Next Article in Journal
A Good View for Graph Contrastive Learning
Previous Article in Journal
Research on Risk Contagion in ESG Industries: An Information Entropy-Based Network Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Passive Continuous Variable Measurement-Device-Independent Quantum Key Distribution Predictable with Machine Learning in Oceanic Turbulence

1
School of Automation, Central South University, Changsha 410083, China
2
School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(3), 207; https://doi.org/10.3390/e26030207
Submission received: 15 January 2024 / Revised: 13 February 2024 / Accepted: 26 February 2024 / Published: 27 February 2024
(This article belongs to the Section Quantum Information)

Abstract

:
Building an underwater quantum network is necessary for various applications such as ocean exploration, environmental monitoring, and national defense. Motivated by characteristics of the oceanic turbulence channel, we suggest a machine learning approach to predicting the channel characteristics of continuous variable (CV) quantum key distribution (QKD) in challenging seawater environments. We consider the passive continuous variable (CV) measurement-device-independent (MDI) QKD in oceanic scenarios, since the passive-state preparation scheme offers simpler linear elements for preparation, resulting in reduced interaction with the practical environment. To provide a practical reference for underwater quantum communications, we suggest a prediction of transmittance for the ocean quantum links with a given neural network as an example of machine learning algorithms. The results have a good consistency with the real data within the allowable error range; this makes the passive CVQKD more promising for commercialization and implementation.

1. Introduction

Quantum key distribution is a kind of encrypted means of communication [1,2], which uses the principle of quantum mechanics to enable legitimate parties to exchange secret keys securely. Continuous variable quantum key distribution (CVQKD) has been developed over decades due to its efficient source preparations and compatibility with current devices. Recently, a kind of meliorative protocol called the continuous variable measurement-device-independent (CV-MDI) protocol [3,4] has been proposed, in which a third party Charlie performs Bell state measurement on the quantum states prepared by Alice and Bob, and then broadcasts the result to Alice and Bob to generate the secret key. This detection strategy could counter an attack on practical devices because the measurement is performed by an untrusted third party rather than on Alice or Bob’s side. However, for the classical CVQKD protocol, the quantum states are prepared actively, which requires high precision modulators to reduce modulation error and achieve a complex modulation format, making it expensive for practical implementations.
Currently, a kind of quantum key distribution has been suggested with passive state preparations [5]. Compared with active state preparations, which require high extinction ratio modulators, passive states can be derived from a thermal source for the passive CVQKD. If the initial thermal state generated by the source is strong enough, this scheme can tolerate high detector noise on Alice’s side. Additionally, the output of the source does not need to be single-mode, as an optical homodyne detector can selectively measure a single mode determined by the local oscillator. Since then, passive state preparation has attracted much attention [6,7,8,9]. In 2018, passive states were applied to one-way classical quantum communication [10], and this has been experimentally demonstrated [11,12]. There have been many results of passive state preparations in recent years, such as security analysis [13] and applications [14]. In 2019, passive states were used for the CV-MDI QKD protocol [15].
Over time, the CV-MDI system has expanded from the free space channel to the ocean quantum links [16,17,18]. However, in the implementation of the ocean quantum links, many factors, such as seawater salinity, oceanic turbulence, and chlorophyll concentration, have an affect on the propagation of light beams [19]. To solve these difficulties, we propose a machine learning-based prediction of ocean transmittance to provide data reference for engineering applications in practice. In recent years, in the field of QKD, machine learning has been paid more and more attention. In 2020, Z. A. Ren et al. employed machine learning methods to select an optimal QKD protocol [20]; in the same year, a random forests algorithm was used to directly predict the optimal parameters of the QKD system [21]. Two years later, Zhou et al. used neural networks to construct a secure key rate prediction model for discrete modulation continuous variable systems [22]. In 2023, Ahmadian. M et al. used machine learning to improve the polarization tracking compensation scheme of a QKD system [23]. The organization of this paper is as follows. In Section 2, CV-MDI QKD with passive state preparation is suggested. In Section 3, we analyze the characteristics of the oceanic channel and propose a machine learning-assisted model based on an oceanic turbulence model for transmittance prediction. In Section 4, the secret key rate in the oceanic scenario is derived. Section 5 shows the simulation results, and then Section 6 draws the conclusions.

2. CV-MDI QKD with Passive State Preparation

The Gaussian-modulated coherent states (GMCS) QKD protocol is implemented based on the prepare-and-measure scheme. And from Eve and Bob’s points of view, the state from Alice is a single-mode thermal state with an average photon number of a half of modulation variance. In fact, the security of the GMCS QKD is commonly proved based on an equivalent entanglement-based protocol [24], where Alice performs conjugate homodyne detection on one mode of a two-mode squeezed vacuum state and sends the other mode to Bob. In this picture, the state from Alice is indeed thermal.
Here, we prepare the passive state by using a thermal source. There is a relationship between the value of the number of photons output at the Alice terminal and the modulation variance V in the GMCS QKD protocol, and the protocol with passive states requires a Gaussian modulator with a modulation variance of V. The preparation of passive states is implemented by taking advantage of a thermal source, beam splitters, optical attenuators, and homodyne detectors rather than the amplitude and phase modulators. The CV-MDI QKD protocol with passive state preparation is depicted in Figure 1, and its implementation can be described as follows.
Step 1: Alice and Bob each prepare a thermal sources. They use a 50:50 beam splitter to split the optical signal into two correlated spatial modes (the average number of photons output by each source is n 0 ), denoted by ( Mod A 1 , Mod A 2 ) (for Alice’s side) and ( Mod B 1 , Mod B 2 ) (for Bob’s side), respectively. Next, Alice (Bob) attenuates the average photon number of Mod A 1 ( Mod B 1 ) down to a half of the variance of V A ( V B ) by using an optical attenuator. The modulated signals are then transmitted to a third party, Charlie.
Step 2: Alice (Bob) performs heterodyne detection on both the X and P quadratures of mode Mod A 2 ( Mod B 2 ). They broadcast the measurement results to Charlie. The quadratures of Mod A 1 ( Mod B 1 ) at Charlie’s side have the relation with Mod A 2 ( Mod B 2 ) as follows ( X A 1 = 2 η A η D X A 2 , P A 1 = 2 η A η D P A 2 ) and ( X B 1 = 2 η B η D X B 2 , P B 1 = 2 η B η D P B 2 ). Here, η A and η B represent the transmittance of the attenuator, while η D represents the efficiency of the practical homodyne detector.
Step 3: Charlie mixes the received Mod A 1 and Mod B 1 on a balanced beam splitter and conducts Bell state measurement on them. The results are detected by conjugate homodyne detection at the output ports. After that, Charlie broadcasts the quadratures ( X C , P C ) over a classical public channel to Alice and Bob.
Step 4: After repeating these steps several times, Alice and Bob obtain a string of raw keys. Next, they apply post-processing operations such as privacy amplification and error correction to filter the data of ( X A 1 , P A 1 ), ( X B 1 , P B 1 ), and ( X C , P C ). Then, Alice and Bob get the final secret keys. The process is similar to the traditional CV-MDI QKD protocol with active state preparation, where communication parties can obtain final secret keys if the detected total noise falls below a certain threshold value. Compared with the Gaussian state, the passive state does not require the participation of a high-precision Gaussian modulator, which reduces the complexity and cost of the system.

3. Transmittance Prediction with Machine Learning

In this section, we first analyze the effect of the oceanic turbulence channel on light propagation, then we suggest a machine learning-based prediction model that can be used as a reference for practical underwater quantum communication systems.

3.1. Optical Propagation Characteristics of the Oceanic Turbulence Channel

Based on the seawater chlorophyll model and the elliptical model, which have been described in [25]—with the exception of the seawater extinction coefficient T—the Monte Carlo method used in the elliptic beam model for the oceanic turbulence channel has general applicability to any other ocean. The seawater extinction coefficient is the sum of the ocean absorption factor t abs and scattering factor t sca , which have an effect on the absorption and scattering of light in the ocean. t abs and t sca are functions of the ocean depth d and wavelength λ , the specific function varies depending on the type of ocean, and we have analyzed the optical propagation characteristics in ocean type S1. Mathematically, t abs and t sca has the form:
t abs = l c 0 u c ( d ) 0.602 + l w + l f 0 u f ( d ) e k f λ + l h 0 u h ( d ) e k h λ , t sca = m s 0 u s ( d ) + m l 0 u l ( d ) + m w ,
where l w represents the absorption due to pure water in relation to wavelength λ , and l w , corresponding to different wavelengths, is given by [26]. l h 0 denotes the absorption coefficient of chlorophyll α in relation to λ , and l h 0 corresponding to different wavelengths is given by [27]. The details of Equation (1) are given in Appendix A. By fitting the function, we get the functional relationship between l w , l h 0 , and λ , respectively. It should be noted that this function does not contain quantum noise; parameters like the absorption coefficient of chlorophyll α , the loss of light propagation in pure water, etc. are all related physical factors that affect light propagation, and they quantified the effect of seawater on the propagation of light.
The relationship between wavelengths, depth, absorption factor, and scattering factor are given in Figure 2a,b.
The characteristics of S1 can be clearly seen in Figure 2. The absorption and scattering factors of the S1 ocean increase significantly at 100–150 m due to high chlorophyll concentration and plankton enrichment at this depth, which leads to a sharp decrease in the secret key rate near this depth, as detailed in Section 5.

3.2. Transmittance Prediction of Seawater Channel

In practice, the estimation of transmittance and excess noise requires the two legitimate parties to sacrifice part of the raw keys for the parameter estimation procedure; the more the raw keys are consumed, the more accurate the estimation of the transmittance and the excess noise is. However, sacrificing too many raw keys will affect the efficiency of communication. Meanwhile, the estimation for the transmittance in the parameter estimation is intended to estimate its lower bound as much as possible to ensure the absolute security of communication. In this scheme, we do not discard the parameter estimation step. Instead of the transmittance obtained from the parameter estimation step, we use the transmittance predicted by machine learning to participate in the estimation of the secret key rate; the former is more accurately close to the true value than the lower bound of the transmittance ( T l o w ) and thus we can obtain a higher secret key rate without sacrificing more raw keys.
This approach allows the CVQKD system to maintain stable performance in various environmental conditions, thereby improving the system’s reliability. The structure of the Elman neural network is illustrated in Figure 3, and the prediction procedure is outlined in Figure 4.
The Elman neural network is a type of recurrent neural network (RNN) that is used for time series prediction and sequence modeling [28]. It has a feedback loop that allows information from previous time steps to be fed back into the network, enabling it to capture temporal dependencies in the input sequence.
We present below an overview of its structure and training process. An Elman network typically consists of three main layers: an input layer, which receives external inputs and feeds them into the next layer; a hidden layer, which is a set of neurons that perform computations based on both current input and a context vector received from the previous time step. Each neuron has self-recurrent connections along with feedforward connections from the input layer; an output layer, which processes the outputs of the hidden layer neurons to generate the final output; context units—a distinctive characteristic of the Elman network is the context layer or ’memory’ units, which are a copy of the hidden layer activations at one time step, which are then fed back into the hidden layer during the next time step. This feedback loop enables the network to maintain some form of short-term memory that can influence its future predictions.
There are basic steps for training an Elman network. Initialization: Assign random initial weights and biases to all connections between layers; Forward Propagation: For each sequence step, input the current time step data into the input layer. The hidden layer computes its activations based on the current input and the previously stored context. The output layer generates its prediction using the hidden layer activations; Backpropagation through time (BPTT): After making predictions for an entire sequence, calculate the loss function comparing predicted outputs to target values across the sequence. BPTT extends standard backpropagation by unrolling the network over time and computing gradients through the unfolded network; Calculate the error gradient for each time step and update the weight matrices and bias vectors accordingly; Parameter Update: Using an optimization algorithm like stochastic gradient descent (SGD) or variants such as Adam, update the network parameters according to the computed gradients, aiming to minimize the total sequence loss; Iterative Training: Repeat this process over many iterations (epochs) until the performance on a validation set stabilizes or starts to degrade, indicating convergence or potential overfitting; Regularization: If necessary, apply regularization techniques to control model complexity and prevent overfitting. During the training process, it is crucial to monitor the learning curves, adjusting hyperparameters such as learning rate, batch size, and the number of hidden units if needed, to ensure efficient and accurate learning of temporal patterns in the data.
The GA-Elman algorithm [29] is a hybrid approach that combines the Elman recurrent neural network with an adaptive genetic algorithm to optimize the network’s parameters for time series prediction. The main idea is to use the genetic algorithm to search for the optimal combination of weights and biases in the Elman network to minimize the prediction error. The algorithm starts by initializing the Elman network with random weights and biases. The training data are then fed into the network, and the output is computed. The genetic algorithm is used to optimize the weights and biases based on the prediction error. The genetic algorithm creates a population of candidate solutions, which are evaluated based on their fitness, i.e., how well they minimize the prediction error. The fittest solutions are selected for reproduction, and their offspring inherit their genetic traits through crossover and mutation. The Elman network is trained using the optimized weights and biases, and the process is repeated until the prediction error converges or the maximum number of iterations is reached. The trained network is then used to predict future values of the time series. The GA-Elman algorithm has several advantages over other time series prediction methods. It can handle nonlinear and non-stationary time series, and it can adapt to changing environments. The genetic algorithm allows for a global search of the parameter space, which can lead to better solutions than gradient-based methods.
The relationship between t a b s , t s c a and transmittance T is T = e ( t a b s + t s c a ) z [30], z is the transmission distance. Combined with Equation (1), we can find that the transmittance is a binary function whose independent variables are depth and transmission distance, so the inputs to the machine learning model are the depth and transmission distance.
The transmittance prediction of the Elman and GA-Elman algorithms on transmission can be seen in Figure 5. To provide a quantitative analysis of the performance improvements made to the Elman algorithm, we present the prediction errors of GA-Elman and Elman for 1200 sets of test samples, as shown in Figure 6. Prediction error refers to the difference between the value of the transmittance output of the predicted model and the real value when we input the depth and distance.
The numerical analysis demonstrates that this model is capable of predicting the fluctuation of transmittance within an acceptable error range, which has a strong correlation with the actual transmission values. The prediction results can be used to assist actual derivation and calculation under certain circumstances.
The elliptic model provides the probability density function (PDF) of the transmittance, and an estimate of the transmittance is obtained by solving the inverse function of the cumulative distribution function, but the value of the actual measured transmittance can be any arbitrary value within the range of the PDF, and is not exactly equivalent to the former. According to [25], the variance of the transmittance is estimated to be on the order of 10 5 , with a transmittance of at least 0.4 or higher at effective underwater communication distances. Therefore, when the model predicts the transmittance based on actual measurements, the error in the model’s prediction is within acceptable limits, even if the actual value of the transmittance at the predicted location is the value of the transmittance corresponding to a very small probability in the PDF.
The protocol performance under the transmittance prediction model based on machine learning is shown in Figure 7.
The black dashed line represents the secret key rate curve after the transmittance predicted by machine learning is applied to the parameter estimation, and the green dashed line represents the secret key rate curve when the parameter estimation takes the lower bound of the transmittance without the application of the machine learning model.

4. Security Analysis

According to the above-mentioned processing, we obtain the transmittance in seawater channels, and hence we can establish the correlation among average transmittance, ocean depth, and transmission distance. Moreover, the passive state for the CV-MDI QKD protocol usually leads to excess noise, which provides an opportunity for eavesdropping through joint attacks. From [3], we assume that Eve adopts the most general joint attack against the protocol, which involves using the joint two-mode attack strategy that targets both links simultaneously. This approach is considered more effective than a single-mode attack strategy, which involves an additional layer of complexity to the security analysis.

4.1. Secret Key Rate in Asymptotic Scenarios

To begin with, we assume that the preparation sides have the same variance, thus the covariance matrix (CM) can be written as V A 1 B 1 C 1 = V A 1 B 1 Z C 1 Z T , where V A 1 B 1 represents the reduced covariance matrix (CM) of Alice and Bob’s modes, while C denotes the outcome CM of Charlie, and Z represents the complex correlations between these CMs. Regarding the eavesdropping strategy, assuming a Gaussian distribution, Eve has the potential to intercept the traveling modes A 1 and B 1 , which are mixed with two quantum-correlated ancillary modes. The reduced state V E 1 E 2 can be written in the normal form:
V E 1 E 2 = ϖ 1 I 2 G G ϖ 2 I 2 ;
ϖ 1 and ϖ 2 are the variance of the thermal excess noise disturbing the corresponding link, with I 2 = diag ( 1 , 1 ) , with G = diag ( g , g ) , where
g = min ϖ 1 1 ϖ 2 + 1 , ϖ 1 + 1 ϖ 2 1
is set to minimize the secret key rate. From [3,31], the simplified covariance matrix between Alice and Bob can be calculated as:
V A 1 B 1 C = V T A V 2 1 ϑ I 2 T A T B V 2 1 ϑ σ Z T A T B V 2 1 ϑ σ Z V T B V 2 1 ϑ I 2 ,
with σ Z = diag ( 1 , 1 ) , V = V A + 1 = V B + 1 , and
ϑ = V T A + T B + ϖ 1 1 T A + ϖ 2 1 T B 2 g 1 T A 1 T B .
Let X E denote the information that Eve can get by using the two-mode attack, and it is given by
X E = S ρ A 1 B 1 C S ρ B 1 C α ,
where S ρ A 1 B 1 C and S ρ B 1 C α can be calculated as:
S ρ A 1 B 1 C = H λ 1 + H λ 2 , S ρ B 1 C α = H det V A 1 B 1 C ,
with H ( x ) = 1 + x 2 log 2 1 + x 2 x 1 2 log 2 x 1 2 . Here, λ 1 and λ 2 are the symplectic eigenvalues of V A 1 B 1 C . The mutual information between Alice and Bob is given by:
I A B = log 2 V X t o t a l ,
where X t o t a l can be divided into X t o t a l = X l o s s + ε E . The pure loss in channel from senders to Charlie is defined as X l o s s , which has the form X l o s s = 2 T A + T B T A T B , and the total excess noise ε E = ε P + ε 0 , where ε 0 is the background noise, and ε P is the total excess noise in the process of passive state preparation. Therefore, we have:
ε P = ε A + ε B , ε A = 2 V A η D n 0 1 + V e l V A n 0 , ε B = 2 V B η D n 0 1 + V e l V B n 0 ,
where V A and V B are the modulation variance, V e l is the electronic noise of the homodyne detector, η D is the efficiency of the homodyne detector, and n 0 is the average number of photons output by the thermal source.

4.2. Secret Key Rate in the Finite-Size Case

In the finite-size condition, the secret key rate is given by [32,33]:
K = n N K T A l o w , T B l o w , ε X C h i g h , ε P C h i g h Δ ( n ) ,
where the signals exchanged by Alice and Bob are N. Due to the effects of finite size, Alice and Bob should conduct the parameter estimation by using a number of m keys in the practical condition. The remaining number n, which has the correlation with m, is given by n = N m , which is used to generate the secret key. The correction term Δ ( n ) is simplified as:
Δ ( n ) = 7 log 2 2 / ϵ P A n .
The estimation of error in privacy amplification ϵ P A is set to 10 10 . The noise terms of X C and P C has the form:
ε X C = ε P C = ε P + 1 2 ϖ 1 1 T A + ϖ 2 1 T B g 1 T A 1 T B ,
δ ε X C = δ ε P C = 2 ε X C m .
The maximum noise of X C and P C generated in Charlie’s detection is given by:
ε X C h i g h = ε X C + 6.5 δ ε X C , ε P C h i g h = ε P C + 6.5 δ ε P C .
Considering the security of the protocol, the channel transmittance is considered in the worst case because Alice and Bob are the same as Charlie and, consequently, only the case between Alice and Charlie is introduced. The expression can be conducted from:
T A l o w = 1 2 X 2 l o w X 1 u p ,
with
X 2 l o w = X 2 6.5 Var X 2 , X 1 u p = X 1 + 6.5 Var X 1 , X 1 = T A T A 2 , X 2 = T A + T A 2 , Var X 1 = Var X 2 = σ T A 2 + 2 σ T A 4 1 + 2 μ 2 T A σ T A 2 .
Here, we have notations σ T A 2 = P T A 2 σ T ^ A 2 , σ T A 2 = P T A 2 Var T ^ A , and μ T A = P T A E T ^ A . Taking T ^ A = 2 C ^ A C 2 η V A 2 ; we obtain
δ T A ^ 2 = Var C ^ A C 8 T A η V A 2 , E T ^ A = T A , Var T ^ A = 2 Var C ^ A C η V A 2 .
The variance of C ^ A C is η V A 2 T A + V A V N m and V N is the variance of X N .

5. Simulation Results

In what follows, we demonstrate the performance of the CV-MDI QKD system in terms of the secret key rate and transmission distance. In numerical simulations, we set the average number of output photons to 800 per pulse and the modulation variance to 60. For simplicity, we assume that the homodyne detector is noiseless and has an efficiency of 0.95 [15]. The communication block size is 10 8 , and thermal noise ϖ 1 ϖ 2 ∼ 1.01. Depending on the distance between Alice and Bob, and Charlie, it can be classified as asymmetric and symmetric. It is worth mentioning that the system performs better in the asymmetric case when Alice and Charlie are closer to each other than in the symmetric case. Therefore, we will only present the performance in the former case.
The variation relationship between the secret key rate as the dependent variable and the transmission distance and depth as the independent variables is shown in Figure 8.
The title ’distance’ in Figure 8 means the distance between Alice and Bob, namely the effective distance between two underwater communication parties. The green dashed line represents the change of the secret key rate with depth when the communication distance between the two communication parties is 1.65 m, so that the change of the dent of the three-dimensional surface in a certain depth segment can be more clearly seen, which just validates the previous analysis of the extinction coefficient, that is, the extinction coefficient increases sharply in this depth segment, and naturally the corresponding secret key rate should decline sharply in this depth segment.
Additionally, we find how the secret key rate correlates with depth and transmission distance. The green curves demonstrate that the impact of ocean depth on the secret key rate is significant for a given transmission distance. This phenomenon is attributed to the presence of a strong optical fading effect at a specific depth in the ocean, which is denoted in Section 3. Therefore, it is advisable to avoid deploying communication devices in areas where the extinction factor is concentrated. The red curve illustrates the accepted phenomenon that the secret key rate decreases with increasing transmission distance for a given depth. The trend of the secret key rates in the finite-size case is similar to that in ideal conditions. However, the rates are lower due to the effects of the finite size.

6. Conclusions

We have proposed passive state CV-MDI to ocean scenarios. Then, we analyzed the optical propagation characteristics of the oceanic turbulence channel; moreover, we have presented a transmittance prediction model using the GA-Elman neural network. This model exhibits a high level of predictive accuracy for quantum communication in oceanic turbulence. The machine learning-assisted CVMDI protocol with passive states has improved its performance, although, limited by the complexity of the underwater environment and the attenuation of light propagation, the transmission distance has not been significantly improved, which is the limitation of this paper. However, the method for improving the lower bound of transmittance in parameter estimation by predicting transmittance is also suitable for free-space channels. In the future, with the proposal of quantum communication protocols with higher performance, it is expected to provide a new idea for auxiliary QKD systems.
The secret key rates in the asymptotic and finite-size cases are derived and the performance of the scheme is calculated. These above findings contribute to the advancement of passive CV-MDI QKD in challenging underwater environments. The ability to accurately predict transmittance in oceanic turbulence can enhance the security and reliability of quantum communication systems operating in such conditions.

Author Contributions

Conceptualization, J.Y. and Y.G.; methodology, J.Y. and H.W.; formal analysis, J.Y.; data curation, H.W.; writing—original draft preparation, J.Y.; writing—review and editing, H.W.; validation, Y.G. All authors have read and agree to the published version of the manuscript.

Funding

This research is backed by the National Natural Science Foundation of China (Grant Nos. 62103388), as well as the Natural Science Foundation of Hunan Province (Grant No. 2023JJ50268, 2023JJ50269) and the Key Research and Development Program of Hunan Province (Grant Nos. 2022GK2016) and the Scientific Research Fund of Hunan Provincial Education Department (Grant Nos. 22C0446, 21A0470, 22A0669).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. The Seawater Chlorophyll Model

Many factors such as seawater density, turbulence, bubble surface have important effects on light propagation in the ocean quantum links. From [25], the deterministic losses caused by the ocean extinction has an effect on the transmittance
T e x t = e z t ,
T e x t is the extinction-induced transmittance, z denotes the transmission distance and t is the seawater extinction coefficient which is related to the wavelength λ , and it is defined by t = t a b s + t s c a . t a b s is the ocean absorption factor which has the form
t a b s = l c 0 u c ( d ) 0.602 + l w + l f 0 u f ( d ) e k f λ + l h 0 u h ( d ) e k h λ ,
u c is the chlorophyll a content and it is defined as
u c ( d ) = u b + d s + h 2 π ς exp d d max 2 2 ς 2 .
The standard deviation of the concentration of chlorophyll ς is given by
ς = h 2 π u chl u b d max s ,
the content of fulvic acid is defined as u f ( d ) = 1.74098 u c ( d ) e 0.12327 u c ( d ) , the concentration of humic acid has the form u h ( d ) = 0.19334 u c ( d ) e 0.12343 u c ( d ) , where t s c a = m s 0 u s ( d ) + m l 0 u l ( d ) + m w is the scattering factor, and the small particles’ concentration is defined as u s ( d ) = 0.01739 u c ( d ) e 0.11631 u c ( d ) , and u l ( d ) = 0.76284 u c ( d ) e 0.03092 u c ( d ) is the large particles’ concentration. the meaning and parameter of these variables are summarized in Table A1.
Table A1. Variables of ocean model.
Table A1. Variables of ocean model.
Meaning of the VariatesParameter
l c 0 The absorption coefficient of chlorophyll a at wavelength λ 0.009 m 2 / mg
l w The loss of light propagation in pure water 0.0507 m 1
l f 0 The fulvic acid’s absorption coefficient 35.959 m 2 / mg
k f The fulvic acid’s exponential coefficient 0.0189 nm 1
λ The wavelength532 nm
l h 0 The humic acid’s absorption of coefficient 18.828 m 2 / mg
k h The humic acid’s exponential coefficient 0.01105 nm 1
u b The surface’s background chlorophyll content 0.0429 mg / m 3
sThe vertical gradient of concentration 0.000103 mg / m 2
hThe total chlorophyll a above the background levels11.87 mg
d max The depth of the deep chlorophyll maximum115.4 m
u c h l The maximum chlorophyll concentration at the chlorophyll maximum layer 0.708 mg / m 3
m s 0 The scattering coefficient of small particulate matter 1.1513 ( 400 / λ ) 1.7
m l 0 The scattering coefficient of large particulate matter 0.3411 ( 400 / λ ) 0.3
m w The scattering coefficient of the pure water 0.005826 ( 400 / λ ) 4.322
dThe depth of ocean

References

  1. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–699. [Google Scholar] [CrossRef]
  2. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  3. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397–402. [Google Scholar] [CrossRef]
  4. Li, Z.; Zhang, Y.-C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef]
  5. Mauerer, W.; Silberhorn, C. Quantum key distribution with passive decoy state selection. Phys. Rev. A 2007, 75, 050305. [Google Scholar] [CrossRef]
  6. Adachi, Y.; Yamamoto, T.; Koashi, M.; Imoto, N. Simple and efficient quantum key distribution with parametric down-conversion. Phys. Rev. Lett. 2007, 99, 180503. [Google Scholar] [CrossRef] [PubMed]
  7. Zhang, Y.; Chen, W.; Wang, S.; Yin, Z.-Q.; Xu, F.-X.; Wu, X.-W.; Dong, C.-H.; Li, H.-W.; Guo, G.-C.; Han, Z.-F. Practical non-Poissonian light source for passive decoy state quantum key distribution. Opt. Lett. 2010, 35, 3393–3395. [Google Scholar] [CrossRef] [PubMed]
  8. Curty, M.; Ma, X.; Lo, H.-K.; Lütkenhaus, N. Passive sources for the Bennett-Brassard. quantum-key-distribution protocol with practical signals. Phys. Rev. A 2010, 82, 052325. [Google Scholar] [CrossRef]
  9. Sun, S.-H.; Tang, G.-Z.; Li, C.-Y.; Liang, L.-M. Experimental demonstration of passive-decoy-state quantum key distribution with two independent lasers. Phys. Rev. A 2016, 94, 032324. [Google Scholar] [CrossRef]
  10. Qi, B.; Evans, P.G.; Grice, W.P. Passive state preparation in the Gaussian-modulated coherent-states quantum key distribution. Phys. Rev. A 2018, 97, 012317. [Google Scholar] [CrossRef]
  11. Huang, P.; Wang, T.; Chen, R.; Wang, P.; Zhou, Y.; Zeng, G. Experimental continuous-variable quantum key distribution using a thermal source. New J. Phys. 2021, 23, 113028. [Google Scholar] [CrossRef]
  12. Qi, B.; Gunther, H.; Evans, P.G.; Williams, B.P.; Camacho, R.M.; Peters, N.A. Experimental passive-state preparation for continuous-variable quantum communications. Phys. Rev. Appl. 2020, 13, 054065. [Google Scholar] [CrossRef]
  13. Xu, S.; Li, Y.; Wang, Y.; Mao, Y.; Wu, X.; Guo, Y. Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect. Entropy 2022, 23, 1698. [Google Scholar] [CrossRef] [PubMed]
  14. He, Y.-Q.; Mao, Y.; Zhong, H.; Huang, D.; Guo, Y. Hybrid linear amplifier-involved detection for continuous variable quantum key distribution with thermal states. Chin. Phys. B 2020, 29, 050309. [Google Scholar] [CrossRef]
  15. Bai, D.; Huang, P.; Ma, H.; Wang, T.; Zeng, G. Passive-state preparation in continuous-variable measurement-device-independent quantum key distribution. J. Phys. B At. Mol. Opt. Phys. 2019, 52, 135502. [Google Scholar] [CrossRef]
  16. Feng, Z.; Li, S.; Xu, Z. Experimental underwater quantum key distribution. Opt. Express 2019, 29, 8725–8736. [Google Scholar] [CrossRef]
  17. Hiskett, P.A.; Lamb, R.A. Underwater optical communications with a single photon-counting system. Adv. Photon Count. Tech. VIII 2014, 9114, 113–127. [Google Scholar]
  18. Hu, C.-Q.; Yan, Z.-Q.; Gao, J.; Li, Z.-M.; Zhou, H.; Dou, J.-P.; Jin, X.-M. Decoy-state quantum key distribution over a long-distance high-loss air-water channel. Phys. Rev. Appl. 2021, 15, 024060. [Google Scholar] [CrossRef]
  19. Guo, Y.; Xie, C.; Huang, P.; Li, J.; Zhang, L.; Huang, D.; Zeng, G. Channel-parameter estimation for satellite-to-submarine continuous-variable quantum key distribution. Phys. Rev. A 2018, 97, 052326. [Google Scholar] [CrossRef]
  20. Ren, Z.; Chen, Y.; Liu, J.; Ding, H.; Wang, Q. Implementation of Machine Learning in Quantum Key Distributions. IEEE Commun. Lett. 2020, 25, 940–944. [Google Scholar] [CrossRef]
  21. Ding, C.; Wang, Q. Predicting optimal parameters with random forest for quantum key distribution. Quantum Inf. Process. 2020, 19, 2. [Google Scholar] [CrossRef]
  22. Zhou, M.; Liu, Z.; Liu, W.; Li, C.; Bai, J.; Xue, Y.; Fu, Y.; Yin, H.; Chen, Z. Neural network-based prediction of the secret-key rate of quantum key distribution. Sci. Rep. 2022, 12, 8879. [Google Scholar] [CrossRef] [PubMed]
  23. Ahmadian, M.; Ruiz, M.; Comellas, J.; Velasco, L. Cost-Effective ML-Powered Polarization-Encoded Quantum Key Distribution. J. Light. Technol. 2023, 13, 4119–4128. [Google Scholar] [CrossRef]
  24. Frédéric, G.; Gilles, V.A.; Jérôme, W.; Rosa, B.; Nicolas, C.; Philippe, J.G. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 6920, 238–241. [Google Scholar]
  25. Zuo, Z.; Wang, Y.; Mao, Y.; Ruan, X.; Guo, Y. Security of quantum communications in oceanic turbulence. Phys. Rev. A 2021, 104, 052613. [Google Scholar] [CrossRef]
  26. Haltrin, V.I.; Kattawar, G.W. Effects of Raman Scattering and Fluorescence on Apparent Optical Properties of Seawater; Texas A&M University: College Station, TX, USA, 1991. [Google Scholar]
  27. Yentsch, C.S. The influence of phytoplankton pigments on the colour of sea water. Deep. Sea Res. 1953 1960, 7, 1–9. [Google Scholar] [CrossRef]
  28. Elman, J.L. Finding Structure in Time. Cogn. Sci. 1990, 2, 179–211. [Google Scholar] [CrossRef]
  29. Jia, W.; Zhao, D.; Zheng, Y.; Hou, S. A novel optimized GA–Elman neural network algorithm. Neural Comput. Appl. 2019, 31, 449–459. [Google Scholar] [CrossRef]
  30. Xiang, Y.; Wang, Y.; Ruan, X.; Zuo, Z.; Guo, Y. Improving the discretely modulated underwater continuous-variable quantum key distribution with heralded hybrid linear amplifier. Phys. Scr. 2021, 6, 065103. [Google Scholar] [CrossRef]
  31. Ottaviani, C.; Spedalieri, G.; Braunstein, S.L.; Pirandola, S. A Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration. Phys. Rev. A 2015, 91, 022320. [Google Scholar] [CrossRef]
  32. Ruppert, L.; Usenko, C.V.; Filip, R. Long-distance continuous-variable quantum key distribution with efficient channel estimation. Phys. Rev. A 2014, 6, 062310. [Google Scholar] [CrossRef]
  33. Pirandola, O.S. Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables. Phys. Rev. A 2017, 96, 4aPta1. [Google Scholar]
Figure 1. (a) Schematic diagram of the application of the underwater CV-MDI protocol. (b) Alice’s side. (c) Charlie’s side. (d) Bob’s side. In the data processing stage, the machine learning module is used to predict transmittance. The specific explanation of this algorithm can be found in part 3. VOA, variable optical attenuator; TS, thermal source; the red dashed line denotes conjugate homodyne detection. TELE, telescope.
Figure 1. (a) Schematic diagram of the application of the underwater CV-MDI protocol. (b) Alice’s side. (c) Charlie’s side. (d) Bob’s side. In the data processing stage, the machine learning module is used to predict transmittance. The specific explanation of this algorithm can be found in part 3. VOA, variable optical attenuator; TS, thermal source; the red dashed line denotes conjugate homodyne detection. TELE, telescope.
Entropy 26 00207 g001
Figure 2. Variation of absorption and scattering factors with wavelength and depth. (a) Absorption factor. (b) Scattering factor.
Figure 2. Variation of absorption and scattering factors with wavelength and depth. (a) Absorption factor. (b) Scattering factor.
Entropy 26 00207 g002
Figure 3. Structure of the Elman neural network. X ( k ) , Y ( k ) , input and output vectors; W L i (where i = 1, 2,...…, 5), connection weights; h ( · ) , g ( · ) , f ( · ) , the nodal activation functions; a i , a j , a k , the thresholds; Z 1 , the unity delay.
Figure 3. Structure of the Elman neural network. X ( k ) , Y ( k ) , input and output vectors; W L i (where i = 1, 2,...…, 5), connection weights; h ( · ) , g ( · ) , f ( · ) , the nodal activation functions; a i , a j , a k , the thresholds; Z 1 , the unity delay.
Entropy 26 00207 g003
Figure 4. Flowchart of GA-Elman algorithm.
Figure 4. Flowchart of GA-Elman algorithm.
Entropy 26 00207 g004
Figure 5. Predictions for transmittance. (a) Performance of Elman algorithm. (b) Performance of GA-Elman algorithm.
Figure 5. Predictions for transmittance. (a) Performance of Elman algorithm. (b) Performance of GA-Elman algorithm.
Entropy 26 00207 g005
Figure 6. Prediction error of Elman and GA-Elman algorithm. The average absolute percentage error between Elman and GA-Elman are 2.814% and 0.506%, respectively.
Figure 6. Prediction error of Elman and GA-Elman algorithm. The average absolute percentage error between Elman and GA-Elman are 2.814% and 0.506%, respectively.
Entropy 26 00207 g006
Figure 7. Performance improvement diagram of QKD system assisted by machine learning model.
Figure 7. Performance improvement diagram of QKD system assisted by machine learning model.
Entropy 26 00207 g007
Figure 8. Secret key rate in asymmetric case.(a) Asymptotic case. (b) Finite-size case.
Figure 8. Secret key rate in asymmetric case.(a) Asymptotic case. (b) Finite-size case.
Entropy 26 00207 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yi, J.; Wu, H.; Guo, Y. Passive Continuous Variable Measurement-Device-Independent Quantum Key Distribution Predictable with Machine Learning in Oceanic Turbulence. Entropy 2024, 26, 207. https://doi.org/10.3390/e26030207

AMA Style

Yi J, Wu H, Guo Y. Passive Continuous Variable Measurement-Device-Independent Quantum Key Distribution Predictable with Machine Learning in Oceanic Turbulence. Entropy. 2024; 26(3):207. https://doi.org/10.3390/e26030207

Chicago/Turabian Style

Yi, Jianmin, Hao Wu, and Ying Guo. 2024. "Passive Continuous Variable Measurement-Device-Independent Quantum Key Distribution Predictable with Machine Learning in Oceanic Turbulence" Entropy 26, no. 3: 207. https://doi.org/10.3390/e26030207

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop