scholarly journals Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States

Entropy ◽  
2021 ◽  
Vol 23 (3) ◽  
pp. 294
Author(s):  
Yiming Bian ◽  
Luyu Huang ◽  
Yichen Zhang

We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.

2012 ◽  
Vol 10 (05) ◽  
pp. 1250059 ◽  
Author(s):  
MAOZHU SUN ◽  
XIANG PENG ◽  
YUJIE SHEN ◽  
HONG GUO

The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd and S. L. Braunstein, Nat. Phys. 4 (2008) 726] give the security against the collective attack on the condition of the tomography of the quantum channels. We propose a family of new two-way CV-QKD protocols and prove their security against collective entangling cloner attacks without the tomography of the quantum channels. The simulation result indicates that the new protocols maintain the same advantage as the original two-way protocols whose tolerable excess noise surpasses that of the one-way CV-QKD protocol. We also show that all sub-protocols within the family have higher secret key rate and much longer transmission distance than the one-way CV-QKD protocol for the noisy channel.


2019 ◽  
Vol 9 (22) ◽  
pp. 4956 ◽  
Author(s):  
Xinchao Ruan ◽  
Hang Zhang ◽  
Wei Zhao ◽  
Xiaoxue Wang ◽  
Xuan Li ◽  
...  

We investigate the optical absorption and scattering properties of four different kinds of seawater as the quantum channel. The models of discrete-modulated continuous-variable quantum key distribution (CV-QKD) in free-space seawater channel are briefly described, and the performance of the four-state protocol and the eight-state protocol in asymptotic and finite-size cases is analyzed in detail. Simulation results illustrate that the more complex is the seawater composition, the worse is the performance of the protocol. For different types of seawater channels, we can improve the performance of the protocol by selecting different optimal modulation variances and controlling the extra noise on the channel. Besides, we can find that the performance of the eight-state protocol is better than that of the four-state protocol, and there is little difference between homodyne detection and heterodyne detection. Although the secret key rate of the protocol that we propose is still relatively low and the maximum transmission distance is only a few hundred meters, the research on CV-QKD over the seawater channel is of great significance, which provides a new idea for the construction of global secure communication network.


2021 ◽  
Author(s):  
Heng Wang ◽  
Yang Li ◽  
Yaodi Pi ◽  
Yan Pan ◽  
Yun Shao ◽  
...  

Abstract Continuous-variable quantum key distribution (CVQKD) has potential advantages of high secret key rate, which is very suitable for high-speed metropolitan network application. However, the reported highest secret key rates of the CVQKD systems up to now are limited in a few Mbps. Here, we address the fundamental experimental problems and demonstrate a single-carrier four-state CVQKD with sub-Gbps key rate within metropolitan area. In the demonstrated four-state CVQKD using local local oscillator, an ultra-low level of excess noise is obtained and a high efficient post-processing setup is designed for practically extracting the final secure keys. Thus, the achieved secure key rates are 190.54 Mbps and 137.76 Mbps and 52.48 Mbps using linear channel assuming security analysis method and 233.87 Mbps, 133.6 Mbps and 21.53 Mbps using semidefinite programming security analysis method over transmission distances of 5 km, 10 km and 25 km, respectively. This record-breaking result increases the previous secret key rate record by an order of magnitude, which is sufficient to achieve the one-time pad cryptographic task. Our work shows the road for future high-rate and large-scale CVQKD deployment in secure broadband metropolitan and access networks.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Wei Zhao ◽  
Ronghua Shi ◽  
Duan Huang

AbstractBy manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.


2016 ◽  
Vol 16 (13&14) ◽  
pp. 1081-1095
Author(s):  
Tobias Gehring ◽  
Christian S. Jacobsen ◽  
Ulrik L. Andersen

Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two independent modulators for their implementations. Here, we propose and experimentally test a largely simplified scheme in which the Gaussian modulation is performed in a single quadrature. The scheme is shown to be asymptotically secure against collective attacks, and considers a specific attack using asymmetric preparation and excess noise. We find that this protocol is considerably more sensitive to noise than other CVQKD schemes, as a consequence of the simplified implementation. A single-quadrature modulation approach renders the need for a costly amplitude modulator unnecessary, and thus facilitates commercialization of continuous-variable quantum key distribution, provided that the low noise requirement can be achieved.


2013 ◽  
Vol 11 (04) ◽  
pp. 1350037 ◽  
Author(s):  
JIAN FANG ◽  
YUAN LU ◽  
PENG HUANG ◽  
GUANGQIANG HE ◽  
GUIHUA ZENG

In this paper, we first study a generalized protocol of discrete modulation for continuous-variable quantum key distribution with N coherent states in a Gaussian lossy and noisy channel and investigate its performance against collective attacks. We find that discrete modulation protocols with more than eight states do not perform better than the eight-state protocol. Then, we study the improvement of this protocol by using a nondeterministic noiseless linear amplifier (NLA) on Bob's detection stage. Results indicate that a NLA with gain g can extend the maximum transmission distance by 50 log 10g2 km and can increase the maximal tolerable excess noise. With the reconciliation efficiency β, we find the gain of NLA has a maximal value defined as g max and by adjusting the gain to about βg max one can have the best improvement on secret key rate.


Entropy ◽  
2018 ◽  
Vol 20 (8) ◽  
pp. 578 ◽  
Author(s):  
Hai Zhong ◽  
Yijun Wang ◽  
Xudong Wang ◽  
Qin Liao ◽  
Xiaodong Wu ◽  
...  

The scheme of the self-referenced continuous-variable quantum key distribution (SR CV-QKD) has been experimentally demonstrated. However, because of the finite dynamics of Alice’s amplitude modulator, there will be an extra excess noise that is proportional to the amplitude of the reference pulse, while the maximal transmission distance of this scheme is positively correlated with the amplitude of the reference pulse. Therefore, there is a trade-off between the maximal transmission distance and the amplitude of the reference pulse. In this paper, we propose the scheme of SR CV-QKD with virtual photon subtraction, which not only has no need for the use of a high intensity reference pulse to improve the maximal transmission distance, but also has no demand of adding complex physical operations to the original self-referenced scheme. Compared to the original scheme, our simulation results show that a considerable extension of the maximal transmission distance can be obtained when using a weak reference pulse, especially for one-photon subtraction. We also find that our scheme is sensible with the detector’s electronic noise at reception. A longer maximal transmission distance can be achieved for lower electronic noise. Moreover, our scheme has a better toleration of excess noise compared to the original self-referenced scheme, which implies the advantage of using virtual photon subtraction to increase the maximal tolerable excess noise for distant users. These results suggest that our scheme can make the SR CV-QKD from the laboratory possible for practical metropolitan area application.


2017 ◽  
Vol 31 (16) ◽  
pp. 1750143 ◽  
Author(s):  
Xiaoqun Wang ◽  
Chunhui Huang

The performance of one-way and two-way continuous variable quantum key distribution (CVQKD) protocols can be increased by adding some noise on the reconciliation side. In this paper, we propose to add noise at the reconciliation end to improve the performance of CVQKD with untrusted source. We derive the key rate of this case and analyze the impact of the additive noise. The simulation results show that the optimal additive noise can improve the performance of the system in terms of maximum transmission distance and tolerable excess noise.


2012 ◽  
Vol 10 (01) ◽  
pp. 1250004 ◽  
Author(s):  
A. BECIR ◽  
F. A. A. EL-ORANY ◽  
M. R. B. WAHIDDIN

We propose a continuous variable quantum key distribution protocol based on discrete modulation of eight-state coherent states. We present a rigorous security proof against the collective attacks by taking into consideration the realistic lossy and noisy quantum channel, the imperfect detector efficiency, and the detector electronic noise. This protocol shows high tolerance against excess noise and promises to achieve over 100 km distance of optical fiber.


Sign in / Sign up

Export Citation Format

Share Document