Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
MFF-Net: Deepfake Detection Network Based on Multi-Feature Fusion
Previous Article in Journal
Perfect Density Models Cannot Guarantee Anomaly Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving the Performance of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution via a Noiseless Linear Amplifier

College of Information Science and Technology, Northwest University, Xi’an 710127, China
*
Authors to whom correspondence should be addressed.
Entropy 2021, 23(12), 1691; https://doi.org/10.3390/e23121691
Submission received: 16 November 2021 / Revised: 11 December 2021 / Accepted: 14 December 2021 / Published: 16 December 2021

Abstract

:
In the continuous variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol, both Alice and Bob send quantum states to an untrusted third party, Charlie, for detection through the quantum channel. In this paper, we mainly study the performance of the CV-MDI-QKD system using the noiseless linear amplifier (NLA). The NLA is added to the output of the detector at Charlie’s side. The research results show that NLA can increase the communication distance and secret key rate of the CV-MDI-QKD protocol. Moreover, we find that the more powerful the improvement of the performance with the longer gain of NLA and the optimum gain is given under different conditions.

1. Introduction

With the development of photoelectric technology, many physical phenomena of quantum theory [1] have been verified through observation, which attracts many researchers to consider its application. Quantum key distribution (QKD) [2,3] is one of the applications, in which two trusted communication parties (Alice and Bob) are allowed to exchange the cryptographic key through a quantum channel at the existence of eavesdropping. Its theoretical unconditional security is guaranteed by the laws of Heisenberg’s uncertainty principle [4] and no-clone theory [5,6]. The QKD protocols are mainly divided into the following two categories: the discrete variable quantum key distribution (DVQKD) [7,8,9,10] and the continuous variable quantum key distribution (CVQKD) [11,12,13,14,15]. In theory, the unconditional security of QKD has been proven [16,17,18,19,20,21,22].
However, the deviation between the theoretical assumption and the actual implementation will effect the performance and may lead to a loophole in the practical system that could be used by Eve to intercept key information without being discovered. The loopholes involve the the laser source [23,24,25], the local oscillator [26,27], the beam splitter (BS) [28,29,30], the basis choice [31], and the detector [32,33,34,35,36,37]. Nowadays, researchers have proposed the CV-MDI-QKD protocol [38,39,40], which can defend all detector side channels. In the CV-MDI-QKD protocol, Alice and Bob each generate an Einstein–Podolsky–Rosen (EPR) state, and both of them send one mode of the EPR state to an untrusted third party, Charlie, for detection through the quantum channel. After the CV-MDI-QKD protocol was put forward, it was well analyzed in theory and demonstrated in experiments. However, the shortcomings of the communication distance and secret key rate of the CV-MDI-QKD system are still a problem.
In this paper, facing the above problem, the NLA is induced to improve the performance of the CV-MDI-QKD system. The amplification performance of the NLA is better because it can mechanically amplify the amplitude of the coherent state while retaining the excess noise at the initial level [41,42,43]. Thus, when only considering its successful runs, the NLA can compensate the effect of losses and could therefore be useful for quantum communication [44]. So, in theory, the NLA can greatly improve the signal-to-noise ratio of the transmission signal, so that the performance of the system can be improved. Here, we consider that we can add two NLAs to the output ports of two homodyne detectors on Charlie’s side. We find that the communication distance and secret key rate of the NLA-based CV-MDI-QKD system have been improved.
The structure of this paper is as follows. In Section 2, we first introduce the CV-MDI-QKD protocol, and then the CV-MDI-QKD protocol with NLA is investigated. Then, the performance of the CV-MDI-QKD protocol with NLA is analyzed in Section 3. Finally, we conclude the paper in Section 4.

2. The Scheme of CV-MDI-QKD with NLA

The equivalent entanglement-based (E&B) model of the CV-MDI-QKD protocol is shown in Figure 1. Alice prepares an EPR state, keeps one of its mode A 1 , and sends the other mode A 2 to Charlie by channel A. Bob also prepares another EPR state and keeps the mode B 1 , and the mode B 2 is also sent to Charlie by channel B. Then, Charlie will obtain the quadratures X C and P D via homodyne detectors after interfering with the received modes A 2 and B 2 through a 50:50 BS. Then, X C and P D pass through their respective amplifiers. After being amplified by NLA, we record the measurement results { X C , P D } , which will be announced by Charlie.
After Alice and Bob receive the measurement results announced by Charlie, Bob performs the displacement operation D ( θ ) on the mode B 1 and obtains the mode B 1 , where θ = k ( X C + i P D ) and k is the gain coefficient of the displacement operation. Then, Alice and Bob measure states A 1 and B 1 , respectively, via heterodyne detector. Finally, they obtain the data { X A , P A } , { X B , P B } . If we assume that Bob’s EPR state preparation and displacement operation are untrusted, then the protocol could be seen as the well-known one-way CVQKD protocol using coherent states and heterodyne detection [45].
Moreover, due to the presence of Charlie in the CV-MDI-QKD system, there are two situations. Firstly, the symmetrical situation is that the distance L A C between Alice and Charlie is equal to the distance L B C between Bob and Charlie, i.e., L A C = L B C . In this case, the secure communication distance is relatively short due to the excess noise in the channel. Secondly, the asymmetrical case is that the third-party is infinitely close to Bob, that is, L B C = 0 . In this case, the communication distance is significantly higher than the symmetrical case. Therefore, in this paper, we only consider the secret key rate in the asymmetric case.
Assuming that there is such an equivalent in Figure 2, i.e., the modulation variance of the CV-MDI-QKD system without NLA is V ( λ ) = 1 + λ 2 1 λ 2 , the channel transmittance is T, and the channel excess noise ϵ can be equivalent to the modulation variance of the NLA-based CV-MDI-QKD system, which is V ( λ d ) = 1 + λ d 2 1 λ d 2 , and the channel transmittance and excess noise are T d and ϵ d , respectively. Considering a thermal state ρ ^ t h ( λ c h ) = ( 1 λ c h 2 ) n = 0 λ c h 2 n n n with variance 1 + λ c h 2 1 λ c h 2 and the displacement β = β x + i β y , the displaced input thermal state can be given by:
ρ ^ = D ^ ( β ) ρ ^ t h ( λ c h ) D ^ ( β )
When the input thermal state is amplified successfully by NLA, the thermal state ρ ^ will be transformed into:
ρ ^ = D ^ ( g β ) ρ ^ t h ( g λ c h ) D ^ ( g β )
where the variance is 1 + g 2 λ c h 2 1 g 2 λ c h 2 . Here, g is g 1 λ c h 2 1 ( g λ c h ) 2 , we set the parameter g to satisfy g λ c h < 1 , λ c h is the compressibility of the incident thermal state, and the displacement of the thermal state is g β after the amplification of NLA. The related parameters are given by:
λ d = λ ( g 2 1 ) ( ϵ 2 ) T 2 ( g 2 1 ) ϵ T 2 T d = g 2 T ( g 2 1 ) T [ 1 4 ( g 2 1 ) ( ϵ 2 ) ϵ T ϵ + 1 ] ϵ d = ϵ 1 2 ( g 2 1 ) ( ϵ 2 ) ϵ T
where g is the amplification gain of NLA. The amplification effect of NLA on the system is essential to amplify the quantum state transmitted in the channel. As we all know, when the coherent state transmits in the channel, it will be interfered by the excess noise of the channel. Then, it will be regarded as a displacement thermal state. The NLA’s effect on this displaced thermal state can be described by Equation (3) when it is successfully amplified. However, the above equation only considers the amplification effect of the quantum state transmitted in the channel when the NLA amplification is successfully amplified. The successful amplification of NLA is actually probabilistic. Therefore, we must also consider the impact of NLA probabilistic amplification on the EPR state [45].
In general, the thermal state ρ can be regarded as the superposition of countless coherent states and can be expressed ρ ^ = P ( α ) α α d α . The equation can be used in the EB model, and P ( α ) represents the probability of the coherent state α being transmitted to Bob through the channel. If we selectively amplify the coherent state α in the channel and only retain the successfully amplified state, that is, the non-uniform shielding of the EPR state, we will obtain a new thermal state finally. The corresponding entanglement parameter λ d is given as follows:
λ d = λ 1 T λ 2 ( g 2 1 )
Furthermore, only considering the case when the coherent state is successfully amplified by NLA, the other two equivalent parameters T d and ϵ d will be recalculated. The EPR state is always prepared by Alice, and Alice obtains the result of the heterodyne detection α A in one mode λ of the EPR state, the amplitude of which is proportional to λ α A . This coherent state is sent to Bob through a quantum channel with a transmittance T, which transforms its amplitude to T λ α A . The displacement thermal state β can thus be taken as:
β = T λ α A
After being amplified by the NLA, the displacement thermal state β becomes:
T λ α A g 1 λ c h 2 1 + ( g λ c h ) 2 T λ α A
When the modulation variance on Alice’s side V A = 0 , the variance of the thermal state will be equal to the variance at Bob’s side, where ϵ is the excess noise of the CV-MDI-QKD system channel. That is:
1 + λ c h 2 1 λ c h 2 = 1 + T ϵ λ c h 2 = T ϵ T ϵ + 2
After the NLA’s amplification, the parameter λ c h will be changed to g λ c h and then:
λ c h 2 = T ϵ T ϵ + 2 λ c h 2 = g 2 T ϵ T ϵ + 2
Finally, we consider the action of the NLA when Bob does not have any knowledge of Alice’s measurement result. In this case, Bob’s state is regarded as a thermal state ρ ^ ( λ d ) = ( 1 λ d 2 ) n = 0 λ d 2 n n n , where the variance is:
V ( λ d ) = 1 + λ d 2 1 λ d 2 = T V A + T ϵ + 1
According to Equation (9) and based on the analysis above, we know that the parameter λ d will change to g λ d after NLA, and the following equation will be obtained:
λ d 2 = λ 2 T ( 2 ϵ ) + T ϵ 2 2 λ 2 ( 1 T ) + T ϵ ( 1 λ 2 ) λ d 2 = g 2 λ 2 T ( 2 ϵ ) + T ϵ 2 2 λ 2 ( 1 T ) + T ϵ ( 1 λ 2 )
By Equations (8) and (10), we can obtain:
T d = 4 T g 2 [ T ϵ ( 1 g 2 ) + 2 ] 2 ϵ d = ϵ 1 2 T ( g 2 1 ) ϵ 2
When the parameters of the CV-MDI-QKD system λ , T , and ϵ are replaced by the improved channel equivalent parameter λ d , T d , and ϵ d , we can find that the signal-to-noise ratio of system will be improved. There are also some limitations we should pay attention to in the developed method provided above. When we calculate the secret key rate after the equivalent channel, the equivalent parameters must satisfy the following relationship: 0 < λ d < 1, 0 ≤ T d < 1, ϵ d 0. We put this restriction into Equation (11). Then, we can obtain the following restriction:
g m a x ( λ , T , ϵ ) = M i n ( 1 + 1 λ T λ 2 , 1 + 4 + 4 ϵ ( 2 + T ϵ ) T ϵ )
According to Equation (12), we can obtain an upper bound of the parameter g of the NLA. As shown in Figure 3, the maximum value g m a x of NLA with channel loss is plotted under different values of the entanglement coefficient, i.e., λ = 0.7 , 0.8 , 0.9 . The result shows that the gain g of the NLA is limited to a small rang at the short communication distance, but when the communication distance is long, the gain of the NLA will increase quickly. In addition, the smaller the entanglement coefficient is, the greater the gain will be under the same communication distance.

3. The Secret Key Rate of the CV-MDI-QKD System with NLA

In the previous chapter, we introduced the amplification performance of NLA in detail, the equivalent parameters of channel transmittance and excess noise of the CV-MDI-QKD system with NLA are obtained. Then, we will calculate the secret key rate of the CV-MDI-QKD system with NLA, and the performance of the system will be simulated.
Assuming that the quantum channel parameters transmittance between Alice (Bob) and Charlie are T A = 10 a L A C / 10 ( T B = 10 a L B C / 10 ), here, the quantum channel losses are a = 0.2 dB/km. The excess noise is ϵ A ( ϵ B ) correspondingly. After performing the quantum channel equivalent, the covariance matrix of ρ A 1 B 1 N L A has the following form:
γ A 1 B 1 = a I I 2 c σ z c σ z b I I 2 = V ( λ d ) I I 2 T d [ ( V ( λ d ) ] 2 1 ) σ z T d [ ( V ( λ d ) ] 2 1 ) σ z T d ( V ( λ d ) + χ t o t ) I I 2
where I I 2 is the 2 × 2 identity matrix and σ z is the Pauli matrix σ z = 1 0 0 1 . χ t o t represents the total noise at the input of the channel, χ t o t = χ l i n e + 2 χ h o m T , χ h o m represents the noise of the homodyne detector, χ h o m = 1 + v e l η 1 , χ l i n e represents the noise of the quantum channel, and χ l i n e = 1 T 1 ϵ . Here, ϵ refers to the equivalent excess noise of the equivalent one-way protocol, which can be calculated by:
ϵ = 1 + χ A + T B ( χ B 1 ) T A + 1 T A ( 2 k V B 1 T B V B + 1 ) 2
where χ A = ϵ A 1 + 1 T A , χ B = ϵ B 1 + 1 T B and when we set k = 2 ( V B 1 ) T B ( V B + 1 ) , we will obtain:
ϵ = ϵ A + 1 T A [ 2 + T B ( ϵ B 2 ) ]
Considering collective attack, the secret key rate of the CV-MDI-QKD protocol with NLA under finite-size effect can be defined as follows [46]:
K f i n i t e = P n l a [ n N ( β I A B χ B E Δ ( n ) ) ]
where P n l a is the probability of successful amplification of the NLA and P n l a = 1 / g 2 , N is the length of valid data collected, n is the data length used for the final key rate generation, m = N n is the data length for parameter estimation, β is the efficiency of reverse reconciliation, Δ ( n ) is a function related to privacy enhancement, and Δ ( n ) = 7 log 2 ( 2 / ϵ ¯ ) n , where ϵ ¯ means the smoothing parameter.
Moreover, I A B is the Shannon mutual information between Alice and Bob, which can be written as:
I A B = 2 × 1 2 log 2 V A V A | B = log 2 a + 1 a + 1 c 2 / ( b + 1 )
where V = V A + 1 . From Equation (9), we can obtain the modulation variance V A = V ( λ ) 1 T ϵ T , where λ is substituted with the equivalent λ d .
In addition, the maximum information χ B E that Eve can eavesdrop from Bob is limited by the Holevo quantity:
χ B E = S ( ρ E ) d m B p ( m B ) S ( ρ E m B )
where m B represents Bob’s measurement results, p ( m B ) represents the measured probability density, ρ E m B represents Eve’s state under Bob’s measurement, and S ( ρ ) represents the von Neumann entropy of the quantum state ρ . Since Eve can purify the system ρ A 1 B 1 , we can obtain S ( ρ E ) = S ( ρ A 1 B 1 ) . Therefore, χ B E can be expressed as:
χ B E = S ( ρ A 1 B 1 ) S ( ρ A 1 m B 1 )
where ρ A 1 B 1 and ρ A 1 m B 1 are the covariance matrices of γ A 1 B 1 and γ A 1 m B 1 , respectively. S ( ρ A 1 B 1 ) is the function of the symplectic eigenvalues λ 1 , 2 of γ A 1 B 1 , which can be expressed as:
S ( ρ A 1 B 1 ) = G ( λ 1 1 2 ) + G ( λ 2 1 2 )
where G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x and the symplectic eigenvalues λ 1 , 2 is:
λ 1 , 2 2 = 1 2 [ A ± A 2 4 B ]
and
A = a 2 + b 2 2 c 2 B = ( a b c 2 ) 2
Moreover, S ( ρ A 1 m B 1 ) is the function of the symplectic eigenvalues λ 3 of γ A 1 m B 1 , which will be given by:
S ( ρ A 1 m B 1 ) = G ( λ 3 1 2 )
the symplectic eigenvalues λ 3 is
λ 3 = a c 2 b + 1
To demonstrate the influence of the NLA on the secret key rate of the CV-MDI-QKD system, we simulate the relationship between the secret key rate of the system and the communication distance under different NLA gains in Figure 4. Here, we choose the optimal entanglement coefficient λ = 0.7 and consider that Charlie’s detectors are perfect, that is, χ t o t = χ l i n e . Among all curves, the black curve with gain g = 1 represents the secret key rate of the original CV-MDI-QKD protocol. We can see that its performance is worse than the CV-MDI-QKD protocol with NLA in the same communication distance. Moreover, the result shows that after adding NLA to the CV-MDI-QKD system, the communication distance is longer than that of the original protocol. Furthermore, the communication distance and the secret key rate of the system will increase significantly with the increase in the NLA’ s gain.
Moreover, the effect of the reverse reconciliation efficiency on the system is shown in Figure 5. We plot the relationship between the secret key rate and the communication distance with different reverse reconciliation efficiency and the NLA’s gain. The result shows that the influence of the reverse reconciliation efficiency on the communication distance is relatively small when the gain of the NLA becomes larger. In short-distance communication, the greater the gain of NLA, the smaller the impact of the reverse reconciliation efficiency on the secret key rate.
Finally, to investigate the best gain to maximize the secret key rate of the CV-MDI-QKD system with NLA, we simulate the maximized secret key rate as a function of the gain of NLA. Assuming that the secure communication distance of the CV-MDI-QKD system is 60 km, we can see that the secret key rate of the system does not increase with the increase in the NLA’s gain but has a maximum in Figure 6. The reason for this is that there is a successful amplification probability of NLA is P n l a = 1 / g 2 . With the increase in the NLA’s gain, the secret key rate will reach the optimal value with a certain gain, and then the secret key rate will drop rapidly. The best gain under different modulation variances is also given by Figure 6, and it can be seen that the smaller the modulation variance, the greater the optimal gain required.

4. Conclusions

In this paper, we induced an NLA into the traditional CV-MDI-QKD protocol to improve the communication distance and the secret key rate of the system. The NLA is added to the output of the detector at Charlie’s side first, and then, to investigate the performance of the system with NLA, we equate the E-B model of the CV-MDI-QKD system with NLA to the one-way CV-QKD protocol for which both Alice and Bob use heterodyne detectors and perform some related simulations. The research results show that NLA can increase the communication distance and secret key rate of the CV-MDI-QKD protocol. However, the secret key rate will reach the optimal value with a certain gain, and then the secret key rate will drop rapidly with the increase in the NLA’s gain since there is a successful amplification probability of NLA. Moreover, we find that the influence of the reverse reconciliation efficiency on the communication distance is relatively small when the gain of the NLA becomes larger.

Author Contributions

Conceptualization, F.J. and L.K.; methodology, W.L.; software, C.H.; validation, F.J., L.K. and W.L.; formal analysis, F.J.; investigation, L.K.; resources, W.L.; data curation, F.J.; writing—original draft preparation, F.J.; writing—review and editing, W.L.; visualization, L.K.; supervision, C.H.; project administration, W.L.; funding acquisition, W.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (Grants No. 62001383) and the Shaanxi Provincial Department of Education 2019 Special Scientific Research Plan (Natural Science Special Project), 19JK0847.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Acknowledgments

The author thanks the anonymous reviewers for their critical appraisal and constructive recommendations.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ghirardi, G.C.; Grassi, R.; Michelini, M. Thinking Physics for Teaching; Springer: Milan, Italy, 1995; pp. 329–334. [Google Scholar]
  2. Soujaeff, A.; Nishioka, T.; Hasegawa, T.; Takeuchi, S.; Matsui, M. Quantum key distribution at 1550 nm using a pulse heralded single photon source. Opt. Exp. 2007, 15, 726–734. [Google Scholar] [CrossRef] [PubMed]
  3. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301. [Google Scholar] [CrossRef] [Green Version]
  4. Loeb, A.L. The Heisenberg Uncertainty Principle. Am. J. Phys. 1963, 12, 945. [Google Scholar] [CrossRef]
  5. Shokeir, H. Increasing the Bit Density of a Quantum-Confinement Physically Unclonable Function. Master’s Thesis, Master of Science, Lancaster University, Lancaster, UK, 2017. [Google Scholar]
  6. Goorden, S.A.; Horstmann, M.; Mosk, A.P.; Škorić, B.; Pinkse, P.W.H. Quantum-secure authentication of a physical unclonable key. Optica 2014, 1, 421–424. [Google Scholar] [CrossRef] [Green Version]
  7. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J.A. Experimental Quantum Cryptography. J. Cryptol. 1992, 5, 3–28. [Google Scholar] [CrossRef]
  9. Wang, J.Y.; Yang, B.; Liao, S.K.; Zhang, L.; Shen, Q.; Hu, X.F.; Wu, J.C.; Yang, S.J.; Jiang, H.; Tang, Y.L. Direct and full-scale experimental verifications towards ground-satellite quantum key distribution. Nat. Photonics 2013, 7, 387–393. [Google Scholar] [CrossRef]
  10. Chong, S.K.; Hwang, T. Quantum key agreement protocol based on BB84. Opt. Commun. 2010, 283, 1192–1195. [Google Scholar] [CrossRef]
  11. Walk, N.; Ralph, T.C.; Symul, T.; Ping, K.L. Security of Continuous Variable Quantum Cryptography. Phys. Rev. A 2013, 87, 20303. [Google Scholar] [CrossRef] [Green Version]
  12. Hillery, M. Quantum cryptography with squeezed states. Phys. Rev. A 1999, 61, 022309. [Google Scholar] [CrossRef] [Green Version]
  13. Grosshans, F.; Assche, G.V.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef] [Green Version]
  14. Grosshans, F.; Grangier, P. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [Green Version]
  15. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.; Ralph, T.; Shapiro, J.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2011, 84, 621–669. [Google Scholar] [CrossRef]
  16. Berta, M.; Christandl, M.; Colbeck, R. The uncertainty principle in the presence of quantum memory. Nat. Phys. 2010, 6, 659–662. [Google Scholar] [CrossRef]
  17. Jain, N.; Stiller, B.; Khan, I.; Makarov, V.; Marquardt, C.; Leuchs, G. Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse. Phys. Rev. A 2009, 80, 84–85. [Google Scholar]
  18. Renner, R.; Cirac, J.I. de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography. Phys. Rev. Lett. 2009, 102, 110504. [Google Scholar] [CrossRef] [Green Version]
  19. Leverrier, A. Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 2013, 110, 030502. [Google Scholar] [CrossRef] [Green Version]
  20. Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 7. [Google Scholar] [CrossRef] [Green Version]
  21. Leverrier, A. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. Phys. Rev. Lett. 2017, 118, 200501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Liu, W.Q.; Peng, J.Y.; Peng, H.; Duan, H.; Zeng, G.H. Monitoring of continuous-variable quantum key distribution system in real environment. Opt. Exp. 2017, 25, 19429. [Google Scholar] [CrossRef]
  23. Bugge, A.N.; Sauge, S.; Ghazali, A.M.M.; Skaar, J.; Lydersen, L.; Makarov, V. Laser Damage Helps the Eavesdropper in Quantum Cryptography. Phys. Rev. Lett. 2014, 112, 070503. [Google Scholar] [CrossRef] [Green Version]
  24. Huang, A.Q.; Navarrete, Á.; Sun, S.H.; Chaiwongkhot, P.; Curty, M.; Makarov, V. Laser-Seeding Attack in Quantum Key Distribution. Phys. Rev. Appl. 2019, 12, 064043. [Google Scholar] [CrossRef] [Green Version]
  25. Huang, A.Q.; Li, R.; Egorov, V.; Tchouragoulov, S.; Kumar, K.; Makarov, V. Laser-Damage Attack Against Optical Attenuators in Quantum Key Distribution. Phys. Rev. Appl. 2020, 13, 034017. [Google Scholar] [CrossRef] [Green Version]
  26. Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 2013, 87, 062313. [Google Scholar] [CrossRef] [Green Version]
  27. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems. Phys. Rev. A 2013, 88, 022339. [Google Scholar] [CrossRef] [Green Version]
  28. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol. Phys. Rev. A 2013, 87, 052309. [Google Scholar] [CrossRef] [Green Version]
  29. Huang, J.Z.; Weedbrook, C.; Yin, Z.Q.; Wang, S.; Li, H.W.; Chen, W.; Guo, G.C.; Han, Z.F. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack. Phys. Rev. A 2013, 87, 062329. [Google Scholar] [CrossRef] [Green Version]
  30. Kunz-Jacques, S.; Jouguet, P. Robust shot-noise measurement for continuous-variable quantum key distribution. Phys. Rev. A 2015, 91, 022307. [Google Scholar] [CrossRef] [Green Version]
  31. Liu, W.Q.; Peng, J.Y.; Qi, J.; Cao, Z.W.; He, C. Imperfect basis choice in continuous-variable quantum key distribution. Laser Phys. Lett. 2020, 17, 055203. [Google Scholar] [CrossRef]
  32. Cives-Esclop, A.; Luis, A.; Sánchez-Soto, L.L. Unbalanced homodyne detection with a weak local oscillator. Opt. Commun. 2000, 175, 153–161. [Google Scholar] [CrossRef]
  33. Kühn, B.; Vogel, W. Unbalanced Homodyne Correlation Measurements. Phys. Rev. Lett. 2016, 116, 163603. [Google Scholar] [CrossRef] [Green Version]
  34. Huang, Y.; Zhang, Y.; Xu, B.; Huang, L.; Yu, S. A modified practical homodyne detector model for continuous-variable quantum key distribution: Detailed security analysis and improvement by the phase-sensitive amplifier. J. Phys. B-At. Mol. Opt. Phys. 2020, 54, 015503. [Google Scholar] [CrossRef]
  35. Almeida, M.; Pereira, D.; Facão, M.; Pinto, A.N.; Silva, N.A. Impact of imperfect homodyne detection on measurements of vacuum states shot noise. Opt. Quantum Electron. 2020, 52, 503. [Google Scholar] [CrossRef]
  36. Wallentowitz, S.; Vogel, W. Unbalanced homodyning for quantum state measurements. Phys. Rev. A 1996, 53, 4528. [Google Scholar] [CrossRef]
  37. Silva, N.A.; Pereira, D.; Muga, N.J.; Pinto, A.N. Practical imperfections affecting the performance of CV-QKD based on coherent detection. In Proceedings of the 2020 22nd International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 19–23 July 2020; pp. 1–4. [Google Scholar]
  38. Li, Z.; Zhang, Y.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef] [Green Version]
  39. Papanastasiou, P.; Ottaviani, C.; Pirandola, S. Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables. Phys. Rev. A 2017, 96, 4. [Google Scholar] [CrossRef] [Green Version]
  40. Tang, Z.; Liao, Z.; Xu, F.; Qi, B.; Qian, L.; Lo, H.K. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2014, 112, 190503. [Google Scholar] [CrossRef] [Green Version]
  41. Ralph, T.C.; Lund, A.P. Nondeterministic noiseless linear amplification of quantum systems. Am. Inst. Phys. 2009, 1110, 155–160. [Google Scholar]
  42. Blandino, R.; Leverrier, A.; Barbieri, M.; Etesse, J.; Tualle-Brouri, R. Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier. Phys. Rev. A 2014, 86, 1. [Google Scholar]
  43. Levenson, J.A.; Abram, I.; Rivera, T.; Grangier, P. Reduction of quantum noise in optical parametric amplification. JOSA B 1993, 10, 2233–2238. [Google Scholar] [CrossRef]
  44. Ralph, T.C. Quantum error correction of continuous-variable states against gaussian noise. Phys. Rev. A 2011, 84, 022339. [Google Scholar] [CrossRef] [Green Version]
  45. Li, Y.; Huang, P.; Li, D.; Zhou, Y.; Zeng, G. Security analysis of practical continuous-variable quantum key distribution using a heralded noiseless amplifier. Int. J. Theor. Phys. 2019, 58, 2392–2406. [Google Scholar] [CrossRef]
  46. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The EB scheme of the CV-MDI-QKD system with the noiseless linear amplifier. T A and ϵ A are the transmittance and excess noise of channel A, respectively. T B and ϵ B are the transmittance and excess noise of channel B, respectively. BS is the beam splitter with the splitting ratio 50:50.
Figure 1. The EB scheme of the CV-MDI-QKD system with the noiseless linear amplifier. T A and ϵ A are the transmittance and excess noise of channel A, respectively. T B and ϵ B are the transmittance and excess noise of channel B, respectively. BS is the beam splitter with the splitting ratio 50:50.
Entropy 23 01691 g001
Figure 2. The equivalent method is used to analyze the CV-MDI-QKD system with NLA.
Figure 2. The equivalent method is used to analyze the CV-MDI-QKD system with NLA.
Entropy 23 01691 g002
Figure 3. The maximum value g m a x of NLA gain is a function of channel loss (dB). The curve from top to bottom is λ = 0.7 , 0.8 , 0.9 . The excess noise is ϵ A = ϵ B = 0.001 .
Figure 3. The maximum value g m a x of NLA gain is a function of channel loss (dB). The curve from top to bottom is λ = 0.7 , 0.8 , 0.9 . The excess noise is ϵ A = ϵ B = 0.001 .
Entropy 23 01691 g003
Figure 4. The secret key rate as a function of the communication distance. The entanglement coefficient λ = 0.7 and g is the gain of NLA. The other parameters are ϵ A = ϵ B = 0.002 , v e l = 0 , η = 1 , and β = 0.98 .
Figure 4. The secret key rate as a function of the communication distance. The entanglement coefficient λ = 0.7 and g is the gain of NLA. The other parameters are ϵ A = ϵ B = 0.002 , v e l = 0 , η = 1 , and β = 0.98 .
Entropy 23 01691 g004
Figure 5. The secret key rate is a function of communication distance under different the efficiencies of reverse reconciliation and the gain of NLA. In the NLA-based CV-MDI-QKD protocol, when g = 4 , the reverse reconciliation efficiency has little effect on the secret key rate of the system. The other parameters are λ = 0.7 , ϵ A = ϵ B = 0.002 , and v e l = 0 , η = 1 .
Figure 5. The secret key rate is a function of communication distance under different the efficiencies of reverse reconciliation and the gain of NLA. In the NLA-based CV-MDI-QKD protocol, when g = 4 , the reverse reconciliation efficiency has little effect on the secret key rate of the system. The other parameters are λ = 0.7 , ϵ A = ϵ B = 0.002 , and v e l = 0 , η = 1 .
Entropy 23 01691 g005
Figure 6. Maximized secret key rate as a function of the gain of NLA, with a probability of success P n l a = 1 / g 2 . The black dotted curve represent the secret key rate of the NLA-based CV-MDI-QKD protocol with λ = 0.7 , and the red curve represents the secret key rate of the NLA-based CV-MDI-QKD protocol with λ = 0.71 .
Figure 6. Maximized secret key rate as a function of the gain of NLA, with a probability of success P n l a = 1 / g 2 . The black dotted curve represent the secret key rate of the NLA-based CV-MDI-QKD protocol with λ = 0.7 , and the red curve represents the secret key rate of the NLA-based CV-MDI-QKD protocol with λ = 0.71 .
Entropy 23 01691 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jing, F.; Liu, W.; Kong, L.; He, C. Improving the Performance of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution via a Noiseless Linear Amplifier. Entropy 2021, 23, 1691. https://doi.org/10.3390/e23121691

AMA Style

Jing F, Liu W, Kong L, He C. Improving the Performance of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution via a Noiseless Linear Amplifier. Entropy. 2021; 23(12):1691. https://doi.org/10.3390/e23121691

Chicago/Turabian Style

Jing, Fan, Weiqi Liu, Lingzhi Kong, and Chen He. 2021. "Improving the Performance of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution via a Noiseless Linear Amplifier" Entropy 23, no. 12: 1691. https://doi.org/10.3390/e23121691

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop