† Corresponding author. E-mail:
The well-known multi-dimensional reconciliation is an effective method used in the continuous-variable quantum key distribution in the long-distance and the low signal-to-noise-ratio scenarios. The virtual channel employed to exchange data is generally established by using a finite-dimensional rotation in the reconciliation procedure. In this paper, we found that the finite dimension of the multi-dimensional reconciliation inevitably leads to the mismatch of the signal-to-noise-ratio between the quantum channel and the virtual channel, which may be called the finite-dimension effect. Such an effect results in an overestimation on the secret key rate, and subsequently induces vital practical security loopholes.
Quantum key distribution is a vital practical application in quantum information science.[1,2] It enables two legitimate parties, which are always called Alice and Bob, to produce a shared random secure secret key via a quantum channel, even in the existence of an eavesdropper, generally called Eve, who possesses limitless ability. Its security is guaranteed by the quantum mechanics laws, e.g., the Heisenberg uncertainty principle and the quantum no-cloning theorem. Currently two implementation methods, i.e., the discrete variable quantum key distribution and the continuous variable quantum key distribution (CVQKD), are often referenced. The CVQKD scheme usually encodes information on the position and momentum quadratures of quantum states.[3] It has the merits of a potentially high bit rate and compatibility with classical optical communication. In the past few years, the CVQKD have made a great number of achievements in both theories[3–5] and experiments.[6–8] One of the most notable achievements is that the Gaussian modulated coherent state (GMCS) scheme[6] has been proven to be secure against collective attacks[9–12] and coherent attacks.[13–16] Its practical securities with imperfection of the deployed devices in the CVQKD system have also been investigated.[17–24] In order to defend against practical attacks, real-time monitoring technologies are extensively adopted to prevent both attacks and signal disturbance.[25–28] Recently, field tests based on the GMCS scheme in telecommunication optical networks have been successfully implemented by several groups.[29–31]
A standard CVQKD system commonly consists of three phases, i.e., the quantum communication, the reconciliation, and the privacy amplification. In the quantum communication phase, Alice sends a string of X through a quantum channel. After performing a measurement of quadrature states by using a balanced homodyne detector, Bob obtains a string of Y which is correlated to X. Then, Alice and Bob obtain a string called the raw key. After that, with the purpose of checking the existence of Eve, the parameter estimation is indispensable and it determines whether they should abort or reserve the subset of remaining strings. In the reconciliation step, Alice and Bob achieve the same fix-length secret key strings by correcting errors between the secret key strings obtained by Alice and Bob. After the reconciliation step, Alice and Bob extract the secure secret key with a privacy amplification algorithm.
As is well-known, the reconciliation efficiency and speed are directly related to the transmission distance and the secret key rate of the involved CVQKD system. Generally, a high reconciliation efficiency improves the secure transmission distance and the secret key rate, while a high reconciliation speed is necessary to realize the high bit-rate CVQKD. Currently, the reconciliation has become a main bottleneck for the CVQKD implementation in the high-rate and long-distance scenarios. By far, several typical reconciliation schemes have been proposed. The proposed slice reconciliation scheme[32] quantifies the continuous variables to several layers, and then decodes them with correct-codes such as LDPC codes or BCH codes to obtain the same bit strings at both Alice and Bobʼs sides. This scheme has low decoding complexity, but its reconciliation efficiency is low and needs to be improved in a practical application. Because the raw keys follow a Gaussian distribution, it is more difficult to distinguish the signal in the presence of noise. In light of such a case, the post-selection scheme[33–37] was proposed to remove the small values and keep the big ones. Unfortunately, its security against arbitrary general attacks has not yet been proved. A most useful scheme called multi-dimensional reconciliation[38] was put forward to validly enhance the reconciliation efficiency and transmission distance in case of low signal-to-noise (SNR). With the assistance of multi-edge LDPC codes, such kinds of schemes[39,40] have achieved transmission distances up to 150 km[41] and decoding speeds up to 25 Mb/s.[42]
We note that all of the available multi-dimensional reconciliation schemes are essentially finite dimensions,[40] which actually deviates from the theoretical requirements of the reconciliation procedure. This deviation results in the so-called finite-dimensional effect (FDE), i.e., giving rise to the SNR mismatch between the quantum channel and the introduced virtual channel, subsequently, inducing the practical security loopholes. In this paper, we investigate the FDE of the multi-dimensional reconciliation scheme and its influences on the practical security of the involved CVQKD system. Since the multi-dimensional reconciliation scheme has finite dimensions, we find that the virtual channel follows a studentʼs t-distribution but not a Gaussian distribution, even if not the binary input additive white Gaussian noise channel (BIAWGNC), which is an approximation of the Gaussian channel at low SNR situation. Particularly, we find that the FDE may lead to the SNR mismatch between the quantum channel and the virtual channel. Consequently, it results in overestimation on the secret key rate, and then introduces practical security issues.
This paper is organized as follows. In Section
Different from the previously practical security issues due to imperfections of devices deployed in the CVQKD system, the practical security loopholes studied in this work are induced by imperfections of the employed algorithm but not the devices. In other words, in this paper we focus on the imperfections of the multi-dimensional reconciliation scheme. For clarity, we review briefly the multi-dimensional reconciliation scheme in this section.
Generally, in the GMCS scheme, Aliceʼs information is encoded with a bivariate Gaussian distribution in phase space, and then Alice sends the information to Bob via a quantum channel interfered by the eavesdropper and channel noise. After Bobʼs measurement with a balanced homodyne detector, Alice and Bob share N couples of correlated variables
The basic idea of the multi-dimensional reconciliation scheme is as follows. Firstly, map the non-uniform Gaussian-distributed variable space generated by the quantum communication into a uniform-distributed variable space. Then, randomly choose a stochastic code words space whose prior probability meets a uniform distribution. After that, the chosen code words are transmitted over a public authenticated classical channel. In such a case, the two legitimated parties who share the key will not leak any side information about the code words so that Eve cannot obtain any extra key information. The multi-dimensional reconciliation scheme executes the following steps.
According to the multi-dimensional reconciliation scheme described in the above section, the function f rotates the quadrature measure y into binary codeword u. In practice, one may choose a function M so that
The noise of the virtual channel with input u and output v is given by
Now we study the SNR of the virtual channel. According to the above calculation, the SNR of the virtual channel may be calculated by
Apparently, the SNR of the virtual channel is associated with the reconciliation dimension d. The FDE of the multi-dimensional reconciliation will be eliminated when
In this section, we investigate the impacts of the FDE on the channel capacity, reconciliation efficiency, secure secret key rate, and secure transmission distance of the CVQKD system.
First, we consider the impacts of the FDE on the channel capacity. The capacity of the Gaussian channel, i.e., the AWGN channel, is given by
Since the practical virtual channel actually follows the studentʼs t-distribution, the capacity of the virtual channel is given by
In the multi-dimensional reconciliation scheme, the dimension is only restricted to d = 1,2,4,8 according to the Hurwitz theorem of composition algebras,[38] or the dimension is restricted to d = 16.[40] Figure
Now we investigate the impacts of the FDE on the reconciliation efficiency. Generally, the reconciliation efficiency β is defined as
In Table
Finally, we consider the influence of the FDE on the secret key rate. According to Ref. [11], the secret key rate K with n received pulses used for key establishment can be represented as follows:
In Eq. (
Based on Eqs. (
Figure
Commonly, the information characteristic of the introduced virtual channel should accord with that of the quantum channel in a CVQKD scheme. However, if they are not matching, for example, the SNRs between the quantum channel and the virtual channel are not the same, miscalculations on the secret key rate are generated. Consequently, such kinds of imperfections will inevitably degrade the practical security of the CVQKD system. The above section has demonstrated clearly the difference of SNRs between the quantum channel and the introduced virtual channel. Such difference, which is generated by the imperfections of the multi-dimensional reconciliation scheme, will lead to loopholes for the practical security. Actually, Figure
In the above section, we have demonstrated the influences of the FDE on the secure secret key rate and secure transmission distance. The most significant factor is that the FDE leads to the SNR mismatch between the quantum channel and the virtual channel. For example, the noise variation of the virtual channel is 4/3 times of the one of the physical channel (Gaussian channel) when d = 8. Correspondingly, the SNR of the virtual channel is 3/4 times of that of the quantum channel. Such change will decrease the actual reconciliation efficiency, which has a significant influence on the secret key rate.
Figure
We have investigated the imperfections of the multi-dimensional reconciliation scheme and the induced practical security loopholes. Such kinds of imperfections come from the algorithm but are not induced by the devices of the CVQKD system, which has been investigated previously. We find that the binary input virtual channel is different from the BIAWGN channel due to the FDE. In particular, the FDE leads to SNR mismatch between the quantum channel and the virtual channel, and subsequently results in significant influences on the channel capacity, the reconciliation efficiency, and the secure secret key rate. Consequently, it leads to overestimation on the secret key rate, and then introduces practical security loopholes.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] | |
[37] | |
[38] | |
[39] | |
[40] | |
[41] | |
[42] | |
[43] | |
[44] | |
[45] | |
[46] |