Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
<p>(Color online) (<b>a</b>) The prepare-and-measure (PM) scheme of the unidimensional (UD) two-way protocol. Here, the two quantum channels are fully controlled by Eve while she has no access to the apparatuses in Alice’s and Bob’s stations. (<b>b</b>) Symmetrical Gaussian modulated coherent state on a phase space. (<b>c</b>) UD modulated coherent state on a phase space, assuming only <span class="html-italic">x</span> quadrature was modulated, which means, the coherent state can only be shifted along <span class="html-italic">x</span> on the phase space. Here, <math display="inline"><semantics> <msub> <mi>x</mi> <mi>A</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>p</mi> <mi>A</mi> </msub> </semantics></math> are two independent identically distributed Gaussian random variables, and the coordinates describe the centers of the shifted coherent states. (BS: beam splitter, AM: amplitude modulator, PM: phase modulator).</p> "> Figure 2
<p>(Color online) The entanglement-based (EB) scheme of the UD two-way protocol against two-mode collective attacks, where Eve has full control of the quantum channels while she has no access to the apparatuses in Alice’s and Bob’s stations. At Alice’s side, one mode of the EPR pair is measured by homodyne detection while the other mode is sent to a squeezer, this part is equivalent to the PM scheme of UD modulation with coherent state. The blue beam splitter with a transmittance of <math display="inline"><semantics> <msub> <mi>T</mi> <mi>A</mi> </msub> </semantics></math> is used to couple Alice’s state with Bob’s state. (QM: quantum memory, <math display="inline"><semantics> <msub> <mi>B</mi> <mn>0</mn> </msub> </semantics></math> vacuum state).</p> "> Figure 3
<p>(Color online) Secret key rate of UD two-way CV-quantum key distribution (QKD) protocol under all accessible two-mode attacks under different situations. (<b>a</b>) At 5 km while <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.956</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math>. (<b>b</b>) At 5 km while <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <msup> <mn>10</mn> <mn>3</mn> </msup> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math>. (<b>c</b>) At 10 km while <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.956</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math>. (For all simulations <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> "> Figure 4
<p>(Color online) Comparisons of secret key rates between UD two-way CV-QKD protocol (solid line) and a sub-protocol (<math display="inline"><semantics> <mrow> <mi>H</mi> <mi>e</mi> <mi>t</mi> <mo>−</mo> <mi>H</mi> <mi>o</mi> <msub> <mi>m</mi> <mi>M</mi> </msub> </mrow> </semantics></math>) of the conventional symmetrical Gaussian modulated two-way CV-QKD protocol family [<a href="#B20-entropy-23-00294" class="html-bibr">20</a>] (dashed line), under ideal and practical situations. The attack strategies against both protocols are one-mode attack. (<b>a</b>) Ideal situations where <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <msup> <mn>10</mn> <mn>3</mn> </msup> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math> (red line), <math display="inline"><semantics> <mrow> <mn>0.045</mn> </mrow> </semantics></math> (blue line) and <math display="inline"><semantics> <mrow> <mn>0.05</mn> </mrow> </semantics></math> (black line). (<b>b</b>) Practical situations where <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.956</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math> (red line), <math display="inline"><semantics> <mrow> <mn>0.045</mn> </mrow> </semantics></math> (blue line), <math display="inline"><semantics> <mrow> <mn>0.05</mn> </mrow> </semantics></math> (black line). (For both protocols <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> "> Figure 5
<p>(Color online) Comparison of tolerable excess noise between UD two-way CV-QKD protocol (solid lines) and the sub-protocol (<math display="inline"><semantics> <mrow> <mi>H</mi> <mi>e</mi> <mi>t</mi> <mo>−</mo> <mi>H</mi> <mi>o</mi> <msub> <mi>m</mi> <mi>M</mi> </msub> </mrow> </semantics></math>) of the conventional symmetrical Gaussian modulated two-way protocol family (dashed lines), the red lines represent the ideal situations and the blue lines represent the practical situations. (The attack strategies against both protocols are one-mode attack, and for both protocols <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> "> Figure 6
<p>(Color online) Comparison of secret key rate between UD two-way CV-QKD protocol against the optimal two-mode attack (red line) and the one-mode attack (black line). Here, the solid line represents the practical situation, the dashed line and the dotted line represent the ideal situation. (For both cases <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> ">
Abstract
:1. Introduction
2. The Schemes of Unidimensional Two-Way CV-QKD Protocol
3. Security Analysis of the Protocol Against Two-Mode Attack
3.1. Two-Mode Attack Strategy
3.2. The Secret Key Rate of the Protocol
4. Simulation and Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
- Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photon. 2020, 12, 1012–1236. [Google Scholar] [CrossRef] [Green Version]
- Xu, F.; Ma, X.; Zhang, Q.; Lo, H.-K.; Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
- Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621. [Google Scholar] [CrossRef]
- Diamanti, E.; Leverrier, A. Distributing secret keys with quantum continuous variables: Principle, Security and Implementations. Entropy 2015, 17, 6072–6092. [Google Scholar] [CrossRef]
- Guo, H.; Li, Z.; Yu, S.; Zhang, Y. Toward practical quantum key distribution using telecom components. Fundam. Res. 2021, 1, 96–98. [Google Scholar] [CrossRef]
- Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378. [Google Scholar] [CrossRef]
- Kumar, R.; Qin, H.; Alléaume, R. Coexistence of continuous variable QKD with intense DWDM classical channels. New J. Phys. 2015, 17, 043027. [Google Scholar] [CrossRef]
- Zhang, G.; Haw, J.Y.; Cai, H.; Xu, F.; Assad, S.; Fitzsimons, J.F.; Zhou, X.; Zhang, Y.; Yu, S.; Wu, J. An integrated silicon photonic chip platform for continuous-variable quantum key distribution. Nat. Photonics 2019, 13, 839. [Google Scholar] [CrossRef]
- Zhang, Y.; Li, Z.; Chen, Z.; Weedbrook, C.; Zhao, Y.; Wang, X.; Huang, Y.; Xu, C.; Zhang, X.; Wang, Z. Continuous-variable QKD over 50 km commercial fiber. Quantum Sci. Technol. 2019, 4, 035006. [Google Scholar] [CrossRef] [Green Version]
- Eriksson, T.A.; Hirano, T.; Puttnam, B.J.; Rademacher, G.; Luís, R.S.; Fujiwara, M.; Namiki, R.; Awaji, Y.; Takeoka, M.; Wada, N. Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels. Commun. Phys. 2019, 2, 9. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Chen, Z.; Pirandola, S.; Wang, X.; Zhou, C.; Chu, B.; Zhao, Y.; Xu, B.; Yu, S.; Guo, H. Long-distance continuous-variable quantum key distribution over 202.81 km of fiber. Phys. Rev. Lett. 2020, 125, 010502. [Google Scholar] [CrossRef]
- Navascués, M.; Grosshans, F.; Acín, A. Unconditional optimality of gaussian attacks against continuous-variable qantum key distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef] [Green Version]
- García-Patrón, R.; Cerf, N.J.; Acín, A. Optimality of gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef] [Green Version]
- Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Leverrier, A. Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction. Phys. Rev. Lett. 2017, 118, 200501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lupo, C.; Ottaviani, C.; Papanastasiou, P.; Pirandola, S. Parameter estimation with almost no public communication for continuous-variable quantum key distribution. Phys. Rev. Lett. 2018, 120, 220505. [Google Scholar] [CrossRef] [Green Version]
- Pirandola, S. Satellite quantum communications: Fundamental bounds and practical security. arXiv 2020, arXiv:2012.01725. [Google Scholar]
- Pirandola, S.; Mancini, S.; Lloyd, S.; Braunstein, S.L. Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 2008, 4, 726. [Google Scholar] [CrossRef] [Green Version]
- Sun, M.; Peng, X.; Shen, Y.; Guo, H. Security of a new two-way continuous-variable quantum key distribution. Int. J. Quantum Inf. 2012, 10, 1250059. [Google Scholar] [CrossRef] [Green Version]
- Sun, M.; Peng, X.; Guo, H. An improved two-way continuous-variable quantum key distribution protocol with added noise in homodyne detection. J. Phys. B At. Mol. Opt. Phys. 2013, 46, 085501. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.-C.; Li, Z.; Weedbrook, C.; Yu, S.; Gu, W.; Sun, M.; Peng, X.; Guo, H. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers. J. Phys. B At. Mol. Opt. Phys. 2014, 47, 035501. [Google Scholar] [CrossRef] [Green Version]
- Weedbrook, C.; Ottaviani, C.; Pirandola, S. Two-way quantum cryptography at different wavelengths. Phys. Rev. A 2014, 89, 012309. [Google Scholar] [CrossRef] [Green Version]
- Wang, T.; Yu, S.; Zhang, Y.-C.; Gu, W.; Guo, H. Security of two-way continuous-variable quantum key distribution with source noise. J. Phys. B At. Mol. Opt. Phys. 2014, 47, 215504. [Google Scholar] [CrossRef]
- Ottaviani, C.; Mancini, S.; Pirandola, S. Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation. Phys. Rev. A 2015, 92, 062323. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Li, Z.; Zhao, Y.; Yu, S.; Guo, H. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation. J. Phys. B At. Mol. Opt. Phys. 2017, 50, 035501. [Google Scholar] [CrossRef] [Green Version]
- Zhao, Y.; Zhang, Y.; Li, Z.; Yu, S.; Guo, H. Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction. Quantum Inf. Process. 2017, 16, 184. [Google Scholar] [CrossRef] [Green Version]
- Usenko, V.; Grosshans, F. Unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2015, 92, 062337. [Google Scholar] [CrossRef] [Green Version]
- Usenko, V. Unidimensional continuous-variable quantum key distribution using squeezed states. Phys. Rev. A 2018, 98, 032321. [Google Scholar] [CrossRef] [Green Version]
- Wang, X.; Cao, Y.; Wang, P.; Li, Y. Advantages of the coherent state compared with squeezed state in unidimensional continuous variable quantum key distribution. Quantum Inf. Process 2018, 17, 344. [Google Scholar] [CrossRef] [Green Version]
- Huang, L.; Zhang, Y.; Chen, Z.; Yu, S. Unidimensional continuous-variable quantum key distribution with untrusted detection under realistic conditions. Entropy 2019, 21, 1100. [Google Scholar] [CrossRef] [Green Version]
- Bai, D.; Huang, P.; Zhu, Y.; Ma, H.; Xiao, T.; Wang, T.; Zeng, G. Unidimensional continuous-variable measurement-device-independent quantum key distribution. Quantum Inf. Process 2020, 19, 53. [Google Scholar] [CrossRef] [Green Version]
- Wang, P.; Wang, X.; Li, J.; Li, Y. Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions. Optics Express 2017, 25, 27995–28009. [Google Scholar] [CrossRef]
- Huang, L.; Zhang, Y.; Huang, Y.; Jiang, T.; Yu, S. Improvement of unidimensional continuous-variable quantum key distribution systems by using a phase-sensitive amplifier. J. Phys. B At. Mol. Opt. Phys. 2019, 52, 225502. [Google Scholar] [CrossRef]
- Wang, P.; Wang, X.; Li, Y. Security analysis of unidimensional continuous-variable quantum key distribution using uncertainty relations. Entropy 2018, 20, 157. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Wang, X.; Liu, W.; Wang, P.; Li, Y. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2017, 95, 062330. [Google Scholar] [CrossRef] [Green Version]
- Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397–402. [Google Scholar] [CrossRef] [Green Version]
- Pirandola, S.; Serafini, A.; Lloyd, S. Correlation matrices of two-mode bosonic systems. Phys. Rev. A 2009, 79, 052327. [Google Scholar] [CrossRef]
- Devetak, I.; Winter, A. Distillation of secret key and entanglement from quantum states. Proc. Roy. Soc. A 2005, 461, 207–235. [Google Scholar] [CrossRef] [Green Version]
- Holevo, A.S. Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Inf. Transm. 1973, 9, 177. [Google Scholar]
- Milicevic, M.; Feng, C.; Zhang, L.M.; Gulak, P.G. Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography. NPJ Quantum Inf. 2018, 4, 21. [Google Scholar] [CrossRef] [Green Version]
- Zhou, C.; Wang, X.; Zhang, Y.; Zhang, Z.; Yu, S.; Guo, H. Continuous-variable quantum key distribution with rateless reconciliation protocol. Phys. Rev. Appl. 2019, 12, 054013. [Google Scholar] [CrossRef] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bian, Y.; Huang, L.; Zhang, Y. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Entropy 2021, 23, 294. https://doi.org/10.3390/e23030294
Bian Y, Huang L, Zhang Y. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Entropy. 2021; 23(3):294. https://doi.org/10.3390/e23030294
Chicago/Turabian StyleBian, Yiming, Luyu Huang, and Yichen Zhang. 2021. "Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States" Entropy 23, no. 3: 294. https://doi.org/10.3390/e23030294