Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Paper The following article is Open access

Thermal state quantum key distribution

, , , and

Published 13 October 2021 © 2021 The Author(s). Published by IOP Publishing Ltd
, , Citation A Walton et al 2021 J. Phys. B: At. Mol. Opt. Phys. 54 185501 DOI 10.1088/1361-6455/ac2a6e

0953-4075/54/18/185501

Abstract

We analyse a central broadcast continuous variable quantum key distribution protocol in which a beam produced by a thermal source is used to create a secret key between two parties, Alice and Bob. A beam splitter divides the initial beam into a pair of output beams, which are sent to Alice and Bob, with Eve intercepting Bob's beam. We investigate the protocol in detail, calculating mutual informations through a pair of analytic methods and comparing the results to the outputs of a Monte Carlo simulation of the protocol. In a lossless system, we find that a lower bound on the key rate remains positive in the protocol under a beam splitter attack, provided Bob receives a nonzero proportion of the beam initially sent to him. This suggests that the thermal state protocol could be used experimentally to produce secure keys.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 4.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

1. Introduction

In quantum key distribution (QKD), two parties, Alice and Bob, want to communicate in a secure fashion despite the presence of Eve, who is eavesdropping on their communication channel. They do this through establishing a cryptographic key that is known only to them and no one else [1, 2]. However, Alice cannot simply send Bob a key over their communication channel, as Eve will also learn the key by eavesdropping. Therefore, protocols are needed which can distribute an identical key to Alice and Bob over an insecure channel, without Eve discovering it.

Currently, protocols exist that can accomplish this, though many methods of classical encryption base their security on the fact that certain mathematical operations, such as factorising large semiprime numbers, are very difficult to perform using current technology [3]. However there is no reason to assume that solving these problems within a reasonable timeframe will continue to be difficult in the future as computing power increases and new algorithms are created.

In quantum protocols on the other hand, we make the assumption that Eve has access to arbitrarily large amounts of computing power while still being able to establish secure communication between Alice and Bob. This is done by basing security on restrictions imposed by the laws of quantum mechanics [2], such as the inability to measure a quantum state without affecting the system. This cannot be overcome through any amount of computing power.

Currently, most QKD protocols use coherent light, produced by lasers, as a method of generating secure keys. An example of this is the Gaussian modulated coherent state (GMCS) protocol [46], where the key is encoded in randomly chosen quadratures of a beam described by randomly distributed coherent states. However, recently more analysis has been done concerning the use of thermal states in QKD [79]. These involve splitting a beam emitted by a thermal source at a beam splitter and sending the outputs to Alice and Bob respectively. Previous work concerning thermal states showed that they exhibit Hanbury Brown and Twiss correlations [10] when split at a beam splitter, and quantum discord, a requirement for QKD [11].

One of the main factors limiting thermal methods is that noise and thermalisation of states are seen as detrimental for QKD protocols [12], however work in this area is valuable due to the widespread use of microwaves in wireless modern communication, such as in WiFi and Bluetooth, in which thermal state QKD could be applied. Coherent state QKD is not suitable for these applications as the devices involved do not broadcast such states.

Here, we analyse a central broadcast protocol using a thermal input, with Eve intercepting the beam sent to Bob in order to eavesdrop. Monte Carlo simulations of the protocol are performed to produce sample bit strings, setting up for future experimental work using microwave sources. The paper begins with a brief overview of thermal states in section 2, followed by section 3, which describes the setup that will be simulated, while sections 46 describe the measurements and workings.

2. Thermal states

When written in the Fock basis, with ${\hat{a}}^{{\dagger}}$ denoting the creation operator and $\vert n\rangle =\frac{{\left({\hat{a}}^{{\dagger}}\right)}^{n}}{\sqrt{n!}}\vert 0\rangle $ describing an n-photon state, thermal states are given in the form ${\rho }_{\text{Th}}={\sum }_{n=0}^{\infty }\enspace {p}_{n}\vert n\rangle \langle n\vert $. Here, ${p}_{n}=\frac{\mathrm{exp}\left(-n\beta \hslash \omega \right)}{1-\mathrm{exp}\left(-\beta \hslash \omega \right)}$ describes a thermal distribution where $\beta ={({k}_{\mathrm{B}}T)}^{-1}$ is the thermodynamic beta. When a beam from a thermal source is input into a beam splitter, correlations are observed in intensity measurements performed on the output beams [7, 10, 13] which are not present when a coherent source is used.

These correlations exist due to the bunched nature of photons in thermal light. When detecting light from a thermal source, photons are not detected in random intervals, but are instead detected in clusters [13]. High variance in the intensity of thermal light, which is not present with a coherent source, is the result of this bunching.

We aim to take advantage of the correlations produced by this phenomenon to devise a QKD protocol which produces correlated bit strings between Alice and Bob using microwave sources. These bit strings can then be used to create a secure key to allow private communication in the presence of an eavesdropper.

The use of thermal states differentiates this protocol from similar versions involving modulated coherent states. Using a thermal source lets us carry out the protocol with common microwave-based wireless communication equipment instead of relying on fibre.

Additionally, the output of a thermal source and a Gaussian modulated coherent source are statistically equivalent. This allows the application of security proofs for GMCS protocols to thermal protocols. An important distinction to note is that coherent states are superpositions of Fock states, whereas thermal states are a mixture. This allows a Monte Carlo simulation to be used as an appropriate method to model the protocol, through random sampling of Fock states. Here, we will compare the outputs of such a simulation to mutual information values predicted through two separate analytic methods.

3. The QKD protocol

In the QKD protocol to be analysed, as shown in figure 1, we use a central broadcast system in which light from a thermal source is incident on a 50:50 beam splitter. The output beams from this splitter are sent to Alice and Bob. An eavesdropper, Eve, uses a beam splitter attack, intercepting the beam sent to Bob using their own beam splitter of unknown transmittance. The part of the beam transmitted by Eve's beam splitter continues to Bob.

Figure 1.

Figure 1. Protocol schematic. A beam produced by a thermal source provides the initial state ρ. A series of beam splitters are used to direct the beam to Alice and Bob, with Eve performing a beam splitter attack on the channel leading to Bob. Eve's beam splitter has unknown transmittance and reflectance, τ and μ, while each other beam splitter is 50:50.

Standard image High-resolution image

Alice is considered to be in control of the initial source, the first beam splitter, and the channels between the source and her measurement apparatus, while Bob is in control of their beam splitter and its output channels. The channel between the initial beam splitter and Bob is not under Alice or Bob's control, giving a point in the protocol where Eve may interfere with the system.

When each person receives their beam, they use a 50:50 beam splitter to divide the incoming signal into two outputs. Double homodyne detection is employed in order to measure the X quadrature of one beam, and the P quadrature of the second beam as shown in figure 2. Each person cannot simply measure the X and P quadratures of the single beam they receive as the quadrature operators do not commute. This replaces the common method of measurement in QKD, in which the variable to measure [14] (or the measurement basis [2]) is randomly switched in order to ensure security. This method of performing measurements in QKD without random basis switching has been previously used with success for continuous variable QKD protocols [15].

Figure 2.

Figure 2. Heterodyne detection. Heterodyne; or double homodyne, detection. As initially shown in figure 1, the measurer splits the incoming signal at a 50:50 beam splitter, and combines the outputs with local oscillators. The X and P quadratures can then be measured separately using two pairs of detectors.

Standard image High-resolution image

Repeated measurements yield an array of X and P quadrature measurements for each person. For each pair of quadrature measurement outcomes $\left\{{x}_{i},{p}_{i}\right\}$, Alice, Bob and Eve each calculate ${z}_{i}=\sqrt{{x}_{i}^{2}+{p}_{i}^{2}}$, producing a distribution of z measurements for each person. This is converted into a bit string by having Alice, Bob, and Eve each find the median value of their distribution, and recording a 0 or a 1 for each z value depending on if it above or below the median. Due to the correlations in the outputs of the beam splitters with a thermal input, this produces a string of correlated bits for each person. At this point, if the protocol has been successfully executed, a key may be distilled from the bit strings, allowing Alice and Bob to communicate securely. Comparing Alice and Bob's results for a subset of measurements allows them to calculate correlation coefficients, to verify that a thermal source was used and correlated bits have been transmitted.

We performed a Monte Carlo simulation of this protocol in Python with QuTiP [16, 17]. The initial beam is created by randomly sampling Fock state values from the thermal state distribution, with the beam splitters randomly splitting an input beam into a pair of outputs. With a Fock state input, the possible output Fock states of one arm of a beam splitter is described by a binomial distribution. One of these possible outputs is selected at random. This describes a portion of the incident photons being transmitted through the beam splitter, with the remaining portion being reflected. Once all the beam splitters are applied, each person receives a string of randomly distributed Fock state measurements. Due to thermal states being a statistical mixture of Fock states, this is an appropriate method of modelling the system.

Using a sample measurement set produced through simulation, we can verify that Alice and Bob are receiving correlated measurements by calculating the correlation coefficient as Alice's data is offset relative to Bob. We can see from figure 3 that the correlations survive beam splitters as expected of thermal sources [10]. Offsetting Alice and Bob's data streams shows a clear difference between the correlation coefficients for synchronised measurements and random noise, which would not be observed if a coherent source were used.

Figure 3.

Figure 3. Correlation coefficients. Changes in the correlation coefficient as a sample set of Alice and Bob's measurement results (n ≈ 100 000) are offset with respect to each other. Correlated measurements are observed in the thermal protocol when time delays are taken into account. Also shown are sample scatter graphs comparing Alice and Bob's measurements, with and without offsetting the data streams.

Standard image High-resolution image

Given that we have observed correlations between Alice and Bob's data strings, we now derive bit strings from the Fock state measurements and proceed to calculate Shannon mutual information's to test if a secure key can be produced.

4. Key rates

After performing Python simulations, the Shannon mutual information; ${I}_{\mathrm{S}}\left(A;B\right)$, is calculated using the bit strings produced by each person. This is a measurement of the information gained about one of the involved systems from measurement of the other system.

We begin with the definition for the Shannon entropy for a single system, $H\left(A\right)=-{\sum }_{i=0}^{n-1}\enspace {p}_{i}\enspace {\mathrm{log}}_{2}\left({p}_{i}\right)$. This describes the uncertainty in predicting the outcome should a measurement be performed on the system where there are n possible measurement outcomes, with outcome i having a probability pi of occurring. For a binary bit string with 0 and 1 being the only possible values, this can be simplified to:

Equation (1)

Here, p0 is the probability of measuring the 0 outcome. From this, the mutual information ${I}_{\mathrm{S}}\left(A;B\right)=H\left(A\right)+H\left(B\right)-H\left(AB\right)$ can be defined, where $H\left(AB\right)$ is calculated by iterating over the four possible outcomes of two people measuring separate bit strings. Once the Shannon entropy is calculated for each bit string, and the mutual information values between the bit strings for each person is measured, we can see if key distribution can be performed. Two classical options for producing usable keys are considered, direct reconciliation and reverse reconciliation.

In direct reconciliation, Alice openly shares additional information in order for corrections to be made to Bob's bit string. For this to produce a secure key, it is required [18] that entropy calculations from the produced bit strings satisfy ${K}_{\mathrm{D}\mathrm{R}}={I}_{\mathrm{S}}\left(A;B\right)-{I}_{\mathrm{S}}\left(A;E\right) > 0$.

Alternatively, reverse reconciliation is the opposite method, where Bob provides the information in order for Alice to make corrections. In this case, successfully creating a secure key requires [18] ${K}_{\mathrm{R}\mathrm{R}}={I}_{\mathrm{S}}\left(A;B\right)-{I}_{\mathrm{S}}\left(B;E\right) > 0$. Therefore, if one of these inequalities are satisfied, a secret key can be produced. The secret key rate K in this case is bounded such that [19] $\mathrm{max}\left\{{K}_{\mathrm{D}\mathrm{R}},\enspace {K}_{\mathrm{R}\mathrm{R}}\right\}\leqslant K\left(A;B\vert E\right)\leqslant \mathrm{min}\left\{{I}_{\mathrm{S}}\left(A;B\right),\enspace {I}_{\mathrm{S}}\left(A;B\vert E\right)\right\}$.

Here, $H(X\vert Y)=H\left(XY\right)-H\left(Y\right)$ describes the conditional mutual information, the uncertainty in a system, X, given a measurement performed in a second system. So far, the Shannon mutual information values have been used, which can verify security in the case of an individual attack by Eve [20], in which they perform measurements on each pulse sent by Alice before any error correction occurs between Alice and Bob.

If neither of the above reconciliation methods are available, advantage distillation through protocols such as cascade will allow keys to be produced from the bit strings provided any secrecy is present [8]. As measurements have already taken place by this point, this is purely classical error correction. Sharing a random subset of the bit strings allows Alice and Bob to estimate the error rate for use in such algorithms.

While the Shannon entropy calculated through simulation is interesting, it is more useful to analyse the protocol through the von Neumann entropy. Here, we will compare the results of two different methods of calculating von Neumann entropy to sample Shannon entropies produced by the simulation.

5. Mutual information and state variance

Performing an analysis similar to that done by Qi et al 2017 [6] we can calculate von Neumann mutual informations, ${I}_{\mathrm{N}}\left(A;B\right)$. Using Alice's quadrature measurements, Bob's corresponding measurements are estimated, along with Alice's uncertainty on Bob's measurements. Eve's interception is done with a beam splitter of transmittance τ and reflectance μ. This gives:

Equation (2)

where AX is one of Alice's measured X quadrature values, and $\hat{B}$ is Alice's estimate of the corresponding quadrature values of the modes at Bob detector. The detector efficiency for Alice, Bob and Eve are given by nA , nB , and nE respectively. By considering asymmetric beam splitters, continuing the analysis shows the quadrature values of the modes received by each person's detectors, XA , XB , and XE are found:

Equation (3)

Equation (4)

Equation (5)

where xin is the quadrature output from the source, vA , vB , and vE describe the noise introduced at the beam splitters between the source and each person, and loss at their detector. NA , NB , and NE describes Gaussian noise added at each person's detector.

Taking the introduced noise to be described by a Gaussian distribution with mean zero and variance one, we can calculate the uncertainty Alice has on Bob's measurements, then we can perform a similar analysis for Bob and Eve:

Equation (6)

Equation (7)

The mutual information for Gaussian states can be shown to be [6]:

Equation (8)

where V is the variance of the input thermal state and χ is the added noise. If χline is the noise added in the channels, and χhom is the detection noise, the total added noise in a channel with transmittance T is given by [6]:

Equation (9)

Equation (10)

Equation (11)

where we have taken T = 1 and assumed equal detector noise for each person, such that $\left\langle {N}_{A}^{2}\right\rangle =\left\langle {N}_{B}^{2}\right\rangle =\left\langle {N}_{E}^{2}\right\rangle =\left\langle {N}^{2}\right\rangle =1$. This simplified setup gives χ = Δ. Figure 4 shows the plots of various mutual information values as variance is adjusted. Eve's beam splitter is assumed to be 50:50.

Figure 4.

Figure 4. Mutual information calculations using uncertainty. The von Neumann mutual informations ${I}_{\mathrm{N}}\left(A;B\right)$, ${I}_{\mathrm{N}}\left(B;E\right)$ as the variance of the input thermal state, $\langle n\rangle \left(\langle n\rangle +1\right)$ is changed. This is calculated through uncertainty in Alice and Eve's estimates of Bob's measurements.

Standard image High-resolution image

6. Covariance matrix description

To verify this behaviour, we can use a second method to calculate von Neumann entropies, also extending section 4 to allow for entropy calculations using the quantum state of the system, rather than Shannon entropies of measurements. As the states involved in this protocol are Gaussian, they can be completely described with covariance matrices. For an N-mode state ρ, the covariance matrix γ is defined as [21]:

Equation (12)

Here, $r=\left({\hat{X}}_{1},{\hat{P}}_{1},\dots ,{\hat{X}}_{N},{\hat{P}}_{N}\right)$ consists of a pair of quadrature operators for each mode, ${\hat{X}}_{i}$ and $\hat{{P}_{i}}$, with ${d}_{i}=\left\langle {\hat{r}}_{i}\right\rangle $ denoting their expectation values. For the inputs into the initial splitter, the covariance matrix γ12 is given by:

Equation (13)

where V is the variance of the quadratures of the beam output by the thermal source. This fully describes the thermal and vacuum modes input into the initial beam splitter. Through applying the beam splitter transformations to the relevant modes, the covariance matrix of the final state is calculated. The transformation, S, for a beam splitter with transmittance τ and reflectance μ is given by [21]:

Equation (14)

By applying the beam splitters to the appropriate modes, the final covariance matrix can be found:

Equation (15)

The sub-matrices are given by:

Equation (16)

Equation (17)

Equation (18)

Equation (19)

Equation (20)

Equation (21)

Here, ${\gamma }_{{A}_{1}{A}_{2}}$ is the covariance matrix describing the two modes Alice receives at their pair of detectors, with CAB describing covariance between Alice's modes and Bob's. The remaining sub-matrices are similarly defined. From this, von Neumann entropy values are calculated using symplectic eigenvalues. For a covariance matrix γ, the von Neumann entropy is given by [21]:

Equation (22)

where $G\left(x\right)=\left(x+1\right){\mathrm{log}}_{2}\left(x+1\right)-x\enspace {\mathrm{log}}_{2}\enspace x$, and λi are the symplectic eigenvalues of γ. For the covariance matrix for a single mode system, γ1, this is given by ${\lambda }^{2}=\left\vert {\gamma }_{1}\right\vert $. For a two-mode state with the covariance matrix γ12, taking ${\Delta}=\left\vert {\gamma }_{1}\right\vert +\left\vert {\gamma }_{2}\right\vert -2\left\vert C\right\vert $ allows the two symplectic eigenvalues, λ+ and λ to be calculated:

Equation (23)

Mutual informations calculated in this way can be plotted against variance, this is displayed in figure 5. Upper and lower bounds can be placed on the mutual information values in the same manner as when Shannon entropies were used. However, requiring ${K}_{\mathrm{R}\mathrm{R}}={I}_{\mathrm{N}}\left(A;B\right)-{I}_{\mathrm{N}}\left(B;E\right) > 0$, where ${I}_{\mathrm{N}}\left(A;B\right)={S}_{\mathrm{N}}\left({\gamma }_{A}\right)+{S}_{\mathrm{N}}\left({\gamma }_{B}\right)-{S}_{\mathrm{N}}\left({\gamma }_{AB}\right)$, allows for security against a stronger set of attacks. In the case of these 'collective attacks', Eve does not perform measurements until after classical communication between Alice and Bob has occurred. In the example shown in figure 5, it can be seen that as the variance of the thermal state is increased, the protocol remains secure in the case Eve uses a 50:50 beam splitter. In this case, reverse reconciliation is used as KRR is positive. Additionally, analysing either the covariance matrix or measurement uncertainty both produce mutual information graphs which follow similar patterns as variance is increased.

Figure 5.

Figure 5. Mutual information calculations using covariance. Von Neumann mutual information calculations plotted against thermal state variance, found using the covariance matrix of the final state. Here, Eve performs interception using a 50:50 beam splitter.

Standard image High-resolution image

With two methods of calculating von Neumann entropy displaying similar behaviour, we may now compare the outputs to Shannon entropies calculated through the simulation.

7. Results

We performed calculations of the Shannon entropy for the three bit strings and the mutual information between each pair of strings. These strings were produced through the Python simulation. Currently no loss or noise is considered, this allows the simulation to be performed with a lossless Eve. The transmittance of Eve's splitter is varied to measure the effect of Eve's interception strength on the mutual information values. Also calculated was the von Neumann entropy of each mode and pair of modes, using equation (22) and the covariance matrix describing the final state of the system. The results of these calculations and measurements are shown in figure 6.

Figure 6.

Figure 6. Information with varying interception strength. Calculations of von Neumann entropy using the covariance matrix and measurements of Shannon entropy taken from the simulation [22] as the transmittance of Eve's beam splitter is varied. The notable result is that $I\left(A;B\right)-I\left(B;E\right) > 0$ holds in both cases provided Bob receives a nonzero proportion of the signal sent to him. This used an average photon number of 200. Error bars describe one standard deviation. Due to discord in the system, von Neumann entropies have larger magnitudes than Shannon entropies.

Standard image High-resolution image

Meeting the restrictions placed on von Neumann mutual information which ensure secrecy in the case of a collective attack, ${I}_{\mathrm{N}}\left(A;B\right)-{I}_{\mathrm{N}}\left(B;E\right) > 0$ or ${I}_{\mathrm{N}}\left(A;B\right)-{I}_{\mathrm{N}}\left(A;E\right) > 0$, allow the protocol to be secure against a greater range of attacks than the restrictions based on Shannon entropy. Both are included here so that it can be seen that changes in von Neumann entropies are reflected in the Shannon entropies of the bit strings derived by each person after the protocol has been carried out.

It can be seen from figure 6 that $I\left(A;B\right)-I\left(A;E\right)$ crosses zero in both cases when Eve's beam splitter reflects half of the beam sent to Bob. This is expected as Bob and Eve's positions in the protocol are interchangeable in this special case, so $I\left(A;B\right)=I\left(A;E\right)$. If over half of Bob's beam is reflected by Eve, a key cannot be produced via direct reconciliation. However, the second possible requirement of $I\left(A;B\right) - I\left(B;E\right) > 0$ is always satisfied in the no-loss scenario provided Eve's interception beam splitter has nonzero transmittance. This means that reverse reconciliation may be used to produce a secret key and establish secure communication during collective or individual attacks. This would allow the thermal state central broadcast protocol to be used as a method of QKD. It is also clear that the von Neumann entropy has a higher magnitude than Shannon, this is expected due to the presence of discord in the system, which the Shannon entropy does not consider.

8. Conclusions

When considering a system without loss and noise, the lower bound placed on the key rate when reverse reconciliation is considered is positive under a beam splitter attack even when Eve has zero loss. This would allow for a secret key to be produced between Alice and Bob, and therefore secure communication could take place in the presence of an eavesdropper performing collective or individual attacks. Additionally, two separate methods of von Neumann mutual information analysis both showed that thermal sources with higher variance than those that could be produced in the Monte Carlo simulation allowed for a key to be produced with little change in the lower bound of the key rate.

Future work in this area could focus on examining the effects of adding noise and loss into different channels, checking if a positive key rate could be maintained. This is especially relevant for thermal states due to added noise being a large barrier to successful QKD. Additionally, a practical setup following the diagram shown in Figure 1 would allow the protocol to be performed experimentally. This allows real key rates to be measured and would show if the protocol continues to be functional when using thermal sources likely to be employed in modern communication.

Acknowledgments

Work was undertaken on ARC4, part of the High Performance Computing facilities at the University of Leeds, UK. DJ is supported by the Royal Society and also a University Academic Fellowship. This work was supported by the Northern Triangle Initiative Connecting capability fund as well as funding from the UK Quantum Technology Hub for Quantum Communications Technologies EP/M013472.

Data availability statement

The data that support the findings of this study are openly available at the following URL/DOI:https://doi.org/10.5518/944.

Please wait… references are loading.
10.1088/1361-6455/ac2a6e