† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant Nos. 61378010 and 11504219), the Key Project of the Ministry of Science and Technology of China (Grant No. 2016YFA0301403), the Natural Science Foundation of Shanxi Province, China (Grant No. 2014011007-1), and the Program for the Outstanding Innovative Teams of Higher Learning Institutions of Shanxi Province, China.
Quantum key distribution enables unconditionally secure key distribution between two legitimate users. The information-theoretic security is guaranteed by the fundamental laws of quantum physics. Initially, the quantum key distribution protocol was proposed based on the qubits. Later on, it was found that quantum continuous variables can also be exploited for this target. The continuous variable quantum key distribution can build upon standard telecommunication technology and exhibits a higher secret key rate per pulse at a relatively short distance due to the possibility of encoding more than 1 bit per pulse. In this article, we review the current status of the continuous variable quantum key distribution research, including its basic principle, experimental implementations, security and future directions; the experimental progress in this field made by our group is also presented.
In the past three decades, quantum theory has found various applications in the domain of communication. The combination of quantum mechanics and information theory enables new forms of communication techniques, which are more powerful than their classical analogs in certain scenarios. At present, the most mature application of quantum communication is quantum cryptography, which can provide unconditional security based on the so-called one-time pad encryption invented by Vernam in 1917.[1] On the contrary, the security of most modern cryptographic applications is based on some difficult mathematic problems, which can be broken in principle if the adversaries possess strong enough computational power. For example, the security of the public-key encryption method-RSA rests on the assumption that the problem of factoring a large number is hard.[2] The intrinsic security of quantum cryptography comes from the quantum key distribution (QKD) technique which provides a secure approach to sharing a secret key between two legitimate parties required by the one-time pad encryption.
Since Bennett and Brassard[3] proposed the first QKD protocol (BB84 protocol or four-state protocol), a lot of theoretical and experimental progress[4–9] has been made (for the basics of the quantum key distribution, readers can refer to Refs. [4]–[8]). In the theoretical aspect, theoretical tools have been developed to assess the security and the unconditional security of several QKD protocols against arbitrary attacks has been proved rigorously in the asymptotic limit. The composable security in a finite-key regime has also made significant progress. Long-distance QKD over a distance of more than one hundred kilometers based on various protocols has been demonstrated in both fibers and free space. Several QKD networks have been tested in a field environment.[10–16] Recently, it is noted that QKD products have also been launched commercially.
Although various QKD protocols have been proposed, they can be classified as three main families: discrete-variable coding, continuous-variable (CV) coding and distributed-phase-reference coding. The discrete-variable QKD protocol employs the discrete variables of a quantum state, such as the polarization or phase of single photons, whereas in the CV scheme, the key information is encoded in continuous quantum variables, such as the quadratures of quantized electromagnetic modes (coherent states or squeezed states). Unlike the other two coding schemes, where each bit of the key is encoded in an independent single signal state, the distributed-phase-reference coding scheme resorts to the phase difference between two successive signal pulses or the photon arrival times to encode the key information. Both the discrete-variable coding and distributed-phase-reference coding scheme utilize photon counting and post-selection techniques, while homodyne detection is adopted in continuous-variable coding.
The introduction of CV coding provides a useful alternative approach for quantum information processing. It can build upon standard telecommunication technology, for instance, instead of a sophisticated single photon counting technique, the coherent detection method (homodyne detection) widely used in the classical optical communications field is exploited. The quantum efficiency of the homodyne detector at 1550 nm (the lowest-loss window of telecom single mode fiber) determined by PIN photodiodes can reach above 90%. On the other hand, the local oscillator (LO) in homodyne detection can act as a built-in mode filter both in the spatial and temporal domains for the background noisy photons. This feature is beneficial to the coexistence of QKD with intense classical optical signals in dense-wavelength-division multiplexing networks. Due to the possibility of encoding more than 1 bit per pulse, the CV QKD can achieve a higher secret key rate per pulse at a relatively short distance.
The rest of this paper is organized as follows. In Section
Since Ralph suggested encoding key information on the amplitude and phase quadrature amplitudes of the light field and successively detecting the signal by homodyne detection in QKD,[17] a variety of CV QKD protocols have been proposed. The early proposals mainly concentrate on discrete modulation,[17–19] i.e., the encoded key information is binary. Shortly after that, continuous modulation (Gaussian modulation) CV protocols were devised based on squeezed states[20,21] and coherent states of light.[22] In the above two protocols, the key receiver Bob randomly chooses to measure the amplitude or phase quadrature, this implies the need for sifting; Alice and Bob need to discard half of their data (for doubly modulated coherent states,[22] only Alice needs to discard half of her data). Later, the heterodyne based Gaussian-modulated coherent state protocol was proposed[23] and demonstrated.[24] In this case, neither active basis choice nor key sifting is required, and the key rate can often be increased. By exploiting the quantum correlations of Einstein–Podolsky–Rosen (EPR) entangled states, it is shown that CV QKD can also be realized without signal modulation.[25] In 2009, a CV protocol based on squeezed states and heterodyne detection was proposed, which is shown to exhibit higher secret key rates than any previous Gaussian protocols.[26] Recently, it was shown that by modulating the entangled states of light, one can enhance greatly the robustness of the CV QKD to channel noise, and therefore attain a high key rate and key distribution distance.[27,28]
There are two kinds of ways to implement a QKD, i.e., a prepare and measure (PM) scheme, and an entanglement-based (EB) scheme. The PM scheme is usually easier and simpler to implement, whereas the EB scheme can simplify the theoretical calculation of the key rates and provide a unified description of the different protocols.[29] These two different versions are equivalent for Gaussian protocols.[30] In the following, we describe the basic procedure of the Gaussian-modulated coherent state PM protocol.
Alice prepares randomly a weak coherent state
For homodyne detection, Bob tells Alice over an authenticated classical channel which quadratures he has measured. They keep only the relevant quadrature values for which they have used the same bases. After such key sifting, Alice and Bob share a series of Gaussian numbers (usually called a raw key). If Bob performs a heterodyne detection instead of homodyne, no key sifting is required. At this stage, Alice and Bob reveal a random portion of the raw keys to evaluate the parameters of the quantum channel. For CV QKD, such parameters are channel transmission T and excess noise ε. Combined with other system parameters:
Even if no eavesdropping exists and the signal state is prepared perfectly, the errors between Alice’s and Bob’s raw keys are inevitable due to the vacuum noise of the coherent state, detector dark noise, etc. In order to obtain a common binary string out of partially correlated raw keys, a classical error correction algorithm is required, for instance, low-density parity-check (LDPC) codes. To this end, Bob sends the syndrome of his data to Alice over a public channel (reverse reconciliation), based on the syndrome, Alice corrects her data into those that are in accord with Bob.
Alice and Bob perform privacy amplification to erase the information Eve could obtain and distill the final secure key. This can be realized by using two-universal hash functions, more precisely, by multiplying the key bits by a random Toeplitz matrix.
Early proposals of CV QKD adopted the forward reconciliation which limits the quantum channel loss to less than 3 dB. Later it was found that such a loss limit can be broken by the technique of postselection[31] or reverse reconciliation.[30] The first reverse-reconciliation Gaussian-modulated coherent state protocol was implemented with bulk optical elements over a short free-space of an optical table.[32] After this, the CV QKD experiments were extended to long distances by exploiting telecom fiber. Based on a go-&-return configuration, a high stable QKD was demonstrated over 14-km fiber.[33] With both polarization and temporal multiplexing, a CV QKD system was demonstrated over a 25-km fiber which includes the procedure of signal modulation and measurement, authentication, reverse reconciliation, and privacy amplification.[29] A 5-km distribution experiment was also reported by combining polarization and frequency multiplexing.[34] All of the implementations above utilized the Gaussian modulation. To simplify the modulation procedure, discrete modulation protocols have been demonstrated experimentally over a 24-km and 30-km fiber, respectively.[35–37] With an improvement of the data reconciliation efficiency, i.e., by employing both the multidimensional reconciliation and the multi-edge Low Density Parity Check (LDPC) codes,[38–40] the secure key distribution can be achieved over 80 km.[41] Recently, efforts toward a high speed key distribution experiment have been pursued.[42]
Figure
The excess noise is one of the key factors which affect the system performance significantly, i.e., the secure key rate and transmission distance. In the ideal case, the excess noises only refer to those noises which are induced by Eve’s eavesdropping behavior. In practice, even if there is no eavesdropping, the system can exhibit some technical noises, including the leakage of LO pulse due to the finite extinction ratio of the optical pulses, the preparation of the quantum states, non-ideal phase locking between the LO and signal, nonlinear optical phenomenon of the fiber, the stability of the BHD, etc. These noises are added by Alice’s or Bob’s apparatus except the nonlinear optical scattering of the fiber, it is usually difficult for Eve to manipulate such noises to attack the system. However, the technical noises of the system usually vary with time, which will require real-time monitoring to characterize the system parameters. Such monitoring is a challenge in a real QKD system and in practice one usually attributes such system noises to Eve’s attack when considering the security.
In our system, both the polarization and temporal multiplexing are used to isolate the contamination of the LO leakage to the signal field. The corresponding excess noise from the leakage can be given by
The preparation process of the quantum states, such as Gaussian modulation can introduce excess noises. The key points are the calibration of the bias point and the half-wave voltage for the intensity modulator and the phase modulator which are exploited to fulfill the Gaussian modulation. Incorrect calibration of such parameters can lead to the wrong modulation result which deviates from a Gaussian modulation and results in excess noises. It is noted that the bias points and the half-wave voltages drift with time and should be calibrated regularly. In our system the interval of such calibrations is on the order of minutes.
Another source of the system excess noise comes from the measurement process. The first one is the phase locking uncertainty between the LO and signal. Such random phase fluctuations can cause Bob’s measurement basis to change from
The common mode rejection ratio (CMRR) and its long-term stability of the measurement device on Bob’s side are also crucial to the evaluation of the excess noise. For a realistic BHD with a nonideal balance of its two arms:
In CVQKD, the signal field and the LO travel along a single fiber to alleviate their relative phase fluctuations. Due to the relatively strong intensity of the LO and the long single mode fiber, the nonlinear optical scattering, more precisely, the depolarized guided acoustic wave Brillouin scattering can scatter a small portion of the LO photons into the signal pulse and add excess noise to the system.[46] This effect is particularly evident for a high-bandwidth QKD over 1 GHz with a light pulse less than 1 ns.
The data post-processing procedure including the key reconciliation and privacy amplification is a necessary part to extract the final secure key from the raw key. We have designed long block-length irregular LDPC codes with high error-correcting capacity and achieved high-efficiency slice reconciliation based on multilevel coding/multistage decoding.[47] The reconciliation efficiency can reach
Figure
The security proofs of the CV QKD protocols have made significant progress in the past ten years.[26,27,48–64] Currently, there are three kinds of security notions:[65] composable security against arbitrary attacks, composable security against collective attacks, and security against collective attacks in the asymptotic limit. The composable security[63,64] means that the security parameters of the whole system can be given by
At present, two CV QKD protocols have been proven to be composably secure.[56,58,60,61] They are a Gaussian-modulated squeezed state plus homodyne measurement protocol and a Gaussian-modulated coherent state plus heterodyne measurement protocol. However, for realistic block sizes, the security proof techniques adopted above lead to a large sacrifice in the secret rate. For other protocols, only the asymptotic key rate is known precisely, the proofs of the composable security are still in progress. Although by using de Finetti-type reduction, the collective attacks are proven to be optimal in the asymptotic regime, i.e., a protocol is unconditionally secure against arbitrary attacks whenever it is secure against collective attacks. However, it is not the case in the finite-size regime. It is still a challenge to find the right bound of the secure key rate in the finite size regime. In a word, the improvement of already known proof techniques or inventions of new methods is still necessary for the establishment and optimization of the composable securities of various CV protocols.
In the above security analysis, it is assumed that Alice and Bob’s apparatuses are perfect or can be described completely. In practice, it is difficult to characterize all aspects of the apparatuses, i.e., there are always imperfections which are beyond the theoretical models. Such imperfections may be exploited by Eve and introduce the so-called side-channel attacks. Recently, several attacks of such a kind have been proposed, which concentrate on the detection stage. For instance, Eve can benefit from the fluctuations of the LO.[66] By properly controlling the LO, the shot noise can be overestimated, which further leads to an underestimation of the excess noise in the system.[67] Instead of attacking the LO, saturation attack through the exploitation of the nonlinear response of homodyne detection can open a loophole.[68] It is also shown that Eve can obtain all secret keys without being discovered by making use of the wavelength dependent property of the beamsplitter.[69,70] To defeat the above attacks, real-time shot noise measurement can be added on Bob’s side.[71] Generating the LO locally is also a useful way to resist such attacks.[72–74]
Although it is possible in principle to defeat all the side-channel attacks through positioning all the imperfections carefully, another attractive alternative is the device-independent (DI) QKD, the security of which relies on the violation of a Bell inequality.[75,76] However, the DI QKD is currently unfeasible because of the loophole-free Bell test. Then, a compromised version of the DI QKD named measurement-device-independent (MDI) QKD is proposed,[77–79] which enables the faithful operation of the QKD with untrusted measurement devices and are feasible with the current technology. In the CV regime, a proof-of-principle short free-space demonstration of this approach has been realized recently.[80–82]
It is known that the CV QKD protocol is very sensitive to the excess noise. To this end, the technical noises of the system should be minimized and the feedback control systems are required to ensure a long-term stable low-noise operation. On the other hand, it is shown that the maximum transmission distance or tolerated excess noise of CV QKD in the presence of a Gaussian noisy & lossy channel can be increased by using squeezed or entangled states,[26–28] linear noiseless amplifier[83,84] and non-Gaussian postselection.[85,86] For the future high speed (∼ 100-MHz repetition rate) and real-time operation of CV QKD, a fast and efficient hardware secure key extraction engine should be pursued, for instance, based on field-programmable gate array (FPGA). This is due to the fact that in the CV regime each signal pulse sent by Alice is detected by Bob’s BHD which generates a useful output signal.
Recently, some efforts have also been pursed towards incorporating QKD into existing fiber optical networks and integrating the components of a QKD system on a chip. It has been shown that CV QKD is robust to the noise photons from the classical signals and can coexist with classical signals of realistic intensity in the same fiber.[87,88] The on-chip system has the advantages of scalability, low-power, small size, and flexibility. In this direction, a proof-of-principle Si photonic chip including some of the functionalities of CV QKD has been demonstrated recently.[89]
To improve the performance of the QKD protocol, efforts towards combining both the advantages of discrete-variable and CV QKD protocol have begun to be pursued. Recently, the notion of high-dimensional QKD based on the continuous-variable degree of freedom of an entangled photon was proposed to achieve high photon information efficiency and long transmission distance simultaneously.[90,91] More precisely, the key information carriers exploit the position-momentum or the time-energy entangled photon pairs.
In the past few decades, the QKD based on continuous variable of the light field has made great progress. Nevertheless, there are still some challenges that need to be resolved for its wide applications. The majority of current CV QKD protocols employ the single mode fiber as the quantum channel, it is expected that the free-space CV QKD which has the potential of building a secure link between mobile objects will attract a great deal of attention in the coming years. New kinds of protocols which own superior performance and relatively low technical complexity are anticipated also. With the fast development of QKD together with advances of other branches of quantum cryptography such as quantum digital signatures, quantum secret sharing, quantum coin flipping, etc., we believe that the quantum communication network will become part of our everyday life in the near future.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] | |
[37] | |
[38] | |
[39] | |
[40] | |
[41] | |
[42] | |
[43] | |
[44] | |
[45] | |
[46] | |
[47] | |
[48] | |
[49] | |
[50] | |
[51] | |
[52] | |
[53] | |
[54] | |
[55] | |
[56] | |
[57] | |
[58] | |
[59] | |
[60] | |
[61] | |
[62] | |
[63] | |
[64] | |
[65] | |
[66] | |
[67] | |
[68] | |
[69] | |
[70] | |
[71] | |
[72] | |
[73] | |
[74] | |
[75] | |
[76] | |
[77] | |
[78] | |
[79] | |
[80] | |
[81] | |
[82] | |
[83] | |
[84] | |
[85] | |
[86] | |
[87] | |
[88] | |
[89] | |
[90] | |
[91] |