Advantages of the coherent state compared with squeezed state in unidimensional continuous variable quantum key distribution

In this work, a comparison study between unidimensional (UD) coherent-state and UD squeezed-state protocols is performed in the continuous variable quantum key distribution domain. First, a UD squeezed-state protocol is proposed, and the equivalence between the prepare-and-measure and entanglement-based schemes of UD squeezed-state protocol is proved. Then, the security of the UD squeezed-state protocol under collective attack in realistic conditions is analyzed. Finally, the performance of the two UD protocols is compared. Based on the uniform expressions established in our study, the squeezed- and coherent-state protocols can be analyzed simply by varying the squeezing parameter.

[1]  John Preskill,et al.  Secure quantum key distribution using squeezed states , 2001 .

[2]  Shen-Shen Yang,et al.  FPGA-Based Implementation of Size-Adaptive Privacy Amplification in Quantum Key Distribution , 2017, IEEE Photonics Journal.

[3]  Vikram Sharma,et al.  No-switching quantum key distribution using broadband modulated coherent light. , 2005, Physical review letters.

[4]  Anthony Leverrier,et al.  Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.

[5]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[6]  Peng Huang,et al.  Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.

[7]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[8]  Pu Wang,et al.  Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations , 2018, Entropy.

[9]  N. Cerf,et al.  Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.

[10]  Zach DeVito,et al.  Opt , 2017 .

[11]  Miguel Navascués,et al.  Optimality of Gaussian attacks in continuous-variable quantum cryptography. , 2006, Physical review letters.

[12]  Raúl García-Patrón,et al.  Continuous-variable quantum key distribution protocols over noisy channels. , 2008, Physical review letters.

[13]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[14]  S. McLaughlin,et al.  Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.

[15]  G Leuchs,et al.  Continuous variable quantum cryptography: beating the 3 dB loss limit. , 2002, Physical review letters.

[16]  Pu Wang,et al.  Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions , 2017 .

[17]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[18]  Maxim Kuschnerov,et al.  Toward the Integration of CV Quantum Key Distribution in Deployed Optical Networks , 2018, IEEE Photonics Technology Letters.

[19]  Jianqiang Liu,et al.  Generation of Stable and High Extinction Ratio Light Pulses for Continuous Variable Quantum Key Distribution , 2015, IEEE Journal of Quantum Electronics.

[20]  Radim Filip,et al.  Squeezed-state quantum key distribution upon imperfect reconciliation , 2011, 1111.2311.

[21]  N. Lutkenhaus,et al.  Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks , 2008, 0807.3751.

[22]  K. Peng,et al.  Continuous variable quantum key distribution , 2017 .

[23]  H. Lo,et al.  Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.

[24]  Christian Weedbrook,et al.  Security proof of continuous-variable quantum key distribution using three coherent states , 2017, 1709.01758.

[25]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[26]  Bing Qi,et al.  Passive state preparation in the Gaussian-modulated coherent-states quantum key distribution , 2017, 1711.08500.

[27]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[28]  Anthony Leverrier,et al.  Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. , 2008, Physical review letters.

[29]  M. Hillery Quantum cryptography with squeezed states , 1999, quant-ph/9909006.

[30]  Eleni Diamanti,et al.  Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.

[31]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[32]  Xuyang Wang,et al.  Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution , 2017 .

[33]  P. Glenn Gulak,et al.  Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography , 2017, npj Quantum Information.

[34]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[35]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[36]  Vladyslav C. Usenko,et al.  Unidimensional continuous-variable quantum key distribution , 2015, 1504.07093.

[37]  Philip Walther,et al.  Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations , 2017, Advanced Quantum Technologies.

[38]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[39]  Christian Weedbrook,et al.  Quantum cryptography without switching. , 2004, Physical review letters.