† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant Nos. 61332019, 61671287, and 61631014), Northwest University Doctorate Dissertation of Excellence Funds, China (Grant No. YYB17022), and the National Key Research and Development Program, China (Grant No. 2016YFA0302600).
Gaussian-modulated coherent state quantum key distribution is gradually moving towards practical application. Generally, the involved scheme is based on the binary random basis choice. To improve the performance and security, we present a scheme based on a continuous random basis choice. The results show that our scheme obviously improves the performance, such as the secure communication distance. Our scheme avoids comparing the measurement basis and discarding the key bits, and it can be easily implemented with current technology. Moreover, the imperfection of the basis choice can be well removed by the known phase compensation algorithm.
Quantum key distribution (QKD) is an application of quantum information sciences, enabling two partners (Alice and Bob) to share a secret key, which in turn allows them to communicate securely. The security is guaranteed by Heisenberg’s uncertainty principle and the no-clone theory. Since almost ten years ago, lots of interest has arisen in continuous-variable quantum key distribution (CVQKD), which provides various CVQKD protocols.[1–6] One of the most favorable protocols is the Gaussian-modulated coherent state (GMCS) protocol.[7–9] In this protocol, Alice performs Gaussian modulation to encode the key information, by modulating the quadratures X and P (using the amplitude and the phase modulators) of few-photon coherent states with a centered Gaussian distribution. These states are then sent along with a phase reference through the quantum channel to Bob, who randomly measures one of the two quadratures (X or P) using a homodyne detector, or both quadratures simultaneously with a heterodyne detector. So far, several experimental implementations have been carried out by several groups. Meanwhile, the unconditional security of the GMCS QKD against general collective and coherent eavesdropping attacks has been fully proved in some references.[10–14]
Generally, the GMCS QKD protocol with homodyne detector requires a binary random basis choice, i.e., 0 or π/2, which makes Alice and Bob have to discard half of their data. Moreover, the devices and applications used in the practical system may be imperfect, which will incur loopholes to Eve in practical application. This points to the practical security which has been investigated widely, such as the laser source,[15–17] the beam splitter (BS),[18–21] the local oscillator,[22,23] the detector,[21,24] and the software or hardware for the phase compensation[25,26] and the basis choice. For the binary random basis choice, Bob randomly modulates 0 or π/2 on the phase modulator (PM) to measure either quadrature of the received quantum state. Maybe we can propose another alternative figuration of CVQKD system, so that the performance and practical security of the system may be improved.
In this paper, we present a GMCS QKD scheme based on the continuous random basis choice, in which Bob randomly measures the received states depending on the continuous random phase, then Alice reshapes her data. The security of this scheme is guaranteed by the no-cloning theorem and the uncertainty principle. To testify the performance and security of the scheme, we calculate the secret key rate under collective attacks when using reverse reconciliation and investigate the practical security under realistic quantum channel and detector. The simulation results show that the continuous random basis choice does improve the performance, such as the secure communication distance, and the imperfect basis choice can be well removed by the perfect phase compensation algorithm. Moreover, this scheme avoids comparing the measurement basis and discarding the key bits, and it can be implemented with current technology easily.
The paper is organized as follows. In Section
In the prepare-and-measurement (P&M) model of a standard GMCS QKD scheme, Alice randomly prepares an encoded quantum state and sends it to Bob for detection. Alice and Bob broadcast their measurement bases via an authenticated channel. They discard all polarization data sent and received in different bases and use the remaining data to generate a sifted key. Here we substitute the continuous random basis choice in our scheme, which avoids comparing the measurement basis and discarding the key data. The P&M model of our scheme is shown in Fig.
(I) Alice generates two Gaussian random numbers XA and PA with mean values 0 and variances VA. Meanwhile, Bob generates a random bit b.
(II) Alice prepares the quantum coherent state. The initial quantum coherent state with shot noise (δXA, δPA) is modulated by the amplitude and the phase modulator to obtain the coherent state centered at (XA, PA). Then Alice sends the prepared states to Bob through the quantum channel, which features a transmission efficiency T and an excess noise ε. The total channel added noise referred to the channel input, expressed in shot noise units, is defined as χline = 1/T − 1 + ε.
(III) When Bob receives the modulated coherent state, he randomly measures the quadratures by a detector depending on the continuous random phase θ (from 0 to 2π). The continuous random basis choice is implemented by PM at Bob’s side, which is based in the random bit b. The detection-added noise referred to Bob’s input is defined and expressed in shot-noise units as χhom = (1 − η + Vel)/η, where η denotes the efficiency of the detector and Vel is the detector’s electronic noise. The total noise referred to the channel input can then be expressed as χtot = χline + χhom/T.
(IV) Bob informs Alice the phases θ that he selects in each time and keeps his measurement outcomes mB = XA cos θ + PA sin θ. Then Alice reshapes her data depending on θ.
(V) Finally, Alice and Bob apply reconciliation and privacy amplification algorithms to extract a private binary key string from the shared information. The reconciliation is direct when Alice’s data are used as a reference for establishing the key and reverse when the reference is Bob’s data.
Actually, this scheme can be seen just as one specific case of the well-known GMCS model with special known phase shifts θ or θ − π/2, as shown in Fig.
In the following, we derive the expression of the secret key rate of the proposed scheme for the case of collective attacks. It is well known that the P&M scheme is formally equivalent to the corresponding entanglement-based (E-B) scheme.[8] In the E-B scheme, the coherent state preparation is modeled by a heterodyne measurement of one half of a two-mode squeezed vacuum (EPR) state of variance V = VA + 1. The other half of the EPR state is sent to Bob through the quantum channel. Bob’s detector inefficiency is modeled by a BS with transmission η, while its electronic noise Vel is modeled by an EPR state of variance Vd, one half of which is entering the second input port of the BS, as shown in Fig.
In the case of collective attacks, Eve interacts individually with each pulse but is allowed to wait for the entire classical procedure to end before performing the best possible collective measurement on her ensemble of stored ancillae. The maximum information of Bob’s key available to Eve is limited by the Holevo bound
Therefore, the covariance matrix
We now have all the elements required to proceed to the calculation of the symplectic eigenvalues. In addition, the mutual information of Alice and Bob, IAB, is derived from Bob’s measured variance VB and the conditional variance VB|A,
For any practical CVQKD system, the security includes not only the theoretical security, but also the practical security induced by the devices and applications. In our proposed scheme, the continuous random phase θ is needed for the basis choice. However, because of the imperfections of the digital to analog convertor (DAC) and PM, the real phase values applied to the system θ′ may be not equal to the expected phase values θ, which will increase the excess noise of the system and induce a loophole.
Considering a practical basis choice with the imperfect DAC and PM, the output mode can be denoted as
The secret key rate Rκ is plotted in Fig.
In the CVQKD system, the phase shift between the local and signal pulses is inevitable due to the variation of temperature and vibrations in the environment. The phase shift may affect the stability and the final key rate of the system. To overcome this issue, the phase compensation is a necessary procedure in practical applications of the CVQKD system. We introduce some brighter and randomly labeled stabilization pulses that are not used for generating a raw key, which can therefore be used for the calculation of the phase shifts. The stabilization pulses are sent in known phase states and placed at random positions within the weak quantum signals. When Bob receives the data, he firstly extracts the stabilization pulses and calculates the values of the phase shifts. Then Alice reconstructs the quantum data and Bob performs a linear operation on the received data.[31] In order to effectively compensate the phase shifts, the phase variation of the phase shifts should be less than the inaccuracy of the phase compensation algorithm. We test our algorithm in practice, the precision can reach 0.1° for each frame. Considering the angles of each pulse are the same, then 0.1° represents
We have explored the possibility of enabling the GMCS QKD with the continuous random basis choice. The secret key rate of the proposed scheme under collective attacks has been calculated and the result shows that the use of the continuous random basis choice does improve the performance of the system, such as the secure communication distance. Moreover, the devices and applications may be imperfect in the practical system and we investigate the practical security of the scheme with the imperfect basis choice procedure. The results show that this imperfection will decrease the secret key rate and thus incur insecurity of the system. Fortunately, this issue can be well solved by the perfect phase compensation algorithm.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] |