Security analysis of passive measurement-device-independent continuous-variable quantum key distribution with almost no public communication

We perform security analysis of a passive measurement-device-independent (MDI) continuous-variable quantum key distribution (CVQKD) protocol with almost no public communication. In the passive MDI-CVQKD protocol, the quantum states are prepared passively by using thermal sources without Gaussian modulations at Alice’s and Bob’s sides. With this technique, Alice and Bob can precisely prepare quantum states to match the high transmission rate in MDI-CVQKD system at the corresponding speed. Here, both asymptotic regime and finite-size regime are considered. In asymptotic case, we derive the security bounds for the protocol against collective attacks, while in finite-size case we show a new conceptual development of passive MDI-CVQKD, namely the final secret key generation can be performed by using almost all raw keys instead of sacrificing part of raw keys for parameter estimation, and thus the improvement performance of passive MDI-CVQKD protocol can be achieved in finite-size scenario.

[1]  Rupesh Kumar,et al.  Homodyne-detector-blinding attack in continuous-variable quantum key distribution , 2018, Physical Review A.

[2]  H. Lo,et al.  Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.

[3]  Peng Huang,et al.  Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.

[4]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[5]  Zheng-Fu Han,et al.  Detection efficiency and noise in a semi-device-independent randomness-extraction protocol , 2015, 1502.01495.

[6]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[7]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[8]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[9]  Hao Qin,et al.  Coexistence of continuous variable QKD with intense DWDM classical channels , 2014, 1412.1403.

[10]  Wei Chen,et al.  Quantum key distribution based on quantum dimension and independent devices , 2014, 1402.2053.

[11]  Manuel Gessner,et al.  Efficient entanglement criteria for discrete, continuous, and hybrid variables , 2016, 1608.02421.

[12]  Song Yu,et al.  Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution , 2017 .

[13]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[14]  S. Pirandola,et al.  Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.

[15]  Ying Guo,et al.  Quantum relay schemes for continuous-variable quantum key distribution , 2017 .

[16]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.

[17]  Yong-Su Kim,et al.  Plug-and-Play Measurement-Device-Independent Quantum Key Distribution , 2015, 1501.03344.

[18]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[19]  Hao Qin,et al.  Polarization attack on continuous-variable quantum key distribution system , 2013, Security + Defence.

[20]  N. Cerf,et al.  Quantum information with optical continuous variables: from Bell tests to key distribution , 2007 .

[21]  L. Banchi,et al.  Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.

[22]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[23]  S. Braunstein,et al.  Quantum Information with Continuous Variables , 2004, quant-ph/0410100.

[24]  Bing Qi,et al.  Discrete and continuous variables for measurement-device-independent quantum cryptography , 2015, Nature Photonics.

[25]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[26]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[27]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[28]  Stefano Pirandola,et al.  Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution. , 2017, Physical review letters.

[29]  L. Liang,et al.  Gaussian-modulated coherent-state measurement-device-independent quantum key distribution , 2013, 1312.5025.

[30]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[31]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[32]  Radim Filip Continuous-variable quantum key distribution with noisy coherent states , 2008 .

[33]  Peng Huang,et al.  Quantum key distribution using basis encoding of Gaussian-modulated coherent states , 2018 .

[34]  Ziyang Chen,et al.  Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks , 2018, Physical Review A.

[35]  James F. Dynes,et al.  Avoiding the blinding attack in QKD , 2010 .

[36]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[37]  Stefano Pirandola,et al.  Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables , 2017, 1707.04599.

[38]  Duan Huang,et al.  Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution. , 2018, Optics express.

[39]  P. Grangier,et al.  Finite-size analysis of a continuous-variable quantum key distribution , 2010, 1005.0339.

[40]  Tao Wang,et al.  Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol , 2016 .

[41]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[42]  A. Furusawa,et al.  Entanglement swapping between discrete and continuous variables. , 2014, Physical review letters.

[43]  Bing Qi,et al.  Passive state preparation in the Gaussian-modulated coherent-states quantum key distribution , 2017, 1711.08500.

[44]  Peng Huang,et al.  Passive-state preparation in continuous-variable measurement-device-independent quantum key distribution , 2019, Journal of Physics B: Atomic, Molecular and Optical Physics.

[45]  Mei Li,et al.  Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.

[46]  G. Guo,et al.  Quantum hacking on quantum key distribution using homodyne detection , 2014, 1402.6921.

[47]  Wanyi Gu,et al.  Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.

[48]  S. McLaughlin,et al.  Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.

[49]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[50]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.