[go: up one dir, main page]

Next Article in Journal
Early Universe Thermodynamics and Evolution in Nonviscous and Viscous Strong and Electroweak Epochs: Possible Analytical Solutions
Previous Article in Journal
A Technical Critique of Some Parts of the Free Energy Principle
Previous Article in Special Issue
Non-Invertible Public Key Certificates
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States

State Key Laboratory of Information Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(3), 294; https://doi.org/10.3390/e23030294
Submission received: 16 January 2021 / Revised: 18 February 2021 / Accepted: 23 February 2021 / Published: 27 February 2021
(This article belongs to the Special Issue Quantum Cryptography II)
Figure 1
<p>(Color online) (<b>a</b>) The prepare-and-measure (PM) scheme of the unidimensional (UD) two-way protocol. Here, the two quantum channels are fully controlled by Eve while she has no access to the apparatuses in Alice’s and Bob’s stations. (<b>b</b>) Symmetrical Gaussian modulated coherent state on a phase space. (<b>c</b>) UD modulated coherent state on a phase space, assuming only <span class="html-italic">x</span> quadrature was modulated, which means, the coherent state can only be shifted along <span class="html-italic">x</span> on the phase space. Here, <math display="inline"><semantics> <msub> <mi>x</mi> <mi>A</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>p</mi> <mi>A</mi> </msub> </semantics></math> are two independent identically distributed Gaussian random variables, and the coordinates describe the centers of the shifted coherent states. (BS: beam splitter, AM: amplitude modulator, PM: phase modulator).</p> ">
Figure 2
<p>(Color online) The entanglement-based (EB) scheme of the UD two-way protocol against two-mode collective attacks, where Eve has full control of the quantum channels while she has no access to the apparatuses in Alice’s and Bob’s stations. At Alice’s side, one mode of the EPR pair is measured by homodyne detection while the other mode is sent to a squeezer, this part is equivalent to the PM scheme of UD modulation with coherent state. The blue beam splitter with a transmittance of <math display="inline"><semantics> <msub> <mi>T</mi> <mi>A</mi> </msub> </semantics></math> is used to couple Alice’s state with Bob’s state. (QM: quantum memory, <math display="inline"><semantics> <msub> <mi>B</mi> <mn>0</mn> </msub> </semantics></math> vacuum state).</p> ">
Figure 3
<p>(Color online) Secret key rate of UD two-way CV-quantum key distribution (QKD) protocol under all accessible two-mode attacks under different situations. (<b>a</b>) At 5 km while <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.956</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math>. (<b>b</b>) At 5 km while <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <msup> <mn>10</mn> <mn>3</mn> </msup> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math>. (<b>c</b>) At 10 km while <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.956</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math>. (For all simulations <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> ">
Figure 4
<p>(Color online) Comparisons of secret key rates between UD two-way CV-QKD protocol (solid line) and a sub-protocol (<math display="inline"><semantics> <mrow> <mi>H</mi> <mi>e</mi> <mi>t</mi> <mo>−</mo> <mi>H</mi> <mi>o</mi> <msub> <mi>m</mi> <mi>M</mi> </msub> </mrow> </semantics></math>) of the conventional symmetrical Gaussian modulated two-way CV-QKD protocol family [<a href="#B20-entropy-23-00294" class="html-bibr">20</a>] (dashed line), under ideal and practical situations. The attack strategies against both protocols are one-mode attack. (<b>a</b>) Ideal situations where <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <msup> <mn>10</mn> <mn>3</mn> </msup> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math> (red line), <math display="inline"><semantics> <mrow> <mn>0.045</mn> </mrow> </semantics></math> (blue line) and <math display="inline"><semantics> <mrow> <mn>0.05</mn> </mrow> </semantics></math> (black line). (<b>b</b>) Practical situations where <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.956</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϵ</mi> <mo>=</mo> <mn>0.04</mn> </mrow> </semantics></math> (red line), <math display="inline"><semantics> <mrow> <mn>0.045</mn> </mrow> </semantics></math> (blue line), <math display="inline"><semantics> <mrow> <mn>0.05</mn> </mrow> </semantics></math> (black line). (For both protocols <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> ">
Figure 5
<p>(Color online) Comparison of tolerable excess noise between UD two-way CV-QKD protocol (solid lines) and the sub-protocol (<math display="inline"><semantics> <mrow> <mi>H</mi> <mi>e</mi> <mi>t</mi> <mo>−</mo> <mi>H</mi> <mi>o</mi> <msub> <mi>m</mi> <mi>M</mi> </msub> </mrow> </semantics></math>) of the conventional symmetrical Gaussian modulated two-way protocol family (dashed lines), the red lines represent the ideal situations and the blue lines represent the practical situations. (The attack strategies against both protocols are one-mode attack, and for both protocols <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> ">
Figure 6
<p>(Color online) Comparison of secret key rate between UD two-way CV-QKD protocol against the optimal two-mode attack (red line) and the one-mode attack (black line). Here, the solid line represents the practical situation, the dashed line and the dotted line represent the ideal situation. (For both cases <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>0.8</mn> </mrow> </semantics></math>).</p> ">
Versions Notes

Abstract

:
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.

1. Introduction

Quantum key distribution (QKD) [1] is an effective way to ensure communication security and resist the impact of quantum computing on an encryption system [2,3]. Based on the principles of quantum mechanics, a QKD protocol enables two trusted parties, usually called Alice and Bob, to distill secret keys with unconditional security in theory. Over the last three decades, QKD has developed rapidly and spawned two branches, discrete-variable QKD and continuous-variable QKD (CV-QKD) [4,5]. Compared with the discrete-variable QKD, CV-QKD has higher compatibility of standard telecom components [6], which reduces the cost, improves the integration and facilitates the large-scale application of QKD [7,8,9,10,11,12]. In recent years, CV-QKD has gathered momentum: the transmission distance of CV-QKD has been further extended in commercial fibers [10], low loss optical fibers in laboratory [12], and the theory of CV-QKD has also been widely improved [13,14,15,16,17,18].
To enhance the tolerable excess noise of the CV-QKD system, the two-way CV-QKD protocol was proposed [19]. In this protocol, Bob sends states to Alice through the forward channel. After which, Alice couples her own states with the received states and then sends them back to Bob through the backward channel. In this way, the information of the secret key is loaded onto the coupled quantum state, and transferred from Alice to Bob. In order to obtain the key information, an eavesdropper, Eve, must eavesdrop on both channels at the same time, which directly increases the eavesdropping difficulty. The structure is more beneficial to Alice and Bob when the channel is too noisy compared to the one-way protocol. Afterwards, an improved two-way CV-QKD protocol has also been proposed to make the two-way system easier to implement by replacing Alice’s displacement operation with a beam splitter [20], which promotes the practical application of two-way protocol, and thus, has been widely studied [21,22,23,24,25,26,27]. Although the performance of the two-way protocol is better than that of the one-way protocol, the complexity of the protocol is fairly high: It takes up two quantum channels and requires Gaussian modulation in both x and p quadratures at both Alice’s and Bob’s side. Therefore, it is necessary to build a simpler and more feasible two-way scheme.
Reducing the number of the modulators by waiving the symmetry of modulation is one of the strategies to simplify the protocol, namely, the unidimensional (UD) modulation [28]. It simplifies the system by abandoning one quadrature of the modulations, and shows a comparable performance to the conventional Gaussian modulated ones under low noise conditions [28]. Until now, the feasibility of using UD modulation has been demonstrated in the squeezed state protocol [29,30] and the measurement-device-independent protocol [31,32]. Simultaneously, the analysis of UD CV-QKD protocol in practical situations has been improved [33], and the methods to enhance the performance of UD protocol have also been proposed [34,35]. In addition, with single amplitude modulator, the UD protocol has been tested experimentally [36]. Considering that, on the one hand, the using of UD modulation is conducive to the simplification of two-way system. On the other hand, the high anti-noise performance of the two-way system contributes to the compensation of the sensitivity to noise caused by UD modulation. A simplified two-way CV-QKD with UD modulation is expected to have good performance.
In this paper, a UD two-way CV-QKD protocol is proposed. UD modulation is used at Alice’s side instead of the conventional Gaussian modulation, which enables the two-way system to work with a single quadrature modulation. In this way, the complexity of the protocol and the number of quantum random numbers required are reduced. In this protocol, Bob still uses conventional Gaussian modulation to reduce the complexity of security analysis, and to avoid dramatic degradation of the protocol performance caused by multiple use of unidimensional modulation. For security analysis of a two-way protocol, a general two-mode attack strategy is used: Eve is assumed to have the ability to exploit the correlation between the modes used to attack the forward channel and backward channel. To illustrate the system performance against the general two-mode attack, we derive the expressions of the secret key rate of the protocol against general two-mode attacks and perform simulations of the protocol against all accessible two-mode attacks at fixed distance. Furthermore, two typical two-mode attack strategies, namely, the one-mode attack strategy and the optimal two-mode attack strategy, are obtained from the general two-mode attack, which are the simplest and the most complex cases of the general two-mode attack strategy, respectively. For the one-mode attack, there is no correlation between the two attack modes, while for the optimal two-mode attack, Eve is able to find the optimal attack correlations and minimize the performance of the protocol. Under these two attack strategies, performances of the protocol within secure transmission distances are simulated and compared with that of symmetrical modulated counterparts.

2. The Schemes of Unidimensional Two-Way CV-QKD Protocol

In this part, we first introduce the difference between UD modulation and symmetrical Gaussian modulation with the prepare-and-measure (PM) scheme of the UD two-way CV-QKD protocol. Then the entanglement-based (EB) scheme is illustrated, and the reason of using this modulation strategy is explained.
In terms of the structure of the protocol, as shown in Figure 1, the UD modulation is used at Alice’s side and the symmetrical modulation is used at Bob’s side. The most different part between the UD protocol and the symmetrical Gaussian modulated protocol is the number of the modulators. The symmetrical Gaussian modulation modulates x quadrature and p quadrature simultaneously, while the UD modulation modulates only one single quadrature (amplitude quadrature x or phase quadrature p). In this way, CV-QKD can be performed with only one modulator and the complexity of the protocol is reduced. Without loss of generality, the x quadrature is used in the discussion below.
The EB scheme of the UD two-way protocol is shown in Figure 2, and can be described as follows:
Step 1. Alice prepares an EPR state with variance V A . She measures one mode A 1 with homodyne detection and sends the other mode A 2 to a squeezer, which is equivalent to the unidimensional modulation in the PM scheme [35]. At the same time, Bob prepares another EPR state with variance V B . He keeps one mode B 1 and sends the other mode B 2 to Alice through C h a n n e l 1 where Eve may perform an attack.
Step 2. Alice couples the received mode A i n with her own mode A 3 through a beam splitter, she then sends the coupling mode A o u t back to Bob through C h a n n e l 2 while measuring mode A 4 with homodyne detection for parameter estimation.
Step 3. Bob measures the retained mode B 1 with heterodyne detection to get x B 1 x and p B 1 p , and the received mode B 3 is measured with homodyne detection by him to get x B 3 .
Step 4. Bob uses x B x = x B 3 k x B 1 x to construct the estimator to Alice’s corresponding variable x A . Here k is the parameter used to optimize Bob’s estimator of Alice’s corresponding value. Then the postprocessing including reconciliation and privacy amplification is performed.
It is essential to note that although the p quadrature is not modulated, it still needs to be measured sometimes to gather the properties of the channel in the p quadrature in order to ensure the security, and the impact of these measurements on secret key rate is considered negligible [28].
The cost of the simplification by using UD modulation is that the p quadrature is not modulated, which results in the impossibility of estimating the correlation and the channel transmittance in p. Thus, after passing the quantum channel, an unknown parameter C o r p is introduced into the security analysis to represent the unknown correlation in p quadrature [28], which has a negative impact on the performance of the protocol. In addition to the scheme shown in Figure 1, UD modulation can also be used solely at Bob’s side (while Alice still uses symmetrical Gaussian modulation) or both at Alice’s and Bob’s sides. However, by calculation, these two schemes introduce one or two more unknown parameters into the covariance matrix compared with the scheme shown in Figure 1, mainly because the two-way scheme amplifies the loss of correlation caused by UD modulation in these cases. Considering that more unknown parameters result in more loopholes open to eavesdropper and make numerical simulation in security analysis difficult, in the following security analysis, we focus on the scheme with UD modulation solely used at Alice’s side.

3. Security Analysis of the Protocol Against Two-Mode Attack

In the security analysis of two-way protocols, one-mode attack strategy is usually used, which assumes that there are no correlations between the two modes of Eve used for attack. However, it has some limitations: It is a special attack structure which can not describe the other attack strategies, and it may not be optimal for the UD two-way protocol. Thus, it is essential to use the general two-mode attack strategies to make a comprehensive analysis. In this section, we first introduce the two-mode attack strategy used by Eve. Then, the process of calculating the secret key rate of the protocol is deduced. To obtain the worst secret key rate and analyze the protocol in the strictest case, we use a double pessimistic worst-case assumption, which is composed of two parts: The first part is used to obtain the optimal attack strategy from the two-mode attack, and the second part is used to get the worst unknown correlation parameters in p quadrature.

3.1. Two-Mode Attack Strategy

The entanglement-based (EB) scheme of two-mode attack strategy is shown in Figure 2. For a two-way system, Eve needs to attack both quantum channels, which makes it more difficult for her to carry out eavesdropping but also enables her to maximize the information eavesdropped by optimizing the correlation of E 1 and E 2 [26,37]. If we simply use a one-mode attack for analysis, the correlation of the two attacking modes cannot be reflected, therefore, a general two-mode attack is used for the following analysis to evaluate the protocol performance comprehensively and to get the optimal attack strategy.
As shown in Figure 2, Eve mixes the modes B 2 and A o u t with E 1 and E 2 in C h a n n e l 1 and C h a n n e l 2 , through beam splitters with transmissivity T 1 and T 2 . The other modes e, together with E 1 and E 2 , form a whole, and can be globally described by a pure Gaussian state. Afterwards, E 1 , E 2 and e are stored in a quantum memory and measured at the end of the protocol. The covariance matrix of E 1 and E 2 has the normal form
γ E 1 E 2 = V E 1 · I 2 C E 1 E 2 C E 1 E 2 V E 2 · I 2
where C E 1 E 2 = C x 0 0 C p is the correlation parameter matrix between E 1 and E 2 , I 2 = 1 0 0 1 . V E 1 = 1 + T 1 ϵ 1 T 1 , V E 2 = 1 + T 2 ϵ 1 T 2 are the variances of the thermal noise. Here T 1 and T 2 are given by T 1 = T 2 = 10 α L / 10 , and α = 0.2 d B / k m is the loss coefficient of the optical fibers. ϵ is the excess noise, for simplicity, we assume that the excess noise of the two channels are the same. Thus, when ϵ and L are fixed, V E 1 and V E 2 are also determined accordingly. At this point, Eve’s attack strength is totally determined by C x and C p .
To explore the performance of the protocol in the worst case, the ability of Eve is maximized: We assume that Eve is able to determine C x and C p arbitrarily within the limits of physical existence condition [26,37,38], and she can further find the optimal attack parameters C E 1 E 2 w o r s t to minimize the performance of the protocol. This is the first part of our double pessimistic worst-case assumption.
The bound of C x and C p can be written as
γ E 1 E 2 > 0 , v 1 ,
where v is the least symplectic eigenvalue of γ E 1 E 2 , written as
v = 0.5 ( Δ Δ 2 4 det ( γ E 1 E 2 ) ) ,
with
Δ = V E 1 2 + V E 2 2 + 2 C x C p .
From γ E 1 E 2 > 0 , the following restriction is derived,
C x < V E 1 V E 2 , C p < V E 1 V E 2 .

3.2. The Secret Key Rate of the Protocol

In reverse reconciliation, the secret key rate K of the protocol against two-mode Gaussian attacks is given by [39]
K = β I ( A : B ) χ ( B : E ) ,
where β is the reconciliation efficiency, I ( A : B ) is the classical mutual information between Alice and Bob, and χ ( B : E ) is the upper bound of the von Neumann entropy between Eve and Bob, called the Holevo bound [40]. I ( A : B ) and χ ( B : E ) can be derived from the covariance matrix γ A 1 A 4 B 1 B 3 and γ A 1 A 4 B 6 B 1 p B x , which describes the system after the modes go through the channels, and the system after the measurements, respectively. Here, I A B is given by
I ( A : B ) = 0.5 l o g 2 ( V A 1 / V A 1 x B x ) ,
where V A 1 = γ A 1 A 4 B 6 B 1 p B x ( 2 , 2 ) and V A 1 x B x = γ A 1 A 4 B 6 B 1 p B x ( 1 , 1 ) . Assuming that Eve can purify Alice and Bob’s system, χ ( B : E ) is given by
χ ( B : E ) = S ( ρ A 1 A 4 B 1 B 3 ) S ( ρ A 1 A 4 B 6 B 1 p x B x ) = i = 1 4 G ( λ i 1 2 ) j = 5 8 G ( λ j 1 2 ) ,
where λ 1 4 and λ 5 8 are the symplectic eigenvalues of the covariance matrix γ A 1 A 4 B 1 B 3 , and γ A 1 A 4 B 6 B 1 p x B x .
The derivation of the above two matrices is as follows. First, the covariance matrix which describes the states A 1 , A 2 , B 1 and B 2 is given by
γ A 1 A 2 B 1 B 2 = V A · I 2 V A 2 1 · σ z 0 · I 2 0 · I 2 V A 2 1 · σ z V A · I 2 0 · I 2 0 · I 2 0 · I 2 0 · I 2 V B · I 2 V B 2 1 · σ z 0 · I 2 0 · I 2 V B 2 1 · σ z V B · I 2 ,
where σ z = 1 0 0 1 , V A and V B are the variances of Alice’s EPR state and Bob’s EPR state. Then, after A 2 goes through the squeezer, which is equivalent to the UD modulation in PM scheme, the covariance matrix which describes the state A 1 , A 3 is given by
γ A 1 A 3 = V A 0 V A ( V A 2 1 ) 0 0 V A 0 ( V A 2 1 ) V A V A ( V A 2 1 ) 0 V A 2 0 0 ( V A 2 1 ) V A 0 1 .
After transmission through quantum channels, following the channel transmission relationships as below
A i n = T 1 B 2 + 1 T 1 E 1 , A 4 = T A A 3 1 T A A i n , A o u t = T A A i n + 1 T A A 3 , B 3 = T 2 A o u t + 1 T 2 E 2 .
The covariance matrix which describes the states A 1 , A 4 , B 1 and B 3 is given by
γ A 1 A 4 B 1 B 3 = V A · I 2 C A 1 A 4 0 · I 2 C A 1 B 3 C A 1 A 4 γ A 4 C A 4 B 1 C A 4 B 3 0 · I 2 C A 4 B 1 V B · I 2 C B 1 B 3 C A 1 B 3 C A 4 B 3 C B 1 B 3 γ B 3 ,
where
γ A 4 = T A V A 2 + [ V E T 1 1 T 1 V B ] T A 1 0 0 T A + [ V E T 1 1 T 1 V B ] T A 1 ,
and
γ B 3 = V B 3 x 0 0 V B 3 p .
Here, V B 3 x and V B 3 p and the variances of the x quadrature and p quadrature of B 3 , and have the following form:
V B 3 x = 2 C x T 2 T A T 1 1 T 2 1 V E T 2 1 T 2 V A 2 T A 1 T 2 T A V E T 1 1 + T 1 T 2 T A V B ,
and
V B 3 p = 2 C p T 2 T A T 1 1 T 2 1 V E T 2 1 T 2 T A 1 T 2 T A V E T 1 1 + T 1 T 2 T A V B .
The correlation between modes A 1 and A 4 is represented by
C A 1 A 4 = T A ( V A 2 1 ) V A 0 0 1 / V A ,
and the correlation between modes A 1 and B 3 is represented by
C A 1 B 3 = V A ( V A 2 1 ) T 2 1 T A 0 0 C o r p .
Here, as discussed in Section 2, C o r p is used to represent the unknown correlation in p quadrature and assumed to be bounded by the physical existence condition, which is given by the Heisenberg uncertainty principle. In the strictest case, to get the worst protocol performance degradation caused by the loss of correlation parameters, the worst correlation parameter C o r p w o r s t which minimize the secret key rate is used for security analysis [28,29,30,31,32,33,34,35,36]. In this way, we get the worst key rate under UD modulation, and this is the second part of our double pessimistic worst-case assumption in terms of unknown correlation parameters.
The correlations between modes A 4 and B 1 , and between A 4 and B 3 , are represented by C A 4 B 1 and C A 4 B 3 , written as below:
C A 4 B 1 = ( V B 2 1 ) 1 T A T 1 1 0 0 1 ,
C A 4 B 3 = C A 4 B 3 x 0 0 C A 4 B 3 p ,
with
C A 4 B 3 x = T 2 T A 1 T A V A 2 V B T 1 V E 1 T 1 C x ( 1 T 2 ) 1 T 1 / ( T 2 T A ) ,
and
C A 4 B 3 p = T 2 T A ( 1 T A ) 1 V B T 1 V E 1 T 1 C p ( 1 T 2 ) 1 T 1 / ( T 2 T A ) .
C B 1 B 3 represents the correlation between modes B 1 and B 3 , and can be written as
C B 1 B 3 = ( V B 2 1 ) T 1 T 2 T A 1 0 0 1 .
In the formulas above, T A is the transmission efficiency of the beam splitter at Alice’s side. With heterodyne detection of B 1 at Bob’s side, we can get γ A 1 A 4 B 3 B 1 x B 1 p , which is given by
γ A 1 A 4 B 3 B 1 x B 1 p = γ B S · ( γ A 1 A 4 B 3 B 1 I 2 ) · γ B S T ,
where γ B S = ( I 6 γ B S 0 ) , I 6 is an identity matrix of 6 × 6 , and γ B S 0 = η I 2 I 2 I 2 I 2 . For heterodyne detection, η = 0.5 . In the same way as the original two-way system for covariance matrix derivation [20], the construction of the estimator mentioned in Section 2 can be simplified with a Control-Not gate, thus γ A 1 A 4 B 1 p B 6 B x is given by
γ A 1 A 4 B 1 p B 6 B x = Γ T · γ A 1 A 4 B 1 p B 1 x B 3 · Γ ,
where
Γ = I 6 Γ x ,
and
Γ x = 1 0 k 0 0 1 0 0 0 0 1 0 0 k 0 1
represents a Control-Not gate, k = 2 T A T 1 T 2 V B 1 V B + 1 is used to optimize the performance of system.
Finally we get γ A 1 A 4 B 6 B 1 p x B x , which is given by
γ A 1 A 4 B 6 B 1 p x B x = γ A 1 A 4 B 6 B 1 p σ A 1 A 4 B 6 B 1 p B x T · H h o m · σ A 1 A 4 B 6 B 1 p B x ,
where H h o m = ( X · γ B x · X ) M P , X = 1 0 0 0 and MP means the Moore–Penrose pseudo-inverse of a matrix. The matrices γ A 1 A 4 B 6 B 1 p , σ A 1 A 4 B 6 B 1 p B x , γ B x are derived from γ A 1 A 4 B 6 B 1 p B x in the following way:
γ A 1 A 4 B 6 B 1 p B x = γ A 1 A 4 B 6 B 1 p σ A 1 A 4 B 6 B 1 p B x T σ A 1 A 4 B 6 B 1 p B x γ B x .
So far, we get the two matrices needed to calculate the secret key rate, and here the secret key rate can be written as a function form as below:
K = K ( β , ϵ , V A , V B , C o r p , C x , C p , T A , L ) .
From Equation (30), the parameters that determines the secret key rate are shown. Compared with the analysis of the symmetrical modulated two-way protocols [20], three more parameters are introduced, which are C o r p , C x and C p , respectively. Here, different values of C o r p represent different correlations of A 1 and B 3 in p quadrature, and C x and C p represent different two-mode attack strategies. Furthermore, the worst-case secret key rate K w o r s t can be obtained by using C o r p w o r s t and C E 1 E 2 w o r s t instead of C o r p and ( C x , C p ) , where C o r p w o r s t and C E 1 E 2 w o r s t can be obtained by simulations. At this point, the theoretical derivation of security analysis is finished.

4. Simulation and Discussion

In this section, we first show the performance of the UD two-way protocol against all accessible two-mode attacks at fixed distance, which is the basis of the analysis. Then, from the general two-mode attacks, two typical two-mode attack strategies are obtained, which are one-mode attack strategy and the optimal two-mode attack strategy. The simulations of the protocol against these two attack strategies are performed, which is conducive to the accurate analysis of the protocol performance. For all the simulations, C o r p w o r s t is used, which can be obtained from the comparison of K ( C o r p ) , when all the parameters except for C o r p are fixed and C o r p traverses within the physical existence constraint. This is a reflection of the pessimistic worst-case assumption of the unknown correlation parameters in the simulations. Ideal cases and practical cases are mainly simulated, with reconciliation efficiency of 1 and 0.956 [41,42], and variance of 1000 and 5, respectively.
As shown in Figure 3, on a C x , C p plane, each point represents a two-mode attack strategy of Eve, the region that resembles an olive pit represents the physical existing two-mode attack, which means that Eve can choose these pairs of C x and C p for two-mode attack at the fixed parameters of the protocol. When L and ϵ are fixed, as shown in Figure 3a,b, the boundaries of the regions are same, but the distribution of the secret key rate varies with modulation variance and reconciliation efficiency. As the distance increases, as shown in Figure 3a,c, the region will gradually shrink, which means the two-mode attack is limited. What is more, the point ( 0 , 0 ) on the C x , C p plane represents the one-mode attack, which is the simplest case of two-mode attacks.
Despite the different secret key rate distributions, these two-mode attack simulations still have one thing in common, that is, all of them have a minimum secret key rate center, shown in dark blue in the figure. This confirms that Eve can achieve a set of optimal two-mode attack parameters C E 1 E 2 w o r s t to get the most information, which minimizes the performance of the protocol and can be obtained from the comparison of K ( C x , C p ) , when all the parameters except for ( C x , C p ) are fixed and ( C x , C p ) traverses within the physical existence constraint. Thus, it requires us to perform two-mode attack at each distance and obtain the optimal attack parameters in security analysis to avoid overestimating the performance of the protocol. In this way, the performance of the protocol under the optimal two-mode attack is obtained and the worst performance of the UD two-way CV-QKD protocol is reflected, which is a representation of the pessimistic worst-case assumption of two-mode attack in the simulations.
Against one-mode attack, the secret key rate and tolerable excess noise of UD two-way CV-QKD protocol is simulated and compared with the conventional symmetrical Gaussian modulated two-way CV-QKD protocol ( H e t H o m M ) [20] in ideal case and practical case, as shown in Figure 4 and Figure 5. Here, H e t H o m M represents a two-way protocol with coherent state and homodyne detection at Bob’s side. Compared with the conventional two-way protocol, the performance of the UD two-way protocol is reduced to some extent because of the missing of information in p quadrature, which is similar to the performance degradation caused by UD modulation in one-way scheme [28]. In terms of the secret key rate, in the ideal case shown in Figure 4a, the key rate attenuation of the UD two-way protocol is acceptable when the excess noise is low. When β = 1 and ϵ = 0.04 , in the range of 50 km to 150 km, the key rate of UD two-way protocol is approximately 1 to 1.5 orders of magnitude lower than the original protocol. In the practical case shown in Figure 4b, the performance gap is smaller, in the range of 0 km to 10 km, the secret key rate of UD two-way protocol is even higher than that of the original two-way protocol. Here, the outperformance of the UD two-way protocol in the practical case at short distances is mainly due to the fact that the modulation variance V is not optimal for the two protocols under the practical simulation parameters. The optimal modulation variance of the UD two-way protocol is about 10, while it is more than 20 for the original ones. This property limits the performance of the original two-way protocol when the modulation variance is low, and thus, causes the outperformance of the UD two-way protocol. In the aspect of the tolerable excess noise, as shown in Figure 5, the performance of the UD two-way protocol is similar to that of the original two-way protocol in practical, and is acceptable in the ideal conditions especially when the transmission distance is long. At 80 km, in the ideal case, the tolerable excess noise of UD two-way protocol is less than 0.1 lower compared with the original two-way protocol, and the performance gap is further reduced with the increase of distance.
By using the optimal two-mode attack parameters C E 1 E 2 w o r s t and the worst correlation parameters C o r p w o r s t , we get the secret key rate simulation of the UD two-way CV-QKD protocol against the optimal two-mode attack, which is shown in Figure 6. Against the optimal two-mode attack, the performance of the UD two-way CV-QKD protocol is further reduced, however, compared with the performance of the protocol against one-mode attack, the performance loss is not serious when the excess noise is low. Especially under the practical case where ϵ = 0.04 , the loss of transmission distance is less than 5 km. This means, though Eve is able to utilize the two-mode correlation between E 1 and E 2 to optimize the attack strategy, the enhancement of the attack strength is limited. These show that the UD two-way protocol has good resistance to two-mode attacks under low noise condition, and its lower performance limit is acceptable. Thus, the lower bound of the UD two-way CV-QKD protocol is obtained.

5. Conclusions

In this paper, a two-way CV-QKD protocol with UD modulation is proposed, and we focus on the case where UD modulation and symmetrical modulation are used at the sender’s (Alice’s) side and receiver’s (Bob’s) side, respectively. The expressions of the secret key rate of the protocol against general two-mode attacks are derived, and the simulations of the protocol against all accessible two-mode attacks are performed. Here, we use a double pessimistic worst-case assumption to analyze the protocol in the strictest case. Through this assumption, the missing correlation parameters and the two-mode attack strength are limited to the worst case, which minimize the protocol performance. Furthermore, one-mode attack strategy and optimal two-mode attack strategy are obtained from the general two-mode attacks, and the lower bound of the protocol performance is shown.
Through simulations, although the performance of UD two-way protocol is partially reduced, which is the price of the protocol simplification, it is still acceptable compared to that of the symmetrical Gaussian modulated counterpart. In practical cases, the performance of the UD two-way CV-QKD protocol is similar to the symmetrical Gaussian modulated counterpart, and at a short transmission distance, the UD two-way protocol even performs better. Therefore, it is reasonable to use unidimensional modulation in a two-way scheme to simplify the system, which expands the application scenario of the two-way CV-QKD system. The future research on the protocol will focus on the other UD modulation strategy of the two-way scheme, such as using UD modulation singly at Bob’s side or at both Alice’s and Bob’s side. Multiple pessimistic worst-case assumptions can be used for security analysis of those cases, and the study of the analytic solution of the security bound is also helpful to simplify the security analysis of unidimensional two-way CV-QKD protocols.

Author Contributions

Conceptualization, Y.Z. and L.H.; methodology, Y.Z. and L.H.; software, Y.B. and L.H.; validation, Y.B.; formal analysis, Y.B. and L.H.; investigation, Y.B., L.H. and Y.Z.; resources, Y.Z.; data curation, Y.B.; writing—original draft preparation, Y.B.; writing—review and editing, Y.B., L.H. and Y.Z.; visualization, Y.B.; supervision, Y.Z.; project administration, Y.Z.; funding acquisition, Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the Key Program of National Natural Science Foundation of China under Grant 61531003, the National Natural Science Foundation under Grant 62001044, and the Fundamental Research Funds for the Central Universities from China.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  2. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photon. 2020, 12, 1012–1236. [Google Scholar] [CrossRef] [Green Version]
  3. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.-K.; Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  4. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621. [Google Scholar] [CrossRef]
  5. Diamanti, E.; Leverrier, A. Distributing secret keys with quantum continuous variables: Principle, Security and Implementations. Entropy 2015, 17, 6072–6092. [Google Scholar] [CrossRef]
  6. Guo, H.; Li, Z.; Yu, S.; Zhang, Y. Toward practical quantum key distribution using telecom components. Fundam. Res. 2021, 1, 96–98. [Google Scholar] [CrossRef]
  7. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378. [Google Scholar] [CrossRef]
  8. Kumar, R.; Qin, H.; Alléaume, R. Coexistence of continuous variable QKD with intense DWDM classical channels. New J. Phys. 2015, 17, 043027. [Google Scholar] [CrossRef]
  9. Zhang, G.; Haw, J.Y.; Cai, H.; Xu, F.; Assad, S.; Fitzsimons, J.F.; Zhou, X.; Zhang, Y.; Yu, S.; Wu, J. An integrated silicon photonic chip platform for continuous-variable quantum key distribution. Nat. Photonics 2019, 13, 839. [Google Scholar] [CrossRef]
  10. Zhang, Y.; Li, Z.; Chen, Z.; Weedbrook, C.; Zhao, Y.; Wang, X.; Huang, Y.; Xu, C.; Zhang, X.; Wang, Z. Continuous-variable QKD over 50 km commercial fiber. Quantum Sci. Technol. 2019, 4, 035006. [Google Scholar] [CrossRef] [Green Version]
  11. Eriksson, T.A.; Hirano, T.; Puttnam, B.J.; Rademacher, G.; Luís, R.S.; Fujiwara, M.; Namiki, R.; Awaji, Y.; Takeoka, M.; Wada, N. Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels. Commun. Phys. 2019, 2, 9. [Google Scholar] [CrossRef] [Green Version]
  12. Zhang, Y.; Chen, Z.; Pirandola, S.; Wang, X.; Zhou, C.; Chu, B.; Zhao, Y.; Xu, B.; Yu, S.; Guo, H. Long-distance continuous-variable quantum key distribution over 202.81 km of fiber. Phys. Rev. Lett. 2020, 125, 010502. [Google Scholar] [CrossRef]
  13. Navascués, M.; Grosshans, F.; Acín, A. Unconditional optimality of gaussian attacks against continuous-variable qantum key distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef] [Green Version]
  14. García-Patrón, R.; Cerf, N.J.; Acín, A. Optimality of gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef] [Green Version]
  15. Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Leverrier, A. Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction. Phys. Rev. Lett. 2017, 118, 200501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Lupo, C.; Ottaviani, C.; Papanastasiou, P.; Pirandola, S. Parameter estimation with almost no public communication for continuous-variable quantum key distribution. Phys. Rev. Lett. 2018, 120, 220505. [Google Scholar] [CrossRef] [Green Version]
  18. Pirandola, S. Satellite quantum communications: Fundamental bounds and practical security. arXiv 2020, arXiv:2012.01725. [Google Scholar]
  19. Pirandola, S.; Mancini, S.; Lloyd, S.; Braunstein, S.L. Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 2008, 4, 726. [Google Scholar] [CrossRef] [Green Version]
  20. Sun, M.; Peng, X.; Shen, Y.; Guo, H. Security of a new two-way continuous-variable quantum key distribution. Int. J. Quantum Inf. 2012, 10, 1250059. [Google Scholar] [CrossRef] [Green Version]
  21. Sun, M.; Peng, X.; Guo, H. An improved two-way continuous-variable quantum key distribution protocol with added noise in homodyne detection. J. Phys. B At. Mol. Opt. Phys. 2013, 46, 085501. [Google Scholar] [CrossRef] [Green Version]
  22. Zhang, Y.-C.; Li, Z.; Weedbrook, C.; Yu, S.; Gu, W.; Sun, M.; Peng, X.; Guo, H. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers. J. Phys. B At. Mol. Opt. Phys. 2014, 47, 035501. [Google Scholar] [CrossRef] [Green Version]
  23. Weedbrook, C.; Ottaviani, C.; Pirandola, S. Two-way quantum cryptography at different wavelengths. Phys. Rev. A 2014, 89, 012309. [Google Scholar] [CrossRef] [Green Version]
  24. Wang, T.; Yu, S.; Zhang, Y.-C.; Gu, W.; Guo, H. Security of two-way continuous-variable quantum key distribution with source noise. J. Phys. B At. Mol. Opt. Phys. 2014, 47, 215504. [Google Scholar] [CrossRef]
  25. Ottaviani, C.; Mancini, S.; Pirandola, S. Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation. Phys. Rev. A 2015, 92, 062323. [Google Scholar] [CrossRef] [Green Version]
  26. Zhang, Y.; Li, Z.; Zhao, Y.; Yu, S.; Guo, H. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation. J. Phys. B At. Mol. Opt. Phys. 2017, 50, 035501. [Google Scholar] [CrossRef] [Green Version]
  27. Zhao, Y.; Zhang, Y.; Li, Z.; Yu, S.; Guo, H. Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction. Quantum Inf. Process. 2017, 16, 184. [Google Scholar] [CrossRef] [Green Version]
  28. Usenko, V.; Grosshans, F. Unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2015, 92, 062337. [Google Scholar] [CrossRef] [Green Version]
  29. Usenko, V. Unidimensional continuous-variable quantum key distribution using squeezed states. Phys. Rev. A 2018, 98, 032321. [Google Scholar] [CrossRef] [Green Version]
  30. Wang, X.; Cao, Y.; Wang, P.; Li, Y. Advantages of the coherent state compared with squeezed state in unidimensional continuous variable quantum key distribution. Quantum Inf. Process 2018, 17, 344. [Google Scholar] [CrossRef] [Green Version]
  31. Huang, L.; Zhang, Y.; Chen, Z.; Yu, S. Unidimensional continuous-variable quantum key distribution with untrusted detection under realistic conditions. Entropy 2019, 21, 1100. [Google Scholar] [CrossRef] [Green Version]
  32. Bai, D.; Huang, P.; Zhu, Y.; Ma, H.; Xiao, T.; Wang, T.; Zeng, G. Unidimensional continuous-variable measurement-device-independent quantum key distribution. Quantum Inf. Process 2020, 19, 53. [Google Scholar] [CrossRef] [Green Version]
  33. Wang, P.; Wang, X.; Li, J.; Li, Y. Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions. Optics Express 2017, 25, 27995–28009. [Google Scholar] [CrossRef]
  34. Huang, L.; Zhang, Y.; Huang, Y.; Jiang, T.; Yu, S. Improvement of unidimensional continuous-variable quantum key distribution systems by using a phase-sensitive amplifier. J. Phys. B At. Mol. Opt. Phys. 2019, 52, 225502. [Google Scholar] [CrossRef]
  35. Wang, P.; Wang, X.; Li, Y. Security analysis of unidimensional continuous-variable quantum key distribution using uncertainty relations. Entropy 2018, 20, 157. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  36. Wang, X.; Liu, W.; Wang, P.; Li, Y. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2017, 95, 062330. [Google Scholar] [CrossRef] [Green Version]
  37. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397–402. [Google Scholar] [CrossRef] [Green Version]
  38. Pirandola, S.; Serafini, A.; Lloyd, S. Correlation matrices of two-mode bosonic systems. Phys. Rev. A 2009, 79, 052327. [Google Scholar] [CrossRef]
  39. Devetak, I.; Winter, A. Distillation of secret key and entanglement from quantum states. Proc. Roy. Soc. A 2005, 461, 207–235. [Google Scholar] [CrossRef] [Green Version]
  40. Holevo, A.S. Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Inf. Transm. 1973, 9, 177. [Google Scholar]
  41. Milicevic, M.; Feng, C.; Zhang, L.M.; Gulak, P.G. Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography. NPJ Quantum Inf. 2018, 4, 21. [Google Scholar] [CrossRef] [Green Version]
  42. Zhou, C.; Wang, X.; Zhang, Y.; Zhang, Z.; Yu, S.; Guo, H. Continuous-variable quantum key distribution with rateless reconciliation protocol. Phys. Rev. Appl. 2019, 12, 054013. [Google Scholar] [CrossRef] [Green Version]
Figure 1. (Color online) (a) The prepare-and-measure (PM) scheme of the unidimensional (UD) two-way protocol. Here, the two quantum channels are fully controlled by Eve while she has no access to the apparatuses in Alice’s and Bob’s stations. (b) Symmetrical Gaussian modulated coherent state on a phase space. (c) UD modulated coherent state on a phase space, assuming only x quadrature was modulated, which means, the coherent state can only be shifted along x on the phase space. Here, x A and p A are two independent identically distributed Gaussian random variables, and the coordinates describe the centers of the shifted coherent states. (BS: beam splitter, AM: amplitude modulator, PM: phase modulator).
Figure 1. (Color online) (a) The prepare-and-measure (PM) scheme of the unidimensional (UD) two-way protocol. Here, the two quantum channels are fully controlled by Eve while she has no access to the apparatuses in Alice’s and Bob’s stations. (b) Symmetrical Gaussian modulated coherent state on a phase space. (c) UD modulated coherent state on a phase space, assuming only x quadrature was modulated, which means, the coherent state can only be shifted along x on the phase space. Here, x A and p A are two independent identically distributed Gaussian random variables, and the coordinates describe the centers of the shifted coherent states. (BS: beam splitter, AM: amplitude modulator, PM: phase modulator).
Entropy 23 00294 g001
Figure 2. (Color online) The entanglement-based (EB) scheme of the UD two-way protocol against two-mode collective attacks, where Eve has full control of the quantum channels while she has no access to the apparatuses in Alice’s and Bob’s stations. At Alice’s side, one mode of the EPR pair is measured by homodyne detection while the other mode is sent to a squeezer, this part is equivalent to the PM scheme of UD modulation with coherent state. The blue beam splitter with a transmittance of T A is used to couple Alice’s state with Bob’s state. (QM: quantum memory, B 0 vacuum state).
Figure 2. (Color online) The entanglement-based (EB) scheme of the UD two-way protocol against two-mode collective attacks, where Eve has full control of the quantum channels while she has no access to the apparatuses in Alice’s and Bob’s stations. At Alice’s side, one mode of the EPR pair is measured by homodyne detection while the other mode is sent to a squeezer, this part is equivalent to the PM scheme of UD modulation with coherent state. The blue beam splitter with a transmittance of T A is used to couple Alice’s state with Bob’s state. (QM: quantum memory, B 0 vacuum state).
Entropy 23 00294 g002
Figure 3. (Color online) Secret key rate of UD two-way CV-quantum key distribution (QKD) protocol under all accessible two-mode attacks under different situations. (a) At 5 km while V = 5 , β = 0.956 , ϵ = 0.04 . (b) At 5 km while V = 10 3 , β = 1 , ϵ = 0.04 . (c) At 10 km while V = 5 , β = 0.956 , ϵ = 0.04 . (For all simulations T A = 0.8 ).
Figure 3. (Color online) Secret key rate of UD two-way CV-quantum key distribution (QKD) protocol under all accessible two-mode attacks under different situations. (a) At 5 km while V = 5 , β = 0.956 , ϵ = 0.04 . (b) At 5 km while V = 10 3 , β = 1 , ϵ = 0.04 . (c) At 10 km while V = 5 , β = 0.956 , ϵ = 0.04 . (For all simulations T A = 0.8 ).
Entropy 23 00294 g003
Figure 4. (Color online) Comparisons of secret key rates between UD two-way CV-QKD protocol (solid line) and a sub-protocol ( H e t H o m M ) of the conventional symmetrical Gaussian modulated two-way CV-QKD protocol family [20] (dashed line), under ideal and practical situations. The attack strategies against both protocols are one-mode attack. (a) Ideal situations where V = 10 3 , β = 1 , ϵ = 0.04 (red line), 0.045 (blue line) and 0.05 (black line). (b) Practical situations where V = 5 , β = 0.956 , ϵ = 0.04 (red line), 0.045 (blue line), 0.05 (black line). (For both protocols T A = 0.8 ).
Figure 4. (Color online) Comparisons of secret key rates between UD two-way CV-QKD protocol (solid line) and a sub-protocol ( H e t H o m M ) of the conventional symmetrical Gaussian modulated two-way CV-QKD protocol family [20] (dashed line), under ideal and practical situations. The attack strategies against both protocols are one-mode attack. (a) Ideal situations where V = 10 3 , β = 1 , ϵ = 0.04 (red line), 0.045 (blue line) and 0.05 (black line). (b) Practical situations where V = 5 , β = 0.956 , ϵ = 0.04 (red line), 0.045 (blue line), 0.05 (black line). (For both protocols T A = 0.8 ).
Entropy 23 00294 g004
Figure 5. (Color online) Comparison of tolerable excess noise between UD two-way CV-QKD protocol (solid lines) and the sub-protocol ( H e t H o m M ) of the conventional symmetrical Gaussian modulated two-way protocol family (dashed lines), the red lines represent the ideal situations and the blue lines represent the practical situations. (The attack strategies against both protocols are one-mode attack, and for both protocols T A = 0.8 ).
Figure 5. (Color online) Comparison of tolerable excess noise between UD two-way CV-QKD protocol (solid lines) and the sub-protocol ( H e t H o m M ) of the conventional symmetrical Gaussian modulated two-way protocol family (dashed lines), the red lines represent the ideal situations and the blue lines represent the practical situations. (The attack strategies against both protocols are one-mode attack, and for both protocols T A = 0.8 ).
Entropy 23 00294 g005
Figure 6. (Color online) Comparison of secret key rate between UD two-way CV-QKD protocol against the optimal two-mode attack (red line) and the one-mode attack (black line). Here, the solid line represents the practical situation, the dashed line and the dotted line represent the ideal situation. (For both cases T A = 0.8 ).
Figure 6. (Color online) Comparison of secret key rate between UD two-way CV-QKD protocol against the optimal two-mode attack (red line) and the one-mode attack (black line). Here, the solid line represents the practical situation, the dashed line and the dotted line represent the ideal situation. (For both cases T A = 0.8 ).
Entropy 23 00294 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Bian, Y.; Huang, L.; Zhang, Y. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Entropy 2021, 23, 294. https://doi.org/10.3390/e23030294

AMA Style

Bian Y, Huang L, Zhang Y. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Entropy. 2021; 23(3):294. https://doi.org/10.3390/e23030294

Chicago/Turabian Style

Bian, Yiming, Luyu Huang, and Yichen Zhang. 2021. "Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States" Entropy 23, no. 3: 294. https://doi.org/10.3390/e23030294

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop