Thermal state quantum key distribution

We analyse a central broadcast continuous variable quantum key distribution protocol in which a beam produced by a thermal source is used to create a secret key between two parties, Alice and Bob. A beam splitter divides the initial beam into a pair of output beams, which are sent to Alice and Bob, with Eve intercepting Bob’s beam. We investigate the protocol in detail, calculating mutual informations through a pair of analytic methods and comparing the results to the outputs of a Monte Carlo simulation of the protocol. In a lossless system, we find that a lower bound on the key rate remains positive in the protocol under a beam splitter attack, provided Bob receives a nonzero proportion of the beam initially sent to him. This suggests that the thermal state protocol could be used experimentally to produce secure keys.

[1]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[2]  B. Varcoe,et al.  Quantum secrecy in thermal states , 2017, Journal of Physics B: Atomic, Molecular and Optical Physics.

[3]  S. McLaughlin,et al.  Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.

[4]  P. Grangier,et al.  Reverse reconciliation protocols for quantum cryptography with continuous variables , 2002, quant-ph/0204127.

[5]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[6]  Timothy C. Ralph,et al.  Coherent-state quantum key distribution without random basis switching (9 pages) , 2006 .

[7]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[8]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  N. Cerf,et al.  Quantum information with optical continuous variables: from Bell tests to key distribution , 2007 .

[11]  Bing Qi,et al.  Passive state preparation in the Gaussian-modulated coherent-states quantum key distribution , 2017, 1711.08500.

[12]  B. Varcoe,et al.  Quantum secrecy in thermal states III , 2020, Journal of Physics B: Atomic, Molecular and Optical Physics.

[13]  Stefano Pirandola,et al.  Continuous-Variable Quantum Key Distribution using Thermal States , 2011, 1110.4617.

[14]  Franco Nori,et al.  QuTiP: An open-source Python framework for the dynamics of open quantum systems , 2011, Comput. Phys. Commun..

[15]  Stefano Pirandola,et al.  Quantum discord as a resource for quantum cryptography , 2013, Scientific Reports.

[16]  Sammy Ragy,et al.  Unveiling the Hanbury Brown and Twiss effect through Rényi entropy correlations , 2012, 1210.7492.

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  Franco Nori,et al.  QuTiP 2: A Python framework for the dynamics of open quantum systems , 2012, Comput. Phys. Commun..

[19]  Bahaa E. A. Saleh,et al.  I Photon Bunching and Antibunching , 1988 .

[20]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[21]  Raoul F. Guiazon,et al.  Quantum secrecy in thermal states II , 2019, Journal of Physics B: Atomic, Molecular and Optical Physics.

[22]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.