Next Article in Journal
Sentiment-Aware Word Embedding for Emotion Classification
Previous Article in Journal
A Robust Brain MRI Segmentation and Bias Field Correction Method Integrating Local Contextual Information into a Clustering Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Eight-State Continuous Variable Quantum Key Distribution by Applying Photon Subtraction

1
School of Automation, Central South University, Changsha 410083, China
2
Jiangsu Key Construction Laboratory of IoT Application Technology, Wuxi Taihu University, Wuxi 214064, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2019, 9(7), 1333; https://doi.org/10.3390/app9071333
Submission received: 28 January 2019 / Revised: 17 March 2019 / Accepted: 26 March 2019 / Published: 29 March 2019

Abstract

:
We propose a new method to effectively improve the performance of a quantum key distribution with eight-state continuous variables by the photon subtraction method. This operation is effective in increasing and distilling Gaussian entanglement between quantum states, and can be easily realized by existing technology. Simulation results show that the channel-loss tolerance of the eight-state continuous variable quantum key distribution (CVQKD) protocol can be extended by the appropriate photon subtraction algorithm; namely, single-photon subtraction.

1. Introduction

Two independent long-distance legitimate communicators, say, Alice’s station and Bob’s station, can generate an unordered security key sequence through the untrusted quantum and traditional electronic channels by using quantum key distribution (QKD) [1,2]. The fundamental laws of quantum mechanics ensure their absolute security [3,4]. The traditional QKD protocol is usually divided into the following three categories: The discrete variable (DV) QKD protocol, which encodes information based on the polarization states of a single photon. The second is the continuous variable (CV) QKD protocol [5,6,7,8], which encodes key bits in the quadrature of the optical field. The third is the distributed phase reference (DPR) QKD protocol; its main implementation is to use weak coherent pulses to pass information. Unlike DVQKD, in CVQKD there is no necessity to use a single photon detector. Additionally, the security of CVQKD against collective attacks [9,10] and coherent attacks has been proved. Therefore, it can provide a more cost-effective solution, in practice, than its DVQKD counterpart [11]. While the DPRQKD protocol has been used in real settings for many years, it has never been completely secure [12].
Generally speaking, CVQKD can be mainly divided into two categories: Discrete modulation CVQKD [13] and Gaussian modulation CVQKD [14]. However, in the context of long-distance communication, in Gaussian modulation CVQKD it is difficult to harmonize the Gaussian variable required for modulation in the presence of a low SNR. Fortunately, there is no such limitation for discretely-modulated CVQKD protocols. It is worth noting that the current four-state CVQKD has been proven secure during an anti-collective attack, which has been experimentally demonstrated [15,16,17]. Recently, another discretely-modulated scheme, called the eight-state CVQKD, has been proposed, which shows better performance compared with the four-state CVQKD [18,19].
Non-Gaussian operations (including photon addition and photon subtraction) have been diffusely studied in both theory and experiments. By taking advantage of these operations, the entanglement of an Gaussian entangled state is improved and distilled, and thus the maximum secure distance is well-enhanced [20,21,22]. The implementation of a photon subtraction operation is simple, as it can be smoothly performed with optical beam splitters and photon detectors. In this paper, we deployed a photon subtraction operation on Alice’s side, in order to effectively improve the performance of the eight-state protocol. A security analysis shows that the performance of the eight-state protocol can be improved with proper photon subtraction.
The structure of this paper is as follows. In Section 2, we introduce the original eight-state CVQKD protocol, and then introduce the modified protocol (applying a photon-subtraction operation). In Section 3, we perform a security analysis of the modified protocol. Simulation results are illustrated in Section 4. Finally, the conclusion is drawn in Section 5.

2. Eight-State CVQKD with Photon Subtraction Operation

This section is divided into two parts. The original eight-state CVQKD protocol is first explained. Then, we introduce a modified eight-state protocol, based on the entanglement-based (EB) scheme.

2.1. Eight-State CVQKD Protocol

In the eight-state protocol, the eight coherent displaced states α k 8 prepared by Alice are given by
α k 8 = α e i k π 4 ,
where k is the number of coherent displacement states (ranging from 0 to 7), and α is a positive real number obtained from the modulation variance of the coherent state. After that, Alice sends one state to Bob, the state being randomly obtained from eight states. When this state reaches Bob’s station by the quantum channel, Bob measures it using a homodyne or heterodyne detector.
Bob’s received noise variance can be expressed as 1 + τ ϵ N 0 . This noise is mainly generated by the interaction of the excess noise ϵ and the transmission efficiency τ , where N 0 is expressed as the shot-noise limit. Therefore, the total noise received at the Bob’s station can be given by X l i n e = 1 / τ + ϵ 1 [18]. Finally, they achieve the final secret key by taking advantage of privacy amplification and error correction. In the EB protocol, Alice needs to prepare a pure two-mode quantum state. The received matrix ρ 8 can be expressed as
ρ 8 = 1 8 k = 0 7 α k 8 α k 8 = k = 0 7 λ k ϕ k ϕ k ,
where
λ 0 ( 4 ) = 1 4 e α 2 c o s h ( α 2 ) + c o s ( α 2 ) ± 2 c o s ( α 2 2 ) c o s h ( α 2 2 ) , λ 1 ( 5 ) = 1 4 e α 2 s i n h ( α 2 ) + s i n ( α 2 ) ± 2 c o s ( α 2 2 ) s i n h ( α 2 2 ) ± 2 s i n ( α 2 2 ) c o s h ( α 2 2 ) , λ 2 ( 6 ) = 1 4 e α 2 s i n h ( α 2 ) s i n ( α 2 ) ± 2 s i n ( α 2 2 ) s i n h ( α 2 2 ) , λ 3 ( 7 ) = 1 4 e α 2 s i n h ( α 2 ) s i n ( α 2 ) 2 c o s ( α 2 2 ) s i n h ( α 2 2 ) ± 2 s i n ( α 2 2 ) c o s h ( α 2 2 ) ,
and
ϕ k = e α 2 / 2 λ k n = 0 e α 8 n + k ( 8 n + k ) ! 8 n + k , k 0 , 1 , 2 . . . , 7 .
When we apply the annihilation operator α ^ to ϕ k , we obtain α ^ ϕ 0 = α λ 7 / λ 0 ϕ 7 , and α ^ ϕ k = α λ k 1 / λ k ϕ k 1 , k 0 , 1 , 2 . . . , 7 . Therefore, the state ρ 8 can be further processed as
Ψ 8 = k = 0 7 λ k ϕ k ϕ k = 1 4 k = 0 7 ψ k α k 8 ,
where the states ψ k are the orthogonal non-Gaussian states
ψ k = 1 2 m = 0 7 e i ( 4 k + 1 ) m π 4 ϕ m , k 0 , 1 , 2 . . . , 7 .
Among these, Alice prepares the quantum entangled states ψ k ψ k ( k 0 , 1 , 2 . . . , 7 ) and performs projection measurements, one of which enters the first half of Ψ 8 , while the other half is projected to the eight coherent states ϕ k ( k 0 , 1 , 2 . . . , 7 ) with equal probability.
Now, we analyze the covariance matrix γ 8 of state Ψ 8 , which is given by
γ 8 = X L 2 Z 8 σ z Z 8 σ z Y L 2 ,
where the L 2 represents a diagonal matrix of [ 1 , 1 ] , σ z represents a diagonal matrix of [ 1 , 1 ] , and
X = Ψ 8 2 a + 1 Ψ 8 , Y = Ψ 8 2 b + 1 Ψ 8 , Z 8 = Ψ 8 a b + a b Ψ 8 ,
where a , b , a , and b are operators associated with the Alice and Bob modes, respectively; a and a are the annihilation operators, and b and b are the creation operators. Thus, X , Y , and Z 8 in the covariance matrix γ 8 can be calculated as
X = Y = 2 a 2 + 1 , Z 8 = 2 a 2 k = 0 7 λ k 1 3 2 λ k 1 2 .
In addition, V a = 2 a 2 .
Afterwards, Bob obtains a final key, shared with Alice by the implementation of reverse reconciliation and a privacy amplifier.

2.2. Eight-State CVQKD with Photon Subtraction Operation

In what follows, as shown in Figure 1, we suggest an improved eight-state CVQKD scheme by using the photon-subtraction operation. Here, Alice takes advantage of a beam splitter (BS) to split modes B and C 0 (vacuum state) into mode B 1 and mode C, where the states A,C, and B 1 can be expressed as
ρ A C B 1 = U B S Ψ 8 Ψ 8 0 0 U B S .
For the measurement of mode C, Alice gets Π ^ 0 , Π ^ 1 by utilizing positive operator-valued measurement (POVM) in the photon-number-resolving detector (PNRD). The number of photon reductions is related to Π ^ 1 = k k . The modes A and B 1 are kept by Alice and Bob when the POVM element Π ^ 1 clicks. The photon-subtracted state ρ A B 1 Π ^ 1 is expressed by
ρ A B 1 Π ^ 1 = t r C ( Π ^ 1 ρ A C B 1 ) t r A C B 1 ( Π ^ 1 ρ A C B 1 ) ,
where t r X ( · ) is a multimode quantum state part. Our success probability of subtracting k photons is denoted by P k Π ^ 1 , which is given by
P k Π ^ 1 = t r A C B 1 ( Π ^ 1 ρ A C B 1 ) = ( 1 λ 2 ) n = k λ 2 n C n k μ n k ( 1 μ ) k = 1 λ 2 1 μ λ 2 λ 2 ( 1 μ ) 1 μ λ 2 k ,
where λ = ( V 1 ) / ( V + 1 ) . It is worth noting that the state ρ A B 1 Π ^ 1 is no longer a Gaussian distribution after the photon-subtraction operation. Here, Alice performs heterodyne detection. Note that it can be converted into an electrical signal without distortion by selecting a suitable photodetector. When the circuit completes the inspection task, the photodetector ultimately detects the required information in the form of an output electrical signal, which helps to generate a key sequence when interacting with Bob. Bob can perform heterodyne or homodyne detection. In this experiment, we focus our attention on the homodyne measurement. Suppose γ 8 ( k ) represents the covariance matrix of ρ A B 2 Π ^ 1 , which is expressed as ([20]):
γ 8 ( k ) = X L 2 Z 8 σ z Z 8 σ z Y L 2 ,
where
X = μ λ 2 + 2 k + 1 1 μ λ 2 , Y = μ λ 2 ( 2 k + 1 ) + 1 1 μ λ 2 , Z 8 = 2 μ λ ( k + 1 ) 1 μ λ 2 .

3. Security Analysis

3.1. The Optimal Value

We need to find the optimal value for V a , because this value will directly determine whether the performance of the eight-state CVQKD protocol shows the best performance. First, we use the content in Section 2 to build a data model of the original eight-state protocol. We keep the other parameters unchanged in the data model, but only change the transmission distance parameter d (excess noise ϵ is fixed to legitimate value), and establish a relationship diagram between V a and the secret key rate. As shown in Figure 2, we find that the secret key rate achieves the highest value when V a = 0.25 .
We need to further verify the V a value. The transmission distance d is fixed to a legitimate value and the other parameters are kept unchanged. Here, we choose different values of the excess noise ϵ . From Figure 3, we observe that the optimal V a value still exists in a public interval including 0.25.
Therefore, we take the value of V a to be 0.25 in the following analysis.

3.2. Secret Key Rate

In this section, we calculate the secure key rate of the modified protocol. In this case, we performed heterodyne detection and homodyne detection with Alice and Bob, respectively. While Eve only performs a collective attack to get the best results, and the information obtained is limited to the Holevo range S ( E : B ) . It should be noted that the state ρ A B 1 Π ^ 1 is no longer a Gaussian state after the photon subtraction operation is performed. Therefore, here, we cannot directly apply the traditional Gaussian CVQKD results to calculate the secret key rate. We derive the secure key rate based on the extremum of the Gaussian quantum states and the corresponding object with the same covariance matrix
K = P k Π ^ 1 [ β I ( A : B ) S ( E : B ) ] ,
where I ( A : B ) and S ( E : B ) correspond to the mutual information between Alice–Bob and Eve–Bob, and β is the efficiency of reverse reconciliation. When the state emitted by Alice passes through the channel controlled by Eve, the covariance matrix γ A B 3 is expressed as
γ A B 3 = a L 2 c σ z c σ z b L 2 ,
where a = X , b = η ( Y + X l i n e ) , and c = η Z 8 .
Then, I ( A : B ) is derived based on Bob’s measurement, which is calculated by
I ( A : B ) = 1 2 l o g 2 V A V A | B ,
with V A = ( a + 1 ) / 2 and V B = b are the respective variances, and V A | B is the conditional variance, namely
V A | B = V A η Z 8 2 V B = a c 2 2 b .
Eve can purify the system to interact with Bob after Bob performs homodyne detection. Based on this, the Holevo bound is given by
S ( E : B ) = S ( E ) S ( E | B ) = G [ ( λ 1 1 ) / 2 ] + G [ ( λ 2 1 ) / 2 ] G [ ( λ 3 1 ) / 2 ] ,
where
G ( x ) = ( x + 1 ) l o g 2 ( x + 1 ) x l o g 2 x ,
and the eigenvalues, λ 1 , 2 , 3 , in the equation can be calculated by
λ 1 , 2 2 = 1 2 ( A ± A 2 4 B ) , λ 3 2 = a 2 a c 2 b ,
with A = a 2 + b 2 2 c 2 and B = a b c 2 .

4. Performance and Discussion

In Figure 4, based on the improved eight-state CVQKD protocol, we show the relationship between the secret key rate and the transmission distance of the protocol. The left-to-right relationship curves correspond to the original eight-state protocol, three-photon subtraction, two-photon subtraction, and one-photon subtraction. We compare the original eight-state protocol and the modified protocol. Interestingly, the less photons we subtract, the better performance we can achieve. Therefore, we obtain optimal performance of the eight-state protocol by performing a one-photon subtraction operation.
Note that in actual use, the noise ϵ often exists in the quantum channel. Therefore, studying ϵ is very important for the performance of our improved eight-state CVQKD protocol. The relationship between the secret key rate and channel loss is shown in Figure 5. The left-to-right relationship curves correspond to ϵ = 0.032 , ϵ = 0.025 , ϵ = 0.008 , and ϵ = 0.001 , respectively. We find that the use of a photon-subtraction operation can tolerate more channel loss.
As the photon-subtraction operation is utilized on Alice’s side, the intensity of the light field is improved and, thus, the entanglement in the EPR states generated by Alice can be well-enhanced, which ultimately contributes to the performance improvement (tolerating more channel loss) of the eight-state protocol, as illustrated in simulation results above.

5. Conclusions

This paper presents a method for enhancing the performance of eight-state CVQKD, by use of photon subtraction on the original eight-state CVQKD. Only using optical beam splitters and photon detectors, this operation can be well-applied in practice. The simulation results show that the eight-state CVQKD with photon subtraction significantly improved the transmission distance. In addition, it is very important to control the excess noise, in practice, since this noise has a significant impact on the performance of the proposed protocol. It is worth noting that the results also show that the optimal performance can be obtained by utilizing a one-photon subtraction operation.

Author Contributions

X.W. gave a general idea of the study, designed the concept of the study, and provided relevant studies and literature. Q.P. wrote the article and completed the derivation of formulae and simulation analysis. Y.G. provided practical recommendations for this study. X.W. revised some of the content in the paper. All authors have read and approved the final manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (Grant No. 61379153, No. 61572529).

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61572529, 61871407, 61872390, 61801522), and the Natural Science Foundation of the Jiangsu Higher Education Institutions of China (Grant No. 18KJB510045).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef]
  2. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys 2009, 81, 1301. [Google Scholar] [CrossRef]
  3. Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
  4. Bang, J.Y.; Berger, M.S. Quantum mechanics and the generalized uncertainty principle. Phys. Rev. D 2006, 74, 125012. [Google Scholar] [CrossRef]
  5. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Gui, M.; Liang, L.M. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 042335. [Google Scholar] [CrossRef]
  6. Lance, A.M.; Symul, T.; Sharma, V.; Weedbrook, C.; Ralph, T.C.; Lam, P.K. No-switching quantum key distribution using broadband modulated coherent light. Phys. Rev. Lett. 2005, 95, 180503. [Google Scholar] [CrossRef] [PubMed]
  7. Huang, P.; Fang, J.; Zeng, G. State-discrimination attack on discretely modulated continuous-variable quantum key distribution. Phys. Rev. A 2014, 89, 042330. [Google Scholar] [CrossRef]
  8. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621. [Google Scholar] [CrossRef]
  9. Inamori, H.; Lütkenhaus, N.; Mayers, D. Unconditional security of practical quantum key distribution. Eur. Phys. J. D 2007, 41, 599. [Google Scholar] [CrossRef]
  10. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  11. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum cryptography without switching. Phys. Rev. Lett 2004, 93, 170504. [Google Scholar] [CrossRef] [PubMed]
  12. Moroder, T.; Curty, M.; Lim, C.C.W.; Zbinden, H.; Gisin, N. Security of distributed-phase-reference quantum key distribution. Phys. Rev. Lett. 2012, 109, 260501. [Google Scholar] [CrossRef] [PubMed]
  13. Zhang, H.; Fang, J.; He, G. Improving the performance of the four-state continuous-variable quantum key distribution by using optical amplifiers. Phys. Rev. A 2012, 86, 022338. [Google Scholar] [CrossRef]
  14. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397. [Google Scholar] [CrossRef]
  15. Zhou, J.; Huang, D.; Guo, Y. Long-distance continuous-variable quantum key distribution using separable Gaussian states. Phys. Rev. A 2018, 98, 042303. [Google Scholar] [CrossRef]
  16. Li, F.; Wang, Y.; Liao, Q.; Guo, Y. Four-State Continuous-Variable Quantum Key Distribution with Photon Subtraction. Int. J. Theor. Phys 2018, 1–12. [Google Scholar] [CrossRef]
  17. Wu, X.D.; Liao, Q.; Huang, D.; Wu, X.H.; Guo, Y. Balancing four-state continuous-variable quantum key distribution with linear optics cloning machine. Chin. Phys. B 2017, 26, 110304. [Google Scholar] [CrossRef]
  18. Guo, Y.; Li, R.; Liao, Q.; Zhou, J.; Huang, D. Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier. Phys. Lett. A 2018, 382, 372–381. [Google Scholar] [CrossRef]
  19. Zhang, H.; Mao, Y.; Huang, D.; Guo, Y.; Wu, X.; Zhang, L. Finite-size analysis of eight-state continuous-variable quantum key distribution with the linear optics cloning machine. Chin. Phys. B 2018, 27, 090307. [Google Scholar] [CrossRef]
  20. Li, Z.; Zhang, Y.; Wang, X.; Xu, B.; Peng, X.; Guo, H. Non-Gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution. Phys. Rev. A 2016, 93, 012310. [Google Scholar] [CrossRef]
  21. Guo, Y.; Liao, Q.; Wang, Y.; Huang, D.; Huang, P.; Zeng, G. Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction. Phys. Rev. A 2017, 95, 032304. [Google Scholar] [CrossRef]
  22. Huang, P.; He, G.; Fang, J.; Zeng, G. Performance improvement of continuous-variable quantum key distribution via photon subtraction. Phys. Rev. A 2013, 87, 012317. [Google Scholar] [CrossRef]
Figure 1. Prototype diagram of an improved eight-state discrete-modulated continuous variable quantum key distribution (CVQKD). Alice prepares one of the eight-state discrete modulation states. The rest of the state is passed through the photon subtraction module and then passed through the untrusted quantum channel to Bob. Bob will use homodyne or heterodyne detection to derive the key sequence shared by Alice.
Figure 1. Prototype diagram of an improved eight-state discrete-modulated continuous variable quantum key distribution (CVQKD). Alice prepares one of the eight-state discrete modulation states. The rest of the state is passed through the photon subtraction module and then passed through the untrusted quantum channel to Bob. Bob will use homodyne or heterodyne detection to derive the key sequence shared by Alice.
Applsci 09 01333 g001
Figure 2. When ϵ = 0.01 , the relationship between V a and secret key rate with different values of d.
Figure 2. When ϵ = 0.01 , the relationship between V a and secret key rate with different values of d.
Applsci 09 01333 g002
Figure 3. When d = 110 km , the relationship between V a and secret key rate with different values of ϵ .
Figure 3. When d = 110 km , the relationship between V a and secret key rate with different values of ϵ .
Applsci 09 01333 g003
Figure 4. Performance of eight-state protocol with a photon subtraction operation. Here, ϵ = 0.001 and β = 0.95 . The orange line is for the original eight-state protocol and the other lines are for the photon subtraction with k 1 , 2 , 3 , respectively.
Figure 4. Performance of eight-state protocol with a photon subtraction operation. Here, ϵ = 0.001 and β = 0.95 . The orange line is for the original eight-state protocol and the other lines are for the photon subtraction with k 1 , 2 , 3 , respectively.
Applsci 09 01333 g004
Figure 5. The relationship between the secret key rate of the system and different values of the excess noise ϵ under the one-photon subtraction operation of the eight-state CVQKD.
Figure 5. The relationship between the secret key rate of the system and different values of the excess noise ϵ under the one-photon subtraction operation of the eight-state CVQKD.
Applsci 09 01333 g005

Share and Cite

MDPI and ACS Style

Peng, Q.; Wu, X.; Guo, Y. Improving Eight-State Continuous Variable Quantum Key Distribution by Applying Photon Subtraction. Appl. Sci. 2019, 9, 1333. https://doi.org/10.3390/app9071333

AMA Style

Peng Q, Wu X, Guo Y. Improving Eight-State Continuous Variable Quantum Key Distribution by Applying Photon Subtraction. Applied Sciences. 2019; 9(7):1333. https://doi.org/10.3390/app9071333

Chicago/Turabian Style

Peng, Qingquan, Xiaodong Wu, and Ying Guo. 2019. "Improving Eight-State Continuous Variable Quantum Key Distribution by Applying Photon Subtraction" Applied Sciences 9, no. 7: 1333. https://doi.org/10.3390/app9071333

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop