Simultaneous measurement-device-independent continuous variable quantum key distribution with realistic detector compensation

We propose a novel scheme for measurement-device-independent (MDI) continuous-variable quantum key distribution (CVQKD) by simultaneously conducting classical communication and QKD, which is called “simultaneous MDI-CVQKD” protocol. In such protocol, each sender (Alice, Bob) can superimpose random numbers for QKD on classical information by taking advantage of the same weak coherent pulse and an untrusted third party (Charlie) decodes it by using the same coherent detectors, which could be appealing in practice due to that multiple purposes can be realized by employing only single communication system. What is more, the proposed protocol is MDI, which is immune to all possible side-channel attacks on practical detectors. Security results illustrate that the simultaneous MDI-CVQKD protocol can secure against arbitrary collective attacks. In addition, we employ phase-sensitive optical amplifiers to compensate the imperfection existing in practical detectors. With this technology, even common practical detectors can be used for detection through choosing a suitable optical amplifier gain. Furthermore, we also take the finite-size effect into consideration and show that the whole raw keys can be taken advantage of to generate the final secret key instead of sacrificing part of them for parameter estimation. Therefore, an enhanced performance of the simultaneous MDI-CVQKD protocol can be obtained in finite-size regime.

[1]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[2]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[3]  Bing Qi,et al.  Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillator , 2017, 1708.08742.

[4]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[5]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[6]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[7]  E. Diamanti,et al.  Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers , 2008, 0812.4314.

[8]  Pan Qing,et al.  Continuous variable quantum communication with bright entangled optical beams , 2006 .

[9]  L. Liang,et al.  Gaussian-modulated coherent-state measurement-device-independent quantum key distribution , 2013, 1312.5025.

[10]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[11]  Tao Wang,et al.  Practical performance of real-time shot-noise measurement in continuous-variable quantum key distribution , 2018, Quantum Inf. Process..

[12]  Guihua Zeng,et al.  Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution , 2018 .

[13]  Stefano Pirandola,et al.  Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution. , 2017, Physical review letters.

[14]  Samuel L. Braunstein,et al.  Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration , 2015, 1506.05430.

[15]  H. Lo,et al.  Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.

[16]  Peng Huang,et al.  25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel , 2015, Scientific Reports.

[17]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[18]  Xiaodong Wu,et al.  Plug-and-play dual-phase-modulated continuous-variable quantum key distribution with photon subtraction , 2019, Frontiers of Physics.

[19]  Bing Qi,et al.  Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection , 2015, 1503.00662.

[20]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[21]  James F. Dynes,et al.  Avoiding the blinding attack in QKD , 2010 .

[22]  Hao Qin,et al.  Polarization attack on continuous-variable quantum key distribution system , 2013, Security + Defence.

[23]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[24]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[25]  G. Vallone,et al.  Advances in Quantum Cryptography , 2019, 1906.01645.

[26]  Tao Wang,et al.  Field demonstration of a continuous-variable quantum key distribution network. , 2016, Optics letters.

[27]  Peng Huang,et al.  High-speed continuous-variable quantum key distribution without sending a local oscillator. , 2015, Optics letters.

[28]  G. Guo,et al.  Quantum hacking on quantum key distribution using homodyne detection , 2014, 1402.6921.

[29]  L. Liang,et al.  Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.

[30]  L. Banchi,et al.  Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.

[31]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[32]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[33]  Feihu Xu,et al.  Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.

[34]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.

[35]  Hoi-Kwong Lo,et al.  Long distance measurement-device-independent quantum key distribution with entangled photon sources , 2013, 1306.5814.

[36]  Philip Walther,et al.  Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations , 2017, Advanced Quantum Technologies.

[37]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.

[38]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[39]  Ahmed Farouk,et al.  Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states , 2017, Frontiers of Physics.

[40]  L. Zhang,et al.  Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.

[41]  Eleni Diamanti,et al.  Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.

[42]  Wei Chen,et al.  Quantum key distribution based on quantum dimension and independent devices , 2014, 1402.2053.

[43]  Song Yu,et al.  Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution , 2017 .

[44]  Mu-Sheng Jiang,et al.  Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol , 2013 .

[45]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[46]  Stefano Pirandola,et al.  Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables , 2017, 1707.04599.

[47]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[48]  Peng Huang,et al.  State-discrimination attack on discretely modulated continuous-variable quantum key distribution , 2014 .

[49]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[50]  C. Wanichanon,et al.  Autophagy-Associated Shrinkage of the Hepatopancreas in Fasting Male Macrobrachium rosenbergii Is Rescued by Neuropeptide F , 2018, Front. Physiol..

[51]  Duan Huang,et al.  Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution. , 2018, Optics express.

[52]  A. Acín,et al.  Security bounds for continuous variables quantum key distribution. , 2004, Physical review letters.

[53]  W. Hofer Solving the Einstein-Podolsky-Rosen puzzle: the origin of non-locality in Aspect-type experiments , 2011, 1109.6750.

[54]  Guihua Zeng,et al.  Carrier-phase estimation for simultaneous quantum key distribution and classical communication using a real local oscillator , 2019, Physical Review A.

[55]  M. P. Fernandes,et al.  Developmental Origins of Cardiometabolic Diseases: Role of the Maternal Diet , 2016, Front. Physiol..

[56]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[57]  Rupesh Kumar,et al.  Homodyne-detector-blinding attack in continuous-variable quantum key distribution , 2018, Physical Review A.

[58]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[59]  Hong Guo,et al.  High-Speed Implementation of Length-Compatible Privacy Amplification in Continuous-Variable Quantum Key Distribution , 2018, IEEE Photonics Journal.

[60]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[61]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[62]  Mu-Sheng Jiang,et al.  Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices , 2014, Frontiers of Physics.

[63]  S. Pirandola,et al.  Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.

[64]  Xiaodong Wu,et al.  Security analysis of passive measurement-device-independent continuous-variable quantum key distribution with almost no public communication , 2019, Quantum Inf. Process..

[65]  S. Lloyd,et al.  Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography. , 2008, Physical review letters.

[66]  Bing Qi,et al.  Practical challenges in quantum key distribution , 2016, npj Quantum Information.

[67]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[68]  Duan Huang,et al.  Balancing four-state continuous-variable quantum key distribution with linear optics cloning machine , 2017 .

[69]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[70]  Peng Huang,et al.  Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.

[71]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[72]  Bing Qi Simultaneous classical communication and quantum key distribution using continuous variables , 2016 .

[73]  E. Diamanti,et al.  Preventing Calibration Attacks on the Local Oscillator in Continuous-Variable Quantum Key Distribution , 2013, 1304.7024.

[74]  J. F. Dynes,et al.  Overcoming the rate-distance barrier of quantum key distribution without using quantum repeaters , 2018 .

[75]  P. Grangier,et al.  Finite-size analysis of a continuous-variable quantum key distribution , 2010, 1005.0339.

[76]  Xiaodong Wu,et al.  Simultaneous Classical Communication and Quantum Key Distribution Based on Plug-and-Play Configuration with an Optical Amplifier , 2019, Entropy.