Neural Network-Based Prediction for Secret Key Rate of Underwater Continuous-Variable Quantum Key Distribution through a Seawater Channel

Continuous-variable quantum key distribution (CVQKD) plays an important role in quantum communications, because of its compatible setup for optical implementation with low cost. For this paper, we considered a neural network approach to predicting the secret key rate of CVQKD with discrete modulation (DM) through an underwater channel. A long-short-term-memory-(LSTM)-based neural network (NN) model was employed, in order to demonstrate performance improvement when taking into account the secret key rate. The numerical simulations showed that the lower bound of the secret key rate could be achieved for a finite-size analysis, where the LSTM-based neural network (NN) was much better than that of the backward-propagation-(BP)-based neural network (NN). This approach helped to realize the fast derivation of the secret key rate of CVQKD through an underwater channel, indicating that it can be used for improving performance in practical quantum communications.

[1]  Xiang Yi,et al.  Improvement of a Monte-Carlo-simulation-based turbulence-induced attenuation model for an underwater wireless optical communications channel. , 2022, Journal of the Optical Society of America. A, Optics, image science, and vision.

[2]  Dongling Xu,et al.  Improvement of MCS-based Turbulent Induced Scattering Model for UWOC Channel , 2022, Journal of the Optical Society of America A.

[3]  Hua-Lei Yin,et al.  Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution , 2022, Optics express.

[4]  Zheng Wang,et al.  Practical continuous-variable quantum secret sharing using plug-and-play dual-phase modulation. , 2022, Optics express.

[5]  Peter D. Tonner,et al.  Application of Bayesian Optimization and Regression Analysis to Ferromagnetic Materials Development , 2022, IEEE Transactions on Magnetics.

[6]  Hua-Lei Yin,et al.  Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable Quantum key Distribution with High Excess Noise Tolerance , 2021, PRX Quantum.

[7]  P. Zoller,et al.  Importance Sampling of Randomized Measurements for Probing Entanglement. , 2021, Physical review letters.

[8]  N. Lütkenhaus,et al.  Dimension Reduction in Quantum Key Distribution for Continuous- and Discrete-Variable Protocols , 2021, 2101.05799.

[9]  Shahnawaz Ahmed,et al.  Classification and reconstruction of optical quantum states with deep neural networks , 2020, Physical Review Research.

[10]  Ying Guo,et al.  Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source , 2020, Physical Review A.

[11]  Jie Lin,et al.  Security proof of practical quantum key distribution with detection-efficiency mismatch , 2020, 2004.04383.

[12]  Anthony Leverrier,et al.  Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation , 2019, Physical Review X.

[13]  Guang-Can Guo,et al.  Experimental Simultaneous Learning of Multiple Nonclassical Correlations. , 2018, Physical review letters.

[14]  Peng Huang,et al.  Long-distance continuous-variable quantum key distribution by controlling excess noise , 2016, Scientific Reports.

[15]  Peng Huang,et al.  High-speed continuous-variable quantum key distribution without sending a local oscillator. , 2015, Optics letters.

[16]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[17]  Ruben Martinez-Cantin,et al.  BayesOpt: a Bayesian optimization library for nonlinear optimization, experimental design and bandits , 2014, J. Mach. Learn. Res..

[18]  Norbert Lütkenhaus,et al.  Squashing model for detectors and applications to quantum key distribution protocols , 2013, ArXiv.

[19]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[20]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[21]  T. Tsurumaru Squash operator and symmetry , 2009, 0910.2326.

[22]  Normand J. Beaudry,et al.  Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.

[23]  S. Braunstein,et al.  Quantum Information with Continuous Variables , 2004, quant-ph/0410100.

[24]  T. Ralph,et al.  Quantum cryptography without switching. , 2004, Physical review letters.

[25]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[26]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[27]  S. Hochreiter,et al.  Long Short-Term Memory , 1997, Neural Computation.

[28]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[29]  Kurt Hornik,et al.  Multilayer feedforward networks are universal approximators , 1989, Neural Networks.