Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions

A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions.

[1]  Vladyslav C. Usenko,et al.  Unidimensional continuous-variable quantum key distribution , 2015, 1504.07093.

[2]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[3]  Yi-Chen Zhang,et al.  Continuous-Variable Quantum Key Distribution with Rateless Reconciliation Protocol , 2019, Physical Review Applied.

[4]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[5]  Fabian Furrer,et al.  Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle , 2014, 1405.5965.

[6]  Raúl García-Patrón,et al.  Continuous-variable quantum key distribution protocols over noisy channels. , 2008, Physical review letters.

[7]  Vladyslav C. Usenko Unidimensional continuous-variable quantum key distribution using squeezed states , 2018, Physical Review A.

[8]  Dong-Yun Bai,et al.  Passive-state preparation in continuous-variable measurement-device-independent quantum key distribution , 2019, Quantum Information Processing.

[9]  Leif Katsuo Oxenløwe,et al.  Space division multiplexing chip-to-chip quantum key distribution , 2017, Scientific Reports.

[10]  Seth Lloyd,et al.  Continuous Variable Quantum Cryptography using Two-Way Quantum Communication , 2006, ArXiv.

[11]  Ziyang Chen,et al.  Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks , 2018, Physical Review A.

[12]  C. M. Natarajan,et al.  Chip-based quantum key distribution , 2015, Nature Communications.

[13]  Wanyi Gu,et al.  Improvement of two-way continuous-variable quantum key distribution using optical amplifiers , 2014 .

[14]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[15]  A. Holevo Bounds for the quantity of information transmitted by a quantum communication channel , 1973 .

[16]  Bingjie Xu,et al.  Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction , 2017, 1711.04225.

[17]  V. Scarani,et al.  Fast and simple one-way quantum key distribution , 2005, quant-ph/0506097.

[18]  Pu Wang,et al.  Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions , 2017 .

[19]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[20]  J. Cirac,et al.  Extremality of Gaussian quantum states. , 2005, Physical review letters.

[21]  Mei Li,et al.  Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.

[22]  A Tosi,et al.  Hong-Ou-Mandel interference between independent III-V on silicon waveguide integrated lasers. , 2019, Optics letters.

[23]  Christoph Pacher,et al.  Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks , 2014, Nature Communications.

[24]  Vadim Makarov,et al.  Implementation vulnerabilities in general quantum cryptography , 2018, New Journal of Physics.

[25]  Bing Qi,et al.  Practical challenges in quantum key distribution , 2016, npj Quantum Information.

[26]  Yi-Chen Zhang,et al.  One-Time Shot-Noise Unit Calibration Method for Continuous-Variable Quantum Key Distribution , 2019 .

[27]  Anthony Leverrier,et al.  Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.

[28]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[29]  Xuyang Wang,et al.  Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution , 2017 .

[30]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[31]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[32]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.

[33]  Nathan Walk,et al.  Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution , 2014, 1405.6593.

[34]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[35]  T Franz,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2011, Physical review letters.

[36]  Seth Lloyd,et al.  Direct and reverse secret-key capacities of a quantum channel. , 2008, Physical review letters.

[37]  Wanyi Gu,et al.  Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.

[38]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[39]  Leif Katsuo Oxenløwe,et al.  High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits , 2016, npj Quantum Information.

[40]  Hong Guo,et al.  Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation , 2017, 1703.02727.

[41]  Bing Qi,et al.  Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection , 2015, 1503.00662.

[42]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[43]  Yoshihisa Yamamoto,et al.  Differential-phase-shift quantum key distribution using coherent light , 2003 .

[44]  Christian Weedbrook,et al.  Continuous-variable quantum key distribution with entanglement in the middle , 2012, 1205.1497.

[45]  Hong Guo,et al.  Continuous-variable source-device-independent quantum key distribution against general attacks , 2018, Scientific Reports.

[46]  Song Yu,et al.  Improvement of unidimensional continuous-variable quantum key distribution systems by using a phase-sensitive amplifier , 2019, Journal of Physics B: Atomic, Molecular and Optical Physics.

[47]  A. Iserles,et al.  Efficient quadrature of highly oscillatory integrals using derivatives , 2005, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[48]  Hong Guo,et al.  Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution , 2019, Entropy.

[49]  Eleni Diamanti,et al.  Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations , 2015, Entropy.

[50]  Patrick J. Coles,et al.  Self-referenced continuous-variable quantum key distribution protocol , 2015, 1503.04763.

[51]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[52]  Christian Weedbrook,et al.  Quantum cryptography without switching. , 2004, Physical review letters.

[53]  Leif Katsuo Oxenløwe,et al.  Two-dimensional distributed-phase-reference protocol for quantum key distribution , 2016, Scientific Reports.

[54]  Hong Guo,et al.  SECURITY OF A NEW TWO-WAY CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOL , 2011, 1110.1818.

[55]  Wee Ser,et al.  An integrated silicon photonic chip platform for continuous-variable quantum key distribution , 2019, Nature Photonics.

[56]  L. C. Kwek,et al.  Integrated Chip for Continuous-variable Quantum Key Distribution using Silicon Photonic Fabrication , 2018, 2018 Conference on Lasers and Electro-Optics (CLEO).

[57]  Jiri Janousek,et al.  Violation of Bell's Inequality Using Continuous Variable Measurements. , 2018, Physical review letters.

[58]  Seth Lloyd,et al.  Quantum cryptography approaching the classical limit. , 2010, Physical review letters.

[59]  Stefano Pirandola,et al.  Two-way quantum cryptography at different wavelengths , 2013, 1309.7973.

[60]  S. Pirandola,et al.  Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.

[61]  Eleni Diamanti,et al.  Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.

[62]  Song Yu,et al.  Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution , 2017 .

[63]  Peng Huang,et al.  Continuous-variable measurement-device-independent quantum key distribution with photon subtraction , 2017, 1711.05978.