Finite-size analysis of eight-state continuous-variable quantum key distribution with the linear optics cloning machine*

Project supported by the National Natural Science Foundation of China (Grant Nos. 61379153 and 61572529).

Zhang Hang, Mao Yu, Huang Duan, Guo Ying, Wu Xiaodong, Zhang Ling
School of Information Science and Engineering, Central South University, Changsha 410083, China

 

† Corresponding author. E-mail: lingzhang2017@foxmail.com

Project supported by the National Natural Science Foundation of China (Grant Nos. 61379153 and 61572529).

Abstract

We propose a method to improve the secret key rate of an eight-state continuous-variable quantum key distribution (CVQKD) by using a linear optics cloning machine (LOCM). In the proposed scheme, an LOCM is exploited to compensate for the imperfections of Bob’s apparatus, so that the generated secret key rate of the eight-state protocol could be well enhanced. We investigate the security of our proposed protocol in a finite-size scenario so as to further approach the practical value of a secret key rate. Numeric simulation shows that the LOCM with reasonable tuning gain λ and transmittance τ can effectively improve the secret key rate of eight-state CVQKD in both an asymptotic limit and a finite-size regime. Furthermore, we obtain the tightest bound of the secure distance by taking the finite-size effect into account, which is more practical than that obtained in the asymptotic limit.

1. Introduction

Quantum key distribution (QKD) has been a significant practical application in quantum-information science,[1,2] which allows two distant parties to share a secret key over an untrusted quantum channel that is controlled by an eavesdropper. For decades, continuous-variable (CV) QKD has become a hotspot of QKD research due to its high detection efficiency and high key rate.[35] It has been certified to be secure against arbitrary collective attacks,[6] which are optimal in the asymptotic limit.

In general, there are two main modulation approaches in CVQKD, called Gaussian modulated CVQKD and discretely modulated CVQKD. A CVQKD protocol based on coherent states with Gaussian modulation has been experimentally demonstrated[7] and has been shown to be secure against arbitrary collective attacks.[8] However, the level of signal-to-noise ratio (SNR) has an important effect on the reconciliation efficiency β of this protocol, which could only achieve a short transmission distance. Recently, an irregular low-density-parity-check (LDPC) technique, i.e., MET-LDPC code[9] and multi-edge quasi-cyclic LDPC codes[10] with a GPU-based decoder have been proposed to reach a high reconciliation efficiency over 95%. However, it would have a high cost of equipment on the practical operation to obtain a high reconciliation efficiency. Fortunately, there is another approach to solve the problem, that is, using discrete modulation such as the four-state CVQKD protocol, proposed by Leverrier et al.,[8,11] which generates four nonorthogonal coherent states and exploits the sign of the measured quadrature of each state to encode information rather than using the quadrature ) or itself. This is the reason why the sign of the measured quadrature is already the discrete value to which the most excellent error-correcting codes are suitable even at very low SNR.[12] In the experimental field, a fiber-based four-state discrete modulation CVQKD system has been demonstrated and various factors that lead to excess noises have also been discussed with the emphasis on the influence of the relative phase fluctuations and local field scattering process.[13,14] Although the security analysis of four-state has not been perfectly proven, we could also find some merits of the discrete modulation scheme such as the concise modulation process and less consumption of the random number.[14]

Recently, a better discretely-modulated scheme with higher secret key rate and longer transmission distance, called the eight-state protocol, was proposed,[15] which potentially provides a better performance by offering a higher secret key rate, better excess noise tolerance, and longer secure transmission distance.[16] Since the discretely modulated eight-state protocol exhibits excellent performance at low SNR, we further enhance its capability by applying a linear optics cloning machine (LOCM) at Bob’s apparatus. The LOCM, in fact, is the cloning machine which can be practically implemented using just linear optics, heterodyne measurement, and controlled displacements.[17] It is remarkable that the LOCM used here does not violate the non cloning theorem since we make approximate copies instead of perfect copies of quantum states in our protocol.[18] The proposed scheme (eight-state protocol with an LOCM operation) can improve the generated secret key rate of the eight-state protocol by tuning its parameters in appropriate ranges to compensate for the imperfection of the detector at Bob’s side with only a slight cost of transmission distance.

In addition, the asymptotic limit is a universal method when performing a security analysis of the CVQKD protocol.[1921] However, the length of secret key is impossibly unlimited in practice.[22,23] Moreover, one can make the assumption in the asymptotic case that the quantum channel is perfectly known before the transmission is performed, while in a finite-size scenario, one actually does not know the characteristics of the quantum channel in advance, because a part of exchanged signals has to be used for parameter estimation rather than the generation of a secret key.[24] Thus in this paper, the finite-size effect will be taken into consideration. We draw a comparison between the finite-size scenario and the asymptotic case, and discuss the value of the secret key rate with a different number of exchanged signals N.

This paper is organized as follows. In Section 2, we describe the schematic configuration of the eight-state CVQKD protocol based on LOCM operation in detail. In Section 3, we characterize the theoretical analysis of the proposed protocol, and calculate the secret key rate in the finite-size scenario. In Section 4, numeric simulation and performance analysis are discussed. Our conclusions are drawn in Section 5.

2. Eight-state CVQKD with LOCM inserted

In this section, we mainly elaborate the discretely-modulated eight-state CVQKD protocol with an LOCM. To make the derivation self-contained, we firstly briefly introduce the original eight-state CVQKD protocol.

2.1. Description of the eight-state CVQKD protocol

We first take a brief review of the discretely modulated CVQKD protocols. Until now, some types of discretely modulated CVQKD protocols have been proposed, such as the two-[8] and four-state protocols.[25] The discretely modulated protocols can be generalized to the one with N coherent states |αk⟩ = |αe2i/N⟩, where α is a positive number related to the modulation variance as VA = 2α2. Without loss of generality, we focus on the discretely modulated protocol with N = 8, which corresponds to the eight-state protocol.

In the prepare-and-measure (PM) scheme of the eight-state CVQKD protocol,[15] Alice firstly prepares one of the eight coherent states,

Alice then randomly sends one of these eight coherent states to Bob with equal probability through an insecure quantum channel controlled by an eavesdropper called Eve,[26] see Fig. 1(a). For a certain channel, that is, given the transmittance T and excess noise ε, we can set the value of the α to maximize the secret key rate.[27] After receiving the coherent state, Bob measures randomly one of the quadratures in homodyne detection and decodes the information by the sign of his measurement result.

Afterwards, Bob sends the absolute value results to Alice through a classical channel, in which approach Alice and Bob share correlated strings of bits. Then through the operations of error reconciliation and privacy amplification, the secret key can be obtained.

The PM version is relatively easy to implement, but its security is hard to be proved directly.[28] Hence, the security we describe is established by considering the equivalent entanglement-based version of the protocol. In the EB version, Alice initially uses a purification |Φ⟩ of two-mode entangled state[29]

where the states
are a non-Gaussian orthogonal state, and
where

Fig. 1. (color online) (a) PM scheme of the eight-state CV-QKD protocol: Alice obtained the random number k from a random number generator (RNG), and then modulated the original state sent from the source by the modulator. (b) The equivalent EB version of the protocol: Alice prepared a two-mode entangled state, one mode was measured to get the result k. The other state of the mode was sent to Bob.

We can describe the eight-state CVQKD protocol performed in the entanglement-based (EB) version, see Fig. 1(b). Alice prepares the entangled state |ΦAB⟩ and performs the projective measurement {|ψ0⟩⟨ψ0|, |ψ1⟩⟨ψ1|, …, |ψ7⟩⟨ψ7|} on her half. When her measurement gives the result k, the coherent state |αk⟩ is sent through the quantum channel to Bob who measures both of the quadratures with a heterodyne detection.[30] The EB version provides a valid security proof against collective attacks through the covariance matrix γAB of the state before their respective measurements.[31]

The covariance matrix γA0B0 of the original eight-state |ΦAB(α)⟩ is

where I2 is the 2 × 2 identity matrix, and σz = diag(1, −1), V = 2α2 + 1 = VA + 1 is the variance of quadratures for modes A and B, and
reflects the relationship between mode A and mode B.

2.2. The improved eight-state scheme with LOCM

Due to the imperfection in Bob’s apparatus, the detection process cannot be ideal, which will mean the final secret key rate is lower than expectation.[32] Fortunately, the effect of imperfect apparatus can be compensated by applying a linear optics cloning machine.[33] In what follows, we elaborate the proposed eight-state CVQKD with an LOCM placed at Bob’s side. It is remarkable that the LOCM used here does not violate the non-cloning theorem since we make approximate copies instead of perfect copies of quantum states in our protocol.[18] Figure 2 shows the EB version of the proposed scheme against Eve’s collective attacks.

Fig. 2. (color online) The EB scheme for the eight-state CVQKD protocol with LOCM operation. λ and τ are two critical parameters of LOCM. Alice randomly prepares one of the eight-state discrete-modulated states and sends it to Bob through the unsecure quantum channel controlled by an eavesdropper, Eve. Additionally, an LOCM is placed in the input of Bob’s apparatus. Bob detects the received mode to derive a sequence of bits shared with Alice by using the heterodyne detector.

Firstly, Alice prepares an entangled state |Φ8⟩, one mode of the modulated state with variance V = VA + 1 is sent to Bob through an insecure quantum channel. At Alice’s side, she applies the heterodyne detection and obtains two measurements and .[34] After the quantum channel, the mode goes through the LOCM which is placed in the input of Bob’s side and then is detected by Bob’s apparatus with heterodyne detection. The LOCM consists of two beam splitters (BS) with the transmission efficiency τ and two phase operations with tuning gain λ. Bob prepares two vacuum states and , then the LOCM operation is implemented, and Bob measures both quadratures simultaneously via performing heterodyne detection. As displayed in Fig. 2, we can obtain[35]

The transmitted mode can be expressed as

Based on the measuring result and the tuning gain λ, we can derive the relationship of the transmitted mode that could be written as

On the basis of the calculations above, we can obtain the variance of mode as follows:

In order to expediently discuss the security of the protocol, we establish an equivalent system by considering the entanglement-based version of the protocol, as shown in Fig. 3. Accordingly, the expression of equivalent transmittance Teq is given by

It should be noted that the equivalent transmittance Teq limits of a numerical range in [0, 1]. Thus, we can derive the LOCM-tuned noise χeq with two parameters λ and τ referred to Bob’s input, the expression can be written as

In the equivalent scheme, Bob’s detection efficiency is modeled by a beam splitter with transmission efficiency Teq. An EPR state with variance Neq is used to model the thermal noise υel that is introduced by the process of Bob’s detector,[36] where Neq = (Teqχeq − 1)/(1 − Teq) is for heterodyne detection. After that, Bob implements reverse reconciliation and privacy amplification to generate the final bit string of the secret key shared with Alice.

In this section, we introduce the EB version of the proposed eight-state scheme using LOCM, and establish an equivalent scheme. By utilizing an LOCM, the performance of eight-state CVQKD can be enhanced especially in terms of the secret key rate.

3. Security analysis in finite-size regime

In order to simplify the theoretical QKD security proofs, researchers usually expand their theories based on some assumptions, which can be more or less explicit. One assumption might be considered that the security of a protocol in the asymptotic regime of infinitely numerous signals could be exchanged by Alice and Bob.[37] However, the number of exchanged signals cannot be infinite, Alice and Bob need some signals for parameter estimation so that they can ensure the accuracy of QKD.[38] We here consider the secret key rate Kf that is derived from heterodyne detection in the finite-size scenario where the number of exchanged signals is confined to a finite value. The finite-size scenario includes the loss of parameter estimation, so the analysis can be closer to the realistic value than the asymptotic scenario.

In the following, we mainly focus the analysis on heterodyne detection in the case of reverse reconciliation.[39]N denotes the total number of signals exchanged by Alice and Bob during the protocol. n is the segmental number of N signals that is used for establishment of the secret key, and m = Nn signals will be used in parameter estimation. Hence, in the case of a CVQKD protocol, the finite-size secret key rate can be written as

where β is the efficiency of reconciliation, which ranges from 0 when no information was extracted to 1 for a perfect reconciliation scheme. I(x : y) represents mutual information between Alice and Bob. SεPE(y : E) is defined as the maximum conditional entropy compatible with the statistics given by the parameter estimation except with probability εPE, and Δ(n) is related to the security of the privacy amplification.

The term Δ(n) related to security of privacy amplification can be written as

where is the Hilbert space corresponding to the variable x used in the raw key, is the smoothing parameter, εPA is the failure probability of the privacy amplification procedure. Generally, we have since for all continuous-variable protocols. Moreover, the second term can be neglected because the convergence speed of 2/n is faster than log2(1/εPA) largely. So, we have Δ(n) as a function of n,

The efficiency of reconciliation is set to 0.95,[14] and the mutual information I(x : y) for heterodyne detection can be expressed as

where V = VA + 1, χtot = χline + χLOCM/T represent the total noise referred to the channel input, χline = 1/T+ ε − 1, and χLOCM can be calculated as

In order to calculate SεPE(y : E), first we have a matrix representing the shared state ρAB1,

where I2 is the 2 × 2 identity matrix, and σz = diag(1, −1).

We need to evaluate the covariance matrix γρAB1 compatible with the exchanged data except with failure probability of parameter estimation εPE. Parameters estimation of covariance matrix γεPE can be implemented by sampling of m couples of correlated variables (xi, yi)i = 1, 2, …, m. Thus, we can find a covariance matrix γεPE which successfully minimizes the secret key rate Kf as follows:

where tmin represents the minimum of , and indicates the maximum of ξ2 compatible with sample couples.

The parameters tmin and can be calculated respectively as

Then, we can obtain symplectic eigenvalues λ1, 2, 3, 4, 5 as follows:

with

The SεPE(y : E) can be derived by

where G(x) = (x + 1)log2(x + 1) − xlog2x.

4. Performance analysis

In this section, we mainly research the effect of the LOCM operation on the performance of the eight-state CV-QKD protocol for reverse reconciliation with the heterodyne detection. We consider the secret key rate Kf under the circumstance that the estimation of and are equivalent to their expected values, see Eq. (21). Based on the security analysis above, the performance of LOCM in our scheme mainly depends on two parameters τ and λ. In our simulation, the fluctuation of the value of excess noise ε[40,41] exerts a small influence on the final value of secret key rate Kf, thus we set ε to be a conservative value ε = 0.005. More details of parameter settings are shown in Table 1. Furthermore, the relationship between transmission distance d and transmissivity T is T = 10ad/10, where d represents the length of the quantum channel and a = 0.2 dB/km means the loss coefficient of optical fibers.

The analysis of the equivalent state allows us to compare the secret key rate obtained with and without an LOCM operation in the finite-size scenario. As is shown in Eq. (12), the equivalent transmittance Teq has a relationship with two parameters of LOCM, λ and τ. We need to notice that the constraint Teq ∈ [0, 1]. Thus, it is necessary for us to solve the parameter λ in an available range for the given parameter τ ∈ [0,1]. Afterwards, the function of Teq has been plotted, as can be seen in Fig. 4, which is of value for us to find the applicable parameter Teq according to the values of λ and τ. Thus, we can regulate Teq in a valid range by properly tuning these two parameters.

Fig. 3. (color online) Equivalent eight-state CVQKD protocol with a thermal state of variance Neq characterized by the tunable noise χeq and transmittance Teq.
Fig. 4. (color online) The LOCM-tuned transmittance Teq as a function of two parameters λ and τ. By choosing appropriate parameter values, the transmittance Teq can be regulated in [0,1].
Table 1.

Parameter settings in the simulation.

.

Based on the analysis above, we take τ = {0.25, 0.45, 0.65} as examples, the corresponding Teq can be calculated from Eq. (12) by {0.945, 0.781, 0.582}, where the tuning gain λ is 0.3. The secret key rate Kf in the finite-size regime can be derived in Fig. 5(a). It is clear that the secret key rate of eight-state CVQKD using LOCM operation has a better performance than the original eight-state protocol. Furthermore, by tuning the value of parameter τ to be smaller in a suitable range, we can obtain the higher secret key rate and longer maximum transmission distance.

Accordingly, we can use the similar analytical approach to take the fixed efficiency τ = 0.45 for example to illustrate the effect of the tuning gain λ on the eight-state protocol with LOCM. Here, we choose λ = {0.1, 0.3, 0.5}, and the values of the corresponding Teq are {0.623, 0.781, 0.958}, the numeral relation can be displayed in Fig. 5(b). It is remarkable that by using LOCM operation the secret key rate under the analysis of finite-size scenario is increased obviously for the eight-state protocol in comparison to the original protocol, which means that the modified protocol has better security on a collective Gaussian attack. Besides we can achieve the higher secret key rate and longer maximum transmission distance by tuning the value of parameter λ to be larger in a compatible range.

Fig. 5. (color online) Relationship between maximum transmission distance and secret key rate with the parameters’ analysis of LOCM in the finite-size scenario, where the exchanged number signals N = 1012. (a) Comparison of the performance between the eight-state protocol based on LOCM operation and the original eight-state protocol with parameters λ = 0.3 and τ = {0.25, 0.45, 0.65}. (b) Comparison of the performance between the eight-state protocol based on LOCM operation and the original eight-state protocol with parameters τ = 0.45 and λ = {0.1, 0.3, 0.5}.

Furthermore, we draw a comparison between the finite-size scenario and the asymptotic case (see Fig. 6). From Fig. 6, we notice that the maximum transmission distance in the asymptotic scenario is longer than the transmission distance in the finite-size scenario. Yet the values of the secret key rates are basically equal to 10−1, which means that the different analysis approaches of finite-size region and asymptotic case produce little impact on the secret key rate. Moreover, with the growth of the exchanged number signals N, the performance in the finite-size regime will converge to the asymptotic case. This is because more signals parameter estimation can be used and therefore the parameter estimation is approaching perfection. Actually, it is impossible for the number of exchanged signals to reach infinity in practice. The value of the block length of exchanged signals N = 108 is an enormous number for a practical CVQKD system. Nevertheless, the eight-state protocol with LOCM always has better improvement of the secret key rate Kf than the original eight-state protocol in the finite-size scenario.

Fig. 6. (color online) Discretely-modulated eight-state protocol with LOCM in finite-size scenario in the case of heterodyne detection, where VA = 0.25, η = 0.6, υel = 0.05, and β = 0.95. Solid curves indicate the original eight-state protocol while the dashed curves represent the scenario with an LOCM (where the two parameters are set to λ = 0.3 and τ = 0.45). From left to right, the first eight curves correspond to the finite-size scenario of block length N = 108, 1010, 1012, 1014 respectively, and the last two curves represent the asymptotic scenario.

We are interested to compare our previous work on eight-state CVQKD using an optical amplifier (OA),[42] with our proposed scheme, which both belong to a phase-insensitive amplifier. The secret key rates are compared in Fig. 7, which shows that the two schemes both have the ability to enhance the secret key rate about 20%–30%. Our proposed LOCM-CVQKD protocol obtains a little better performance for the secrete key rate than the OA-based CVQKD, while the maximum transmission distance is nearly the same.

Fig. 7. (color online) Numerical analysis of secret key rates based on the comparison between the LOCM-CVQKD protocol and the OA protocol, where VA = 0.25, η = 0.6, υel = 0.05, β = 0.95, the two parameters of LOCM are λ = 0.3 and τ = 0.45, and the parameter g = 20. Solid curves mean the OA eight-state protocol, and the dashed curves represent the scenario with an LOCM.

As shown in Fig. 8, we can find that various transmission distances with different number of exchanged signals reflect regular curves relative to the secret key rates Kf. It shows that this novel scheme not only enhances the numerical value of the secret key rate Kf, but also numerously decreases the number of exchanged signals. Thus, the whole data size of the CVQKD derivation procedure can be cut down and the system load also decreases correspondingly. Therefore, the proposed scheme could also be a considerable approach to enhance the performance of the CVQKD system in practical applications.

Fig. 8. (color online) Number of exchanged signals and secret key rate in the case of heterodyne detection, where VA = 0.25, η = 0.6, υel = 0.05, β = 0.95, and the two parameters of LOCM are λ = 0.3 and τ = 0.45. Solid curves mean the original eight-state protocol, and the dashed curves represent the scenario with an LOCM.
5. Conclusion

In this paper, we propose a scheme to improve the performance of the eight-state CVQKD protocol by using a linear optics cloning machine. In the proposed scheme, we show the secret key rate of the modified CVQKD scheme with LOCM operation in the case of a finite-size scenario, as a function of total exchanged signals N, which can further approach the practical value of the secret key rate. The numerical simulation shows that by setting the two appropriate values of λ and τ, the LOCM is exploited to compensate for the imperfection of Bob’s apparatus so that the secret key rate can be well enhanced and commendably harmonized with the maximum transmission distance. Furthermore, we need to notice that the performance of secret key rate Kf that is analysed in the finite-size scenario is more pessimistic than that obtained in the asymptotic case, whereas the finite-size region approach is closer to the practical situation of the CVQKD protocol.

Reference
[1] Scarani V Bechmann-Pasquinucci H Cerf N J Dušek M Lütkenhaus N Peev M 2009 Rev. Mod. Phys. 81 1301
[2] Weedbrook C Pirandola S García-Patrón R Cerf N J Ralph T C Shapiro J H Lloyd S 2012 Rev. Mod. Phys. 84 621
[3] Grosshans F Grangier P 2002 Phys. Rev. Lett. 88 057902
[4] Samuel L B Peter V L 2005 Rev. Mod. Phys. 77 513
[5] Li Y M Wang X Y Bai Z L Liu W Y Yang S S Peng K C 2017 Chin. Phys. 26 040303
[6] Li H W Zhao Y B Yin Z Q Wang S Han Z F Bao W S Guo G C 2009 Opt. Commun. 20 4162
[7] Qi B Huang L L Qian L Lo H K 2007 Phys. Rev. 76 052323
[8] Pirandola S Braunstein S L Lloyd S 2008 Phys. Rev. Lett. 101 200504
[9] Wang X Y Zhang Y C Li Z Y Xu B J Yu S Guo H 2017 Quantum Inf. Comput. 17 1123
[10] Milicevic M Feng C Zhang L M Gulak P G 2018 Quantum Inf. 4 21
[11] Diamanti E Leverrier A 2015 Entropy 17 6072
[12] Liao Q Guo Y Huang D Huang P Zeng G H 2018 New J. Phys. 20 023015
[13] Xuan Q D Zhang Z S Voss P L 2009 Opt. Express 17 24244
[14] Wang X Y Bai Z L Wang S F Li Y M Peng K C 2013 Chin. Phys. Lett. 30 010305
[15] Becir A El-Orany F A A Wahiddin M R B 2012 Int. J. Quantum Inform. 10 1250004
[16] Qu Z Djordjevic I B 2017 IEEE Photon. J. 9 7600408
[17] Andersen U L Josse V Leuchs G 2005 Phys. Rev. Lett. 94 240503
[18] Guo Y Lv G L Zeng G H 2015 Quantum Inf. Process 14 4323
[19] Lodewyck J Bloch M García-Patrón R Fossier S Karpov E Diamanti E Debuisschert T Cerf N J Tualle-Brouri R McLaughlin S W Grangier P 2007 Phys. Rev. 76 042305
[20] Jouguet P Kunz-Jacques S Diamanti E Leverrier A 2012 Phys. Rev. A 86 6429
[21] Pirandola S Ottaviani C Spedalieri G Weedbrook C Braunstein S L Lloyd S Gehring T Jacobsen C S Andersen U L 2015 Nat. Photonics 9 397
[22] Leverrier A Grosshans F Grangier P 2010 Phys. Rev. 81 062343
[23] Zhou C Bao W S Li H W Wang Y Li Y Yin Z Q Chen W Han Z F 2013 Phys. Rev. A 89 052328
[24] Leverrier A 2015 Phys. Rev. Lett. 114 070501
[25] Leverrier A Grangier P 2011 Phys. Rev. 83 042312
[26] Hu L Y Liao Z Y Zubairy M S 2017 Phys. Rev. 95 012310
[27] Yang J Xu B Peng X Guo H 2012 Phys. Rev. 85 052302
[28] Guo Y Liao Q Wang Y J Huang D Huang P Zeng G H 2017 Phys. Rev. 95 032304
[29] Leverrier A Grangier P 2009 Phys. Rev. Lett. 102 180504
[30] Lodewyck J Grangier P 2007 Phys. Rev. 76 022332
[31] Thearle O Assad S M Symul T 2016 Phys. Rev. 93 042343
[32] Scarani V Renner R 2008 Phys. Rev. Lett. 100 200501
[33] Guo Y Qiu D L Huang P Zeng G H 2015 J. Phys. Soc. Jpn. 84 094003
[34] Huang P He G Q Fang J Zeng G H 2013 Phys. Rev. 87 012317
[35] Wu X D Liao Q Huang D Wu X H Guo Y 2017 Chin. Phys. 26 110304
[36] Ma H X Bao W S Li H W Chou C 2016 Chin. Phys. 25 080309
[37] Ma X C Sun S H Jiang M S Liang L M 2013 Phys. Rev. 87 52309
[38] Wang P Wang X Li J Li Y 2017 Opt. Express 25 27995
[39] Zhang H Fang J He G Q 2012 Phys. Rev. 86 022338
[40] Usenko V C Filip R 2016 Entropy 18
[41] Yang Y Xu L P Yan B Zhang H Y Shen Y H 2017 Chin. Phys. 26 110305
[42] Guo Y Li R J Liao Q Zhou J Huang D 2018 Phys. Lett. 382 372