introduction and overview of the field can be found, for example, in the following review articles.1–4Here, we
will just briefly recall the main ideas and concepts. Central to QKD is the so-called no-cloning theorem that
states that an arbitrary quantum state, and therefore the quantum information it is carrying, cannot be simply
copied, which is the key ingredient for the security of QKD. Due to their transmission properties and minimal
interaction with the environment, quantum states of light are usually used to encode and distribute quantum
information based on which it is possible to extract a secure key for encryption afterwards. In QKD, there
are two main branches, namely the continuous-variable (CV) and discrete-variable (DV) regime. In the former,
quantum information is encoded in the field properties of an optical mode while in the latter one properties and
correlations of individual photons are used. In the DV regime the most common approaches are the prepare and
measure protocols based on so-called BB84 protocol5and entanglement-based approaches which exploit quantum
entanglement between two photons.6,7As the name already suggests, prepare and measure protocols need an
active encoding of the information onto the quantum state of a single photon or weak coherent states if one uses
the decoy-state protocol.8This active encoding demands that one communication partner (usually called Alice)
possesses the sending device, that the device is trusted, and that one has access to true random numbers for
the active encoding. On the other hand, entanglement-based schemes are based on the creation of two entan-
gled photons through a physical process and the subsequent distribution of these photons to the communication
partners Alice and Bob. This approach does not require that one of the communication partners possesses the
source of entangled photons nor is it necessary to trust the device as the quantum correlations between the two
photons measured by the communication partners cannot be emulated or faked by a malicious adversary. For
BB84 and entanglement-based protocols one has to choose the degree of freedom (physical property) in which one
wants to encode and measure the quantum information that can be, for example, polarization, time, or orbital
angular momentum. Note that there exist also other QKD schemes such as measurement-device independent or
twin-field QKD; again, see Refs. 1–4for an overview.
Let us briefly recall some further fundamentals of entangled-photon sources. In principle, there are several
physical processes that allow to generate entangled photons for QKD such as exciton decay in quantum-dots9or
nonlinear optical processes like spontaneous parametric down-conversion (SPDC) (see, e.g. Ref. 10) or four-wave
mixing.11 SPDC is the most advanced and most broadly used technique for implementing entanglement-based
QKD. Its basic working principle is the conversion of pump photons in a material with second-order nonlinearity
into two (down-converted) photons that are entangled. Depending on the design of the SPDC source, the
generated photons are entangled in different degrees of freedom and can even feature simultaneous entanglement
– so-called hyperentanglement – in several degrees of freedom.12 Notably, high-dimensional degrees of freedom
provide a larger information content per sent photon13 and show better resistance against noise.14 An overview
on different designs of entangled photon sources (EPS) can be found in Ref. 15. Among others, important
parameters of SPDC source are: the SPDC emission spectrum, the source’s heralding efficiency, the brightness
describing the average number of entangled photon pairs per second (and per pump power and spectral width),
and deviations from the ideal (maximally entangled) target state. A definition of these properties and their
influence on the performance of QKD protocols can be found in Ref. 16. It is also important to mention that
entangled photons cannot only be used for QKD applications but they will be an essential building block of a
future quantum internet.
The fundamental principle which provides security in QKD systems also limits the implementation, as quan-
tum information cannot be simply amplified resulting in the fact that losses (attenuation) play a crucial role
in QKD. Therefore, the implementation of QKD systems is practically limited to a few hundred kilometers in
optical fibers,17,18 because the losses in fiber systems scale exponentially with the communication distance. A
possible way to overcome this problem is to use satellite-to-ground links, which do not scale exponentially with
the distance between the communication parties and therefore even allow for global quantum communication.
An overview on free-space satellite QKD implementations is provided in Section 2. The implementation of free-
space QKD links, however, needs to deal with the influence of the turbulent atmosphere19,20 that can have a
detrimental effect on the transmitted quantum correlations.21–23 Additionally, the losses in satellite-based QKD
are still high which limits the attainable key rate. Therefore, it is important to develop strategies to optimize
and maximize the achievable secure key rate in satellite QKD systems.
In this paper, we present potential advances in future entanglement-based QKD systems involving satellites,
including their demands and challenges. The discussed approaches cover the exploitation of physical properties