3.1 On-demand AFC protocol

As the protocol depicted in Fig. 1a necessitates the utilization of QM with the function of heralding, we realized an on-demand protocol utilizing AFC QM by integrating S-BSM, as shown in Fig. 2c. The MDI-QKD scheme with on-demand QM has been analyzed in previous studies. In [20], decoherence due to time evolution of the QM was not considered, and in [19], decoherence was considered. As depicted in Fig. 4, the key rate of the protocol scales with \(O(\sqrt{\eta _{{\text {ch}}}})\). This scaling appears to be valid over a limited distance range up to 400 km. The reason is that the effects of QM decoherence become increasingly dominant as the distance between the QM and Alice or Bob increases, ultimately causing the key rate to fall below the PLOB limit. The average storage time required for the QM can be calculated using the equation \(T_{{\text {st}}} = E\{N_A-N_B\}\tau =\frac{2(1-\eta )\tau }{\eta (2-\eta )} \approx \frac{\tau }{\eta } \quad (\eta \ll 1)\) [19], where \(N_A\) and \(N_B\) are the probability variables for successful loading of the QM on Alice’s and Bob’s sides, respectively. Here, \(\tau \) represents the repetition period. \(\eta \) represents the loading efficiency of the QM, with \(\eta _A\) and \(\eta _B\) corresponding to Alice’s and Bob’s sides, respectively, and \(\eta =\eta _A=\eta _B\). Instead of calculation based on the average storage time, an alternative approach is to optimize the number of modes in temporal multiplexing \(m_{\text {t}}\) according to distance, resulting in the scaling of \(R=O(\sqrt{\eta _{{\text {ch}}}})\), as detailed in Appendix 2.

Fig. 4
figure 4

Comparison of the key rate of the on-demand AFC protocol with the PLOB bound (R=1.44\(\eta _{{\text {ch}}}\)). The parameters were set as follows: \(L_{{\text {att}}}=22, \eta _{{\text {d}}}=0.93, \eta _{{\text {ent}}}=0.5, p_{{\text {dc}}}=10^{-8}, T_2=300\times 10^{-6}\)

3.2 Multimode AFC protocol

We realized the multimode protocol utilizing the multimode storage of the AFC QM by integrating S-BSM, as shown in Fig. 2c. When QM is utilized with multimode storage via frequency or spatial multiplexing, \(Y_{11}^{{\text {QM}}}\) is expressed as follows:

$$\begin{aligned} Y_{11}^{{\text {QM}}}&= \mu \nu e^{-\mu -\nu }Y_{11}(\eta _A^{{\text {mm}}},\eta _B^{{\text {mm}}}), \end{aligned}$$
(6)

where \(\mu , \nu \) represent the average photon numbers of the WCPs on Alice’s and Bob’s sides, respectively; \(\eta _K^{{\text {mm}}} (K=A,B)\) represents the success probability of S-BSM in multiplexing, which is given below; and \(m_{\text {s}}\) represents the number of modes in frequency or spatial multiplexing.

$$\begin{aligned} \eta _K^{{\text {mm}}}&= 1-(1-Y_{11}(\eta _{{\text {ch}}}(L_{\text {K}})\eta _{\text {d}},\eta _{{\text {ent}}}\eta _{\text {d}}))^{m_{\text {s}}} \quad (K=A,B) \end{aligned}$$
(7)
Fig. 5
figure 5

Key rate of the multimode AFC protocol is compared with the PLOB bound (R = 1.44\(m_{\text {s}}\eta _{{\text {ch}}}\)). Simulations were performed with \(m_{\text {s}}=1,10000\). The parameters used in the simulations were \(L_{{\text {att}}}=22\) km, \(\eta _{{\text {d}}}=0.93\), \(\eta _{{\text {ent}}}=0.5\), \(p_{{\text {dc}}}=10^{-8}\), and \(\eta _{{\text {f}}}=0.8\). The PLOB bound is depicted as green (lower dashdot) and red (upper dashdot) for \(m_{\text {s}} = 1\) and 1000, respectively

Fig. 6
figure 6

Number of modes at which the key rate of the multimode protocol exceeds the PLOB limit at each distance (crossover modes). Until the distance reaches approximately 270 km, it is infeasible to surpass the PLOB limit. However, beyond this range, it becomes possible to exceed the PLOB limit utilizing approximately 1000 modes, within the practical distance range

Fig. 7
figure 7

At a distance of 400 km, the key rate of the multimode AFC protocol depends on the number of modes. Specifically, the rate increases by \(O(m^2_{\text {s}})\) as the number of modes \(m_{\text {s}}\) increases. Furthermore, when 1000 modes or more are utilized, the multimode AFC protocol surpasses the PLOB bound

The incorporation of multiplexing in the S-BSM is considered, where \(\eta _{\text {d}}, \eta _{{\text {ent}}}\) represent the detector efficiency and entanglement source efficiency, respectively. The mathematical framework for the analysis of spatial multiplexing is equivalent to that of frequency multiplexing. Despite the experimental differences between frequency and spatial multiplexing, 36 modes of transmission have been achieved using a single fiber [49], with ongoing efforts to develop spatial multiplexing in QMs [50]. As shown in Fig. 5, the plateau region became larger with an increase in the number of modes \(m_{\text {s}}\). The key rate of the multimode AFC protocol, i.e., the original MDI-QKD protocol, for \(m_{\text {s}}=1\) was significantly below the PLOB bound; however, for \(m_{\text {s}}=10,000\), the key rate of the multimode AFC protocol surpassed the PLOB bound. As shown in Fig. 5, the key rate increased by \(O(m_{\text {s}}^2)\) at long distances as the number of modes in frequency (spatial) multiplexing \(m_{\text {s}}\) increased. This analysis indicates that the improvement persists even after normalization by the number of modes, providing motivation for experimental efforts to increase the number of modes in frequency (spatial) multiplexing, even in the absence of a quantum repeater with multiple links (\(N\ge 2\)).

In the scheme depicted in Fig. 1b, it should be noted that the QM necessitates only fixed-time storage, rather than on-demand storage.

Figure 6 illustrates that the number of crossover modes in the multimode protocol is approximately 1000 within the range of 300–500 km. As depicted in Fig. 7, the key rate is also equivalent to the PLOB bound before the number of modes reaches 1000, but in \(\mathrm {Pr^{3+}:Y_2SiO_5}\), the number of modes that can be stored by frequency multiplexing is currently limited to approximately 100. To exceed this number, the utilization of either spatial or temporal multiplexing is necessary. Theoretically, 100-mode multiplexing is possible through the incorporation of spatial multiplexing [45], increasing the total number of modes to \(10^4\). In this context, the middle BSM is executed in a single mode. Consequently, despite the increase in \(\eta _{K}^{{\text {mm}}}\) due to multiplexing, the maximum attainable number of bits in a single round remains limited to 1. Thus, with an increase in the parameter \(m_{\text {s}}\), the key rate eventually reaches a plateau, as depicted in Figs. 5 and 7.

4 Conclusion

We examined the MA-MDI-QKD configuration utilizing a multimode QM. We analyzed the impact on the key rate. The results indicated that the protocol utilizing the QM with on-demand storage yields a key rate of \(O(\sqrt{\eta _{{\text {ch}}}})\), which depends on \(T_2\). In comparison, the protocol utilizing multimode storage achieves a key rate increase of \(O(m_{\text {s}}^2)\) through frequency (spatial) multiplexing. Furthermore, with current technology, frequency multiplexing alone yields \(m_{\text {s}}\sim 100\) in the AFC, but when frequency multiplexing and spatial multiplexing are combined, it is possible to exceed the PLOB bound. This outcome indicates that multiplexing has considerable potential for single-element QKD protocols and is effective for single quantum-repeater node protocols. In future, advancements in QMs can extend these configurations to scalable quantum repeaters and contribute to rate enhancement through multimode quantum repeaters or QKDs. Additionally, the theoretical and experimental work on these protocols brings us closer to the ultimate goal of the quantum internet, as it serves as a stepping stone between point-to-point QKD and full quantum-repeater networks.