Discrete-modulated continuous-variable quantum key distribution with a machine-learning-based detector

Abstract. The discrete-modulated continuous-variable quantum key distribution (DM-CV-QKD) could break the distance limitation of Gaussian-modulated CV-QKD. In practice, the high-performance error correction code plays an important role in DM-CV-QKD and affects the secure transmission distance. However, DM-CV-QKD usually works under low signal-to-noise ratio (SNR) and the design of high-performance error correction code under this condition is difficult, so that it would impose a limitation on further improvement of the secure distance. We propose a DM-CV-QKD with the machine-learning-based detector to further improve the secure distance. The numerical result shows that the proposed scheme could validly improve the system performance. Viewed from another perspective, the proposed scheme could be employed to overcome various impairments induced by the channel and thereby lower the demand of error correction codes on the SNR threshold of the quantum channel without compromising the system performance. The proposed scheme opens the door to applying machine leaning to directly process the raw secret key and improve the performance for CV-QKD systems.

[1]  Christian Weedbrook,et al.  Quantum cryptography without switching. , 2004, Physical review letters.

[2]  E. Diamanti,et al.  Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution , 2012, 1206.6357.

[3]  D. Zibar,et al.  Machine Learning Techniques in Optical Communication , 2016 .

[4]  Zabih Ghassemlooy,et al.  Artificial Neural Network Nonlinear Equalizer for Coherent Optical OFDM , 2015, IEEE Photonics Technology Letters.

[5]  Idelfonso Tafur Monroy,et al.  Nonlinear impairment compensation using expectation maximization for dispersion managed and unmanaged PDM 16-QAM transmission. , 2012, Optics express.

[6]  Peng Huang,et al.  Continuous-variable quantum key distribution with 1 Mbps secure key rate. , 2015, Optics express.

[7]  Peng Huang,et al.  Monitoring of continuous-variable quantum key distribution system in real environment. , 2017, Optics express.

[8]  Min Zhang,et al.  System impairment compensation in coherent optical communications by using a bio-inspired detector based on artificial neural network and genetic algorithm , 2017 .

[9]  Peng Huang,et al.  Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects , 2016 .

[10]  Peng Huang,et al.  High-speed continuous-variable quantum key distribution without sending a local oscillator. , 2015, Optics letters.

[11]  Zabih Ghassemlooy,et al.  SVM detection for superposed pulse amplitude modulation in visible light communications , 2016, 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).

[12]  Sébastien Kunz-Jacques,et al.  Long Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation , 2011, Physical Review A.

[13]  Guihua Zeng,et al.  Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution , 2018 .

[14]  Lawrence Ong,et al.  On the problem of non-zero word error rates for fixed-rate error correction codes in continuous variable quantum key distribution , 2016, 1605.04663.

[15]  P. Grangier,et al.  Finite-size analysis of a continuous-variable quantum key distribution , 2010, 1005.0339.

[16]  Lihua Gong,et al.  Three-party remote state preparation schemes based on entanglement , 2014, Quantum Inf. Process..

[17]  Peng Huang,et al.  Performance improvement of continuous-variable quantum key distribution via photon subtraction , 2013 .

[18]  Tao Wang,et al.  Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol , 2016 .

[19]  Sarah J. Johnson,et al.  Repeat-accumulate codes for reconciliation in continuous variable quantum key distribution , 2015, 2016 Australian Communications Theory Workshop (AusCTW).

[20]  Zheshen Zhang,et al.  The quantum noise of guided wave acoustic Brillouin scattering with applications to continuous-variable quantum key distribution , 2011 .

[21]  Peter Harrington,et al.  Machine Learning in Action , 2012 .

[22]  Guihua Zeng,et al.  High performance reconciliation for continuous-variable quantum key distribution with LDPC code , 2015 .

[23]  Romain Alléaume,et al.  Multidimensional reconciliation for continuous-variable quantum key distribution , 2007, 2008 IEEE International Symposium on Information Theory.

[24]  H. Lo,et al.  Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.

[25]  Li-Hua Gong,et al.  Novel Quantum Deterministic Key Distribution Protocols with Entangled States , 2010 .

[26]  Heng Zhang,et al.  Improving the performance of the four-state continuous-variable quantum key distribution by using optical amplifiers , 2012 .

[27]  David Elkouss,et al.  Efficient reconciliation protocol for discrete-variable quantum key distribution , 2009, 2009 IEEE International Symposium on Information Theory.

[28]  Peng Huang,et al.  Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.

[29]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[30]  David Elkouss,et al.  Rate compatible protocol for information reconciliation: An application to QKD , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[31]  Rüdiger L. Urbanke,et al.  Polar codes: Characterization of exponent, bounds, and constructions , 2009, 2009 IEEE International Symposium on Information Theory.

[32]  Hong-Xin Ma,et al.  Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack , 2016 .

[33]  Oliver Kramer,et al.  K-Nearest Neighbors , 2013 .

[34]  Zeng Gui-Hua,et al.  Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack ⁄ , 2008 .

[35]  Weidong Zhou,et al.  Entanglement of coherent superposition of photon-subtraction squeezed vacuum , 2017 .

[36]  Duan Huang,et al.  Balancing four-state continuous-variable quantum key distribution with linear optics cloning machine , 2017 .

[37]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[38]  Anthony Leverrier,et al.  Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. , 2008, Physical review letters.

[39]  Zeng Guihua,et al.  Quantum key distribution using binary-modulated coherent states , 2008 .

[40]  P. Grangier,et al.  Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation , 2011, Physical Review A.

[41]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[42]  Tao Wang,et al.  Robust continuous-variable quantum key distribution against practical attacks , 2017 .