
3
pulse, such as the back-reflected light from a THA (see
Appendix C for more details). Note that |ψj,giBk,Ekin
Eq. (1) is a uniquely determined pure state once jand
gkare fixed. However, here we write g, rather than gk,
because as explained above, in our security proof the pa-
rameter g, which contains gkfor any k, is fixed at the
beginning of the protocol.
From construction, Eq. (1) is the most general descrip-
tion of the transmitted states within the framework of
setting-independent correlations, since it is simply an ex-
pansion of the most general state |ψj,giBk,Ekin the basis
{|φj,giBk,Ek,|φ⊥
j,giBk,Ek}[31, 53]. In Eq. (1) the param-
eter (k)
j,g∈[0,1] quantifies the deviation of |ψj,giBk,Ek
from the qubit state |φj,giBk,Ek:=|ωj,giBk|λgiEk,
where |ωj,giBkis the state that Alice would send to
Bob in the absence of side channels and |λgiEkis a
setting-independent state for the current round. Note
that the state |ωj,giBkincorporates any imperfections
in a qubit space, such as SPFs and phase fluctuations.
The side channels are represented in Eq. (1) by the state
|φ⊥
j,giBk,Ek, which can live in a Hilbert space of arbitrary
dimension and is orthogonal to |φj,giBk,Ek. In other
words, the state |φ⊥
j,giBk,Ekcorresponds to unwanted
and possibly unknown modes, and it can incorporate side
channels other than setting-dependent pulse correlations,
such as THAs and mode dependencies.
In the setting-dependent scenario, the emitted state
for each round kcan instead be expressed as,
ψj,g|jk−1,...,jk−lcBk,Ek=q1−(k)
j,g|jk−1,...,jk−lc|φj,giBk,Ek
+q(k)
j,g|jk−1,...,jk−lc|φ⊥
j,g|jk−1,...,jk−lciBk,Ek,(2)
where jk−1, . . . , jk−lcrepresents the dependence of
the kth pulse on Alice’s previous lcsetting choices.
As before, Eq. (2) is simply an expansion of the
state |ψj,g|jk−1,...,jk−lciBk,Ekin the basis {|φj,giBk,Ek,
|φ⊥
j,g|jk−1,...,jk−lciBk,Ek}, and within the framework of
classical pulse correlations, this is the most general de-
scription of the transmitted states. Note that the state
|φ⊥
j,g|jk−1,...,jk−lciBk,Ekin Eq. (2), besides incorporating
all the side channels in |φ⊥
j,giBk,Ek, also takes into ac-
count setting-dependent pulse correlations.
Importantly, due to the form of Eqs. (1) and (2), one
can apply the RT to prove the security of the modified
BB84 protocol as long as the following assumptions hold.
A. Assumptions on Alice’s transmitting unit
(A1) For all rounds of the protocol, Alice chooses the
setting jwith a fixed probability pj, with p0Z=
p1Z.
Alice’s setting selection in a given round is inde-
pendent of those of other rounds, and Eve cannot
tamper with her selection probabilities.
(A2) As described above, we consider two different sce-
narios for the source, which result in two security
analyses with different assumptions:
a. The emitted states do not depend on Alice’s
previous setting choices – Eq. (1).
We assume that an upper bound U≥(k)
j,gis
known for all k,jand g. Note that, even in
this case, the states emitted in different rounds
of the protocol are not necessarily independent
and identically distributed (IID) because the
random variables G1,...,GNthat represent the
setting-independent factors may be correlated
between consecutive rounds. We show the secu-
rity analysis under this scenario in Section III A.
b. The emitted states depend on Alice’s previous
lcsetting choices – Eq. (2).
We assume that an upper bound 0U≥
(k)
j,g|jk−1,...,jk−lcis known for all k,j,g, and
jk−1, . . . , jk−lc. Moreover, we assume that the
state of the kth pulse is affected by gand Al-
ice’s previous lcsetting choices, and that lcis a
known parameter. The analysis under this sce-
nario is given in Section III B. As we shall see,
the data post-processing in this case must be
done differently. In particular, one needs to di-
vide the sifted key in (lc+ 1) groups, and then
perform the parameter estimation and privacy
amplification separately for each group (see Ap-
pendix A).
We emphasise that, while knowing the upper bound
U(0U) is a requirement to apply the RT, the char-
acterisation of the side-channel states |φ⊥
j,giBk,Ek
(|φ⊥
j,g|jk−1,...,jk−lciBk,Ek) is not needed. In other
words, the inner products hφ⊥
j,g|φ⊥
j0,giBk,Ek
(hφ⊥
j,g|jk−1,...,jk−lc|φ⊥
j0,g|jk−1,...,jk−lciBk,Ek) and
hφj,g|φ⊥
j0,giBk,Ek(hφj,g|φ⊥
j0,g|jk−1,...,jk−lciBk,Ek)
with j6=j0can be unknown. Importantly, this
is not a necessary assumption but a fortunate
consequence originating from the freedom to
choose the reference states in the RT when using
the particular inequality Gdefined in Eq. (12).
Since obtaining a full characterisation of the
side-channel states is very challenging in practice,
previous theoretical works [31, 53], as well as this
work, have exploited this advantage to consider
device models that require minimal experimental
characterisation. Nonetheless, it is important
to emphasise that if any information about the
side channels is available it can be incorporated
in the RT framework. This would most likely
lead to higher performances because a better
source characterisation tends to result in a more
accurate estimation of the phase-error rate. In
fact, this has been recently shown for a particular
time-dependent side channel in [28].