Next Article in Journal
Intuitionistic Fuzzy Entropy for Group Decision Making of Water Engineering Project Delivery System Selection
Previous Article in Journal
A Smoothed Algorithm with Convergence Analysis under Generalized Maximum Correntropy Criteria in Impulsive Interference
Previous Article in Special Issue
Bandwidth-Limited and Noisy Pulse Sequences for Single Qubit Operations in Semiconductor Spin Qubits
Open AccessArticle

Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions

1
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
State Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(11), 1100; https://doi.org/10.3390/e21111100
Received: 19 October 2019 / Revised: 6 November 2019 / Accepted: 7 November 2019 / Published: 11 November 2019
(This article belongs to the Special Issue Quantum Information Processing)
A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions. View Full-Text
Keywords: unidimensional modulated coherent states; continuous-variable quantum key distribution; untrusted detection unidimensional modulated coherent states; continuous-variable quantum key distribution; untrusted detection
Show Figures

Figure 1

MDPI and ACS Style

Huang, L.; Zhang, Y.; Chen, Z.; Yu, S. Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions. Entropy 2019, 21, 1100.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop