Project supported by the National Natural Science Foundation of China (Grant Nos. 61379153 and 61572529).
Project supported by the National Natural Science Foundation of China (Grant Nos. 61379153 and 61572529).
† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant Nos. 61379153 and 61572529).
We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution (CVQKD) by using a linear optics cloning machine (LOCM). In the proposed scheme, an LOCM is exploited to compensate for the imperfections of Bob’s apparatus, so that the generated secret key rate of the eight-state protocol could be well enhanced. We investigate the security of our proposed protocol in a finite-size scenario so as to further approach the practical value of a secret key rate. Numeric simulation shows that the LOCM with reasonable tuning gain λ and transmittance τ can effectively improve the secret key rate of eight-state CVQKD in both an asymptotic limit and a finite-size regime. Furthermore, we obtain the tightest bound of the secure distance by taking the finite-size effect into account, which is more practical than that obtained in the asymptotic limit.
Quantum key distribution (QKD) has been a significant practical application in quantum-information science,[1,2] which allows two distant parties to share a secret key over an untrusted quantum channel that is controlled by an eavesdropper. For decades, continuous-variable (CV) QKD has become a hotspot of QKD research due to its high detection efficiency and high key rate.[3–5] It has been certified to be secure against arbitrary collective attacks,[6] which are optimal in the asymptotic limit.
In general, there are two main modulation approaches in CVQKD, called Gaussian modulated CVQKD and discretely modulated CVQKD. A CVQKD protocol based on coherent states with Gaussian modulation has been experimentally demonstrated[7] and has been shown to be secure against arbitrary collective attacks.[8] However, the level of signal-to-noise ratio (SNR) has an important effect on the reconciliation efficiency β of this protocol, which could only achieve a short transmission distance. Recently, an irregular low-density-parity-check (LDPC) technique, i.e., MET-LDPC code[9] and multi-edge quasi-cyclic LDPC codes[10] with a GPU-based decoder have been proposed to reach a high reconciliation efficiency over 95%. However, it would have a high cost of equipment on the practical operation to obtain a high reconciliation efficiency. Fortunately, there is another approach to solve the problem, that is, using discrete modulation such as the four-state CVQKD protocol, proposed by Leverrier et al.,[8,11] which generates four nonorthogonal coherent states and exploits the sign of the measured quadrature of each state to encode information rather than using the quadrature
Recently, a better discretely-modulated scheme with higher secret key rate and longer transmission distance, called the eight-state protocol, was proposed,[15] which potentially provides a better performance by offering a higher secret key rate, better excess noise tolerance, and longer secure transmission distance.[16] Since the discretely modulated eight-state protocol exhibits excellent performance at low SNR, we further enhance its capability by applying a linear optics cloning machine (LOCM) at Bob’s apparatus. The LOCM, in fact, is the cloning machine which can be practically implemented using just linear optics, heterodyne measurement, and controlled displacements.[17] It is remarkable that the LOCM used here does not violate the non cloning theorem since we make approximate copies instead of perfect copies of quantum states in our protocol.[18] The proposed scheme (eight-state protocol with an LOCM operation) can improve the generated secret key rate of the eight-state protocol by tuning its parameters in appropriate ranges to compensate for the imperfection of the detector at Bob’s side with only a slight cost of transmission distance.
In addition, the asymptotic limit is a universal method when performing a security analysis of the CVQKD protocol.[19–21] However, the length of secret key is impossibly unlimited in practice.[22,23] Moreover, one can make the assumption in the asymptotic case that the quantum channel is perfectly known before the transmission is performed, while in a finite-size scenario, one actually does not know the characteristics of the quantum channel in advance, because a part of exchanged signals has to be used for parameter estimation rather than the generation of a secret key.[24] Thus in this paper, the finite-size effect will be taken into consideration. We draw a comparison between the finite-size scenario and the asymptotic case, and discuss the value of the secret key rate with a different number of exchanged signals N.
This paper is organized as follows. In Section
In this section, we mainly elaborate the discretely-modulated eight-state CVQKD protocol with an LOCM. To make the derivation self-contained, we firstly briefly introduce the original eight-state CVQKD protocol.
We first take a brief review of the discretely modulated CVQKD protocols. Until now, some types of discretely modulated CVQKD protocols have been proposed, such as the two-[8] and four-state protocols.[25] The discretely modulated protocols can be generalized to the one with N coherent states |αk⟩ = |αe2ikπ/N⟩, where α is a positive number related to the modulation variance as VA = 2α2. Without loss of generality, we focus on the discretely modulated protocol with N = 8, which corresponds to the eight-state protocol.
In the prepare-and-measure (PM) scheme of the eight-state CVQKD protocol,[15] Alice firstly prepares one of the eight coherent states,
Alice then randomly sends one of these eight coherent states to Bob with equal probability through an insecure quantum channel controlled by an eavesdropper called Eve,[26] see Fig.
Afterwards, Bob sends the absolute value results to Alice through a classical channel, in which approach Alice and Bob share correlated strings of bits. Then through the operations of error reconciliation and privacy amplification, the secret key can be obtained.
The PM version is relatively easy to implement, but its security is hard to be proved directly.[28] Hence, the security we describe is established by considering the equivalent entanglement-based version of the protocol. In the EB version, Alice initially uses a purification |Φ⟩ of two-mode entangled state[29]
We can describe the eight-state CVQKD protocol performed in the entanglement-based (EB) version, see Fig.
The covariance matrix γA0B0 of the original eight-state |ΦAB(α)⟩ is
Due to the imperfection in Bob’s apparatus, the detection process cannot be ideal, which will mean the final secret key rate is lower than expectation.[32] Fortunately, the effect of imperfect apparatus can be compensated by applying a linear optics cloning machine.[33] In what follows, we elaborate the proposed eight-state CVQKD with an LOCM placed at Bob’s side. It is remarkable that the LOCM used here does not violate the non-cloning theorem since we make approximate copies instead of perfect copies of quantum states in our protocol.[18] Figure
Firstly, Alice prepares an entangled state |Φ8⟩, one mode of the modulated state with variance V = VA + 1 is sent to Bob through an insecure quantum channel. At Alice’s side, she applies the heterodyne detection and obtains two measurements
The transmitted mode
Based on the measuring result
On the basis of the calculations above, we can obtain the variance
In order to expediently discuss the security of the protocol, we establish an equivalent system by considering the entanglement-based version of the protocol, as shown in Fig.
It should be noted that the equivalent transmittance Teq limits of a numerical range in [0, 1]. Thus, we can derive the LOCM-tuned noise χeq with two parameters λ and τ referred to Bob’s input, the expression can be written as
In the equivalent scheme, Bob’s detection efficiency is modeled by a beam splitter with transmission efficiency Teq. An EPR state with variance Neq is used to model the thermal noise υel that is introduced by the process of Bob’s detector,[36] where Neq = (Teqχeq − 1)/(1 − Teq) is for heterodyne detection. After that, Bob implements reverse reconciliation and privacy amplification to generate the final bit string of the secret key shared with Alice.
In this section, we introduce the EB version of the proposed eight-state scheme using LOCM, and establish an equivalent scheme. By utilizing an LOCM, the performance of eight-state CVQKD can be enhanced especially in terms of the secret key rate.
In order to simplify the theoretical QKD security proofs, researchers usually expand their theories based on some assumptions, which can be more or less explicit. One assumption might be considered that the security of a protocol in the asymptotic regime of infinitely numerous signals could be exchanged by Alice and Bob.[37] However, the number of exchanged signals cannot be infinite, Alice and Bob need some signals for parameter estimation so that they can ensure the accuracy of QKD.[38] We here consider the secret key rate Kf that is derived from heterodyne detection in the finite-size scenario where the number of exchanged signals is confined to a finite value. The finite-size scenario includes the loss of parameter estimation, so the analysis can be closer to the realistic value than the asymptotic scenario.
In the following, we mainly focus the analysis on heterodyne detection in the case of reverse reconciliation.[39]N denotes the total number of signals exchanged by Alice and Bob during the protocol. n is the segmental number of N signals that is used for establishment of the secret key, and m = N − n signals will be used in parameter estimation. Hence, in the case of a CVQKD protocol, the finite-size secret key rate can be written as
The term Δ(n) related to security of privacy amplification can be written as
The efficiency of reconciliation is set to 0.95,[14] and the mutual information I(x : y) for heterodyne detection can be expressed as
In order to calculate SεPE(y : E), first we have a matrix representing the shared state ρAB1,
We need to evaluate the covariance matrix γρAB1 compatible with the exchanged data except with failure probability of parameter estimation εPE. Parameters estimation of covariance matrix γεPE can be implemented by sampling of m couples of correlated variables (xi, yi)i = 1, 2, …, m. Thus, we can find a covariance matrix γεPE which successfully minimizes the secret key rate Kf as follows:
The parameters tmin and
Then, we can obtain symplectic eigenvalues λ1, 2, 3, 4, 5 as follows:
The SεPE(y : E) can be derived by
In this section, we mainly research the effect of the LOCM operation on the performance of the eight-state CV-QKD protocol for reverse reconciliation with the heterodyne detection. We consider the secret key rate Kf under the circumstance that the estimation of
The analysis of the equivalent state allows us to compare the secret key rate obtained with and without an LOCM operation in the finite-size scenario. As is shown in Eq. (
Based on the analysis above, we take τ = {0.25, 0.45, 0.65} as examples, the corresponding Teq can be calculated from Eq. (
Accordingly, we can use the similar analytical approach to take the fixed efficiency τ = 0.45 for example to illustrate the effect of the tuning gain λ on the eight-state protocol with LOCM. Here, we choose λ = {0.1, 0.3, 0.5}, and the values of the corresponding Teq are {0.623, 0.781, 0.958}, the numeral relation can be displayed in Fig.
Furthermore, we draw a comparison between the finite-size scenario and the asymptotic case (see Fig.
We are interested to compare our previous work on eight-state CVQKD using an optical amplifier (OA),[42] with our proposed scheme, which both belong to a phase-insensitive amplifier. The secret key rates are compared in Fig.
As shown in Fig.
In this paper, we propose a scheme to improve the performance of the eight-state CVQKD protocol by using a linear optics cloning machine. In the proposed scheme, we show the secret key rate of the modified CVQKD scheme with LOCM operation in the case of a finite-size scenario, as a function of total exchanged signals N, which can further approach the practical value of the secret key rate. The numerical simulation shows that by setting the two appropriate values of λ and τ, the LOCM is exploited to compensate for the imperfection of Bob’s apparatus so that the secret key rate can be well enhanced and commendably harmonized with the maximum transmission distance. Furthermore, we need to notice that the performance of secret key rate Kf that is analysed in the finite-size scenario is more pessimistic than that obtained in the asymptotic case, whereas the finite-size region approach is closer to the practical situation of the CVQKD protocol.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] | |
[37] | |
[38] | |
[39] | |
[40] | |
[41] | |
[42] |