Next Article in Journal
Information Theory Applications in Signal Processing
Next Article in Special Issue
Uniqueness of Minimax Strategy in View of Minimum Error Discrimination of Two Quantum States
Previous Article in Journal
A Novel Active Learning Regression Framework for Balancing the Exploration-Exploitation Trade-Off
Previous Article in Special Issue
On the Exact Variance of Tsallis Entanglement Entropy in a Random Pure State
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution

1
State Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China
2
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(7), 652; https://doi.org/10.3390/e21070652
Submission received: 19 April 2019 / Revised: 25 June 2019 / Accepted: 1 July 2019 / Published: 2 July 2019
(This article belongs to the Special Issue Entropy in Foundations of Quantum Physics)

Abstract

:
The entropic uncertainty relation (EUR) is of significant importance in the security proof of continuous-variable quantum key distribution under coherent attacks. The parameter estimation in the EUR method contains the estimation of the covariance matrix (CM), as well as the max-entropy. The discussions in previous works have not involved the effect of finite-size on estimating the CM, which will further affect the estimation of leakage information. In this work, we address this issue by adapting the parameter estimation technique to the EUR analysis method under composable security frameworks. We also use the double-data modulation method to improve the parameter estimation step, where all the states can be exploited for both parameter estimation and key generation; thus, the statistical fluctuation of estimating the max-entropy disappears. The result shows that the adapted method can effectively estimate parameters in EUR analysis. Moreover, the double-data modulation method can, to a large extent, save the key consumption, which further improves the performance in practical implementations of the EUR.

1. Introduction

The quantum key distribution (QKD) [1,2,3,4,5] is one of the most mature quantum cryptography technologies, which can provide information-theoretical provable security together with the one-time pad method. The idea of QKD is to employ the basic principles of quantum physics to ensure the security of random keys and to use classical post-processing methods to find potential eavesdropping behaviors. Based on the dimension of the Hilbert space of the encoding, QKD can be roughly divided into two categories. One kind of protocol is called the discrete-variable (DV) protocol, in which the dimension of the Hilbert space is finite. DV-QKD protocols have the superiority of long transmission distance, but depending on high-performance dedicated devices such as single-photon detectors. As an alternative, continuous-variable (CV) protocols, which use the infinite dimension of Hilbert space as the key space, give us opportunities to achieve the QKD process via off-the-shelf commercial components, e.g., homodyne detector and heterodyne detector.
The first idea of the CV-QKD protocol was exploiting squeezed states to carry the key information [6,7,8,9]. Then, in order to weaken the dependence on the squeezed-state sources, the coherent-state-based CV-QKD protocols were proposed [10,11,12]. During these twenty years, research on protocol design and corresponding experimental verification was developing rapidly. Different novel CV-QKD protocols have been proposed, such as the two-way protocol [13,14,15,16,17,18], the discrete modulation protocol [19,20,21], the measurement-device-independent (MDI) protocol [22,23,24,25,26,27,28], etc., each of which has its own advantages in different scenarios. Besides the protocol design, the experiments also have made a tremendous step forward with the progress of today’s technology [29,30,31].
The core of QKD is the security, and there have been many security analysis methods proposed to investigate the security of different CV-QKD protocols [4]. For the convenience of the security analysis, the eavesdropper’s ability is usually restricted to three different levels, namely individual attacks, collective attacks, and coherent attacks. Individual attacks and collective attacks are, to some extent, to restrict the eavesdropper’s (Eve’s) attack ability, so that the exchanged state between Alice (sender) and Bob (receiver) can be treated as an identical and independently distributed (i.i.d.) state, i.e., ρ A N B N = σ A B N (where N is the number of exchanged signals), which can simplify the security analysis. However, a protocol is unconditionally secure only when it is secure under coherent attacks, due to the fact that coherent attacks do not limit the ability of eavesdroppers, thereby the most general attacks. In the case of coherent attacks, the exchanged states between Alice and Bob do not have the i.i.d. structure anymore; thus, the security proof is complicated.
Diverse security analysis techniques have been developed to analyze the security of different protocols under coherent attacks, typically the de Finetti theorem [32,33], the post-selection technique [34,35], and the entropic uncertainty relation (EUR) [36,37,38]. Those analysis methods can also be applied to analyze the quantum random number generation protocols [39,40]. Different analysis methods have their advantages and disadvantages, so they are suitable for the analysis of different protocols (see [4] for detailed discussions). The advantages of the EUR lies in its intuitive physical meaning (corresponding to the guessing game [41]) and the simple estimation method. Most of the work has been done in the EUR in [36], except for the finite-size effect in estimating the covariance matrix (CM). However, in practical experiments, the estimation of the CM is always achieved by limited data; thus, the finite-size effect not only affects the estimation of min-entropy, but also the estimation of leakage information.
In this work, we focus on the parameter estimation of the EUR in CV-QKD, especially on the finite-size estimation of the CM, and the modified estimation on the max-entropy. The discussion involves only the squeezed state/homodyne detection-type protocols and has no assumption on Eve’s ability, namely under coherent-attack cases. Due to the influence of the finite block length of the key, the estimation of the CM is inaccurate in the case of a short block length, compared with the ideal CM estimation cases (as shown in [36,37]). We exploit the parameter estimation technique developed in [42] to consider the estimation of the CM under practical block sizes. Furthermore, inspired by the double-modulation method developed in [42], we propose a double-data modulation method to estimate the parameters in the security analysis effectively, and only one modulation is needed rather than two, which simplifies the experimental structure of the double-modulation protocol. Since the exchanged state can be used for both parameter estimation and key generation, the estimation of the max-entropy is modified, and the statistical fluctuation of estimating the max-entropy disappears. The simulation result shows that the modified estimation method can, to a large extent, save the key consumption.
This paper is organized as follows. In Section 2, we review the composable security frameworks in QKD and give the description of the discussed protocol. In Section 3, we discuss in detail the channel parameter estimation process with finite-size. In Section 4, the modified parameter estimation method is proposed with double-data modulation. The numerical simulation and discussion are give in Section 5, and the conclusions are drawn in Section 6.

2. Composable Security and Description of the Protocol

In this work, we investigate the CV-QKD protocol under the universal composable framework (UCF), which can be seen in [43,44] for the details, and the discussion is under the coherent-attack cases. The UCF is of great importance to compose sequential rounds of a protocol, and even if some of the rounds are imperfect and deviate from the ideal model, the UCF can well describe their defects. A general QKD protocol can always be divided into different parts; thus, one of the benefits of UCFs is that even if part of the protocol is imperfect, this imperfection can still be applied to subsequent analysis of the rest part of the protocol to obtain the final non-ideal key. Another advantage of UCFs is that the final imperfect key generated from a QKD system can be well quantified as ε -secure and then can be applied to other classical communication tasks, such as the one-time pad scenario.
To illustrate the composable security of QKD, we first use s A to denote Alice’s key and use s B to denote Bob’s key. In the ideal case, the keys should be correct, secret, and robust. Correctness means, for each round of the protocol, the keys of Alice and Bob are always the same, namely s A = s B = S . Secrecy means the key is independent of the third part and only known to Alice and Bob themselves. Robustness requires that, in every round of the protocol, Alice and Bob can always generate a non-empty key, namely S . If a QKD protocol can satisfy correctness, secrecy, and robustness, the protocol then can be called perfectly secure. We denote by s s S the orthogonal bases of the key, by ρ E Eve’s auxiliary quantum systems, and by p the probability of generating an empty key set. The perfectly secure classical-quantum (cq) state between the key S and the environment E can be shown as follows,
ρ s E p e r f e c t = 1 - p s S 1 S s s ρ E s + p ρ E .
Nevertheless, a protocol is always imperfect with practical issues, resulting in the security deviating from the ideal model. Therefore, the ε -security can be used to describe the practical security with imperfect features. We denote by ε c , ε r , ε s the smoothness parameters of practical correctness, robustness, and secrecy, respectively. ε c -correctness requires that the key in Alice and Bob’s sides be different only with very small probability ε c , namely Pr s A s B ε c . ε r -robustness requires that the set of the keys is empty only with a small probability, given by Pr S = ε r . ε s -secrecy can be treated as the distance between the practical security and the perfect security, in terms of the trace distance, given by 1 2 ρ s E - ρ s E p e r f e c t 1 ε s . In summary, if a QKD protocol can contain ε c -correctness, ε r -robustness, and ε s -secrecy, then the protocol can be called ε -secure, with ε = ε c + ε r + ε s .
Let us start with the execution of the prepare-and-measure (PM) version of the squeezed-states protocol. The protocol can be divided into sequential parts, as shown in Figure 1, which can be described by the following steps:
  • State preparation: Alice holds the squeezed states with squeezed variance V S before the protocol begins, where V S 0 , 1 . In every run of the protocol, Alice uses Gaussian random numbers x M to encode the displacement of quadratures by using modulators (generally containing amplitude and phase modulators), and the total modulation variance is denoted by V M .
  • State transmission: Alice sends the modulated state in the quantum channel, which is treated as a totally untrusted channel and controlled by Eve.
  • State measurement: Bob receives the quantum state and randomly measures x or p quadrature by an ideal homodyne detector. Resulting from the fact that the practical measurement phase is always discrete, the ideal measurement outcomes should be discretized by the analogue-to-digital converter (ADC). The final discretized results are denoted by x B .
  • Parameter estimation: Alice and Bob repeat the above steps many times until they have enough raw data (e.g., N). Then, Alice or Bob reveals some of the raw data (with length m) through the classical channel to estimate the key parameters of the channel, especially the data distance d 0 between Alice’s and Bob’s data, the transmittance τ , and the excess noise ε . See Section 3 for a detailed explanation of the parameter estimation step.
  • Error correction: According to the estimation parameters τ and ε , the communication parts estimate the leakage information E C during the error correction phase and choose an appropriate classical error reconciliation algorithm, e.g., low-density-parity-check (LDPC) code, to correct Alice’s error (in reverse reconciliation cases) or Bob’s error (in direct reconciliation cases).
  • Privacy amplification: Alice and Bob randomly choose a universal 2 hash function [45] and apply it to their respective keys to get the final private keys s A and s B with length , which are only known to themselves.
According to the UCF, one can write the upper bound of the final key length l o w , even if the above steps are not ideal, given by [43]:
l o w = H min ε x B | E - E C - log 2 1 ε 1 2 ε c + 2 ,
where H min ε x B | E is the smooth min-entropy of x B conditioned on the information Eve may hold, with smoothing parameter ε , and ε 1 is the smoothness of the physical part of the protocol.

3. Channel Parameter Estimation with Finite-Size

There are roughly two parameters that need to be bounded in the protocol. One is the smooth min-entropy H min ε x B | E , and the other is the leakage information E C . We separately discuss the estimation of the two parameters in two parts.

3.1. Estimation of Smooth Min-Entropy

There are different ways to estimate the min-entropy under coherent attacks. For instance, the de Finetti theorem [32,33], which can reduce the analysis from the coherent attack case to the collective attack case, has been successfully used to prove the security of CV-QKD protocols with the source of coherent states [27,46]. The EUR has also been exploited to prove the security of squeezed-state-type protocols [28,36,37]. In this work, we focus on using the uncertainty relation to bound the min-entropy of the key.
In practical experiments, x M and x B are always discretized. We denote α as the maximum discretization range of the sampling interval and denote δ as the discrete precision of the measurement, which satisfy 2 α 2 α δ δ = 2 L N , where L is the number of discrete bits. Therefore, the measurement result will fall into different intervals, namely,
- , - α , - , - α + δ , - α + k - 1 δ , - α + k δ , α - δ , α , α , + ,
where k = 1 , 2 , , 2 α 2 α δ δ . One can bound the smooth min-entropy of the discretized data x B conditioned on Eve’s information H min ε x B | E according to the CV version of EUR, given by:
H min ε x B | E - n log c δ - H max ε x M | x B ,
where c quantifies the maximum overlap of the two measurements, namely c = max x , z X x X x Z z Z z 2 and X and Z are mutually unbiased bases; hence, c δ is the overlap between discrete quadrature measurements related to the interval length δ , which reads:
c δ = 1 2 π δ 2 S 0 1 1 , δ 2 4 2 ,
where S 0 1 ( . ) is the zeroth radial prolate spheroidal wave function of the first kind [47] and S 0 1 1 , δ 2 4 2 is approximately one if δ is small. The term H max ε x M | x B in Equation (4) denotes the max-entropy between Alice’s and Bob’s data, with smoothing parameter ε = ε s ε s 4 p p a s s 4 p p a s s - 2 2 1 - 1 - p α n 2 2 1 - 1 - p α n p p a s s p p a s s , where p α is the probability that the measurement is outside of the detection range.
According to Equation (4), in order to give a lower bound of the min-entropy, one should estimate the upper bound of the max-entropy using some of the raw keys during the parameter estimation phase. First, the average distance, which quantifies the correlation between Alice’s and Bob’s data, should be estimated, given by:
d x M P E , x B P E = 1 m i = 1 m M i - B i ,
where we use M i to denote the i th modulating value and B i denotes the i th measurement result, for i = 1 , 2 , , m , respectively. If the data distance d x M P E , x B P E is smaller than a certain threshold d 0 , the parameter estimation step passes. Then, one can bound the max-entropy according to Serfling’s large deviation bound [48], given by:
H max ε x M | x B n log 2 γ d 0 + μ ,
where γ is a large deviation function, which reads:
γ ( t ) = t + t 2 + 1 t t 2 + 1 - 1 t ,
and μ quantifies the impact of statistical fluctuations resulting from estimating “data parameter” H max ε x M | x B by “PEparameter” H max ε x M P E | x B P E , which reads:
μ = 2 α δ N m + 1 n m 2 ln 1 ε ,
where N denotes the total number of exchanged signals and satisfies N = n + m .

3.2. Ideal Estimation of Leakage Information with Infinite-Size

To estimate the leakage information in the error correction phase, we model Eve’s behavior by the entangling cloner attack model, which is the most common example of a Gaussian attack [49]. We point out that the whole analysis of this paper is under the most general coherent attacks and has no restriction on Eve’s ability. The model of the entangling cloner attack is only for intuitive understanding, and it is convenient to investigate the performance of the protocol, which can be used to estimate the lower bound of the key rate. Even if Eve’s attack is not the entangling cloner attack, the following analysis also holds, resulting from the fact that in a practical experiment, we do not need to assume the eavesdropper’s strategy in advance and only need to estimate the channel parameters by the existing data that Alice and Bob hold.
The quadrature of the quantum state sent by Alice’s side is denoted by x A = x s + x M . In order to obtain the correlation between Alice and Bob after passing through the channel, we assume Eve performs the entangling cloner attack, where Eve’s state is modeled by a two-mode squeezed vacuum (TMSV) state ρ e E 0 with the CM γ e E 0 , which reads:
γ e E 0 = ω I ω 2 - 1 Z ω 2 - 1 Z ω I ,
where ω is the variance of the TMSV, I = diag 1 , 1 , and Z = diag 1 , - 1 . The channel is modeled by a beam splitter with the transmittance τ , whose CM is given by:
S τ = τ I 1 - τ I - 1 - τ I τ I ,
and the excess noise ε can be defined as ε : = 1 - τ ω - 1 1 - τ ω - 1 τ τ . Thus, it is easy to deduce the quadrature on Bob’s side after passing through the quantum channel, given by:
x B = τ x A + 1 - τ x 0 + x ε = τ x M + x N ,
where x N = τ x s + 1 - τ x 0 + x ε . Assuming that the squeezing operation is performed for x quadrature, the mutual information between Alice and Bob reads:
I x A : B = 1 2 log 2 V B V B | A = 1 2 log 2 1 + τ σ x V N ,
and V N has the form:
V N = 1 + τ ε + τ V S - 1 : = 1 + V ε + τ V S - 1 .
When Alice and Bob perform the error correction step, they need to randomly announce part of the information through the public channel, which is also revealed to Eve. It is assumed that eavesdroppers can monitor all classical communication processes; thus, the amount of information leaked in the error correction process must be well estimated and then removed from the final keys. The leakage information E C in the error correction step can be described as
E C D R = H ( x M ) - β I x A : B ,
in the direct reconciliation (DR) case and:
E C R R = H ( x B ) - β I x A : B ,
in the reverse reconciliation (RR) case, where β is the reconciliation efficiency.

3.3. Practical Estimation of Leakage Information with Finite-Size

In the previous works, the estimator of the leakage information ^ E C was treated as an asymptotic parameter, which is independent of the total key length. However in practice, the estimation of ^ E C cannot be accurate especially when the key length is not large, further affecting the performance of the error correction. To take finite-size effects into consideration, the estimator ^ E C under a practical block length needs to be estimated. We adapt the estimation method shown in [42] to analyze the characteristics of the channel. Here, we only give the main results of the previous work, and the detailed derivation can be seen in [42]. In the practical experiment, the data on Alice’s side is actually the modulated data x M ; thus, the key of parameter estimation is to estimate the CM γ M B , namely γ M B = V M I , c M B Z ; c M B Z , V B I . The relation of x M and x B (Alice’s and Bob’s data) has the form of x B = τ x M + x N , where x N is the aggregated noise with zero mean, and the variance is shown in Equation (14). The covariance of x M and x B is:
C o v x M , x B = τ V M = : c M B .
For obtaining the estimator of covariance c ^ M B , we also use M i denoting the i th modulating value and B i denoting the i th measurement result, for i = 1 , 2 , , m , respectively. According to the maximum likelihood estimation, we can get:
c ^ M B = 1 m i = 1 m M i B i .
and it is easy to compute the expectation value E c ^ M B and the variance V c ^ M B by assuming M i and B i are two independent Gaussian variables with zero mean values, which read:
E c ^ M B = c M B ,
V c ^ M B = τ V M 2 m 2 + V N τ V M .
According to Equation (17), we can get the estimator τ ^ of τ , which reads:
τ ^ = c ^ M B 2 V M 2 = V c ^ M B V M 2 c ^ M B V c ^ M B 2 ,
where c ^ M B V c ^ M B 2 follows the χ 2 -distribution, namely,
c ^ M B V c ^ M B 2 χ 2 1 , c ^ M B 2 V c ^ M B .
Then, we can calculate the expectation value of τ ^ , which reads:
E τ ^ = τ + O 1 1 m m ,
and the variance is given by:
V τ ^ = 4 τ 2 m 2 + V N τ V M + O 1 1 m 2 m 2 .
For m 1 , which is practical in experiments, the term O 1 1 m 2 m 2 can be negligible due to the order 1 1 m 2 m 2 being small. Thus, we define new variance of τ ^ under a practical block length, which reads:
σ τ ^ 2 = 4 τ 2 m 2 + V N τ V M ,
so that the confidence interval of estimating τ can be well quantified.
In order to estimate the upper bound of the leakage information E C u p , one should give the lower bound of the transmittance τ . For practical purposes, we set the failure probability of the parameter estimation to ε P E = 10 - 10 , which corresponds to the confidence interval of 6.5 σ τ ^ , and one can estimate the lower bound of τ ^ l o w , given by:
τ ^ l o w = E τ l o w : = τ ^ - 6.5 σ τ ^ .
According to:
x B = τ x M + x S + 1 - τ x 0 + x ε = τ x M + x N ,
the estimator of V ε can also be calculated by the maximum likelihood estimation with the following form:
V ^ ε = 1 m i = 1 m B i - τ ^ M i 2 + τ ^ 1 - V S - 1 .
In the case of m 1 , the estimator τ ^ converges rapidly to the actual value τ as m increases, owing to the variance of τ ^ being negligible. Thus, here, we use τ to replace τ ^ to simplify the estimation process. Noticing that the term 1 m i = 1 m B i - τ M i V N 2 also follows the χ 2 -distribution with the expectation value E 1 m i = 1 m B i - τ M i V N 2 = m and variance V 1 m i = 1 m B i - τ M i V N 2 = 2 m , respectively, resulting from B i - τ M i being Gaussian distributed with variance V N , therefore, one can get the following approximation when m is large:
i = 1 m B i - τ M i 2 V N · i = 1 m B i - τ M i V N 2 .
The expectation value of V ^ ε can be obtained, which reads:
E V ^ ε 1 m V N · E i = 1 m B i - τ M i V N 2 + τ 1 - V S - 1 = V ε ,
and the variance of V ^ ε can also be calculated, given by:
V V ^ ε 2 m V N 2 + σ τ ^ 2 1 - V S 2 : = σ V ^ ε 2 .
The upper bound of the variance of excess noise can be given, also considering the failure probability of the parameter estimation to ε P E = 10 - 10 , which is:
V ^ ε u p = E V ε u p : = V ^ ε + 6.5 σ V ^ ε .

4. Double-Data Modulation Method and the Modified Estimation Process

Inspired by the double-modulation method developed in [42], we find that this estimation method is also useful in the parameter estimation of the EUR analysis method.
Here, we slightly modify the double-modulation method by pre-generating two sets of Gaussian random numbers, namely x M 1 and x M 2 , with variances V M 1 and V M 2 and zero mean values, encoding quantum states by new random variable x M , where x M = x M 1 + x M 2 . In this double-data modulation method, Alice holds both data x M 1 and x M 2 in her memories and then generates data x M according to data x M 1 and x M 2 . The generated data x M are used to modulate the quantum states. After Alice and Bob finish the key distribution processes, Alice reveals data x M 2 to perform the channel parameter estimation, and all the information about data x M 1 is not announced throughout the parameter estimation phase; thus, x M 1 can be used for the key extraction step without leaking information about the key during the parameter estimation step. The idea is very similar to that in [42], and the difference is that this double-data modulation method only needs one modulation rather than two, since we perform the pre-processing of two independent random variables, which simplifies the experimental setup of the double-modulation method.
Since all the exchanged signals can be used for both parameter estimation and key extraction, the estimation of the max-entropy needs to be modified. Recalling that in Section 3, the key point of estimating the max-entropy is to quantify the data distance d x M t o t a l , x B t o t a l . However, in traditional EUR method, not all the data can be used for the parameter estimation, and only part of the data (parameter estimation data) can be used to estimate the total data distance, resulting in the statistical fluctuation of the estimating distance, thereby d x M t o t a l , x B t o t a l is approximately replaced by d x M P E , x B P E + μ , where the first term is the distance between the parameter estimation data and the second term is the statistical fluctuation of estimating the total data distance by using the parameter estimation data. In the double-data modulation protocol, we modify the L 1 distance between the key-extraction data x M 1 and Bob’s data x B by exploiting the absolute value inequality, given by:
d x M 1 , x B = 1 N N x B i - x M 1 i 1 N N x B i - x M 2 i + 1 N N x M 2 i - x M 1 i = d x M 2 , x B + d x M 1 , x M 2 ,
where d x M 2 , x B denotes the L 1 distance between data x M 2 and x B , which can be estimated after Alice reveals data x M 2 , and d x M 1 , x M 2 denotes the L 1 distance between data x M 1 and x M 2 , which can be calculated on Alice’s side locally. Here, we replace the number of parameter estimation signals m by N since all the exchanged signals are used in this step. Therefore, the max-entropy can be bounded after modifying the parameter estimation step, which reads:
H max ε x M 1 | x B N log 2 d x M 2 , x B + d x M 1 , x M 2 .
Due to the fact that all the states are exploited to perform parameter estimation, the statistical fluctuation of estimating L 1 distance disappears, which reduces the finite-size effect on estimating the max-entropy, especially in the short block size regime, where the statistical fluctuation cannot be negligible.
The remaining task is to estimate the confidence intervals of the channel parameters by using data x M 2 and x B , which is the standard estimation method shown in [42]. The quadrature of the received states on Bob’s side can be rewritten in the following form after using the double-data modulation method,
x B = τ x M + x S + 1 - τ x 0 + x ε = τ x M 2 + x N * ,
where x N * = τ x s + x 1 + 1 - τ x 0 + x ε is the aggregated noise when we use x M 2 to perform the parameter estimation, with variance V N * = τ x s + x 1 - 1 + 1 + V ε .
After comparing Equation (35) with Equation (27), it is easy to obtain the variances of the estimators τ ^ and V ^ ε by replacing V M with V M 2 , V N with V N * , and m with N, which are given by:
σ τ ^ * 2 = 4 τ 2 N 2 + V N * τ V M 2 ,
σ V ^ ε * 2 = 2 N V N * 2 + σ τ ^ * 2 1 - V S 2 .

5. Numerical Simulation and Discussion

In this section, we focus on the simulation analysis of the protocol with the finite-size effect, containing the comparison of the protocol’s performances between ideal and practical estimations of the CM and the comparison between standard estimation method and the modified double-data modulation method. The simulation assumes that Eve’s attack is the entangling cloner attack. We stress again that this attack model does not affect the security of the protocol and is just for the convenience of the simulation. In practice, we do not need to assume the attack model in advance and only need to estimate the correlation through the data in the hands of Alice and Bob. The correlation between Alice’s and Bob’s data can be verified according to whether the L 1 distance d x M P E , x B P E shown in Equation (6) is greater than the threshold parameter d 0 . If the relation d x M P E , x B P E < d 0 holds, we think the data between Alice and Bob are correlated. Otherwise, we abort the protocol. In order to determine whether the amount of data is sufficient for the parameter estimation, one needs to use the experimental data of Alice and Bob with a finite block size to estimate the practical parameters and to determine whether the finite-size effect is acceptable by simulation.
We point out that the analysis using the EUR does not rely on Eve’s attack method in the experiment, which is due to two reasons. One reason is that the EUR security analysis method itself does not restrict Eve’s ability [36], which means there is no need to assume that the quantum state is a product state σ A B N , like the collective-attack analysis. Another reason is that the parameter estimation does not need to assume Eve’s attacking model. The estimation of max-entropy only needs to estimate the data distance d x M P E , x B P E by x M and x B . The estimation of E C needs the variance of the measured data and the signal-to-noise ratio after transmission, which can be obtained from the statistical CM directly. Using the entangling cloner attack model to model Eve’s behavior just aims at getting the lower bound of the transmittance τ and the upper bound of the excess noise ε , and then, the lower bound of the key rate can be calculated.
In the following discussion, we consider the squeezed vacuum states with a squeezing level of 13.1 dB and an anti-squeezing level of 25.8 dB, which has experimentally been achieved at 1550 nm with today’s technology [50]. We set the reconciliation efficiency β to 95 % , which is also easily achievable with CV-QKD’s post-processing method [51,52]. The excess noise is chosen as ε = 0.01 , and the security parameters are chosen as ε c = ε s = 10 - 9 .
In Figure 2, we plot the key rate as a function of the transmission distance, expressed in terms of km. The lower bound of the key length is given by Equation (2), and the secret key rate is calculated by l o w l o w N N . The left panel and the right panel are the performances under the DR and RR cases, respectively. We give the comparison between the ideal CM estimation and the practical CM estimation with different practical block sizes, namely 10 7 , 10 8 , and 10 9 . The solid lines are the protocol under ideal CM estimation, and the dashed lines are the performances under practical CM estimation. We can find that the finite-size effect of estimating the CM will slightly influence the final key rates, and the larger the block size, the smaller the impact. For a practical block size of the order of 10 9 , there is almost no influence on the secret key rate.
In Figure 3, we plot the key rate of the protocol as a function of the block size and compare the performances under different transmission distances. In the DR case (left panel), the performances under transmission distances of 3 km, 5 km, and 10 km are illustrated, while the key rates under transmission distances of 3 km, 10 km, and 15 km are plotted in the RR case (right panel), respectively. We can see that the block length of the order of 10 7 10 9 is sufficient for the protocol under the composable security analysis, achieving rates over 10 - 1 bits per channel use for transmission distances of about 10 km in DR and 15 km in RR, respectively. The results also show that, in the case of short transmission distance, the limited block length has a small impact on the performance of the protocol, which will be weakened with the increase of the block length. Moreover, in the case of relatively long transmission distance (approximately more than 10 km), the estimation of leakage information with finite-size has little effect on the final key since the case of long transmission distance requires a larger block size for the error correction.
The comparison of the performances between the standard estimation method and the modified double-data modulation method is shown in Figure 4, where the left panel shows the performances of two scenarios under different block sizes, while the right panel shows the protocol’s performances under different transmission distances. We optimize the performance of the double-data method by adopting the optimization method shown in [42]. In the left panel, we plot the performances of the double-data modulation method under block sizes of 10 5 and 10 6 and the asymptotic case, respectively, which are shown with solid lines, while the performances of the standard estimation method are depicted with dashed lines, under block sizes of 10 8 and 10 9 and the asymptotic case. It can be seen that, with the help of the double-data modulation method, using less quantum states can achieve better performance than the standard estimation method in a short block-size regime, due to the fact that the data fluctuation term μ in the previous estimation method is not negligible when the block-size is not large, which makes the statistical fluctuation of the finite-size effect more significant in short key lengths. Thus, the double-data modulation method can efficiently improve the parameter estimation process when the block size is not large. We also note that since we use all the states to extract the key, leading to a high utilization of quantum states, the key rate of the modified method is higher than that of the previous method. However, the double-data modulation method cannot achieve the transmission distance as far as the single-modulation method in the asymptotic case. This is intuitive since the statistical fluctuation in the standard estimation method converges to zero with N going to infinity, while there still exit some noises in estimating data distance in double-data modulation method, namely d x M 1 , x M 2 , which will compromise the transmission distance. In the right panel of Figure 4, we can see that the block length of the order of 10 5 - 10 7 is sufficient for the protocol to support the previous transmission distances with the block size of the order of 10 7 - 10 9 , which we believe, to a large extent, saves the key consumption.

6. Conclusions

In this work, we investigated the EUR used for the composable security analysis of the CV-QKD protocol and focused on the parameter estimation step, containing the finite-size effect on estimating the CM and the improvement of the parameter the estimation phase using the double-data modulation method, which were not discussed in previous works [36,37,38]. We believe it is necessary to study the finite-size effect on the parameter estimation in the EUR method, as well as its improvement, since in practice, only limited exchanged states can be used for the parameter estimation, making the estimation process non-ideal.
The analysis showed that the finite-size effect of estimating the CM had a slight influence on the key rate. The larger the block size, the smaller the influence. For a practical block length of the order of 10 9 , the influence on the protocol’s performance was almost negligible. Thus, in a practical experiment, if the amount of data is large, treating the estimators of parameters as ideal parameters will not have a great influence on the key rate. The result also showed that the parameter estimation method developed in [42] was very effective at handling the finite-size analysis of the covariance matrix in EUR analysis.
To further reduce the impact of the finite-size effect in the parameter estimation phase, we also improved the parameter estimation process by exploiting the double-data modulation method, which was inspired by L. Ruppert, et al. [42]. All the quantum states can be used for both parameter estimation and key extraction, which improves the utilization of exchanged states. After modifying the estimation of the max-entropy, we found that the finite-size effect was to a large extent suppressed when the block size was not large, which saved the key consumption, while the longest transmission distances in the asymptotic case were compromised.
Our work is an improvement of previous works [36,37]. We believe that the modified estimation method is practical by using less states to perform parameter estimation.

Author Contributions

Z.C.: conception and design of the study, performing theoretical calculations and numerical simulations, and drafting the article; Y.Z.: conception of the study, providing critical advice, and revision of the manuscript; X.W.: conception of the study, providing critical advice, and revision of the manuscript; S.Y.: conception and design of the study, providing critical advice, and revision of the manuscript; H.G.: conception and design of the study, providing critical advice, and revision of the manuscript; all authors have read and approved the final manuscript.

Funding

This work is supported by the National Natural Science Foundation under Grant No. 61531003, the National Science Fund for Distinguished Young Scholars of China (Grant No. 61225003), and the China Postdoctoral Science Foundation (Grant No. 2018M630116).

Acknowledgments

We would like to thank Tobias Gehring for the valuable discussions.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CVContinuous-variable
DVDiscrete-variable
QKDQuantum key distribution
EUREntropic uncertainty relation
CMCovariance matrix
DRDirect reconciliation
RRReverse reconciliation

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef] [Green Version]
  2. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef] [Green Version]
  3. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  4. Diamanti, E.; Leverrier, A. Distributing secret keys with quantum continuous variables: Principle, security and implementations. Entropy 2015, 17, 6072–6092. [Google Scholar] [CrossRef]
  5. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. arXiv 2019, arXiv:1906.01645. [Google Scholar]
  6. Ralph, T.C. Continuous variable quantum cryptography. Phys. Rev. A 1999, 61, 010303(R). [Google Scholar] [CrossRef]
  7. Hillery, M. Quantum cryptography with squeezed states. Phys. Rev. A 2000, 61, 022309. [Google Scholar] [CrossRef] [Green Version]
  8. Cerf, N.J.; Lévy, M.; Van Assche, G. Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A 2001, 63, 052311. [Google Scholar] [CrossRef] [Green Version]
  9. Usenko, V.C.; Filip, R. Squeezed-state quantum key distribution upon imperfect reconciliation. New J. Phys. 2011, 13, 113007. [Google Scholar] [CrossRef]
  10. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  11. Grosshans, F.; van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum cryptography without switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef] [PubMed]
  13. Pirandola, S.; Mancini, S.; Lloyd, S.; Braunstein, S.L. Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 2008, 4, 726–730. [Google Scholar] [CrossRef] [Green Version]
  14. Sun, M.; Peng, X.; Shen, Y.; Guo, H. Security of a new two-way continuous-variable quantum key distribution protocol. Int. J. Quantum Inf. 2012, 10, 1250059. [Google Scholar] [CrossRef]
  15. Zhang, Y.-C.; Li, Z.; Weedbrook, C.; Yu, S.; Gu, W.; Sun, M.; Peng, X.; Guo, H. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers. J. Phys. B 2014, 47, 035501. [Google Scholar] [CrossRef] [Green Version]
  16. Ottaviani, C.; Mancini, S.; Pirandola, S. Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation. Phys. Rev. A 2015, 92, 062323. [Google Scholar] [CrossRef]
  17. Ottaviani, C.; Pirandola, S. General immunity and superadditivity of two-way Gaussian quantum cryptography. Sci. Rep. 2016, 6, 22225. [Google Scholar] [CrossRef] [Green Version]
  18. Zhang, Y.; Li, Z.; Zhao, Y.; Yu, S.; Guo, H. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation. J. Phys. B At. Mol. Opt. Phys. 2017, 50, 035501. [Google Scholar] [CrossRef] [Green Version]
  19. Leverrier, A.; Grangier, P. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 2009, 102, 180504. [Google Scholar] [CrossRef]
  20. Leverrier, A.; Grangier, P. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation. Phys. Rev. A 2011, 83, 042312. [Google Scholar] [CrossRef]
  21. Li, Z.; Zhang, Y.; Guo, H. User-defined quantum key distribution. arXiv 2018, arXiv:1805.04249. [Google Scholar]
  22. Li, Z.; Zhang, Y.-C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef] [Green Version]
  23. Zhang, Y.-C.; Li, Z.; Yu, S.; Gu, W.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution using squeezed states. Phys. Rev. A 2014, 90, 052325. [Google Scholar] [CrossRef] [Green Version]
  24. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photon. 2015, 9, 397–402. [Google Scholar] [CrossRef] [Green Version]
  25. Zhang, X.; Zhang, Y.; Zhao, Y.; Wang, X.; Yu, S.; Guo, H. Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2017, 96, 042334. [Google Scholar] [CrossRef] [Green Version]
  26. Papanastasiou, P.; Ottaviani, C.; Pirandola, S. Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables. Phys. Rev. A 2017, 96, 042332. [Google Scholar] [CrossRef] [Green Version]
  27. Lupo, C.; Ottaviani, C.; Papanastasiou, P.; Pirandola, S. Continuous-variable measurement-device- independent quantum key distribution: Composable security against coherent attacks. Phys. Rev. A 2018, 97, 052327. [Google Scholar] [CrossRef]
  28. Chen, Z.; Zhang, Y.; Wang, G.; Li, Z.; Guo, H. Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks. Phys. Rev. A 2018, 98, 012314. [Google Scholar] [CrossRef] [Green Version]
  29. Jouguet, P.; Kunz-Jacques, S.; Debuisschert, T.; Fossier, S.; Diamanti, E.; Alléaume, R.; Tualle-Brouri, R.; Grangier, P.; Leverrier, A.; Pache, P.; et al. Field test of classical symmetric encryption with continuous variables quantum key distribution. Opt. Express 2012, 20, 14030–14041. [Google Scholar] [CrossRef] [Green Version]
  30. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photon. 2013, 7, 378–381. [Google Scholar] [CrossRef]
  31. Zhang, Y.; Li, Z.; Chen, Z.; Weedbrook, C.; Zhao, Y.; Wang, X.; Huang, Y.; Xu, C.; Zhang, X.; Wang, Z.; et al. Continuous-variable QKD over 50km commercial fiber. Quantum Sci. Technol. 2019, 4, 035006. [Google Scholar] [CrossRef]
  32. Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef] [PubMed]
  33. Leverrier, A. Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction. Phys. Rev. Lett. 2017, 118, 200501. [Google Scholar] [CrossRef] [PubMed]
  34. Christandl, M.; König, R.; Renner, R. Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 2009, 102, 020504. [Google Scholar] [CrossRef] [PubMed]
  35. Leverrier, A.; García-Patrón, R.; Renner, R.; Cerf, N.J. Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 2013, 110, 030502. [Google Scholar] [CrossRef] [PubMed]
  36. Furrer, F.; Franz, T.; Berta, M.; Leverrier, A.; Scholz, V.B.; Tomamichel, M.; Werner, R.F. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. Phys. Rev. Lett. 2012, 109, 100502. [Google Scholar] [CrossRef]
  37. Furrer, F. Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle. Phys. Rev. A 2014, 90, 042325. [Google Scholar] [CrossRef] [Green Version]
  38. Gehring, T.; Händchen, V.; Duhme, J.; Furrer, F.; Franz, T.; Pacher, C.; Werner, R.F.; Schnabel, R. Implementation of continuous-variable quantum key distribution with composable and one-sided-device- independent security against coherent attacks. Nat. Commun. 2015, 6, 8795. [Google Scholar] [CrossRef]
  39. Marangon, D.G.; Vallone, G.; Villoresi, P. Source-device-independent ultrafast quantum random number generation. Phy. Rev. Lett. 2017, 118, 060503. [Google Scholar] [CrossRef]
  40. Xu, B.; Chen, Z.; Li, Z.; Yang, J.; Su, Q.; Huang, W.; Zhang, Y.; Guo, H. High speed continuous variable source-independent quantum random number generation. Quantum Sci. Technol. 2019, 4, 025013. [Google Scholar] [CrossRef] [Green Version]
  41. Coles, P.J.; Berta, M.; Tomamichel, M.; Wehner, S. Entropic uncertainty relations and their applications. Rev. Mod. Phys. 2017, 89, 015002. [Google Scholar] [CrossRef] [Green Version]
  42. Ruppert, L.; Usenko, V.C.; Filip, R. Long-distance continuous-variable quantum key distribution with efficient channel estimation. Phys. Rev. A 2014, 90, 062310. [Google Scholar] [CrossRef]
  43. Renner, R. Security of Quantum Key Distribution. Ph.D. Thesis, Swiss Federal Institute of Technology (ETH) Zurich, Zurich, Switzerland, 2006. [Google Scholar]
  44. Müller-Quade, J.; Renner, R. Composability in quantum cryptography. New J. Phys. 2009, 11, 085006. [Google Scholar] [CrossRef] [Green Version]
  45. Carter, J.L.; Wegman, M.N. Universal classes of hash functions. J. Comput. Syst. Sci. 1979, 18, 143. [Google Scholar] [CrossRef]
  46. Ghorai, S.; Diamanti, E.; Leverrier, A. Composable security of two-way continuous-variable quantum key distribution without active symmetrization. Phys. Rev. A 2019, 99, 012311. [Google Scholar] [CrossRef] [Green Version]
  47. Kiukas, J.; Werner, R.F. Maximal violation of Bell inequalities by position measurements. J. Math. Phys. 2010, 51, 072105. [Google Scholar] [CrossRef] [Green Version]
  48. Serfling, R.J. Probability inequalities for the sum in sampling without replacement. Ann. Stat. 1974, 2, 39. [Google Scholar] [CrossRef]
  49. Grosshans, F.; Cerf, N.J.; Wenger, J.; Tualle-Brouri, R.; Grangier, P. Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables. Quantum Inf. Comput. 2003, 3, 535. [Google Scholar]
  50. Schönbeck, A.; Thies, F.; Schnabel, R. 13 dB squeezed vacuum states at 1550 nm from 12 mW external pump power at 775 nm. Opt. Lett. 2018, 43, 110. [Google Scholar] [CrossRef]
  51. Wang, X.; Zhang, Y.; Li, Z.; Xu, B.; Yu, S.; Guo, H. Efficient rate-adaptive reconciliation for CV-QKD protocol. Quantum Inf. Comput. 2017, 17, 1123. [Google Scholar]
  52. Wang, X.; Zhang, Y.; Yu, S.; Guo, H. High speed error correction for continuous-variable quantum key distribution with multi-edge type LDPC code. Sci. Rep. 2018, 8, 10543. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Prepare-and-measure (PM) scheme of continuous-variable (CV)-quantum key distribution (QKD) using squeezed states. Source: squeezed-state source with squeezed variance V S ; Mod: modulators containing amplitude and phase quadrature modulators with total modulation variance V M ; Hom: homodyne detection; x M : Gaussian modulation data on Alice’s side; x B : measurement results on Bob’s side; Quantum channel: channel for the transmission of quantum states, with the transmittance τ and the excess noise ε ; Classical channel: channel for the transmission of classical data during the post-processing procedure.
Figure 1. Prepare-and-measure (PM) scheme of continuous-variable (CV)-quantum key distribution (QKD) using squeezed states. Source: squeezed-state source with squeezed variance V S ; Mod: modulators containing amplitude and phase quadrature modulators with total modulation variance V M ; Hom: homodyne detection; x M : Gaussian modulation data on Alice’s side; x B : measurement results on Bob’s side; Quantum channel: channel for the transmission of quantum states, with the transmittance τ and the excess noise ε ; Classical channel: channel for the transmission of classical data during the post-processing procedure.
Entropy 21 00652 g001
Figure 2. Comparison of performances between the previous key rates and the modified results under different block lengths, namely, 10 7 , 10 8 , and 10 9 . (a) shows the direct reconciliation (DR) cases, and (b) shows the reverse reconciliation (RR) cases. The solid lines are the performances under the ideal covariance matrix (CM) estimation, and the dashed lines are the performances under practical CM estimation considering finite-size. The reconciliation efficiency β is under a practical value of 95 % , and the excess noise is chosen as ε = 0 . 01 . We set the security parameters ε c = ε s = 10 - 9 and the detection range to α = 61 . 6 .
Figure 2. Comparison of performances between the previous key rates and the modified results under different block lengths, namely, 10 7 , 10 8 , and 10 9 . (a) shows the direct reconciliation (DR) cases, and (b) shows the reverse reconciliation (RR) cases. The solid lines are the performances under the ideal covariance matrix (CM) estimation, and the dashed lines are the performances under practical CM estimation considering finite-size. The reconciliation efficiency β is under a practical value of 95 % , and the excess noise is chosen as ε = 0 . 01 . We set the security parameters ε c = ε s = 10 - 9 and the detection range to α = 61 . 6 .
Entropy 21 00652 g002
Figure 3. Comparison of performances between the previous key rates and the modified results under different transmission distances. (a) shows the direct reconciliation cases, and (b) shows the reverse reconciliation cases. The solid lines are the performances under ideal CM estimation, and the dashed lines are the performances under practical CM estimation considering finite-size. The parameters are chosen as in Figure 2.
Figure 3. Comparison of performances between the previous key rates and the modified results under different transmission distances. (a) shows the direct reconciliation cases, and (b) shows the reverse reconciliation cases. The solid lines are the performances under ideal CM estimation, and the dashed lines are the performances under practical CM estimation considering finite-size. The parameters are chosen as in Figure 2.
Entropy 21 00652 g003
Figure 4. Comparison of the performances between the standard estimation method and the modified double-data modulation method under the reverse reconciliation case. (a) shows the performances of two scenarios under different block sizes, while (b) shows the protocol’s performances under different transmission distances. The dashed lines are the performances using the standard estimation method, and the solid lines are the performances using double-data modulation method.
Figure 4. Comparison of the performances between the standard estimation method and the modified double-data modulation method under the reverse reconciliation case. (a) shows the performances of two scenarios under different block sizes, while (b) shows the protocol’s performances under different transmission distances. The dashed lines are the performances using the standard estimation method, and the solid lines are the performances using double-data modulation method.
Entropy 21 00652 g004

Share and Cite

MDPI and ACS Style

Chen, Z.; Zhang, Y.; Wang, X.; Yu, S.; Guo, H. Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution. Entropy 2019, 21, 652. https://doi.org/10.3390/e21070652

AMA Style

Chen Z, Zhang Y, Wang X, Yu S, Guo H. Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution. Entropy. 2019; 21(7):652. https://doi.org/10.3390/e21070652

Chicago/Turabian Style

Chen, Ziyang, Yichen Zhang, Xiangyu Wang, Song Yu, and Hong Guo. 2019. "Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution" Entropy 21, no. 7: 652. https://doi.org/10.3390/e21070652

APA Style

Chen, Z., Zhang, Y., Wang, X., Yu, S., & Guo, H. (2019). Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution. Entropy, 21(7), 652. https://doi.org/10.3390/e21070652

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop