Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making a double use of the quantum channel and the potential of long-distance secure communication using two-way protocol.

[1]  Vikram Sharma,et al.  No-switching quantum key distribution using broadband modulated coherent light. , 2005, Physical review letters.

[2]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[3]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[4]  M. Hayashi,et al.  Quantum information with Gaussian states , 2007, 0801.4604.

[5]  Miguel Navascués,et al.  Optimality of Gaussian attacks in continuous-variable quantum cryptography. , 2006, Physical review letters.

[6]  Stefano Pirandola,et al.  Two-way quantum cryptography at different wavelengths , 2013, 1309.7973.

[7]  Maozhu Sun,et al.  An improved two-way continuous-variable quantum key distribution protocol with added noise in homodyne detection , 2012, 1208.6249.

[8]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[9]  Seth Lloyd,et al.  Continuous Variable Quantum Cryptography using Two-Way Quantum Communication , 2006, ArXiv.

[10]  Nathan Killoran,et al.  Optimal working points for continuous-variable quantum channels , 2013, 1301.6051.

[11]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[12]  S. Lloyd,et al.  Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography. , 2008, Physical review letters.

[13]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[14]  Stefano Mancini,et al.  Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation , 2015 .

[15]  Wanyi Gu,et al.  Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.

[16]  S. McLaughlin,et al.  Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.

[17]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[18]  Stefano Pirandola,et al.  General immunity and superadditivity of two-way Gaussian quantum cryptography , 2016, Scientific Reports.

[19]  Wanyi Gu,et al.  Improvement of two-way continuous-variable quantum key distribution using optical amplifiers , 2014 .

[20]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[21]  Wanyi Gu,et al.  Security of two-way continuous-variable quantum key distribution with source noise , 2014 .

[22]  Seth Lloyd,et al.  Correlation matrices of two-mode bosonic systems , 2009, 0902.1502.

[23]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[24]  Eleni Diamanti,et al.  Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.

[25]  Christian Weedbrook,et al.  Quantum cryptography without switching. , 2004, Physical review letters.

[26]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[27]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.

[28]  Hong Guo,et al.  SECURITY OF A NEW TWO-WAY CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOL , 2011, 1110.1818.

[29]  Samuel L. Braunstein,et al.  Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration , 2015, 1506.05430.

[30]  Stefano Pirandola,et al.  Covariance Matrices under Bell-like Detections , 2012, Open Syst. Inf. Dyn..

[31]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[32]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[33]  S. Braunstein,et al.  Quantum Information with Continuous Variables , 2004, quant-ph/0410100.