Continuous-variable source-device-independent quantum key distribution against general attacks

The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths.

[1]  Ziyang Chen,et al.  Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks , 2018, Physical Review A.

[2]  L. Banchi,et al.  Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.

[3]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[4]  Eleni Diamanti,et al.  Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations , 2015, Entropy.

[5]  Hong Guo,et al.  Composable Security Analysis for Continuous Variable Measurement-Device-Independent Quantum Key Distribution , 2017 .

[6]  Marco Tomamichel,et al.  Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.

[7]  Jiri Janousek,et al.  Violation of Bell's Inequality Using Continuous Variable Measurements. , 2018, Physical review letters.

[8]  Stefano Pirandola,et al.  General immunity and superadditivity of two-way Gaussian quantum cryptography , 2016, Scientific Reports.

[9]  I. G. Priest The Optical Society of America , 1962, Nature.

[10]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[11]  Hong Guo,et al.  User-defined quantum key distribution , 2018, 1805.04249.

[12]  J. Cirac,et al.  Extremality of Gaussian quantum states. , 2005, Physical review letters.

[13]  Christian Weedbrook,et al.  Continuous-variable quantum key distribution with entanglement in the middle , 2012, 1205.1497.

[14]  P. Grangier,et al.  Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation , 2011, Physical Review A.

[15]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2013, 2014 Conference on Lasers and Electro-Optics (CLEO) - Laser Science to Photonic Applications.

[16]  Stefano Mancini,et al.  Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation , 2015 .

[17]  S. Braunstein,et al.  CV-MDI-QKD: One-mode Gaussian attacks are not enough , 2015, 1509.04144.

[18]  Wanyi Gu,et al.  Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.

[19]  Vadim Makarov,et al.  Implementation vulnerabilities in general quantum cryptography , 2018, New Journal of Physics.

[20]  Raúl García-Patrón,et al.  Continuous-variable quantum key distribution protocols over noisy channels. , 2008, Physical review letters.

[21]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[22]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[23]  Anthony Leverrier,et al.  Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. , 2008, Physical review letters.

[24]  Wee Ser,et al.  An integrated silicon photonic chip platform for continuous-variable quantum key distribution , 2019, Nature Photonics.

[25]  Christoph Pacher,et al.  Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks , 2014, Nature Communications.

[26]  Anthony Leverrier,et al.  Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.

[27]  Wanyi Gu,et al.  Improvement of two-way continuous-variable quantum key distribution using optical amplifiers , 2014 .

[28]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[29]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[30]  A. Holevo Bounds for the quantity of information transmitted by a quantum communication channel , 1973 .

[31]  Samuel L. Braunstein,et al.  Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration , 2015, 1506.05430.

[32]  F. Furrer,et al.  Position-momentum uncertainty relations in the presence of quantum memory , 2013, 1308.4527.

[33]  Fabian Furrer,et al.  Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle , 2014, 1405.5965.

[34]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[35]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[36]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[37]  R. Renner,et al.  Min- and Max-Entropy in Infinite Dimensions , 2010, 1004.1386.

[38]  Stefano Pirandola,et al.  Entanglement reactivation in separable environments , 2012, 1210.2119.

[39]  Ericka Stricklin-Parker,et al.  Ann , 2005 .

[40]  Hong Guo,et al.  Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution , 2019, Entropy.

[41]  S. Pirandola,et al.  Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks , 2017, Physical Review A.

[42]  Christian Weedbrook,et al.  Quantum cryptography without switching. , 2004, Physical review letters.

[43]  Hong Guo,et al.  SECURITY OF A NEW TWO-WAY CONTINUOUS-VARIABLE QUANTUM KEY DISTRIBUTION PROTOCOL , 2011, 1110.1818.

[44]  Maxim Kuschnerov,et al.  Toward the Integration of CV Quantum Key Distribution in Deployed Optical Networks , 2018, IEEE Photonics Technology Letters.

[45]  R. F. Werner,et al.  Maximal violation of Bell inequalities by position measurements , 2009, 0912.3740.

[46]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[47]  Nathan Walk,et al.  Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution , 2014, 1405.6593.

[48]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[49]  Reinhard F. Werner,et al.  Gaussian entanglement for quantum key distribution from a single-mode squeezing source , 2011, 1110.3977.

[50]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[51]  Mei Li,et al.  Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.

[52]  R. Serfling Probability Inequalities for the Sum in Sampling without Replacement , 1974 .

[53]  Hong Guo,et al.  Long-distance continuous-variable quantum key distribution over 202.81 km fiber , 2020, 2001.02555.

[54]  Seth Lloyd,et al.  Continuous Variable Quantum Cryptography using Two-Way Quantum Communication , 2006, ArXiv.

[55]  Hong Guo,et al.  Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation , 2017, 1703.02727.

[56]  Naoya Wada,et al.  Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels , 2019, Communications Physics.