Coherence-assisted non-Gaussian measurement-device-independent quantum key distribution

Non-Gaussian operations on two mode squeezed vacuum states (TMSV) in continuous variable measurement device independent quantum key distribution (CV-MDI-QKD) protocols have been shown to effectively increase the total transmission distances drastically. In this paper we show that photon subtraction on a two mode squeezed coherent (PSTMSC) state can further improve the transmission distances remarkably. To that end we also provide a generalized covariance matrix corresponding to PSTMSC, which has not been attempted before. We show that coherence, defined as the amount of displacement of vacuum state, along with non-Gaussianity can help improve the performance of prevalent CV-MDI-QKD protocols. Furthermore, since we use realistic parameters, our technique is experimentally feasible and can be readily implemented

[1]  L. Zhang,et al.  Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.

[2]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[3]  Se-Wan Ji,et al.  Enhancing quantum entanglement for continuous variables by a coherent superposition of photon subtraction and addition , 2011, 1107.2771.

[4]  Ying Guo,et al.  Continuous-variable quantum key distribution with non-Gaussian quantum catalysis , 2018, Physical Review A.

[5]  M. Suhail Zubairy,et al.  Continuous-variable entanglement via multiphoton catalysis , 2017 .

[6]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[7]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[8]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[9]  S. Pirandola,et al.  Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.

[10]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[11]  L. Liang,et al.  Gaussian-modulated coherent-state measurement-device-independent quantum key distribution , 2013, 1312.5025.

[12]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[13]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[14]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[15]  Nicolas J. Cerf,et al.  Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables , 2003, Quantum Inf. Comput..

[16]  N. Cerf,et al.  Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.

[17]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[18]  F. Illuminati,et al.  Continuous-variable quantum teleportation with non-Gaussian resources , 2007, 0706.3701.

[19]  Peng Huang,et al.  Performance improvement of continuous-variable quantum key distribution via photon subtraction , 2013 .

[20]  Fuli Li,et al.  Entanglement properties of non-Gaussian resources generated via photon subtraction and addition and continuous-variable quantum-teleportation improvement , 2009 .

[21]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[22]  Anthony Leverrier,et al.  Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.

[23]  M. S. Kumar,et al.  Quantitative study of beam-splitter-generated entanglement from input states with multiple nonclassicality-inducing operations , 2016, 1611.06736.

[24]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[25]  S. Lloyd,et al.  High-rate quantum cryptography in untrusted networks , 2013, 1312.4104.

[26]  Philippe Grangier,et al.  Increasing entanglement between Gaussian states by coherent photon subtraction. , 2006, Physical review letters.

[27]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[28]  Ying Guo,et al.  Self-referenced continuous-variable measurement-device-independent quantum key distribution , 2018 .

[29]  Philip Walther,et al.  Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations , 2017, Advanced Quantum Technologies.

[30]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[31]  Bingjie Xu,et al.  Non-Gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution , 2016, 1601.02799.

[32]  Bingjie Xu,et al.  Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction , 2017, 1711.04225.

[33]  Stefano Pirandola,et al.  Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables , 2017, 1707.04599.

[34]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[35]  Jeffrey H. Shapiro,et al.  Enhancing quantum entanglement by photon addition and subtraction , 2012 .

[36]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[37]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[38]  Peng Huang,et al.  Continuous-variable measurement-device-independent quantum key distribution with photon subtraction , 2017, 1711.05978.

[39]  M. Hillery Quantum cryptography with squeezed states , 1999, quant-ph/9909006.

[40]  Samuel L. Braunstein,et al.  Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration , 2015, 1506.05430.

[41]  Peter van Loock,et al.  Distillation of mixed-state continuous-variable entanglement by photon subtraction , 2010, 1009.4888.

[42]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[43]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.