Next Article in Journal
Gudder’s Theorem and the Born Rule
Next Article in Special Issue
Enhancing of Self-Referenced Continuous-Variable Quantum Key Distribution with Virtual Photon Subtraction
Previous Article in Journal
A Quantal Response Statistical Equilibrium Model of Induced Technical Change in an Interactive Factor Market: Firm-Level Evidence in the EU Economies
Previous Article in Special Issue
Tsirelson’s Bound Prohibits Communication through a Disconnected Channel
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations

1
State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, China
2
Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, China
*
Authors to whom correspondence should be addressed.
Entropy 2018, 20(3), 157; https://doi.org/10.3390/e20030157
Submission received: 30 January 2018 / Revised: 22 February 2018 / Accepted: 27 February 2018 / Published: 1 March 2018
(This article belongs to the Special Issue Entropy in Foundations of Quantum Physics)

Abstract

:
We study the equivalence between the entanglement-based scheme and prepare-and-measure scheme of unidimensional (UD) continuous-variable quantum key distribution protocol. Based on this equivalence, the physicality and security of the UD coherent-state protocols in the ideal detection and realistic detection conditions are investigated using the Heisenberg uncertainty relation, respectively. We also present a method to increase both the secret key rates and maximal transmission distances of the UD coherent-state protocol by adding an optimal noise to the reconciliation side. It is expected that our analysis will aid in the practical applications of the UD protocol.

1. Introduction

Quantum key distribution (QKD), which is a prominent application of the quantum information, enables two remote parties, conventionally called Alice and Bob, to share a common secret key through an insecure quantum channel and an authenticated classical channel [1,2]. This unconditional security is guaranteed by the basic principles of quantum mechanics. Continuous-variable quantum key distribution (CV-QKD) has attracted considerable attention over the past years because of its good performances in the secret key rates and compatibility with the current optical networks [3,4,5,6,7,8,9,10,11,12,13,14,15,16]. A particular class of CV-QKD protocols that is based on the Gaussian modulation of coherent states has experienced a rapid development [17,18,19,20,21,22,23,24,25,26,27]. In a coherent-state protocol, Alice encodes her information in the amplitude and phase quadratures of the coherent light field by using amplitude and phase modulators, and Bob performs homodyne or heterodyne detection.
Recently, a further simplified unidimensional (UD) CV-QKD protocol has been proposed [28]. In such protocol, Alice, still using coherent states, encodes her information by using one modulator (e.g., amplitude modulator) instead of two, whereas Bob performs a homodyne detection, hence simplifying both the modulation scheme and the key extraction task. The security against collective attacks has been proved in asymptotic regime. However, this early work only considered the UD model under an idea homodyne detector. It does not refer to the realistic condition, such as the efficiency and electronic noise of the homodyne detector. Then, a model of the UD protocol under realistic condition was designed and realized in an experiment [29]. Furthermore, the finite size effect was analyzed in paper [30], and an optimum ratio in parameters estimation was proposed.
In the UD protocol, due to the fact that the phase quadrature is not modulated in Alice’s side, we cannot estimate the correlation in the phase quadrature between Alice and Bob. However, this unknown parameter is bounded by the requirement of the physicality of the state. A Gaussian state can typically be characterized by a covariance matrix. However, not all covariance matrices correspond to physical states, as the covariance matrix must respect the Heisenberg uncertainty relation [31,32]. By using this uncertainty relation, we can calculate the physical region boundary of a covariance matrix, which is crucial for the security of the protocol. We can see that the UD CV-QKD protocol is very different from the previous symmetrical (SY) coherent-state protocol [18,21]. Due to the equivalence between the prepare-and-measure (PM) and entanglement-based (EB) scheme of UD protocol, the differences of the Heisenberg uncertainty relations under the idea and realistic condition, and the effect of noise from Bob’s setup on secret key rate under realistic condition are not described or investigated in depth [28,29,30], a further study about above questions is required.
In this paper, we first consider the equivalence between the PM scheme and the EB scheme of the UD CV-QKD protocol. Then, we analyze the boundary of the physical region of the symmetrical coherent-state protocol based on the Heisenberg uncertainty relation. We also study the variances of the physical region of the UD coherent-state protocol under the conditions of different detection efficiency and electronic noise. Secure and unsecure regions of both the protocols are further analyzed under ideal and realistic detection conditions. It is found that adding an optimal noise to Bob’s side can truly help the improvement of the secret key rate and increase the transmission distance of the UD coherent-state protocol under the assumption of reverse reconciliation.
The paper is organized as follows. In Section 2, we introduce the equivalence between the EB scheme and the PM scheme of the UD CV-QKD protocol. In Section 3, a comparison between the physical and secure regions of the UD protocol under ideal and realistic detection conditions is shown, and a method to improve the performance of the UD coherent-state protocol by adding an optimal noise to Bob’s side is proposed. In Section 4, we give our conclusions and discussions.

2. Unidimensional Quantum Key Distribution

2.1. Equivalence between the EB Scheme and the PM Scheme

Generally, most of the experimental systems in CV-QKD are focused on PM schemes currently, given their ease of implementation in practice. However, it’s hard to analyze the security in theory. On the contrary, the theoretical analysis based on EB scheme is maturity. The involved entangled states make the calculations feasible and simpler [33]. Especially in UD CV-QKD protocol, the security analysis based on EB scheme has more advantages. The covariance matrices achieved from the EB schemes contain the constraints of phase amplitude quadrature. However these constraints is difficult to achieve from the PM scheme. More details about the security analysis will be shown later. Now, it is necessary to study the equivalence of EB and PM schemes, firstly. This equivalence is based on the indistinguishability between these two protocols for Bob and Eve. The consequent advantage of this equivalence is that it is sufficient to implement the PM scheme and study the EB scheme.
In the PM scheme, as depicted in Figure 1a, the sender, Alice, prepares coherent states using a laser source. Then, she encodes the information in the amplitude or phase quadratures of coherent states by using either amplitude or phase modulators. Here, without losing generality, we assume that Alice uses an amplitude modulator with a modulation variance VM, which is assumed to be expressed in shot-noise units, and that the coherent states follow the uncertainty principle of variance 1. Thus, the mixture of Gaussian-modulated coherent states gives rise to a unidimensional chain structure with a thickness of 1 and a length of 1 + V M in the phase space. These quantum states are then sent to Bob through an untrusted quantum channel with transmittance T x , T y and excess noise ε x , ε y .
In the EB scheme, as shown in Figure 1b, Alice starts with a two-mode squeezed vacuum state ρ A B 0 with variance V . Then, she performs homodyne detection on the first half of the state and squeezes the second half by r = ln V . The result is the covariance matrix
γ A S = [ V 0 V ( V 2 1 ) 0 0 V 0 ( V 2 1 ) / V V ( V 2 1 ) 0 V 2 0 0 ( V 2 1 ) / V 0 1 ]
The covariance matrix of mode S , conditioned on Alice’s measurement result ( x a ), can be written as
γ S x a = γ S σ A S T ( X γ A X ) M P σ A S ,
and the displacement vector can be expressed as
d S x a = σ A S T ( X γ A X ) M P d A ,
where d A is the result of the homodyne measurement, γ A and γ S are the covariance matrices of the modes A and S , respectively, σ A S is the correlation matrix of the two modes, X = d i a g ( 1 , 0 ) , and M P denotes the Moore–Penrose inverse of the matrix [34].
Then, we obtain
γ S x a = [ 1 0 0 1 ]   and   d S x a = V 2 1 V ( x a , 0 ) ,
which is a coherent state centered on d S x a . Furthermore, the variance of d S x a is
Δ 2 d S x a = V 2 1 V x a 2 = V 2 1 V V = V 2 1 ,
where V 2 1 is exactly the variance of the Alice’s V M . Then, we can establish a one-to-one correspondence between the EB scheme and the PM scheme by multiplying the outcome of Alice’s measurements by the factor α = V 2 1 V .

2.2. Calculation of Secret Key Rate with Reverse Reconciliation

Thus far, we have established the equivalence between the EB scheme and the PM scheme of the UD CV-QKD protocol. In this subsection, we present a brief overview of the calculation of the secret key rates. In the EB protocol, the realistic Bob’s detector can be modeled by an ideal balanced homodyne detector and a beam splitter, with transmission efficiency η and input noise V N = 1 + v e l / ( 1 η ) , as the one shown in Figure 1b. The secret key rate against collective attacks for reverse reconciliation in the asymptotic regime can be calculated as [29,30]
K R R = β I A B χ B E ,
where β is the reverse reconciliation efficiency and I A B is the mutual information between Alice and Bob. I A B can expressed as
I A B = 1 2 log 2 ( 1 + V M 1 + χ totx ) ,
where
χ hom = ( 1 + v e l ) / η 1 χ linex = ( 1 T x ) / T x + ε x χ totx = χ linex + χ hom / T x .
Still from Equation (6), χ B E is the Holevo bound, which represents an upper bound on the information acquired for reverse reconciliation by the potential eavesdropper Eve. The procedures to calculate χ B E can be written as:
χ B E = S ( ρ E ) S ( ρ E x b ) = S ( ρ A B 1 ) S ( ρ A R H x b ) = i = 1 2 g ( λ i 1 2 ) i = 3 5 g ( λ i 1 2 ) ,
where S ( ρ ) is the von Neumann entropy of the quantum state ρ , g ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x and λ i are the symplectic eigenvalues of the covariance matrix γ , with
λ 1 , 2 2 = 1 2 ( a ± a 2 4 b ) λ 3 , 4 2 = 1 2 ( c ± c 2 4 d ) λ 5 = 1 ,
a = 1 + V M + V y B 1 ( 1 + V M + χ linex ) T x + 2 C y B 1 ( 1 + V M ) 1 / 4 V M T x b = ( V y B 1 ( 1 + V M ) ( C y B 1 ) 2 1 + V M ) ( 1 + ε x T x ) c = ( a ( χ hom + 1 ) + ( ( 1 + ε x T x ) ( V M + 2 ) + V M T x a ) ) / e d = ( b χ hom + ( 1 + V M ) ( 1 + ε x T x ) ) / e e = T x ( 1 + V M + χ totx ) ,
where V y B 1 is the variance of the mode B 1 in phase quadrature with V y B 1 = 1 + T y ε y and C y B 1 is the correlation between A and B 1 in phase quadrature with C y B 1 = T y V M ( 1 + V M ) 1 / 4 .

3. Security Analysis Using Uncertainty Relations

In this section, we provide a security analysis of continuous variable quantum key distribution with coherent states based on the Heisenberg uncertainty relation. Before describing the UD coherent-state protocol case, it is useful to first consider the SY coherent-state protocol case.

3.1. Uncertainty Relations for Symmetrical Coherent-State Protocol

Let us consider a n -mode quantum mechanical system that is described by the canonical conjugate operators x ^ j and p ^ j , with j = 1 , 2 , , n . In terms of the annihilation and creation operators ( a ^ j and a ^ j , respectively), one has
x ^ j = 1 2 ( a ^ j + a ^ j )   and   p ^ j = i 2 ( a ^ j a ^ j ) ,
which are the dimensionless position and momentum operators. Such operators also satisfy the bosonic canonical commutation relations (CCR)
[ x ^ i , p ^ j ] = i δ i , j ,   [ x ^ i , x ^ j ] = [ p ^ i , p ^ j ] = 0 ,
Furthermore, if we group together the canonical conjugate operators in a vector γ ^ as
γ ^ = ( r ^ 1 , r ^ 2 , r ^ 2 n ) T = ( x ^ 1 , p ^ 1 , x ^ 2 , p ^ 2 , , x ^ n , p ^ n ) T ,
we can express the CCR in a compact form:
[ γ ^ j , γ ^ k ] = i Ω j k ,
where Ω is defined as
Ω = i = 1 n [ 0 1 1 0 ] .
By combining this CCR relation and the positive semi-definiteness of the density operator ρ , we obtain the following uncertainty relation [35]
γ + i Ω 0 ,
which is a more precise and complete version of the Heisenberg uncertainty relation. This well-known inequality is the only constraint that γ has to respect to be a covariance matrix satisfying a physical state.
Let us consider the physicality of the SY coherent-state protocol by using the uncertainty relation in Equation (17). In the EB protocol, as shown in Figure 2, we have:
γ A B 1 s y m = [ V 0 T ( V 2 1 ) 0 0 V 0 T ( V 2 1 ) T ( V 2 1 ) 0 T ( V + χ line ) 0 0 T ( V 2 1 ) 0 T ( V + χ line ) ] ,
γ A B s y m = [ V 0 η T ( V 2 1 ) 0 0 V 0 η T ( V 2 1 ) η T ( V 2 1 ) 0 η T ( V + χ tot ) 0 0 η T ( V 2 1 ) 0 η T ( V + χ tot ) ] ,
where χ tot = χ line + χ hom / T , χ line = ( 1 T ) / T + ε , χ hom = ( 1 η ) / η + v e l / η , and V = V A + 1 , V A is the modulation variance of the Alice’s side. According to the Heisenberg uncertainty relation, we have:
{ γ A B 1 s y m + i Ω 0 γ A B s y m + i Ω 0 .
Then, we obtain
{ ε T ( 2 + ( ε 2 ) T ) ( V 2 1 ) 0 ( ε T η ( 2 + ( ε 2 ) T η ) + 2 v e l ( 1 + ( ε 1 ) T η ) + v e l 2 ) ( V 2 1 ) 0 .
The two inequalities in Equation (21) are simultaneously satisfied if ε , v e l 0 and T , η [ 0 , 1 ] . Here, we further consider the secure and unsecure regions of the protocol for both ideal and realistic Bob’s detectors, which are shown in Figure 3a. In the secure region, the secret key rate is greater than zero; in the unsecure region, the secret key rate is less than zero. We observe that the realistic protocol can provide a bigger secure region. The secret key rate as a function of the excess noise, in correspondence of three values of channel losses, under ideal and realistic detection conditions, is shown in Figure 3b. We can see that the realistic Bob detection improves the resistance of the protocol to the excess noise, although the total noise is increased, which will lead to the appearance of a phenomenon called “fighting noise with noise” [36], and will be discussed in detail in the following. Here, we set the values of the actual parameters: the reconciliation efficiency is β = 0.99 [37] and the modulation variance is V A = 10 .

3.2. Uncertainty Relations for Unidimensional Coherent-State Protocol

In the above, we have discussed the physicality of the SY coherent-state protocol by using the Heisenberg uncertainty relation. The securities under ideal and realistic homodyne detectors have also been analyzed. Next, let us consider the UD coherent-state protocol. As shown in Figure 1b, in the EB scheme, we have
γ A B 1 u n i = [ 1 + V M 0 T x V M ( 1 + V M ) 1 / 4 0 0 1 + V M 0 C y B 1 T x V M ( 1 + V M ) 1 / 4 0 T x ( V M + 1 + χ linex ) 0 0 C y B 1 0 V y B 1 ]   and
γ A B u n i = [ 1 + V M 0 η T x V M ( 1 + V M ) 1 / 4 0 0 1 + V M 0 C y B 1 η η T x V M ( 1 + V M ) 1 / 4 0 η T x ( V M + 1 + χ totx ) 0 0 C y B 1 η 0 η ( V y B 1 + χ hom ) ] .
In the UD protocol, in order to estimate the information of the Eve eavesdropping, χ B E , we have to know the parameters C y B 1 and V y B 1 . Here, V y B 1 can be estimated by randomly measuring the phase quadrature in Bob’s side, while C y B 1 is unknown due to the fact that the phase quadrature is not modulated in Alice’s side. However, such an unknown parameter is constrained by the requirement of the physicality of the state. Differently from Ref. [30], under realistic condition, when the mode B 1 is transformed into mode B after the beam splitter, there will have to be a new constraint on the covariance matrix γ A B u n i in order to make it correspondent to a physical state. According to the Heisenberg uncertainty relation, we have
{ γ A B 1 u n i + i Ω 0 γ A B u n i + i Ω 0 .
Then, we obtain the following two parabolic equations:
{ ( C y B 1 C 0 ) 2 V M ( 1 + V M ) χ linex 1 + χ linex ( V y B 1 V 0 ) ( C y B 1 C 0 ) 2 V M ( 1 + V M ) χ totx 1 + χ totx ( V y B 1 V 0 ) ,
where C 0 = V 0 T x V M ( 1 + V M ) 1 / 4 , V 0 = 1 T x ( 1 + χ linex ) , C 0 = T x V M ( 1 + V M ) 1 / 4 η T x ( 1 + χ totx ) and V 0 = 1 η 2 T x ( 1 + χ totx ) χ hom .
The parabolic curves between C y B 1 and V y B 1 , under ideal and realistic detection conditions, are shown in Figure 4. The whole plane is divided into two regions: the unphysical and physical regions. In the unphysical region, the values of the parameters C y B 1 and V y B 1 cannot be satisfied simultaneously, otherwise, the Heisenberg uncertainty principle will be violated. In the physical region, the whole region is divided into two parts, R1 and R2. The R1 represents the real physical region, which is delimited by the ideal parabolic curve and ensures the attacks of Eve to the quantum channel complying with the physical principles. The red dashed line further divides the region R1 into unsecure and secure regions. The R2 represents the pseudo physical region, which is the overlapped part between the physical region contained by the realistic parabolic curve and the unphysical region, as defined by the ideal parabolic curve. The appearance of the pseudo physical region is due to the fact that, even if some attacks of Eve are unphysical, after the transform of the realistic homodyne detection of Bob, the final covariance matrix can satisfy a physical state. Hence, the physical region should be delimited at the input side of Bob, or equivalently, Bob performs an ideal detection. Furthermore, in Figure 5, we see how the physical region delimited by the realistic parabolic curve changes according to different conditions of detection efficiency and electronic noise. We also compare such regions with the one delimited by the ideal parabolic curve (black solid line in Figure 5). We find that the physical region defined by the realistic parabolic curve gradually decreases as the detection efficiency increases and the electronic noise decreases. Therefore, also in this case, in order to ensure the physicality of the UD protocol, we select the smaller region R1.
In Figure 6, we consider the dependence of the ideal parabolic curve (R1) on related parameters, including V M , T x , ε x , and β . From Figure 6a, we can find that the parabolic curve moves down and gradually becomes broader as the modulation variance increases. In Figure 6b, the parabolic curve moves towards bottom-left corner and gradually becomes narrower as the transmission efficiency increases. In Figure 6c, as the excess noise increases, the parabolic curve moves towards left and gradually becomes larger. The reconciliation efficiency β does not change the shape of the parabola, but rather expands the secure region. In Figure 6d, the red solid line represents the minimum secret key rate, which was obtained by scanning the parameter C y B 1 . The black solid line represents the ideal parabolic curve. It is interesting that a larger C y B 1 does not always give a higher secret key rate, more details about the red solid line can be seen in paper [30]. Later, we can see that the minimum secret key rate can also be achieved by scanning T y and ε y simultaneously.
Furthermore, if we assume C y B 1 = T y V M ( 1 + V M ) 1 / 4 and V y B 1 = 1 + T y ε y , the parabolic equations (Equation (25)), as determined by the Heisenberg uncertainty relation under ideal and realistic detection conditions transform into
{ ( k T x T y ) 2 ( 1 k T x ) ( 1 + T y ε y k ) ( k T x T y ) 2 ( 1 k T x η ) ( 1 + T y ε y k / η + χ hom ) ,
where k = 1 T x ( 1 + χ linex ) and k = 1 η T x ( 1 + χ totx ) . By this way, more details about eavesdropping method taken by Eve can be found. Moreover, one can easily see that the transformed equations do not depend on V M . We redraw the physical regions delimited by the new curves for different values of detection efficiency and electronic noise as shown in Figure 7. We obtain the same rule as in Figure 5 that the physical region gradually decreases as the detection efficiency increases and the electronic noise decreases. Secure and unsecure regions under the realistic detection condition are shown in Figure 8. The cyan curve with the secret key rate of zero represents the boundary of two regions. Although the parameters T y and ε y are unknown, they are confined to the curve V y B 1 = 1 + T y ε y , which can be estimated by randomly measuring the phase quadrature in Bob’s side, meaning that T y and ε y cannot be set simultaneously in other physical places outside this curve. We can see that Eve essentially changes the value of the parameter C y B 1 by controlling the value of T y . For a constant value of V y B 1 , we can calculate the minimum secret key rate by scanning T y or ε y in the physical region. As shown in Figure 8, the curve corresponding to the minimum secret key rate is divided into three parts. The red curve part overlaps with the left boundary of the black solid curve which corresponds to the black solid curve in Figure 6d. As the value of V y B 1 increases, the worst-case T y and ε y (green curve part) gradually separate from the black solid curve, meaning that the secret key rate of the protocol is not always monotonically decreasing as ε y increases or T y decreases, but still lie in the secure region. The blue curve represents the part where the minimum secret key rate is less than zero. We also find that this minimum secret key rate is equal to the minimum secret key rate that was obtained by scanning C y B 1 (corresponding to the red solid line of Figure 6d) when other parameter values are set to be consistent.
In typical communication channels, the value of V y B 1 can be estimated by setting V y B 1 1 + T x ε x = 1.001 , which is plotted with the black dashed line of Figure 8. At the black point, the conditions T x = T y and ε x = ε y are satisfied. The red point represents the worst-case T y and ε y , which is the intersection of the red line and black dashed line. Because Eve can distinguishes T y , ε y from T x , ε x by measuring coherent states sent by Alice, she can arbitrarily change the values of both T y and ε y , while keeps V y B 1 unchanged, eventually, obtains more information. If Alice and Bob use T x and ε x to estimate T y and ε y (black point), then this will underestimate the ability of the eavesdropper Eve and provide security loopholes. Therefore, here we should consider the minimum secret key rate (red point).
In Figure 9, the curves representing the maximal tolerable excess noise versus the channel losses under ideal and realistic detection conditions are shown. We observe that the UD protocol has a lower tolerance to the excess noise than the SY protocol. However, the UD protocol reduces the complexity of the experiment and still provides a reasonable secure region (all of the parameters are set under the actual conditions).
In addition, from Figure 9b, it is not difficult to find out that the realistic Bob’s detection can slightly increase the secure region of the UD protocol. This effect can be explained by considering the fact that the noise added on Bob’s side not only affects Alice’s and Bob’s mutual information, but also decreases Eve’s information in reverse reconciliation. Due to the detection at Bob’s side, which can be controlled and observed by Bob, the noise added on Bob’s side could be considered as a believable noise not controlled by the eavesdropper Eve. Moreover, it is found that there is an optimal noise χ hom (characterized by the detection efficiency η and electronic noise v e l ) that Bob needs to add to maximize the secret key rate for each channel loss. Then, we can effectively improve the secret key rate and increase the transmission distance by adding proper noise to Bob’s side, as we show in Figure 10.

4. Conclusions

In this paper, we have proven the equivalence between the EB scheme and the PM scheme of the UD CV-QKD protocol, and investigated the physical and secure regions of the SY coherent-state protocol based on the Heisenberg uncertainty relation. It was shown that the realistic detection condition in UD protocol results in an excess pseudo physical region, which corresponds to the unphysical attack of Eve. In order to ensure the physicality, we should select the physical region delimited by the ideal curve. We also found that a realistic Bob’s detection improves the resistance of the protocol to the channel excess noise, therefore, the performance in terms of the secret key rates and transmission distances of the UD coherent-state protocol can be improved by adding an optimal noise to the reconciliation side. Overall, the results confirm the potential of a long-distance secure communication through the usage of the UD CV-QKD protocol.

Acknowledgments

This work was supported by the Key Project of the Ministry of Science and Technology of China (2016YFA0301403), the National Natural Science Foundation of China (NSFC) (Grants No. 11504219, No. 61378010), the Shanxi 1331KSC, and the Program for the Outstanding Innovative Teams of Higher Learning Institutions of Shanxi.

Author Contributions

Pu Wang conceived the study, performed theoretical calculations and numerical simulations and drafted the article. Xuyang Wang designed the conception of the study, discussed the results, checked the draft and critically reviewed the manuscript. Yongmin Li proposed and supervised the project, checked the draft and provided a critical revision of the manuscript. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef]
  2. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef]
  3. Cerf, N.J.; Levy, M.; Van Assche, G. Quantum distribution of gaussian keys using squeezed states. Phys. Rev. A 2001, 63, 052311. [Google Scholar] [CrossRef]
  4. Silberhorn, C.; Ralph, T.C.; Lütkenhaus, N.; Leuchs, G. Continuous variable quantum cryptography: Beating the 3 db loss limit. Phys. Rev. Lett. 2002, 89, 167901. [Google Scholar] [CrossRef]
  5. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum cryptography without switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef]
  6. Fossier, S.; Diamanti, E.; Debuisschert, T.; Villing, A.; Tualle-Brouri, R.; Grangier, P. Field test of a continuous-variable quantum key distribution prototype. New J. Phys. 2009, 11, 045023. [Google Scholar] [CrossRef]
  7. Leverrier, A.; Grangier, P. Continuous-variable quantum-key-distribution protocols with a non-gaussian modulation. Phys. Rev. A 2011, 83, 042312. [Google Scholar] [CrossRef]
  8. Madsen, L.S.; Usenko, V.C.; Lassen, M.; Filip, R.; Andersen, U.L. Continuous variable quantum key distribution with modulated entangled states. Nat. Commun. 2012, 3, 1083. [Google Scholar] [CrossRef]
  9. Wang, X.Y.; Bai, Z.L.; Du, P.Y.; Li, Y.M.; Peng, K.C. Ultrastable fiber-based time-domain balanced homodyne detector for quantum communication. Chin. Phys. Lett. 2012, 29, 124202. [Google Scholar] [CrossRef]
  10. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  11. Wang, X.Y.; Bai, Z.L.; Wang, S.F.; Li, Y.M.; Peng, K.C. Four-state modulation continuous variable quantum key distribution over a 30-km fiber and analysis of excess noise. Chin. Phys. Lett. 2013, 30, 010305. [Google Scholar] [CrossRef]
  12. Gehring, T.; Handchen, V.; Duhme, J.; Furrer, F.; Franz, T.; Pacher, C.; Werner, R.F.; Schnabel, R. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks. Nat. Commun. 2015, 6, 8795. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Zhang, Y.; Li, Z.; Weedbrook, C.; Marshall, K.; Pirandola, S.; Yu, S.; Guo, H. Noiseless linear amplifiers in entanglement-based continuous-variable quantum key distribution. Entropy 2015, 17, 4547. [Google Scholar] [CrossRef]
  14. Li, H.S.; Wang, C.; Huang, P.; Huang, D.; Wang, T.; Zeng, G.H. Practical continuous-variable quantum key distribution without finite sampling bandwidth effects. Opt. Express 2016, 24, 20481–20493. [Google Scholar] [CrossRef]
  15. Bai, D.Y.; Huang, P.; Ma, H.X.; Wang, T.; Zeng, G.H. Performance improvement of plug-and-play dual-phase-modulated quantum key distribution by using a noiseless amplifier. Entropy 2017, 19, 546. [Google Scholar] [CrossRef]
  16. Bai, Z.L.; Yang, S.S.; Li, Y.M. High-efficiency reconciliation for continuous variable quantum key distribution. Jpn. J. Appl. Phys. 2017, 56, 044401. [Google Scholar] [CrossRef]
  17. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  18. Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef]
  19. Iblisdir, S.; Van Assche, G.; Cerf, N.J. Security of quantum key distribution with coherent states and homodyne detection. Phys. Rev. Lett. 2004, 93, 170502. [Google Scholar] [CrossRef]
  20. Grosshans, F. Collective attacks and unconditional security in continuous variable quantum key distribution. Phys. Rev. Lett. 2005, 94, 020504. [Google Scholar] [CrossRef] [PubMed]
  21. Lance, A.M.; Symul, T.; Sharma, V.; Weedbrook, C.; Ralph, T.C.; Lam, P.K. No-switching quantum key distribution using broadband modulated coherent light. Phys. Rev. Lett. 2005, 95, 180503. [Google Scholar] [CrossRef] [PubMed]
  22. Lodewyck, J.; Bloch, M.; Garcia-Patron, R.; Fossier, S.; Karpov, E.; Diamanti, E.; Debuisschert, T.; Cerf, N.J.; Tualle-Brouri, R.; McLaughlin, S.W.; et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 2007, 76, 042503. [Google Scholar] [CrossRef]
  23. Qi, B.; Huang, L.L.; Qian, L.; Lo, H.K. Experimental study on the gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers. Phys. Rev. A 2007, 76, 052323. [Google Scholar] [CrossRef]
  24. Yang, S.S.; Bai, Z.L.; Wang, X.Y.; Li, Y.M. FPGA-based implementation of size-adaptive privacy amplification in quantum key distribution. Photonics J. 2017, 9, 7600308. [Google Scholar] [CrossRef]
  25. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378–381. [Google Scholar] [CrossRef]
  26. Li, Y.M.; Wang, X.Y.; Bai, Z.L.; Liu, W.Y.; Yang, S.S.; Peng, K.C. Continuous variable quantum key distribution. Chin. Phys. B 2017, 26, 040303. [Google Scholar] [CrossRef]
  27. Liu, W.Y.; Wang, X.Y.; Wang, N.; Du, S.N.; Li, Y.M. Imperfect state preparation in continuous-variable quantum key distribution. Phys. Rev. A 2017, 96, 042312. [Google Scholar] [CrossRef]
  28. Usenko, V.C.; Grosshans, F. Unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2015, 92, 062337. [Google Scholar] [CrossRef]
  29. Wang, X.Y.; Liu, W.Y.; Wang, P.; Li, Y.M. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2017, 95, 062330. [Google Scholar] [CrossRef]
  30. Wang, P.; Wang, X.Y.; Li, J.Q.; Li, Y.M. Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions. Opt. Express 2017, 25, 27995–28009. [Google Scholar] [CrossRef]
  31. Braunstein, S.L.; van Loock, P. Quantum information with continuous variables. Rev. Mod. Phys. 2005, 77, 513–577. [Google Scholar] [CrossRef]
  32. Serafini, A. Detecting entanglement by symplectic uncertainty relations. J. Opt. Soc. Am. B 2007, 24, 347–354. [Google Scholar] [CrossRef]
  33. Grosshans, F.; Cerf, N.J.; Wenger, J.; Tualle-Brouri, R.; Grangier, P. Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables. Quantum Inform. Comput. 2003, 3, 535–552. [Google Scholar]
  34. Ben-Israel, A.; Greville, T.N.E. Generalized Inverses: Theory and Applications, 2nd ed.; Springer: New York, NY, USA, 2003. [Google Scholar]
  35. Serafini, A.; Paris, M.G.A.; Illuminati, F.; Siena, S.D. Quantifying decoherence in continuous variable systems. J. Opt. B 2005, 7, R19. [Google Scholar] [CrossRef]
  36. Garcia-Patron, R.; Cerf, N.J. Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 2009, 102, 130501. [Google Scholar] [CrossRef]
  37. Milicevic, M.; Feng, C.; Zhang, L.M.; Gulak, P.G. Key reconciliation with low-density parity-check codes for long-distance quantum cryptography. arXiv, 2017; arXiv:1702.07740. [Google Scholar]
Figure 1. Unidimensional (UD) protocol schemes under realistic conditions. (a) Prepare-and-measure (PM) scheme of the UD protocol; (b) Entanglement-based (EB) scheme of the UD protocol.
Figure 1. Unidimensional (UD) protocol schemes under realistic conditions. (a) Prepare-and-measure (PM) scheme of the UD protocol; (b) Entanglement-based (EB) scheme of the UD protocol.
Entropy 20 00157 g001
Figure 2. EB scheme of the SY protocol under realistic conditions.
Figure 2. EB scheme of the SY protocol under realistic conditions.
Entropy 20 00157 g002
Figure 3. (a) Secure and unsecure regions of the SY protocol using ideal homodyne detector ( η = 1 , v e l = 0 ) and realistic homodyne detector ( η = 0.6 , v e l = 0.1 ); (b) Secret key rate versus the excess noise for different channel losses.
Figure 3. (a) Secure and unsecure regions of the SY protocol using ideal homodyne detector ( η = 1 , v e l = 0 ) and realistic homodyne detector ( η = 0.6 , v e l = 0.1 ); (b) Secret key rate versus the excess noise for different channel losses.
Entropy 20 00157 g003
Figure 4. Comparison among physical regions of the UD protocol under both ideal and realistic detection conditions. The red solid line represents the realistic parabolic curve (equivalent to Bob using a realistic homodyne detector with η = 0.6 , v e l = 0.1 ) and black solid line is the ideal parabolic curve (equivalent to Bob using an ideal homodyne detector with η = 1 , v e l = 0 ). The red dashed line represents the part where the key rate is zero under realistic detection condition. Here, we set: β = 0.99 , T x = 0.4 (corresponding to a distance of 20 km fiber), ε x = 0.01 and V M = 6.35 .
Figure 4. Comparison among physical regions of the UD protocol under both ideal and realistic detection conditions. The red solid line represents the realistic parabolic curve (equivalent to Bob using a realistic homodyne detector with η = 0.6 , v e l = 0.1 ) and black solid line is the ideal parabolic curve (equivalent to Bob using an ideal homodyne detector with η = 1 , v e l = 0 ). The red dashed line represents the part where the key rate is zero under realistic detection condition. Here, we set: β = 0.99 , T x = 0.4 (corresponding to a distance of 20 km fiber), ε x = 0.01 and V M = 6.35 .
Entropy 20 00157 g004
Figure 5. Comparison among physical regions delimited by the parabolic curves of the UD protocol. The black solid curve corresponds to the ideal parabolic curve, whereas the others to the realistic parabolic curves obtained for different parameter conditions. (a) Changes of the physical region extension according to different values of η ( v e l remains constant); (b) Changes of the physical region extension according to different values of v e l ( η remains constant). The values of the parameters T x , ε x , and V M are the same as in Figure 4.
Figure 5. Comparison among physical regions delimited by the parabolic curves of the UD protocol. The black solid curve corresponds to the ideal parabolic curve, whereas the others to the realistic parabolic curves obtained for different parameter conditions. (a) Changes of the physical region extension according to different values of η ( v e l remains constant); (b) Changes of the physical region extension according to different values of v e l ( η remains constant). The values of the parameters T x , ε x , and V M are the same as in Figure 4.
Entropy 20 00157 g005
Figure 6. Ideal parabolic curve versus related parameters. (a) Different modulation variance values with T x = 0.1 and ε x = 0.01 ; (b) Different transmission efficiency values with ε x = 0.01 and V M = 3 ; (c) Different excess noise values with T x = 0.1 and V M = 3 ; (d) Different reconciliation efficiency values with T x = 0.1 , ε x = 0.01 , and V M = 3 .
Figure 6. Ideal parabolic curve versus related parameters. (a) Different modulation variance values with T x = 0.1 and ε x = 0.01 ; (b) Different transmission efficiency values with ε x = 0.01 and V M = 3 ; (c) Different excess noise values with T x = 0.1 and V M = 3 ; (d) Different reconciliation efficiency values with T x = 0.1 , ε x = 0.01 , and V M = 3 .
Entropy 20 00157 g006
Figure 7. Comparison among physical regions delimited by the new curves of the UD protocol. (a) Changes of the physical region according to different values of η ( v e l remains constant); (b) Changes of the physical region according to different values of v e l ( η remains constant). The other parameters are β = 0.99 , T x = 0.1 , ε x = 0.01 , and V M = 3 .
Figure 7. Comparison among physical regions delimited by the new curves of the UD protocol. (a) Changes of the physical region according to different values of η ( v e l remains constant); (b) Changes of the physical region according to different values of v e l ( η remains constant). The other parameters are β = 0.99 , T x = 0.1 , ε x = 0.01 , and V M = 3 .
Entropy 20 00157 g007
Figure 8. Secure and unsecure regions of the UD protocol under realistic detection condition. The parameters are set to β = 0.99 , V M = 3 , T x = 0.1 , ε x = 0.01 , η = 0.6 , and v e l = 0.1 .
Figure 8. Secure and unsecure regions of the UD protocol under realistic detection condition. The parameters are set to β = 0.99 , V M = 3 , T x = 0.1 , ε x = 0.01 , η = 0.6 , and v e l = 0.1 .
Entropy 20 00157 g008
Figure 9. (a) Comparison between secure and unsecure regions for the SY coherent-state protocol and UD coherent-state protocol under different detection conditions; (b) Secure and unsecure regions of the UD protocol using an ideal homodyne detector ( η = 1 , v e l = 0 ) and a realistic one ( η = 0.6 , v e l = 0.1 ). Here we consider V M = 3 , β = 0.99 , and the estimated value V y B 1 1 + T x ε x .
Figure 9. (a) Comparison between secure and unsecure regions for the SY coherent-state protocol and UD coherent-state protocol under different detection conditions; (b) Secure and unsecure regions of the UD protocol using an ideal homodyne detector ( η = 1 , v e l = 0 ) and a realistic one ( η = 0.6 , v e l = 0.1 ). Here we consider V M = 3 , β = 0.99 , and the estimated value V y B 1 1 + T x ε x .
Entropy 20 00157 g009
Figure 10. (a) Minimum secret key rate as a function of the channel losses; (b) Optimal choice of χ hom that maximizes the secret key rate in (a). The other parameters are β = 0.99 , ε x = 0.04 , V M = 3 , and V y B 1 1 + T x ε x .
Figure 10. (a) Minimum secret key rate as a function of the channel losses; (b) Optimal choice of χ hom that maximizes the secret key rate in (a). The other parameters are β = 0.99 , ε x = 0.04 , V M = 3 , and V y B 1 1 + T x ε x .
Entropy 20 00157 g010

Share and Cite

MDPI and ACS Style

Wang, P.; Wang, X.; Li, Y. Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations. Entropy 2018, 20, 157. https://doi.org/10.3390/e20030157

AMA Style

Wang P, Wang X, Li Y. Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations. Entropy. 2018; 20(3):157. https://doi.org/10.3390/e20030157

Chicago/Turabian Style

Wang, Pu, Xuyang Wang, and Yongmin Li. 2018. "Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations" Entropy 20, no. 3: 157. https://doi.org/10.3390/e20030157

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop