Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Improvement of self-referenced continuous-variable quantum key distribution with quantum photon catalysis

Open Access Open Access

Abstract

Quantum photon-catalysis operations can be utilized for improving the performance of continuous-variable quantum key distribution (CVQKD) systems. Motivated by characteristics of quantum photon-catalysis operations that can be implemented by the existing technologies, we consider the performance improvement of self-referenced (SR) CVQKD involving zero-photon catalysis operation. We find that the zero-photon catalysis can be regarded as a noiseless attenuation, and the numerical simulations show that the zero-photon catalysis (ZPC)-based SR-CVQKD scheme outperforms the original SR-CVQKD scheme. In addition, to highlight the advantage of applying zero-photon catalysis operation into SR-CVQKD systems, we make a comparison about the performances between the ZPC-based SR-CVQKD scheme and the previous single-photon subtraction (SPS)-based SR-CVQKD scheme. Numerical simulations show that the ZPC-based SR-CVQKD is superior to the single-photon subtraction case with respect to the transmission distance and the tolerable excess noise. Especially, the ZPC-based SR-CVQKD allows the lower quantum detection efficiency and the higher electronic noise to achieve the same performance. These results show that the proposed protocol is expected to provide theoretical reference for the practical application of SR-CVQKD in metropolitan areas.

© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

Quantum key distribution (QKD) [1–4] provides a secure approach for two distant legal users, Alice and Bob, to share a common secret key over an untrusted channel since its unconditional security has been guaranteed by the fundamental laws of quantum mechanics [5–8]. Continuous-variable (CV) QKD protocol [9], as a promising alternative, encodes information on the quadratures of the optical field and then decodes the secret information by the better efficiency of coherent detection so that this protocol promises higher key rates than its discrete-variable (DV) QKD counterpart [10–15]. Moreover, other advantages of CVQKD including the low experimental cost and the compatibility with current optical fiber communication have reflected its potential application in commerce, especially for the Gaussian modulated coherent state (GMCS) CVQKD protocol initially proposed theoretically in [16] and experimentally in [17].

In the traditional implementations of GMCS-CVQKD protocol [18–20], the quantum signal is co-transmitted with a bright local oscillator (LO) pulse from Alice to Bob through the quantum channel. However, there exist some security holes of this transmitted LO (TLO) design when implementing in practice. For instance, to realize the long distance and the high speed communication, a stronger LO is usually required at the sender’s side, but unfortunately brings about the inefficiency of QKD and the certain security loopholes, such as the LO fluctuation attack [21] and the calibration attack [22]. In order to overcome these problems, a novel self-referenced (SR) CVQKD protocol [23–29] is the most remarkable in which the extra generation of the local LO is placed at receiver’s side for coherent detections. In SR-CVQKD, Alice consecutively sends two optical pulses used as the quantum signal pulse and the phase reference pulse, respectively, and meanwhile at reception, Bob uses the locally generated LO for coherent detections to estimate the relative phase by employing the phase reference. Note that the maximal transmission distance for the traditional SR-CVQKD is associated with the amplitude of the reference pulse. However, in practice, the amplitude of the reference pulse is unable to take infinity, so it is crucial that how to expand the maximal transmission distance especially when the reference pulse is weak.

Fortunately, due to the fact that the entanglement of Gaussian entangled states can be improved by exploiting non-Gaussian operations, it is a viable scheme for improving the performance of CVQKD by means of these operations [11, 12, 30–33]. Recently, the photon subtraction, as the one of non-Gaussian operations, has been employed extensively for lengthening the maximal transmission distance of one-way CVQKD [11, 12, 30, 31], two-way CVQKD [32] and even measurement device-independent(MDI) CVQKD [33]. In particular, when the so-called virtual photon subtraction was first presented in [12], such an operation not only can be used to simulate the ideal photon subtraction, but also can be implemented via non-Gaussian post-selection, which is applied to extend the maximal transmission distance of SR-CVQKD [23]. Despite the above merits, the success probability of implementing this photon-subtraction operation is usually no more than 0.25 for the variance of the Einstein-Podolsky-Rosen (EPR) state V=20, which may give birth to the lost of the information between Alice and Bob in the process of extracting the secret key [15]. Attractively, the quantum photon catalysis [34–37], as the other non-Gaussian operation, has been used for the CVQKD system so far, performing better than the single photon subtraction case in terms of the transmission distance and the tolerable excess noise without taking detector efficiency into account [15]. In particular, the zero-photon catalysis operation has the best performance. However, from a practical standpoint, the preparation of EPR state is relatively difficult, which makes it impractical to improve the performance of CVQKD system in the case of bilateral catalysis. On the other hand, during the process of multiphoton catalysis, the preparation of multiphoton sources and the use of multiphoton detections are required, thereby resulting in incompatibility with the telecommunication technique. Therefore, inspired by the above analysis, we suggest a SR-CVQKD scheme with the zero-photon catalysis operation involved an on-off type detector.

In this paper, we focus on the performance improvement of the SR-CVQKD system with the zero-photon catalysis. This paper is structured as follows. In Sec.II, we suggest the conventional SR-CVQKD from the perspectives of the prepare-and-measure (PM) scheme and the entanglement-based (EB) scheme, and then propose the model of zero-photon catalysis (ZPC)-based SR-CVQKD in a realistic detection scenario. The secret key rate of the ZPC-based SR-CVQKD and the performance analysis are provided in Sec. III. Finally, we draw conclusions in Sec. IV.

2. The ZPC-based SR-CVQKD System

In this section, we propose the model design of the SR-CVQKD system involving the zero-photon catalysis operation. From a practical point of view, the PM scheme of SR-CVQKD systems is advantageous to be realized, and its security analysis can be formulated by the equivalent EB scheme. Therefore, we first review the PM and EB scheme of SR-CVQKD, and then detail the SR-CVQKD system with zero-photon catalysis.

 figure: Fig. 1

Fig. 1 Schematic diagram of the SR-CVQKD system where Alice successively sends weak quantum signal (green pulse) and bright reference (orange pulse) pulses to Bob over an optical channel characterized by channel transmittance T and excess noise ε. At reception, each received pulse is performed by coherent detection in Bob’s own phase reference frame using the LO pulses (blue pulse). GM: Gaussian modulation; T: channel transmittance; ε: excess noise.

Download Full Size | PDF

2.1. PM and EB description of SR-CVQKD

For the conventional PM scheme of the SR-CVQKD system, as shown in Fig. 1, Alice sends a coherent state |qA+ipA acting as the quantum signal pulse with two random numbers qA and pA from the Gaussian distribution of variance VA to Bob. In the next time bin, she sends another coherent state |qAR+ipAR as the reference pulse whose fixed amplitudeVR=qAR2+pAR2 is several times greater than VA but much weaker than the amplitude of the traditional LO. Note that in oder to carry information on Alice’s reference frame, the mean quadrature values of the reference pulse are publicly known. On the receiver side, Bob performs consecutively coherent detections of quantum signal and reference pulses in his own reference frame where a second laser to generate local LO pulses is placed at Bob station so as to estimate the relative phase θ^E. After undergoing the phase correlation on Alice and Bob’s data, a string of secret key finally can be extracted.

However, in the SR-CVQKD system, a critical problem about the estimation of the relative phase θ^E need to be solved, which has an effect on the reference frame alignment. Fortunately, following the approach in [24, 25], Bob performs a homodyne detection on the incoming quantum signal pulse and then takes a heterodyne detection on the incoming reference pulses (including the reference pulse by Alice and the LO by Bob). Thus Bob in his own reference frame can obtain one of the mean quadrature values (qB or pB) of the signal pulse and both of mean quadrature values (qBR and qBR) of the reference pulse. Moreover, at Alice and Bob’s station, we assume that the two lasers have a stable line width so that the θE in each round maintains a specific constant. Under these conditions, the correlation between (qAR, pAR) and (qBR, pBR) can be established to estimate the relative phase θ^E via

(qBRpBR)=Tect(cos θ^Esin θ^Esin θ^Ecos θ^E)(qARpAR),
where Tect denotes the effective channel transmittance. In addition, without loss of generality, we assume that Alice’s pAR quadrature of the reference pulse is set to zero. Therefore, according to Eq. (1), it is straightforward to derive the relative phase θ^E, i.e.,
θ^E=arctan pBRqBR.

It is evident that the second laser to generate local LO pulses placed at Bob station is just to estimate the relative phase θ^E, which is fully trusted. Unfortunately, in practice, the amplitude of the reference pulse is relatively weaker when compared to the typical LO, so we have to take its quantum uncertainty into account. Thus, the relative phase θ^E should be modified as θ^E=θE+ ϕerr with the actual relative phase θE and the estimation error ϕerr. Note that ϕerr is a crucial factor in determining the secret key rate of SR-CVQKD, which satisfies a random probability distribution P(ϕerr). That is because after Bob performs the phase correlation, the remaining phase noise Vest reads

Vest=Verr+Vch+Vdri,
where Verr, Vch and Vdri represent the variance of the phase reference’s estimation error, the variance of the channel and the variance of the relative phase drift, respectively. Thus, the phase noise ξphase can be given by ξphase=2VA(1eVest/2).

The PM scheme is often implemented in practice systems, while the EB scheme is beneficial to facilitate security analysis, so we have to introduce an equivalent EB version in SR-CVQKD protocol where Alice prepares an EPR source with a modulation variance V=VA+1 and retains mode A to heterodyne detection while sending the other mode B to Bob through the quantum channel characterized by the quantum channel transmittance T and the excess noise ε. Thus, the covariance matrix ΓAB shared between Alice and Bob before executing any detection can be given by

ΓAB=(VIITμ(V21)φ¯Tμ(V21)φ¯Tμ(V+χ)II),
with
φ¯=(cos ϕerr¯sin ϕerr¯sin ϕerr¯cos ϕerr¯),
where
cos ϕerr¯=ππdϕerrP(ϕerr)cos ϕerr,sin ϕerr¯=ππdϕerrP(ϕerr)sin ϕerr,

If the probability distribution P(ϕerr) is symmetric around ϕerr=0, the parameter φ¯ can be rewritten as φ¯= cos ϕerr¯ σz with σz= diag(1,1) [24]. Consequently, we find that in this sense, the contribution of the reference frame alignment is to rescale the off-diagonal elements of the covariance matrix between Alice and Bob.

2.2. Photon catalysis in SR-CVQKD

To remove the relative phase drift noise of the SR-CVQKD scheme, a method of a balanced delay line interferometer was proposed in [28]. Motivated by this delay line, we propose a SR-CVQKD scheme involving the zero-photon catalysis operation, as shown in Fig. 2. Note that the vacuum state |0c itself on auxiliary mode C remains unaffected but facilitates the transformation of the target ensemble during the zero-photon catalysis (the purple box), so that such operation could effectively prevent the loss of information between Alice and Bob in the process of extracting the secret key. From the perspective of PM version, the ZPC-based SR-CVQKD protocol in Fig. 2(a) is described as follows:

  • Step 1: Alice generates two coherent states at the repetition rate f/2 consecutively. For each generated coherent state |Z, Alice splits into a weak quantum signal pulse |ZS and a strong reference pulse |ZR by using a balanced delay line interferometer. Note that only the weak quantum signal pulse |ZS is modulated by Gaussian modulation and photon catalysis, transmiting over an optical path of length LA, while the strong reference pulse |ZR is delayed by a time 1/f on an optical path of length LA+δLA.
  • Step 2: At reception, Bob successively generates two coherent states at the same repetition rate f/2 by the second laser. Likewise, by using the same delay line, Bob obtains some coherent LO pulses (|γS and |ZR) where the signal pulse |γS propagates through an optical path of length LB, and the reference pulse |γR is delayed by the same time 1/f on an optical path of length LB+δLB.
  • Step 3: Bob uses the incoming reference pulse pairs (|ZR and |γR) to measure the received signal pulses (|ZS and |γS) under his own reference frame by performing coherent detection. More specifically, Bob performs a homodyne detection for the received signal pulse and a heterodyne detection for the reference pulse. According to the measured results, Bob can thus infer an estimation of Alice’s relative phase. Finally, a phase correlation is digitally performed to distill a string of secret key.
 figure: Fig. 2

Fig. 2 The schematic view of SR-CVQKD protocol with zero-photon catalysis (the purple box) at the sender. (a) Prepare-and-measure scheme of zero-photon catalysis (ZPC) SR-CVQKD. (b). Entanglement-based (EB) scheme of ZPC-based SR-CVQKD. BS: beam splitter; T, ε: channel parameters; Π^off: projection operator |00|.

Download Full Size | PDF

As shown in Fig. 2(b), it shows the EB scheme of the ZPC-based SR-CVQKD system where Alice generates an EPR state involving two modes A and B with the modulation variance V, which can be expressed as

|EPRAB=1λ2exp {λab}|0,0AB,
with a(b) representing a addition photon operator in mode A(B), and λ=(V1)/(V+1). In order to be compatible with the existing experimental techniques, during the process of zero-photon catalysis we introduce an on-off type detector illustrated as the projection operator valued measurement (POVM), which is given by
Π^off=|0c0|,Π^on=1^|0c0|.

Note that if the photon number outcome n in mode c is equal to zero (no click), then we identify that the zero-photon catalysis operation is under way. Otherwise, it is considered as the n-photon subtraction (n>0). Thus the equivalent zero-photon catalysis O^0 can be expressed as

O^0=Tr[B(η)|0c0|]=:exp [(η1)bb]:=(η)bb,
where :: is a normal ordering prescription, B(η)=:exp {(η1)(bb+cc)+(bccb)R}: is a beam splitter operator with a transmittance η=1R [15, 37]. Interestingly, it is clearly seen from Eq. (9) that the zero-photon catalysis process can be taken as a noiseless attenuation since O^0|α|ηα where |α is the coherent state in PM scheme of SR-CVQKD.

As mentioned in [15, 34], the effect of quantum catalysis is to facilitate the conversion between modes B and B1, and hence it results in the state

|ΨAB1=O^0Pd|EPRAB=1λ2Pdexp {ληab}|0,0AB,
where Pd is the normalized coefficient that represents the success probability for implementing the zero-photon catalysis, and can be derived as
Pd=21+η+RV,

In Eq. (10), interestingly, the derived state |ΨAB1 is still a kind of Gaussian state with a new squeezing parameter λ˜=λη [36, 37]. Thus, the covariance matrix ΓAB1 of the state |ΨAB1 can be calculated as

ΓAB1=(X1IIZ1φ¯Z1φ¯Y1II),
where
X1=Y1=2(1+V)1+η+RV1,Z1=2η(V21)1+η+RV,φ¯=cos ϕerr¯σz.

After passing the channel characterized by quantum channel transmittance T and excess noise ε, similar to Eq. (4), the covariance matrix ΓAB2 can be calculated as

ΓAB2=(X1IITectZ1φ¯TectZ1φ¯Tect(Y1+χ)II),
where the condition of symmetric probability distribution P(ϕerr) is given by sin ϕerr =0, the effective channel transmittance is Tect=Tμ, and the channel noise χ is
χ=1Tect+ϵelTect+ε,
with the detector electronic noise ϵel.

3. Performance analysis of the ZPC-based SR-CVQKD system

So far we have derived the parameter characteristics of the SR-CVQKD system involving the zero-photon catalysis operation. In what follows, we demonstrate the effect of the zero-photon catalysis on the SR-CVQKD system in terms of the secret key rate and the maximal transmission distance.

3.1. Asymptotic secret key rate

Now, we consider the secret key rate of our scheme for reverse reconciliation under Gaussian collective attack, where both Alice and Bob perform heterodyne detection and coherent detection (homodyne detection for the received signal pulse and heterodyne detection for the reference pulse), respectively. Fortunately, through the zero-photon catalysis, the yielded state |ΨAB1 can still be regarded as a Gaussian state so that we can directly calculate the secret key rate by using the results of the conventional Gaussian CVQKD protocol. According to the optimality of Gaussian attack [38–40], the asymptotic secret key rate K for reverse reconciliation can be obtained by

K=Pd{βI(A:B)I(B:E)},
where Pd has been derived in Eq. (11), I(A:B) is the Shannon mutual information between Alice and Bob, and I(B:E) is the Holevo bound for Eve’s maximal accessible information. Supposing that {QA,PA} (QB or PB) denotes heterodyne-detection (homodyne detection) results of mode A (B2), I(A:B) can thus be derived as
I(A:B)=12log2VA 'VA|B ',
with VA '=(X1+1)/2, VB '=Tect(X1+χ) and VA|B '=VA 'Tect(Z1cos ϕerr¯)2/2VB '. Moreover, according to Eq. (3), the remaining phase noise Vest for the ZPC-based SR-CVQKD with delay line can be written as [18–20]
Vest=Verr=χ+1VR+1TμVR.

If the probability distribution P(ϕerr) is tight, we can then obtain the relation as follows

cos ϕerr¯2=1Verr,
and thus the analytical expression of the mutual information I(A:B) can be achieved from Eq. (17). In addition, to solve the Holevo bound, assuming that Eve can purify the whole system, we obtain
I(B:E)=S(E)S(E|B)=S(AB)S(A|B)=i2G[(λi1)/2]G[(λ31)/2],
where G[x]=(x+1)log2(x+1)xlog2x, and the symplectic eigenvalues λi(i=1,2,3) are derived as
λ1,22=Δ±Δ24D22,λ32=X12X1Z12(1Verr)X1+χ,
with Δ=X12+Tect2(Y1+χ)22TectZ12(1Verr) and D=X1Tect(Y1+χ)TectZ12(1Verr).

 figure: Fig. 3

Fig. 3 The maximal secret key rate at each transmission distance with several different parameters ϵel ∈ {0.01, 0.001} and VR ∈ {20VA, 50VA } for the optimal choice of η. The black thin line represents the original protocol. The magenta thick line represents the single-photon subtraction. The blue dashed line represents the zero-photon catalysis.

Download Full Size | PDF

 figure: Fig. 4

Fig. 4 The optimal η for the maximal secret key at each transmission distance with several different parameters ϵel ∈ {0.01, 0.001} and VR ∈ {20VA, 50VA}. The blue dashed line represents the zero-photon catalysis.

Download Full Size | PDF

3.2. Performance analysis

Before demonstrating performance improvement of the ZPC-based SR-CVQKD system, we set the simulation parameters as VA=40,β=0.95,ε=0.01 in shot noise units (SNU) for μ=0.719. Moreover, it is worth noting that the excess noise contributed by the reference pulses (VR can be set as some realistic values of 20VA and 50VA) can be neglected when Alice’s amplitude modulator is set to be 60 dB, as expected [28]. As shown in Fig. 3, it shows the maximal secret key rate of the ZPC-based SR-CVQKD system for all possible η with parameter ϵel {0.001,0.01}. In Fig. 4 it shows characteristics of the optimal η, which may have effect on the maximal secret key rate in Fig. 3. The black solid line represents the original protocol, which is outperformed by the proposed protocol with zero-photon catalysis operation at long transmission distance range. We find that the zero-photon catalysis operation has advantageous in dramatically enhancing the secret key rate and lengthening the maximal transmission distance. However, at the short-distance range, we find that, for VR=50VA, the secret key rate of the ZPC-based SR-CVQKD system is the same as that of the original protocol since its transmittance η = 1 means that there is no quantum catalysis effect (see Fig. 4(b)). Interestingly, although the performance of the proposed protocol for VR=20VA is better than that of the original protocol at long-distance range, it seems to be worse than that of the protocol for VR=50VA. This indicates that the maximal transmission distance is proportional to the amplitude of the reference pulse [24].

 figure: Fig. 5

Fig. 5 The maximal tolerable excess noise as a function of transmission distance with several different parameters ϵel ∈{0.01,0.001} and VR ∈ {20VA, 50VA}, when optimized over η of Alice’s beam splitter. The black thin line represents the original protocol. The magenta thick line represents the single-photon subtraction. The blue dashed line represents the zero-photon catalysis.

Download Full Size | PDF

In addition, the tolerable excess noise is another important factor for evaluating the performance of the ZPC-based SR-CVQKD system. In Fig. 5, it shows the maximal tolerable excess noise as a function of the transmission distance when optimizing over η. The performance of the proposed protocol is better than that of the original protocol, which means that the advantages of zero-photon catalysis can improve the maximal tolerable excess noise even for remote users. For instance, when ε0.001, the proposed protocol can expand the maximal transmission distance to more than 30 km. To our knowledge, for all the photon-subtraction-based SR-CVQKD schemes in Ref. [23], the single-photon subtraction (SPS)-based SR-CVQKD presents the best performance. Consequently, in order to make comparisons about the performances between the SPS-based SR-CVQKD and the ZPC-based SR-CVQKD, the magenta solid line represents the single-photon subtraction case with respect to the the maximal transmission distance and the maximal tolerable excess noise, as shown in Figs. 3 and 5. It is found that the proposed ZPC-based SR-CVQKD system outperforms the SPS-based SR-CVQKD in terms of the maximal transmission distance and the maximal tolerable excess noise. In particular, at the short-distance range, the performance of the SPS-based SR-CVQKD is exceeded by that of the ZPC-based SR-CVQKD system. The reason is that the zero-photon catalysis has an advantage of the success probability over the single-photon subtraction case (see Fig. 6). These results show that the zero-photon catalysis can be used to improve the performance of SR-CVQKD system.

 figure: Fig. 6

Fig. 6 The success probability Pd of implementation of zero-photon catalysis as a function of η. As a comparison, the magenta solid line represents the single-photon subtraction case.

Download Full Size | PDF

 figure: Fig. 7

Fig. 7 When VR = 20VA and ϵel = 0.001, the transmission distance as a function of the estimated parameter η. The color region denotes the secret key rate. The red solid line denotes the optimal value of η corresponding to KOpt. The orange (black) dashed line denotes the upper (lower) of η, if the secret key rate maintains more than 90%KOpt. KOpt: the optimal secret key rate.

Download Full Size | PDF

 figure: Fig. 8

Fig. 8 Performance comparison of SR-CVQKD with the zero-photon catalysis and the single-photon subtraction for different quantum detection efficiency μ and electronic noise ϵel of the coherent detections, when given when given VR = 20VA and transmission distance 20 km.

Download Full Size | PDF

In practice, the parameter η brought by quantum catalysis have an impact on the performance of ZPC-based SR-CVQKD. The reason is that the accurate estimation of η to maintain a relatively high performance usually requires some complicated implementations if the secret key rate changes significantly with η around its optimal value. Fortunately, the secret key rate slowly changes with η at each distance around its optimal value KOpt (red solid line), as depicted in Fig. 7. We find that the secret key rate can maintain higher than 90% of its optimal value (KOpt) when the estimated η locates in the region between the black dashed line and the orange dashed line. On the other hand, As shown in Figs. 3 and 5, the imperfection of coherent detections is also an important factor that can interfere with the performance of ZPC-based SR-CVQKD system. Fig. 8 shows the performance comparison of SR-CVQKD with the zero-photon catalysis and the single-photon subtraction for different quantum detection efficiency μ and electronic noise ϵel of the coherent detections, when given VR=20VA and transmission distance 20 km. We can find that the performance of the ZPC-based SR-CVQKD always is better than that of the SPS-based SR-CVQKD when μ and ϵel take a finite value. In other words, the SR-CVQKD system with the zero-photon catalysis requires lower quantum detection efficiency μ and higher electronic noise ϵel than the SPS-based SR-CVQKD under the case of achieving the same performance.

4. Conclusions

We have suggested a method to improve the performance of the SR-CVQKD system by using the zero-photon catalysis, which can be taken as a noiseless attenuation. Moreover, we derive the asymptotic secret key rate of the ZPC-based SR-CVQKD system for reverse reconciliation against the collective attack, according to the optimality of Gaussian attack. The numerical simulations show that comparing with the original protocol, the ZPC-based SR-CVQKD system has an advantage of lengthening the maximal transmission distance with the increased secret key rate. Attractively, in order to further highlight the advantage of applying the zero-photon catalysis in the SR-CVQKD systems, we make a comparison of the SR-CVQKD schemes involving zero-photon catalysis and single-photon subtraction, and find that the performance of the ZPC-based SR-CVQKD system is superior to that of the single-photon subtraction case in terms of the transmission distance and the tolerable excess noise. In particular, the ZPC-based SR-CVQKD system allows the lower quantum detection efficiency and the higher electronic noise to achieve the same performance.

Funding

National Natural Science Foundation of China (61572529, 61821407, 11664017); Outstanding Young Talent Program of Jianxi Province (20171BCB23034).

Acknowledgments

LiYun Hu is supported by the Outstanding Young Talent Program of Jianxi Province (20171BCB23034).

Disclosures

The authors declare that there are no conflicts of interest related to this article.

References

1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers Systems, and Signal Processing, Bangalore, India, (1984), pp. 175–179.

2. N. Gisin, G. G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145–195 (2002). [CrossRef]  

3. S. L. Braunstein and P. van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77, 513–577 (2005). [CrossRef]  

4. E. Diamanti and A. Leverrier, “Distributing secret keys with quantum continuous variables: Principle, security and implementations,” Entropy 17, 6072–6092 (2015). [CrossRef]  

5. H.-K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nat. Photon. 8, 595 (2014). [CrossRef]  

6. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dusek, N. Lutkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81, 1301–1350 (2009). [CrossRef]  

7. J. Y. Bang and M. S. Berger, “Quantum mechanics and the generalized uncertainty principle,” Phys. Rev. D 74, 125012 (2006). [CrossRef]  

8. W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299, 802–803 (1982). [CrossRef]  

9. T. C. Ralph, “Continuous variable quantum cryptography,” Phys. Rev. A 61, 010303 (1999). [CrossRef]  

10. P. Huang, J. Z. Huang, T. Wang, H. S. Li, D. Huang, and G. H. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A 95, 052302 (2017). [CrossRef]  

11. Y. Guo, Q. Liao, Y. J. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017). [CrossRef]  

12. Z. Y. Li, Y. C. Zhang, X. Y. Wang, B. J. Xu, X. Peng, and H. Guo, “Non-gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution,” Phys. Rev. A 93, 012310 (2016). [CrossRef]  

13. Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382, 372–381 (2018). [CrossRef]  

14. Q. Liao, Y. J. Wang, D. Huang, and Y. Guo, “Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution,” Opt. Express 26, 19907–19920 (2018). [CrossRef]   [PubMed]  

15. Y. Guo, W. Ye, H. Zhong, and Q. Liao, “Continuous-variable quantum key distribution with non-Gaussian quantum catalysis,” arXiv e-prints arXiv:1811.06698 (2018).

16. F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88, 057902 (2002). [CrossRef]   [PubMed]  

17. F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003). [CrossRef]   [PubMed]  

18. D. Huang, D. K. Lin, C. Wang, W. Q. Liu, S. H. Fang, J. Y. Peng, P. Huang, and G. H. Zeng, “Continuous-variable quantum key distribution with 1 mbps secure key rate,” Opt. Express 23, 17511–17519 (2015). [CrossRef]   [PubMed]  

19. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photon. 7, 378–381 (2013). [CrossRef]  

20. B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007). [CrossRef]  

21. X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013). [CrossRef]  

22. P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013). [CrossRef]  

23. H. Zhong, Y. J. Wang, X. D. Wang, Q. Liao, X. D. Wu, and Y. Guo, “Enhancing of self-referenced continuous-variable quantum key distribution with virtual photon subtraction,” Entropy 20, 578 (2018). [CrossRef]  

24. D. B. S. Soh, C. Brif, P. J. Coles, N. Lutkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5, 041010 (2015).

25. B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5, 041009 (2015).

26. M. Koashi, “Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse,” Phys. Rev. Lett. 93, 120501 (2004). [CrossRef]   [PubMed]  

27. T. Wang, P. Huang, Y. M. Zhou, W. Q. Liu, H. X. Ma, S. Y. Wang, and G. H. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26, 2794–2806 (2018). [CrossRef]   [PubMed]  

28. A. Marie and R. Alleaume, “Self-coherent phase reference sharing for continuous-variable quantum key distribution,” Phys. Rev. A 95, 012316 (2017). [CrossRef]  

29. M. Li and M. Cvijetic, “Continuous-variable quantum key distribution with self-reference detection and discrete modulation,” IEEE J. Quantum Electron. 54, 1–8 (2018).

30. Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-gaussian state-discrimination detection,” New J. Phys. 20, 023015 (2018). [CrossRef]  

31. P. Huang, G. Q. He, J. Fang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution via photon subtraction,” Phys. Rev. A 87, 012317 (2013). [CrossRef]  

32. Y. J. Zhao, Y. C. Zhang, Z. Y. Li, S. Yu, and H. Guo, “Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction,” Quantum Inf. Process 16, 184 (2017). [CrossRef]  

33. H. X. Ma, P. Huang, D. Y. Bai, S. Y. Wang, W. S. Bao, and G. H. Zeng, “Continuous-variable measurement-device-independent quantum key distribution with photon subtraction,” Phys. Rev. A 97, 042329 (2018). [CrossRef]  

34. A. I. Lvovsky and J. Mlynek, “Quantum-optical catalysis: Generating nonclassical states of light by means of linear optics,” Phys. Rev. Lett. 88, 250401 (2002). [CrossRef]   [PubMed]  

35. L. Y. Hu, J. N. Wu, Z. Y. Liao, and M. S. Zubairy, “Multiphoton catalysis with coherent state input: nonclassicality and decoherence,” J. Phys. B: At. Mol. Opt. Phys. 49, 175504 (2016). [CrossRef]  

36. W. D. Zhou, W. Ye, C. J. Liu, L. Y. Hui, and S. Q. Liu, “Entanglement improvement of entangled coherent state via multiphoton catalysis,” Laser Phys. Lett. 15, 065203 (2018). [CrossRef]  

37. L. Y. Hu, Z. Y. Liao, and M. S. Zubairy, “Continuous-variable entanglement via multiphoton catalysis,” Phys. Rev. A 95, 012310 (2017). [CrossRef]  

38. M. Navascues, F. Grosshans, and A. Acin, “Optimality of gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006). [CrossRef]   [PubMed]  

39. R. Garcia-Patron and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006). [CrossRef]   [PubMed]  

40. M. M. Wolf, G. Giedke, and J. I. Cirac, “Extremality of gaussian quantum states,” Phys. Rev. Lett. 96, 080502 (2006). [CrossRef]   [PubMed]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (8)

Fig. 1
Fig. 1 Schematic diagram of the SR-CVQKD system where Alice successively sends weak quantum signal (green pulse) and bright reference (orange pulse) pulses to Bob over an optical channel characterized by channel transmittance T and excess noise ε. At reception, each received pulse is performed by coherent detection in Bob’s own phase reference frame using the LO pulses (blue pulse). GM: Gaussian modulation; T: channel transmittance; ε: excess noise.
Fig. 2
Fig. 2 The schematic view of SR-CVQKD protocol with zero-photon catalysis (the purple box) at the sender. (a) Prepare-and-measure scheme of zero-photon catalysis (ZPC) SR-CVQKD. (b). Entanglement-based (EB) scheme of ZPC-based SR-CVQKD. BS: beam splitter; T, ε: channel parameters; Π ^ o f f: projection operator | 0 0 |.
Fig. 3
Fig. 3 The maximal secret key rate at each transmission distance with several different parameters ϵel ∈ {0.01, 0.001} and VR ∈ {20VA, 50VA } for the optimal choice of η. The black thin line represents the original protocol. The magenta thick line represents the single-photon subtraction. The blue dashed line represents the zero-photon catalysis.
Fig. 4
Fig. 4 The optimal η for the maximal secret key at each transmission distance with several different parameters ϵel ∈ {0.01, 0.001} and VR ∈ {20VA, 50VA}. The blue dashed line represents the zero-photon catalysis.
Fig. 5
Fig. 5 The maximal tolerable excess noise as a function of transmission distance with several different parameters ϵel ∈{0.01,0.001} and VR ∈ {20VA, 50VA}, when optimized over η of Alice’s beam splitter. The black thin line represents the original protocol. The magenta thick line represents the single-photon subtraction. The blue dashed line represents the zero-photon catalysis.
Fig. 6
Fig. 6 The success probability Pd of implementation of zero-photon catalysis as a function of η. As a comparison, the magenta solid line represents the single-photon subtraction case.
Fig. 7
Fig. 7 When VR = 20VA and ϵel = 0.001, the transmission distance as a function of the estimated parameter η. The color region denotes the secret key rate. The red solid line denotes the optimal value of η corresponding to KOpt. The orange (black) dashed line denotes the upper (lower) of η, if the secret key rate maintains more than 90%KOpt. KOpt: the optimal secret key rate.
Fig. 8
Fig. 8 Performance comparison of SR-CVQKD with the zero-photon catalysis and the single-photon subtraction for different quantum detection efficiency μ and electronic noise ϵel of the coherent detections, when given when given VR = 20VA and transmission distance 20 km.

Equations (21)

Equations on this page are rendered with MathJax. Learn more.

( q B R p B R ) = T e c t ( cos  θ ^ E sin  θ ^ E sin  θ ^ E cos  θ ^ E ) ( q A R p A R ) ,
θ ^ E = arctan  p B R q B R .
V e s t = V e r r + V c h + V d r i ,
Γ A B = ( V I I T μ ( V 2 1 ) φ ¯ T μ ( V 2 1 ) φ ¯ T μ ( V + χ ) I I ) ,
φ ¯ = ( cos  ϕ e r r ¯ sin  ϕ e r r ¯ sin  ϕ e r r ¯ cos  ϕ e r r ¯ ) ,
cos  ϕ e r r ¯ = π π d ϕ e r r P ( ϕ e r r ) cos  ϕ e r r , sin   ϕ e r r ¯ = π π d ϕ e r r P ( ϕ e r r ) sin   ϕ e r r ,
| E P R A B = 1 λ 2 exp  { λ a b } | 0 , 0 A B ,
Π ^ o f f = | 0 c 0 | , Π ^ o n = 1 ^ | 0 c 0 | .
O ^ 0 = Tr [ B ( η ) | 0 c 0 | ] = : exp   [ ( η 1 ) b b ] : = ( η ) b b ,
| Ψ A B 1 = O ^ 0 P d | E P R A B = 1 λ 2 P d exp   { λ η a b } | 0 , 0 A B ,
P d = 2 1 + η + R V ,
Γ A B 1 = ( X 1 I I Z 1 φ ¯ Z 1 φ ¯ Y 1 I I ) ,
X 1 = Y 1 = 2 ( 1 + V ) 1 + η + R V 1 , Z 1 = 2 η ( V 2 1 ) 1 + η + R V , φ ¯ = cos   ϕ e r r ¯ σ z .
Γ A B 2 = ( X 1 I I T e c t Z 1 φ ¯ T e c t Z 1 φ ¯ T e c t ( Y 1 + χ ) I I ) ,
χ = 1 T e c t + ϵ e l T e c t + ε ,
K = P d { β I ( A : B ) I ( B : E ) } ,
I ( A : B ) = 1 2 log 2 V A   ' V A | B   ' ,
V e s t = V e r r = χ + 1 V R + 1 T μ V R .
cos  ϕ e r r ¯ 2 = 1 V e r r ,
I ( B : E ) = S ( E ) S ( E | B ) = S ( A B ) S ( A | B ) = i 2 G [ ( λ i 1 ) / 2 ] G [ ( λ 3 1 ) / 2 ] ,
λ 1 , 2 2 = Δ ± Δ 2 4 D 2 2 , λ 3 2 = X 1 2 X 1 Z 1 2 ( 1 V e r r ) X 1 + χ ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.