Next Article in Journal
Intuitionistic Fuzzy Entropy for Group Decision Making of Water Engineering Project Delivery System Selection
Next Article in Special Issue
A Quantum Cellular Automata Type Architecture with Quantum Teleportation for Quantum Computing
Previous Article in Journal
A Smoothed Algorithm with Convergence Analysis under Generalized Maximum Correntropy Criteria in Impulsive Interference
Previous Article in Special Issue
Bandwidth-Limited and Noisy Pulse Sequences for Single Qubit Operations in Semiconductor Spin Qubits
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions

1
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
State Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(11), 1100; https://doi.org/10.3390/e21111100
Submission received: 19 October 2019 / Revised: 6 November 2019 / Accepted: 7 November 2019 / Published: 11 November 2019
(This article belongs to the Special Issue Quantum Information Processing)

Abstract

:
A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions.

1. Introduction

Quantum key distribution (QKD) [1,2,3,4], as one of the most prominent applications of quantum information science, allows two legitimate partners, i.e., Alice and Bob, to achieve the secure key distribution phase of an encrypted communication. The QKD protocols can be divided into three main categories, which are called discrete-variable (DV) QKD [5,6], continuous-variable (CV) QKD [7,8], and differential-phase-shift (DPR) QKD [9,10,11], respectively. Both DV and CV systems can be integrated on chip [12,13,14,15,16] and operate at room temperature, but CV systems have significant advantages to achieve higher rate in a short distance link [17]. Thus, the CV-QKD protocols have attracted much attention in the past few years [18,19,20,21,22,23,24]. To meet a variety of application needs, much theoretical and experimental research of CV-QKD was done [25,26,27,28,29,30,31,32,33,34,35,36,37,38]. In the research of fully trusted-device protocols, it is always assumed that the devices at two legitimate partners are honest, and Eve can only control the quantum channels rather than the devices at the two parties.
However, the mismatch between practical devices and their idealized models may open security loopholes, resulting in harmful damages to the security of a protocol and the practical systems [39]. To eliminate all the loopholes of devices, fully device-independent (DI) protocols are proposed [40], which allow Eve to control all experimental devices without any assumptions. Nevertheless, DI protocols need a loophole-free Bell test [41] which is an experimental challenge. To compromise between practical protocols and full DI protocols, semi-device-independent (semi-DI) protocols are proposed, e.g., measurement-device-independent (MDI) [42,43,44], source-device-independent [45,46], and one-sided device-independent (1sDI) [47,48] QKD protocols, to consider both the security of some devices and the performance of a protocol. In semi-DI protocols, some devices can be assumed to be fully controlled by the adversary while the others should be well characterized. The investigations on the security analysis of semi-DI protocols develop very fast in recent years, such as CV-MDI [49,50,51], source-device-independent [46] and CV-1sDI protocols [47,52,53], which extend the application of such protocols.
Compared with one-way CV-QKD protocols, the secret key of CV-MDI QKD protocols is established by the measurement results of an untrusted third party, which reduces the performance of the protocols [42]. A lot of efforts were aimed at improving the performance of the protocols, such as using squeezed states [43], and virtual photon subtraction [54,55]. Recently, the unidimensional CV-QKD protocols were proposed in one-way CV-QKD protocols [56,57]. Compared with the Gaussian-modulated protocols, the features of the unidimensional CV-QKD protocols include easy modulation, low cost, and only a small number of random numbers required [56,58]. Moreover, the performance of the unidimensional coherent-state CV-QKD protocol is comparable to the Gaussian-modulated coherent-state protocol under the condition of low excess noise [56,58,59]. Even if the detectors are not ideal, the performance of the protocols can be improved by adding an optical amplifier [60]. Therefore, the unidimensional CV-QKD protocol using coherent states has a certain potential to be applied to various scenarios.
In this paper, we introduce the unidimensional CV-QKD protocol with untrusted detection under realistic conditions in order to eliminate the loopholes described above. We first present the equivalent entanglement-based (EB) scheme and the prepare-and-measure (PM) scheme of the unidimenaional CV-QKD protocol with untrusted detection under realistic conditions, including three different schemes based on using unidimensional modulated coherent states at each side (Alice’s side or Bob’s side), and both sides (both Alice’s and Bob’s side). The expressions of the secret key rate of the protocols are derived and the optimal gain parameters of the displacement are calculated, respectively. It is found that the optimal performance, in terms of both key rates and maximal transmission distance, of the protocol is achieved using unidimensional modulated coherent states at both Alice’s and Bob’s side. In addition, we also consider the asymmetric case that the distance between Bob and Charlie decreases to make the transmission distance further. Thus we investigate the relationship between the distance from Alice or Bob to Charlie by numeral simulation. Furthermore, an extreme situation is taken into account that Charlie is put on Bob’s side, and the simulation result indicates that the total transmission distance increases when the distance from Bob to Charlie decreases.
The paper is organized as follows. In Section 2, we give detailed descriptions of the PM and EB schemes of the proposed protocol in three situations. Then we derive the expressions of secret key rate in detail and show the numerical simulation results of the secret key rate. Our conclusions are drawn in Section 3.
Note added. Recently, an independent work [61] was posted on arXiv. This work studied the performance of the measurement-device-independent CV-QKD protocol using unidimensional modulated coherent states in both Alice’s and Bob’s sides.

2. Results

2.1. Unidimensional CV-QKD Protocol with Untrusted Detection

Firstly, we propose the PM scheme for unidimensional CV-QKD protocol with untrusted detection, as illustrated in Figure 1. In particular, the modulator in the model can be Gaussian modulator as well as unidimensional modulator. Thus, there are four probable situations in our discussion, among which the situation that Gaussian modulator in both sides was described in detail in references [50,51]. Therefore, the other three probable schemes are taken into consideration in the proposed protocol with unidimensional modulator, which are the unidimensional modulation only in Alice’s side, the unidimensional modulation only in Bob’s side and the unidimensional modulation both in Alice’s and Bob’s side, respectively. The PM schemes of the three cases are described separately as follows:
Case 1: unidimensional modulation only in Alice’s side
Step 1. Alice produces coherent states and randomly selects the x - or p - quadrature along which the prepared states are displaced according to a random Gaussian variable with displacement variance V A M = V A 2 1 . At the same time, Bob randomly prepares coherent states | x B + i p B , where x B and p B are Gaussian distributed with modulation variance V B M = V B 1 . Subsequently, the states are sent to the untrusted party Charlie through two different channels whose length are L A C and L B C , respectively.
Step 2. After receiving the mode A from Alice and the mode B from Bob, Charlie combines them with a 50:50 beamsplitter. The output are mode C and D. Subsequently, Charlie performs measurement on the x - quadrature of the mode C and the p - quadrature of the mode D with two homodyne detectors, and then announces the results X C and P D publicly through the classical channels.
Step 3. According to the information Charlie announces, Bob modifies his data as x B = x B + k X C , p B = p B + k P D , where k is the amplification coefficient. Here Alice keeps her data unchanged.
Step 4. Alice and Bob perform post-processing, including information reconciliation, privacy amplification, and so on.
Case 2: unidimensional modulation only in Bob’s side
Step 1. Alice randomly prepares coherent states | x A + i p A , where x A and p A are Gaussian distributed with modulation variance V A M = V A 1 . Meanwhile, Bob produces coherent states and randomly selects the x - or p - q u a d r a t u r e along which the prepared states are displaced according to a random Gaussian variable with displacement variance V B M = V B 2 1 . Subsequently, the states are sent to the untrusted party Charlie through two different channels whose length are L A C and L B C , respectively.
The next steps are the same as those in Case 1.
Case 3: unidimensional modulation in both sides
Step 1. Both Alice and Bob produce coherent states and simultaneously select the x - or p - quadrature along which the prepared states are displaced according to two random Gaussian variables with displacement variance V A M = V A 2 1 and V B M = V B 2 1 , respectively. Subsequently, the states are sent to the untrusted party Charlie through two different channels whose length are L A C and L B C , respectively.
The next steps are the same as those in Case 1.
Furthermore, the equivalent EB schemes are described as followed, among which the Case 3 is revealed in Figure 2a:
Case 1: unidimensional modulation only in Alice’s side
Step 1. Alice generates Einstein-Podolsky-Rosen (EPR) states with variance V A . Then she keeps mode A 1 and squeezes the other mode A 2 on a squeezer. The output is mode A 3 , which is sent to the untrusted party Charlie through a channel with length L A C . Meanwhile, Bob generates another Einstein-Podolsky-Rosen (EPR) state with variance V B . Then he keeps mode B 1 and sends the other mode B 2 through a channel with length L B C .
Step 2. Modes A and B received by Charlie interfere at a 50:50 beamsplitter with two output modes C and D. Subsequently, Charlie performs measurement on the x - quadrature of the mode C and the p - quadrature of the mode D with two homodyne detectors, and then announces the results X C and P D publicly through the classical channels.
Step 3. According to the information Charlie announces, Bob displaces mode B 1 by operation D ^ β , where β = g ( X C + i P D ) , and g represents the gain of displacement. The relationship between k and g is well studied in reference [42]. Then Bob measures mode B 1 to get the final data X B , P B using heterodyne detection. Alice uses mode A 1 to get the final data X A ( P A ) using homodyne detection.
Step 4. Alice and Bob perform post-processing, including information reconciliation, privacy amplification, and so on.
Case 2: unidimensional modulation only in Bob’s side
Step 1. Alice generates Einstein-Podolsky-Rosen (EPR) states with variance V A . Then she keeps mode A 1 and sends the other mode A 2 through a channel with length L A C . Meanwhile, Bob generates another Einstein-Podolsky-Rosen (EPR) state with variance V B . Then he keeps mode B 1 and squeezes the other mode B 2 on a squeezer. The output is mode B 3 , which is sent to the untrusted party Charlie through a channel with length L B C .
Step 2 and Step 4 are the same as those in Case 1.
Step 3. According to the information Charlie announces, Bob displaces mode B 1 by operation D ^ β , where β = g ( X C + i P D ) . Then Bob measures mode B 1 to get the final data X B ( P B ) using homodyne detection. Alice uses mode A 1 to get the final data X A , P A using heterodyne detection.
Case 3: unidimensional modulation in both sides
Step 1. Both Alice and Bob generate Einstein-Podolsky-Rosen (EPR) states with variance V A and V B respectively. Alice and Bob keep mode A 1 and mode B 1 of their own EPR state separately. The other two modes, A 2 and B 2 , are squeezed on two squeezers, and the output are modes A 3 and B 3 . Then the modes A 3 and B 3 are sent to the untrusted party Charlie through two different channels with length L A C and L B C .
Step 2 and Step 4 are the same as those in Case 1.
Step 3. According to the information Charlie announces, Bob displaces mode B 1 by operation D ^ β , where β = g ( X C + i P D ) . Then Alice measures mode A 1 , Bob measures mode B 1 to get the final data X A ( P A ), X B ( P B ) using homodyne detection, respectively.

2.2. Security Analysis

In this section, the three schemes involved above, which are designed to reduce the cost and simplify the implementation of CV-QKD with untrusted detectors, are discussed separately. In each case, we derive the secure bound of the protocol using the EB scheme owing to ease of calculation in detail. In particular, under the assumptions that Eve controls the channels, Charlie and Bob’s EPR state, and the displacement in Figure 2a, their equivalent EB models of one-way CV-QKD model are illustrated in Figure 2b–d.

2.2.1. Using Unidimensional Modulated Coherent States Only in Alice’s Side

The EB description of this case is similar to that shown in Figure 1, and the only difference is that there is no squeezer in Bob’s side. Thus, the EB scheme discussed here is equivalent to the one-way CV-QKD with unidimentional modulated coherent states and heterodyne detection shown in Figure 2b. The secret key rate K against collective attacks for reverse reconciliation is given by [62]
K ( b ) = β I ( b ) A : B χ ( b ) B : E ,
where β is the reconciliation efficiency, I A : B = 1 2 l o g 2 V B ( b ) + 1 V B | A ( b ) + 1 is the classical mutual information between Alice and Bob, χ ( B : E ) is the Holevo quantity [63]:
χ ( b ) B : E = S ρ E ( b ) x B p ( b ) x B S ρ E | x B ( b ) ,
where S ( ρ ) is the von Neumann entropy of the state ρ , x B is Bob’s measurement result obtained with the probability p ( b ) x B , ρ E | x B ( b ) is the corresponding state of Eve’s ancillary, and ρ E ( b ) = x B p ( b ) x B ρ E | x B ( b ) are Eve’s partial states.
Since Eve is able to purify the whole system ρ A 1 B 1 ( b ) to maximize the information she can get, we have S ρ E ( b ) = S ρ A 1 B 1 ( b ) . Furthermore, after Bob’s projective measurement resulting in x B , the system ρ A 1 E ( b ) is pure, so that S ρ E | x B ( b ) = S ρ A 1 | x B ( b ) . According to the Gaussian optimality theorem, we assume the final state ρ A 1 B 1 ( b ) shared by Alice and Bob is Gaussian so that the information available to the eavesdropper is maximum [64,65]. Thus, the entropy S ( ρ A 1 B 1 ( b ) ) and x B p ( b ) x B S ρ A 1 | x B ( b ) can be calculated directly from the covariance matrices γ A 1 B 1 ( b ) and γ A 1 | x B ( b ) . In addition, now the expression for χ B E ( b ) can be simplified as followed:
χ B : E = i = 1 2 G λ i 1 2 G λ 3 1 2 ,
where G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x , λ 1 , 2 are the symplectic eigenvalues of the covariance matrix γ A 1 B 1 ( b ) and λ 3 is the symplectic eigenvalue of the covariance matrix γ A 1 | x B ( b ) , which can be obtained in terms of the corresponding EB scheme. As is described in the corresponding EB scheme, mode A 3 in Alice’s side and B 2 in Bob’s side turn into mode A and B after the channel, which satisfy the following relationships:
A ^ x , p ( b ) = η A A ^ 3 x , p + 1 η A E ^ 2 x , p ,
B ^ x , p ( b ) = η B B ^ 2 x , p + 1 η B E ^ 5 x , p ,
where η A = 10 α L A C / 10 , η B = 10 α L B C / 10 is the channel parameter transmittance on Alice’s and Bob’s side, with the loss of channel α = 0.2 dB/km, the transmission distance between Alice and Charlie L A C , and the transmission distance between Bob and Charlie L B C .
Then passing through a beamsplitter, mode A becomes mode C and mode B becomes mode D, and
C ^ x , p ( b ) = 1 2 ( A ^ x , p ( b ) B ^ x , p ( b ) ) , D ^ x , p ( b ) = 1 2 ( A ^ x , p ( b ) + B ^ x , p ( b ) ) .
After measurement and displacement operation, mode B 1 becomes mode B 1 , which is entangled with A 1 . In addition, the relationship between mode B 1 and mode B 1 can be written as
B ^ 1 x ( b ) = B ^ 1 x + g C ^ x ( b ) , B ^ 1 p ( b ) = B ^ 1 p + g D ^ p ( b ) ,
where g represents the gain of the displacement. Thus, the covariances of mode A 1 and mode B 1 in x - quadrature and p - quadrature can be calculated as
A ^ 1 x , B ^ 1 x ( b ) = T ( b ) V A V A 2 1 ,
A ^ 1 p , B ^ 1 p ( b ) = T ( b ) V A 2 1 / V A ,
where T ( b ) = g 2 ( b ) 2 η A . Furthermore, the variances of mode B 1 ( b ) are calculated by
V B 1 x ( b ) = V B + g 2 ( b ) 2 η A V A 2 + χ A + g 2 ( b ) 2 η B V B + χ B g 2 η B V B 2 1 , V B 1 p ( b ) = V B + g 2 ( b ) 2 η A 1 + χ A + g 2 ( b ) 2 η B V B + χ B g 2 η B V B 2 1 .
Then the covariance matrix γ A 1 B 1 ( b ) can be written naturally as
γ A 1 B 1 ( b ) = V A 0 T ( b ) V A V A 2 1 0 0 V A 0 C p ( b ) T ( b ) V A V A 2 1 0 T ( b ) V A 2 1 + ε ( b ) + 1 0 0 C p ( b ) 0 1 + T ( b ) ε ( b ) = γ A 1 σ A 1 B 1 T ( b ) σ A 1 B 1 ( b ) γ B 1 ( b ) ,
where
ε ( b ) = ε A + 1 η A η B V B + ε B 1 + 2 + V B 1 g 2 η B V B 2 1 g 2 ( b ) 2 η A .
The value of ε ( b ) reaches the minimum when g ( b ) = 2 η B V B 1 V B + 1 , and the minimum ε ( b ) = ε A + 1 η A η B ε B 2 + 2 . Furthermore, since the p - quadrature is not modulated, the correlation C p ( b ) is unknown. Yet the matrix is restricted by the constraint following from Heisenberg uncertainly principle:
γ A 1 B 1 ( b ) + i Ω 0 ,
where Ω = k = 1 N ω a n d ω = 0 1 1 0 . Thus the possible values of C p ( b ) is limited, and its value corresponding to the minimum secret key distribution should be concerned so that we can get the lower secure bound.
Next, the symplectic eigenvalues λ 3 is given by the matrix γ A 1 | x B ( b ) , which can be calculated by:
γ A 1 | x B ( b ) = γ A 1 σ A 1 B 1 T ( b ) γ B 1 ( b ) + I 1 σ A 1 B 1 ( b ) ,
where I is an identity matrix.

2.2.2. Using Unidimensional Modulated Coherent States ONLY in Bob’s Side

Similarly, the EB description in this case is similar to that shown in Figure 2a, and the only difference is that there is no squeezer in Alice’s side. In addition, the EB scheme discussed here is equivalent to the one-way CV-QKD model with homodyne detection, which is illustrated in Figure 2c. The secret key rate K against collective attacks for reverse reconciliation is also given by (1), where the first part in right side is now I ( c ) A : B = 1 2 l o g 2 V A + 1 V A | B ( c ) + 1 . The second part χ ( c ) ( B : E ) is given by (3), where λ 1 , 2 ( c ) are the symplectic eigenvalues of the covariance matrix γ A 1 B 1 ( c ) and λ 3 ( c ) is the symplectic eigenvalue of the covariance matrix γ A 1 | x B ( c ) . The calculations to obtain γ A 1 B 1 ( c ) and γ A 1 | x B ( c ) resemble those in Section 2.2.1. Finally, the matrix γ A 1 B 1 ( c ) has the following form:
γ A 1 B 1 ( c ) = V A 0 T x ( c ) V A 2 1 0 0 V A 0 C p ( c ) T x ( c ) V A 2 1 0 T x ( c ) V A + χ l i n e x ( c ) 0 0 C p ( c ) 0 T p ( c ) V A + χ l i n e p ( c ) = γ A 1 ( c ) σ A 1 B 1 T ( c ) σ A 1 B 1 ( c ) γ B 1 ( c ) ,
where T x ( c ) = g x 2 ( c ) η A / 2 and T p ( c ) = g p 2 ( c ) η A / 2 . The factors χ l i n e x ( c ) and χ l i n e p ( c ) can be calculated by:
χ l i n e x ( c ) = 1 T x ( c ) T x ( c ) + ε x ( c ) , χ l i n e p ( c ) = 1 T p ( c ) T p ( c ) + ε p ( c ) ,
with
ε x ( c ) = ε A + 1 η A η B V B 2 + ε B 1 + 2 + V B 1 g x ( c ) 2 η B V B ( V B 2 1 ) g x 2 ( c ) 2 η A , ε p ( c ) = ε A + 1 η A η B V B 2 + ε B 1 + 2 + V B 1 g p ( c ) 2 η B ( V B 2 1 ) / V B g p 2 ( c ) 2 η A .
The value of ε x ( c ) reaches the minimum when g x ( c ) = 2 η B V B 1 V B ( V B + 1 ) , and the minimum ε x ( c ) = ε A + 1 η A η B ε B V B 1 + 2 . The value of ε p ( b ) reaches the minimum when g p ( c ) = 2 η B V B ( V B 1 ) V B + 1 , and the minimum ε p ( c ) = ε A + 1 η A η B ε B 1 V B 1 + 2 .
Also, the matrix γ A 1 B 1 ( c ) is restricted by constraint following from Heisenberg uncertainly principle:
γ A 1 B 1 ( c ) + i Ω 0 .
Furthermore, the symplectic eigenvalues λ 3 ( c ) is given by the matrix γ A 1 | x B ( c ) , which can be calculated by:
γ A 1 | x B ( c ) = γ A 1 ( c ) σ A 1 B 1 T ( c ) X γ B 1 ( c ) X 1 σ A 1 B 1 ( c ) .

2.2.3. Using Unidimensional Modulated Coherent States Both in Alice’s and Bob’s Side

The EB description in this case is illustrated in Figure 2a, which is equivalent to the one-way CV-QKD model with homodyne detection shown in Figure 2d. Then the secret key rate K against collective attacks for reverse reconciliation is obtained by (1), with the I ( d ) A : B = 1 2 l o g 2 V A V A | B ( d ) . Furthermore, χ ( d ) ( B : E ) is given identically by (3), and all the parameters in the expression can be obtained from the final matrix γ A 1 B 1 ( d ) , whose form is as followed:
γ A 1 B 1 ( d ) = V A 0 T x ( d ) V A V A 2 1 0 0 V A 0 C p ( d ) T x ( d ) V A V A 2 1 0 T x ( d ) V A 2 1 + ε x ( d ) + 1 0 0 C p ( d ) 0 1 + T p ( d ) ε p ( d ) = γ A 1 ( d ) σ A 1 B 1 T ( d ) σ A 1 B 1 ( d ) γ B 1 ( d ) ,
where T x ( d ) = g x 2 ( d ) η A / 2 , T p ( d ) = g p 2 ( d ) η A / 2 , and
ε x ( d ) = ε A + 1 η A η B V B 2 + ε B 1 + 2 + V B 1 g x ( d ) 2 η B V B ( V B 2 1 ) g x 2 ( d ) 2 η A , ε p ( d ) = ε A + 1 η A η B V B 2 + ε B 1 + 2 + V B 1 g p ( d ) 2 η B ( V B 2 1 ) / V B g p 2 ( d ) 2 η A .
The values of ε x ( d ) and ε p ( d ) reaches the minimum similarly when
g x ( d ) = 2 η B V B 1 V B ( V B + 1 ) , g p ( d ) = 2 η B V B ( V B 1 ) V B + 1 ,
at this time are the minimum
ε x ( d ) = ε A + 1 η A η B ε B V B 1 + 2 , ε p ( d ) = ε A + 1 η A η B ε B 1 V B 1 + 2 .
Furthermore, the matrix γ A 1 B 1 ( d ) is restricted by the constraint following from Heisenberg uncertainly principle:
γ A 1 B 1 ( d ) + i Ω 0 .
Finally, the symplectic eigenvalues λ 3 ( d ) is given by the matrix γ A 1 | x B ( d ) , which can be calculated by:
γ A 1 | x B ( d ) = γ A 1 ( d ) σ A 1 B 1 T ( d ) X γ B 1 ( d ) X 1 σ A 1 B 1 ( d ) .

2.3. Numeral Simulation

In this section, the performance of the proposed three schemes of the unidimensional CV-QKD protocol with untrusted detection are illustrated and compared. In particular, we first summarize the optimal parameters of the proposed three schemes into a table illustrated in Table 1. Here, the performance of the three cases discussed above is considered to make a contrast.
The parameters that will affect the secret key rate are the reconciliation efficiency β , the variance of Alice and Bob V A , V B , the transmission efficiency η A , η B , excess noise ε A , ε B of two quantum channels. It can be seen in Table 1 that the excess noises ε x , ε p are related to the variance V B . When the values of ε x , ε p are less than zero, the excess noises are physically absent. Therefore, the values of variance V B , which make the excess noises ε x , ε p less than zero, are unreasonable. Conversely, when the values of V B make ε x , ε p greater than or equal to zero at the same time, they are reasonable. Thus, we make the variance V B take the values 1.001, 1.1, and 2, and simulate the performances of the excess noise ε x , ε p . As is shown in Figure 3, when the variance V B = 1.001 , the excess noises in x - and p - quadrature are both greater than zero, so we choose this value for numerical simulation. In particular, we choose a large variance of V A = 10 5 to see the performance of the ideal modulation, and use practical variance of V A = 4 to observe the realistic performance. Excess noise is set to ε A = ε B = ε = 0.001 and transmittance are η A = 10 α L A C / 10 , η B = 10 α L B C / 10 ( α = 0.2 dB/km) for simulation, which are standard parameters in one-way CV-QKD experiment. Furthermore, the other parameter reconciliation efficiencies in the three cases are set as β = 0.98 for practical case, and β = 1 for ideal case.
Firstly, we consider the performance of the symmetric case where the length of two quantum channels L A C = L B C . Then we make a numerical simulation of the secret key rates K in the three cases. Unfortunately, even the parameters are set to be ideal, the secret key is unable to be distilled in the case that unidimensional modulated coherent states only in Bob’s side. The phenomenon may be resulted from the structure of the scheme and the awful effect of the excess noise in the p - quadrature where the states are not modulated. Since MDI-type protocol requires displacement operation in Bob’s side, at least 1-unit extra variance will be introduced to the quadrature by Charlie’s announced data when displacing a coherent state, we find it rational that no secure key could be extracted in the case that the unidimensional modulation only in Bob’s side. Thus, the cases that unidimensional modulated coherent states only in Alice’s side as well as in both sides are taken into consideration. The simulation results are shown in Figure 4, from which we make a comparison. We find that the secret key rate of ideal condition is always larger than that of practical condition. Furthermore, it can be directly seen that the case of unidimentional modulation both in two sides corresponds to higher secret key rate and further transmission distance.
Secondly, we can consider the EB schemes of the proposed protocol as a continuous-variable quantum teleportation process, i.e., Alice and Bob prepare EPR states respectively, and then pass the mode from Alice to Bob. Therefore, any loss and noise in the channel from Bob to Charlie with the length L B C will reduce the quality of the EPR source, thus affecting the final performance, as is revealed in Figure 4. In other words, L B C has a much greater impact on the final performance than L A C . In order to eliminate this effect as much as possible and increase the total transmission distance, we try to shorten the distance between Bob and Charlie ( L B C ). The change of the total transmission distance is displayed by numerical simulation, where the distance between Bob and Charlie L B C is a function of the distance between Alice and Charlie L A C . Specifically, we find the maximum L B C , which makes the secret key rate greater than zero, corresponding to each L A C . The results are displayed in Figure 5, from which we can find that when Charlie’s position is close to Bob, the total maximal transmission distance L A B ( L A B = L A C + L B C ) will be relatively longer. Also, L A B improves with large variance V A = 10 5 . Furthermore, examining different locations the unidimentional modulation in, we find that the identical result that the transmission distance corresponding to the unidimentional modulation in both sides has a better performance.
Finally, an extreme asymmetric situation is considered when L B C = 0 . As revealed in Figure 6, the transmission distance between the two legitimate parties L A B increases significantly in a comparison with the symmetric case. In this case, the secret key rates correlated with the unidimentional modulation in both sides provide a better performance and the performance of the secret key rate in the ideal condition is better than that in the practical condition. Besides, we also plot the curves of standard CV-MDI QKD in Figure 6 for a better understanding of the secret key rate performance of our proposed protocol. As is revealed in Figure 6, the performance of the proposed protocol is comparable to the standard CV-MDI QKD protocol.

3. Discussion and Conclusions

In this paper, a unidimensional continuous-variable quantum key distribution protocol with untrusted detection under realistic conditions is proposed. We consider three situations including using unidimensional modulated coherent states at each side or both sides and derive the expressions of the secret key rates against the collective attacks of protocols in each situation, where the third party is untrusted and may be controlled by the eavesdropper. Making use of the expression we make numeral simulations and compare the performances of the cases that the unidimensional modulation exists only in Alice’s side as well as in both sides. From the simulation results can we know that the protocol provides a better performance when the unidimensional modulation is used in both sides of the two legitimate partners, and decreasing the distance between Bob and Charlie helps make the total transmission distance further. Indeed, with the appropriate parameters and schemes selected, we could extract the secret key based on the proposed protocol except in the case of unidimensional coherent states only in Bob’s side. We provide a possible explanation of the phenomenon, and the reason for more accuracy is still an open question. We would like to model this situation better in the future. Undoubtedly, the proposed protocol provides a simple method to simplify the implementation of the CV-QKD systems, and the security analysis is based on the uncertainty relation. In addition, the scheme has the ability to immune to the collective attacks against standard detectors that are very likely to exist in practical system.

Author Contributions

Conceptualization, L.H. and Z.C.; methodology, Y.Z.; validation, L.H.; formal analysis, L.H.; investigation, L.H., Y.Z., Z.C., and S.Y.; resources, Y.Z. and S.Y.; writing–original draft preparation, L.H.; writing—review and editing, L.H. and Y.Z; visualization, L.H.; funding acquisition, Y.Z. and S.Y.

Funding

This work was supported in part by the Key Program of National Natural Science Foundation of China under Grants 61531003, the National Natural Science Foundation under Grants 61427813, and the Fund of State Key Laboratory of Information Photonics and Optical Communications.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74. [Google Scholar] [CrossRef]
  2. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef]
  3. Diamanti, E.; Lo, H.-K.; Qi, B.; Yuan, Z. Practical challenges in quantum key distribution. npj Quantum Inf. 2016, 2, 16025. [Google Scholar] [CrossRef]
  4. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in Quantum Cryptography. arXiv 2019, arXiv:1906.01645. [Google Scholar]
  5. Bennett, C.; Brassard, G. Quantum Cryptography: Public key cryptography and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  6. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed]
  7. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  8. Diamanti, E.; Leverrier, A. Distributing secret keys with quantum continuous variables: Principle, security and implementations. Entropy 2015, 17, 6072–6092. [Google Scholar] [CrossRef]
  9. Inoue, K.; Waks, E.; Yamamoto, Y. Differential-phase-shift quantum key distribution using coherent light. Phys. Rev. A 2003, 68, 022317. [Google Scholar] [CrossRef]
  10. Stucki, D.; Brunner, N.; Gisin, N.; Scarani, V.; Zbinden, H. Fast and simple one-way quantum key distribution. Appl. Phys. Lett. 2005, 87, 194108. [Google Scholar] [CrossRef]
  11. Bacco, D.; Christensen, J.B.; Castaneda, M.A.U.; Ding, Y.; Forchhammer, S.; Rottwitt, K.; Oxenløwe, L.K. Two-dimensional distributed-phase-reference protocol for quantum key distribution. Sci. Rep. 2016, 6, 36756. [Google Scholar] [CrossRef] [PubMed]
  12. Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M.G.; Natarajan, C.M.; et al. Chip-based quantum key distribution. Nat. Commun. 2017, 8, 13984. [Google Scholar] [CrossRef] [PubMed]
  13. Ding, Y.; Bacco, D.; Dalgaard, K.; Cai, X.; Zhou, X.; Rottwitt, K.; Oxenløwe, L.K. High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits. npj Quantum Inf. 2017, 3, 25. [Google Scholar] [CrossRef]
  14. Agnesi, C.; Da Lio, B.; Cozzolino, D.; Cardi, L.; Ben Bakir, B.; Hassan, K.; Della Frera, A.; Ruggeri, A.; Giudice, A.; Vallone, G.; et al. Hong-Ou-Mandel interference between independent III-V on silicon waveguide integrated lasers. Opt. Lett. 2019, 2, 271–274. [Google Scholar] [CrossRef] [PubMed]
  15. Bacco, D.; Ding, Y.; Dalgaard, K.; Rottwit, K.; Oxenløwe, L.K. Space division multiplexing chip-to-chip quantum key distribution. Sci. Rep. 2017, 7, 12459. [Google Scholar] [CrossRef] [PubMed]
  16. Zhang, G.; Haw, J.Y.; Cai, H.; Xu, F.; Assad, S.M.; Fitzsimons, J.F.; Zhou, X.; Zhang, Y.; Yu, S.; Wu, J.; et al. Integrated chip for continuous-variable quantum key distribution using silicon photonic fabrication. Nat. Photonics 2019. [Google Scholar] [CrossRef]
  17. Zhang, Y.; Li, Z.; Chen, Z.; Weedbrook, C.; Zhao, Y.; Wang, X.; Huang, Y.; Xu, C.; Zhang, X.; Wang, Z.; et al. Continuous-variable QKD over 50 km commercial fiber. Quantum Sci. Technol. 2019, 4, 035006. [Google Scholar] [CrossRef]
  18. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378–381. [Google Scholar] [CrossRef]
  19. Qi, B.; Lougovski, P.; Pooser, R.; Grice, W.; Bobrek, M. Generating the local oscillator “locally” in continuous-variable quantum key distribution based on coherent detection. Phys. Rev. X 2015, 5, 041009. [Google Scholar] [CrossRef]
  20. Soh, D.; Brif, C.; Coles, P.J.; Lütkenhaus, N.; Camacho, R.M.; Urayama, J.; Sarovar, M. Self-referenced continuous-variable quantum key distribution protocol. Phys. Rev. X 2015, 5, 04101. [Google Scholar] [CrossRef]
  21. Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef] [PubMed]
  22. Leverrier, A. Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction. Phys. Rev. Lett. 2017, 118, 200501. [Google Scholar] [CrossRef] [PubMed]
  23. Zhang, Y.; Huang, Y.; Chen, Z.; Li, Z.; Yu, S.; Guo, H. One-time shot-noise unit calibration method for continuous-variable quantum key distribution. arXiv 2019, arXiv:1908.06230. [Google Scholar]
  24. Zhou, C.; Wang, X.; Zhang, Y.; Zhang, Z.; Yu, S.; Guo, H. Continuous-variable quantum key distribution with rateless reconciliation protocol. Phys. Rev. Appl. 2019, 12, 054013. [Google Scholar] [CrossRef]
  25. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [PubMed]
  26. Grosshans, F.; Wenger, J.; Tualle-Brouri, R.; Grangier, P.; Cerf, N.J. High-rate quantum key distribution using Gaussian-modulated coherent states. Nature 2003, 421, 8160581. [Google Scholar] [CrossRef] [PubMed]
  27. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Ping, K.L. Quantum cryptography without switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef] [PubMed]
  28. Pirandola, S.; Mancini, S.; Lloyd, S.; Braunstein, S.L. Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 2008, 4, 726. [Google Scholar] [CrossRef]
  29. García-Patrón, R.; Cerf, N.J. Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 2009, 102, 130501. [Google Scholar]
  30. Renner, R.; Cirac, J.I. de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 2009, 102, 110504. [Google Scholar] [CrossRef] [PubMed]
  31. Pirandola, S.; García-Patrón, R.; Braunstein, S.L.; Lloyd, S. Direct and reverse secret-Key capacities of a quantum channel. Phys. Rev. Lett. 2009, 102, 050503. [Google Scholar] [CrossRef] [PubMed]
  32. Weedbrook, C.; Pirandola, S.; Lloyd, S.; Ralph, T.C. Quantum cryptography approaching the classical limit. Phys. Rev. Lett. 2010, 105, 110501. [Google Scholar] [CrossRef] [PubMed]
  33. Sun, M.; Peng, X.; Shen, Y.; Guo, H. Security of a new two-way continuous-variable quantum key distribution protocol. Int. J. Quantum Inf. 2012, 10, 1250059. [Google Scholar] [CrossRef]
  34. Zhang, Y.; Li, Z.; Weedbrook, C.; Yu, S.; Gu, W.; Sun, M.; Peng, X.; Guo, H. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers. J. Phys. B At. Mol. Opt. Phys. 2014, 47, 035501. [Google Scholar] [CrossRef]
  35. Zhang, Y.; Li, Z.; Zhao, Y.; Yu, S.; Guo, H. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation. J. Phys. B At. Mol. Opt. Phys. 2017, 50, 035501. [Google Scholar] [CrossRef] [Green Version]
  36. Leverrier, A.; García-Patrón, R.; Renner, R.; Cerf, N.J. Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 2013, 110, 030502. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  37. Weedbrook, C.; Ottaviani, C.; Pirandola, S. Two-way quantum cryptography at different wavelengths. Phys. Rev. A 2014, 89, 012309. [Google Scholar] [CrossRef] [Green Version]
  38. Chen, Z.; Zhang, Y.; Wang, X.; Yu, S.; Guo, H. Improving parameter estimation of entropic uncertainty relation in continuous-variable quantum key distribution. Entropy 2019, 21, 652. [Google Scholar] [CrossRef] [Green Version]
  39. Huang, A.; Barz, S.; Andersson, E.; Makarov, V. Implementation vulnerabilities in general quantum cryptography. New J. Phys. 2018, 20, 103016. [Google Scholar] [CrossRef]
  40. Antonio, A.; Nicolas, B.; Nicolas, G.; Serge, M.; Stefano, P.; Valerio, S. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 2007, 98, 230501. [Google Scholar]
  41. Thearle, O.; Janousek, J.; Armstrong, S.; Hosseini, S.; Schünemann (Mraz), M.; Assad, S.; Symul, T.; James, M.R.; Huntington, E.; Ralph, T.C.; et al. Violation of Bell’s inequality using continuous variable measurements. Phys. Rev. Lett. 2018, 120, 040406. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  42. Li, Z.; Zhang, Y.-C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef] [Green Version]
  43. Zhang, Y.-C.; Li, Z.; Yu, S.; Gu, W.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution using squeezed states. Phys. Rev. A 2014, 90, 052325. [Google Scholar] [CrossRef] [Green Version]
  44. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397. [Google Scholar] [CrossRef] [Green Version]
  45. Weedbrook, C. Continuous-variable quantum key distribution with entanglement in the middle. Phys. Rev. A 2013, 87, 022308. [Google Scholar] [CrossRef] [Green Version]
  46. Zhang, Y.; Chen, Z.; Weedbrook, C.; Yu, S.; Guo, H. Continuous-variable source-device-independent quantum key distribution against general attacks. arXiv 2018, arXiv:1811.11973. [Google Scholar]
  47. Gehring, T.; Handchen, V.; Duhme, J.; Furrer, F.; Franz, T.; Pacher, C.; Werner, R.F.; Schnabel, R. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks. Nat. Commun. 2015, 6, 8795. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  48. Walk, N.; Hosseini, S.; Geng, J.; Thearle, O.; Haw, J.Y.; Armstrong, S.; Assad, S.M.; Janousek, J.; Ralph, T.C.; Symul, T.; et al. Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution. Optica 2016, 3, 634. [Google Scholar] [CrossRef] [Green Version]
  49. Zhang, X.; Zhang, Y.; Zhao, Y.; Wang, X.; Yu, S.; Guo, H. Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2017, 96, 042334. [Google Scholar] [CrossRef] [Green Version]
  50. Lupo, C.; Ottaviani, C.; Papanastasiou, P.; Pirandola, S. Continuous-variable measurement-device- independent quantum key distribution: Composable security against coherent attacks. Phys. Rev. A 2018, 97, 052327. [Google Scholar] [CrossRef] [Green Version]
  51. Chen, Z.; Zhang, Y.; Wang, G.; Li, Z.; Guo, H. Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks. Phys. Rev. A 2018, 98, 012314. [Google Scholar] [CrossRef] [Green Version]
  52. Furrer, F.; Franz, T.; Berta, M.; Leverrier, A.; Scholz, V.B.; Tomamichel, M.; Werner, R.F. Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks. Phys. Rev. Lett. 2012, 109, 100502. [Google Scholar] [CrossRef] [PubMed]
  53. Furrer, F. Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle. Phys. Rev. A 2014, 90, 042325. [Google Scholar] [CrossRef] [Green Version]
  54. Zhao, Y.; Zhang, Y.; Xu, B.; Yu, S.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction. Phys. Rev. A 2018, 97, 042328. [Google Scholar] [CrossRef] [Green Version]
  55. Ma, H.; Huang, P.; Bai, D.; Wang, S.; Bao, W.; Zeng, G. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction. Phys. Rev. A 2018, 97, 042329. [Google Scholar] [CrossRef] [Green Version]
  56. Usenko, V.; Grosshans, F. Unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2015, 92, 062337. [Google Scholar] [CrossRef] [Green Version]
  57. Usenko, V. Unidimensional continuous-variable quantum key distribution using squeezed states. Phys. Rev. A 2018, 98, 032321. [Google Scholar] [CrossRef] [Green Version]
  58. Wang, X.; Liu, W.; Wang, P.; Li, Y. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2017, 95, 062330. [Google Scholar] [CrossRef] [Green Version]
  59. Wang, P.; Wang, X.; Li, J.; Li, Y. Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions. Opt. Express 2017, 25, 27995. [Google Scholar] [CrossRef]
  60. Huang, L.; Zhang, Y.; Huang, Y.; Jiang, T.; Yu, S. Improvement of unidimensional continuous-variable quantum key distribution systems by using a phase-sensitive amplifier. J. Phys. B At. Mol. Opt. Phys. 2019, 52, 225502. [Google Scholar] [CrossRef]
  61. Bai, D.; Huang, P.; Zhu, Y.; Ma, H.; Xiao, T.; Wang, T.; Zeng, G. Unidimensional continuous-variable measurement-device-independent quantum key distribution. arXiv 2019, arXiv:1905.09029. [Google Scholar]
  62. Devetak, I.; Winter, A. Efficient quadrature of highly-oscillatory integrals using derivatives. Proc. R. Soc. A 2005, 461, 2057. [Google Scholar]
  63. Holevo, A.S. Bounds for the Quantity of Information Transmitted by a Quantum Communication Channel. Probl. Inf. Transm. 1973, 9, 177. [Google Scholar]
  64. García-Patrón, R.; Cerf, N.J. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  65. Wolf, M.M.; Giedke, G.; Cirac, J.I. Extremality of Gaussian Quantum States. Phys. Rev. Lett. 2006, 96, 080502. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. (Color online) The PM scheme of the unidimensional CV-QKD protocol with untrusted detection with the unidimensional modulator in both sides, where both Alice and Bob perform unidimensional modulation. Replacing the unidimensional modulation in Bob’s side with the standard Gaussian modulation corresponds to the case of unidimensional modulation only in Alice’s side, while replacing the unidimensional modulation in Alice’s side with the standard Gaussian modulation corresponds to the case of unidimensional modulation only in Bob’s side. In particular, the quantum channels and Charlie are fully controlled by Eve.
Figure 1. (Color online) The PM scheme of the unidimensional CV-QKD protocol with untrusted detection with the unidimensional modulator in both sides, where both Alice and Bob perform unidimensional modulation. Replacing the unidimensional modulation in Bob’s side with the standard Gaussian modulation corresponds to the case of unidimensional modulation only in Alice’s side, while replacing the unidimensional modulation in Alice’s side with the standard Gaussian modulation corresponds to the case of unidimensional modulation only in Bob’s side. In particular, the quantum channels and Charlie are fully controlled by Eve.
Entropy 21 01100 g001
Figure 2. (Color online) The EB scheme and the equivalent one-way model of the unidimensional CV-QKD protocol, where the EPR states are two-mode vacuum states, with untrusted detection and coherent states (a) The EB scheme of the unidimentional modulation both in Alice’s and Bob’s side where the detectors are all homodyne detector. (b) The equivalent one-way model of the case that are the unidimentional modulation only in Alice’s side. (c) The equivalent one-way model of the case that are the unidimentional modulation only in Bob’s side. (d) The equivalent one-way model of the case that are the unidimentional modulation both in Alice’s and Bob’s side. In particular, two quantum channels and Charlie are fully controlled by Eve, but Eve has no access to the apparatuses in Alice’s and Bob’s stations.
Figure 2. (Color online) The EB scheme and the equivalent one-way model of the unidimensional CV-QKD protocol, where the EPR states are two-mode vacuum states, with untrusted detection and coherent states (a) The EB scheme of the unidimentional modulation both in Alice’s and Bob’s side where the detectors are all homodyne detector. (b) The equivalent one-way model of the case that are the unidimentional modulation only in Alice’s side. (c) The equivalent one-way model of the case that are the unidimentional modulation only in Bob’s side. (d) The equivalent one-way model of the case that are the unidimentional modulation both in Alice’s and Bob’s side. In particular, two quantum channels and Charlie are fully controlled by Eve, but Eve has no access to the apparatuses in Alice’s and Bob’s stations.
Entropy 21 01100 g002
Figure 3. (Color online) Excess noise versus distance with different V B in the situation that unidimensional modulation is in both sides. The dotted lines are under the condition that V B = 2 , the dashed lines represent the condition that V B = 1.1 , and the solid lines represent the case that V B = 1.001 . ε A and ε B is set as ε A = ε B = 0.001 . In particular, the region is divided into two parts by a black dotted-dashed line, where upper part is a reasonable region, indicating that the excess noise is greater than zero, and the lower half is an unreasonable area, indicating that the excess noise is less than zero.
Figure 3. (Color online) Excess noise versus distance with different V B in the situation that unidimensional modulation is in both sides. The dotted lines are under the condition that V B = 2 , the dashed lines represent the condition that V B = 1.1 , and the solid lines represent the case that V B = 1.001 . ε A and ε B is set as ε A = ε B = 0.001 . In particular, the region is divided into two parts by a black dotted-dashed line, where upper part is a reasonable region, indicating that the excess noise is greater than zero, and the lower half is an unreasonable area, indicating that the excess noise is less than zero.
Entropy 21 01100 g003
Figure 4. (Color online) Secret key rate in the symmetric case ( L A C = L B C ). the dotted lines are under the ideal condition ( V A = 10 5 , β = 1 in the situations of unidimensional modulation only in Alice’s side as well as in both sides) and the solid lines represent the practical condition ( V A = 4 , β = 0.98 in the situations of unidimensional modulation only in Alice’s side as well as in both sides). The red lines represent the case that the unidimentional modulation only exists in Alice’s side, the black lines are on behalf of the case that the unidimensional modulation exists in both sides.
Figure 4. (Color online) Secret key rate in the symmetric case ( L A C = L B C ). the dotted lines are under the ideal condition ( V A = 10 5 , β = 1 in the situations of unidimensional modulation only in Alice’s side as well as in both sides) and the solid lines represent the practical condition ( V A = 4 , β = 0.98 in the situations of unidimensional modulation only in Alice’s side as well as in both sides). The red lines represent the case that the unidimentional modulation only exists in Alice’s side, the black lines are on behalf of the case that the unidimensional modulation exists in both sides.
Entropy 21 01100 g004
Figure 5. (Color online) Curves of the correlation between L A C and L B C . The transmission distance from Alice and Charlie L A C is considered to be a function of the distance from Bob to Charlie L B C . the dotted lines are under the ideal condition ( V A = 10 5 , β = 1 in the situations of unidimensional modulation only in Alice’s side as well as in both sides) and the solid lines represent the practical condition ( V A = 4 , β = 0.98 in the situations of unidimensional modulation only in Alice’s side as well as in both sides). The red lines represent the case that the unidimentional modulation only exists in Alice’s side, the black lines are on behalf of the case that the unidimensional modulation exists in both sides of Alice and Bob. The excess noise to be ε A = ε B = 0.001 .
Figure 5. (Color online) Curves of the correlation between L A C and L B C . The transmission distance from Alice and Charlie L A C is considered to be a function of the distance from Bob to Charlie L B C . the dotted lines are under the ideal condition ( V A = 10 5 , β = 1 in the situations of unidimensional modulation only in Alice’s side as well as in both sides) and the solid lines represent the practical condition ( V A = 4 , β = 0.98 in the situations of unidimensional modulation only in Alice’s side as well as in both sides). The red lines represent the case that the unidimentional modulation only exists in Alice’s side, the black lines are on behalf of the case that the unidimensional modulation exists in both sides of Alice and Bob. The excess noise to be ε A = ε B = 0.001 .
Entropy 21 01100 g005
Figure 6. (Color online) Secret key rate versus transmission distance between Alice and Charlie, and the distance L B C is set to L B C = 0 . Identically, the dotted lines are under the ideal condition, and the solid lines represent the practical condition. The red lines represent the case that the unidimentional modulation only exists in Alice’s side, the black lines are on behalf of the case that the unidimensional modulation exists in both sides of Alice and Bob, and the blue lines are the secret key rates of the standard CV-MDI protocols. The parameters are set the same as the symmetric situation.
Figure 6. (Color online) Secret key rate versus transmission distance between Alice and Charlie, and the distance L B C is set to L B C = 0 . Identically, the dotted lines are under the ideal condition, and the solid lines represent the practical condition. The red lines represent the case that the unidimentional modulation only exists in Alice’s side, the black lines are on behalf of the case that the unidimensional modulation exists in both sides of Alice and Bob, and the blue lines are the secret key rates of the standard CV-MDI protocols. The parameters are set the same as the symmetric situation.
Entropy 21 01100 g006
Table 1. Optimal parameters of the unidimensional CV-QKD protocol with untrusted detection.
Table 1. Optimal parameters of the unidimensional CV-QKD protocol with untrusted detection.
Using Unidimensional Modulated Coherent States Only in Alice’s SideUsing Unidimensional Modulated Coherent States Only in Bob’s SideUsing Unidimensional Modulated Coherent States Only in Both Sides
ε x ε A + 1 η A η B ε B 2 + 2 ε A + 1 η A η B ε B V B 1 + 2 ε A + 1 η A η B ε B V B 1 + 2
ε p ε A + 1 η A η B ε B 2 + 2 ε A + 1 η A η B ε B 1 V B 1 + 2 ε A + 1 η A η B ε B 1 V B 1 + 2
g x 2 η B V B 1 V B + 1 2 η B V B 1 V B ( V B + 1 ) 2 η B V B 1 V B ( V B + 1 )
g p 2 η B V B 1 V B + 1 2 η B V B ( V B 1 ) V B + 1 2 η B V B ( V B 1 ) V B + 1

Share and Cite

MDPI and ACS Style

Huang, L.; Zhang, Y.; Chen, Z.; Yu, S. Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions. Entropy 2019, 21, 1100. https://doi.org/10.3390/e21111100

AMA Style

Huang L, Zhang Y, Chen Z, Yu S. Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions. Entropy. 2019; 21(11):1100. https://doi.org/10.3390/e21111100

Chicago/Turabian Style

Huang, Luyu, Yichen Zhang, Ziyang Chen, and Song Yu. 2019. "Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions" Entropy 21, no. 11: 1100. https://doi.org/10.3390/e21111100

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop