1. Introduction
Ability to transmit information in an advanced way, impossible within the classical realm, is an important feature of quantum states, studied by quantum communication. However, during propagation through a quantum channel the states interact with the environment and part of the information becomes shared with it. Such information leakage is essential when security of quantum key distribution (QKD) [
1] is considered. Indeed, as follows from the Csiszár-Körner theorem [
2], secure key can be distilled from the partially correlated data when the mutual information between the trusted parties exceeds the upper bound on the information which is leaking to the untrusted channel, i.e., is available to a potential eavesdropper. Assessment of this quantity depends on the presumable effectiveness of measurement, which an eavesdropper is capable of. In the most feasible case of individual measurements on the leaking signal, which do not require efficient quantum memories, needed for more advanced collective measurements, the upper bound is given by the Shannon classical information [
3]. It was shown for continuous-variable (CV) [
4] squeezed signal states that controllable modulation allows reduction of information leakage to an untrusted noisy environment [
5] and its complete cancellation once the environment is purely lossy [
6] even when an eavesdropper is capable of collective attacks. In this paper we address the minimization of information leakage in the individual attacks case, derive the respective condition and study the properties of the mutual information in the regime of minimum information leakage as well as out of this regime. In the case of individual attacks, a generally noisy environment can be optimally modeled as an entangling quantum cloner [
7]. While such an eavesdropping attack can reach the bounds set by the Heisenberg uncertainty principle, it can be feasible with the current technology as it only requires a tunable two-mode squeezed vacuum (TMSV) source [
8] and homodyne detection. We evaluate the information accessible on the signal after the measurements on the cloner modes, assuming their joint as well as independent measurements, and show that optimality of either of the approaches differs depending on whether the modulated signal is below or above the shot noise, defined by the level of vacuum fluctuations. For the sub-shot-noise modulated signals we observe that the cloner is redundant, meaning the independent measurements on its modes are more efficient compared to the joint strategy. In this regime, the standard entangling cloner attack based on the joint treatment of the measurement outcomes from the cloner modes is not optimal anymore and the modes have to be optimally treated independently. On the other hand, for the above-shot-noise modulated signals the cloner is synergistic, when the joint strategy yields more information on the signal. In the regime, when the leakage is minimum, the two approaches are equivalent. Our results are essential for security of practical squeezed-state CV QKD systems against individual attacks as well as reveal nontrivial statistical properties of entangling cloner attacks.
2. CV QKD and Entangling Cloner
We consider the generalized Gaussian CV QKD protocol between the trusted parties Alice (
A) and Bob (
B) [
5] based on the arbitrary Gaussian quadrature modulation of arbitrarily quadrature-squeezed states belonging to a single mode of electromagnetic radiation. Field quadratures are real and imaginary parts of the annihilation and creation operators of a respective mode of the electromagnetic field, which can be introduced as
and
, from which follows the commutation relation for the quadrature operators,
. Introducing the variance of an observable
as
, one can obtain the quadrature variance of a vacuum or coherent state of light, being equal to one in the used definition and being referred to as the shot-noise unit (SNU). With no loss of generality assuming that the signal states are squeezed in x-quadrature, we denote their x-quadrature variance by
. The squeezed variance is then
, which represents the fact that the squeezed quadrature fluctuations are suppressed below the shot-noise level. Accordingly, the fluctuations of the complementary p-quadrature of a pure squeezed state have the variance
. The Gaussian modulation is applied by displacing the x-quadrature by value
and the p-quadrature by value
, both taken from the Gaussian distributions with variances
and
respectively. Then the overall variance of the signal entering the channel will be
in x-quadrature and
in p-quadrature (where
are the modulation variances of the respective quadratures).
The modulated states travel through an untrusted Gaussian channel (being the worst-case assumption in Gaussian CV QKD [
7]), typically characterized by transmission
and quadrature excess noise
. The channel parameters then explicitly define the strength of an eavesdropping attack in the channel (i.e., how much signal is lost and how much noise is added) and, together with the state preparation parameters, give the upper bound on the amount of information, which is leaking to the channel. If the channel excess noise
is defined with respect to the channel input, the variance on detection outcomes
on the channel output, measured by the remote trusted party Bob using a homodyne detector, reads
which is the result of coupling the noisy signal with variance
to vacuum with the coupling ratio
.
The optimal individual attack on the Gaussian CV QKD is the entangling cloner attack, which allows an eavesdropper to achieve the bound on the information about the key set by the Heisenberg uncertainty principle [
9]. The entangling cloner is a TMSV state with variance
N; one mode (
) of the cloner is coupled to the signal mode, as shown in
Figure 1, while another mode (
) is left intact. Both modes are then measured by an eavesdropper using homodyne detectors, resulting in outcomes
and
, which allows to minimize the uncertainty on the noise added to the signal by mode
, while the signal is measured by the remote party. Entangling cloner can therefore be seen as a purification of a thermal noise in mode
, coupled to the signal, or as a controllable noise addition to the signal after the measurement on mode
, thanks to the strong correlation between the two modes of the TMSV state (see more on security proofs and security analysis methods in CV QKD in the reviews [
10,
11]).
It is known [
9], that in order to mimic the actual channel parameters, the coupling
between the signal and the cloner mode has to be set to the actual channel transmittance, while the variance of the cloner modes has to be
. Then after the interaction between the signal and mode
, the variance of the data measured by Bob,
, is equivalent to (
1), corresponding to the given channel.
To evaluate the upper bound on the leaking information after the entangling cloner attack, we first derive the covariance matrix of the x-quadrature data
,
and
, measured on the signal mode
B and the cloner modes
and
, respectively, by the homodyne detectors. The elements of an x-quadrature covariance matrix are obtained as
, for
giving the quadrature variance of a given mode, and for
giving the quadrature covariance (correlation) between the modes
i and
j. Such x-quadrature covariance matrix of an entangling cloner in modes
with mode variance
N prior to interaction with the signal mode
B reads
with
p-quadrature matrix being the same up to the sign flip in the correlation (off-diagonal) term, corresponding to strong anti-correlation in
p-quadrature. Coupling
between the mode
B, containing the modulated signal with variance
V, and the noise mode
of TMSV with variance
N, can be modelled as a beamsplitter interaction, described by the input-output relation for quantum operators in the respective modes as
where
represents the transmittance and
represents the reflectance of a beamsplitter, similarly for the conjugate operators. The resulting covariance matrix then reads
which, in particular, reflects the fact that the mode
with variance
N remains intact (does not interact with the signal), while the initial TMSV correlation between the cloner modes
is scaled by
.
Considering the individual attacks, we analytically evaluate the accessible information in terms of the Shannon (classical) mutual information, defined for a pair of random variables as through the entropies of the form and the joint entropy of the form . For the Gaussian-distributed continuous variables X and Y, the mutual information can be expressed as (with no loss of generality assuming binary coding), where is the variance of variable X and is the conditional variance expressed through the variance of variable Y and the correlation (covariance) between the variables X and Y. We will also use an extension of the Shannon mutual information to the joint distribution of variables Y and Z in the form , where is the variance of X conditioned on Y and Z.
In the reverse reconciliation scenario (which is typically considered in CV QKD as it is much more robust against channel losses [
7], when the receiver (Bob) is the reference side of the protocol, the information accessible after a joint measurement on the cloner modes can be directly obtained from (
4) as
which is larger, than the information obtained from the measurement of only the mode
:
concerned with the replacement of
in the second term, which corresponds to replacement of
after the measurement on the mode
and represents the information advantage of the entangling cloner. Note that the information between the signal and the auxiliary mode
of the cloner, which reads
is also lower than (
5) for the physically valid parameters
.
When the channel noise is absent, i.e., , it means and the cloner is reduced to two uncorrelated vacuum modes, hence corresponding to the pure channel loss, in which case the measurement on has no effect on the information obtained from the measurement on .
3. Minimization of Information Leakage
The condition for minimizing information leakage was obtained in [
5] for the case of collective attacks, here we analytically derive this condition in the case of the individual ones. It can be directly obtained from the information leakage to the entangling cloner (
5) by taking its derivative by
V, which reads
As
is the convex function of
V in the physically valid region
, the minimum is reached when either
(channel is perfect), or
, meaning
. Therefore, in order to reach the minimum information leakage, the controllable quadrature modulation of the squeezed states, applied by the amplitude or phase modulator (for the amplitude or phase quadrature squeezed state respectively), has to be set in such a way, that the resulting modulated state has the shot-noise variance in the modulated squeezed quadrature. In the case of the noiseless channel
this means that the outputs of the beamsplitter, simulating the channel attenuation, are completely uncorrelated and the information leakage is fully removed [
6]. For the noisy channels
the residual correlations remain due to the noise and the minimum information leakage remains non-zero.
In the regime of the modulated state variance equal to a shot noise, i.e.,
, we obtain that the mutual information (
5) reads
It is straightforward to see by putting
to (
6), (
7) and comparing to (
9) that, in the regime of the minimum leakage, the information between the signal and the jointly measured cloner modes is equal to the sum of the mutual information quantities between the signal and each of the cloner modes:
From this, using the definition of Shannon conditional mutual information
through the conditional entropies of the form
and the conditional joint entropies of the form
, we obtain, that in the regime of minimum leakage
where
is the conditional mutual information between the modes
, conditioned by the measurement results at
B, i.e., in the regime of the minimum leakage the conditioning on the residual signal does not change the mutual information between the two cloner modes.
Indeed, we obtain the mutual information
between the modes of the entangling cloner from the elements of the
submatrix of the matrix (
4) as follows:
The conditional mutual information
can be obtained from the conditional covariance matrix
, containing variances of the form
,
, and the conditional correlation of the form
which contains the correlations
and
between either of the cloner modes and the signal mode
B.
We then obtain the resulting matrix as
and obtain the mutual information between the cloner modes conditioned on the signal mode
B as follows:
which is evidently the same as
given by (
12) when
.
In the next section we show the regimes of redundancy and synergy of the entangling cloner, when the equalities (
10), (
11) do not hold.
4. Redundancy and Synergy of an Entangling Cloner
Outside of the optimal regime of the minimum leakage from a Gaussian CV quantum channel, obtained in the previous Section, i.e., when
, one of the quantities in (
10) and (
11) exceeds another. Similar effect was previously discussed in neuro-science [
12] and information theory [
13,
14]. In particular, the situation when
is referred to as synergy, when jointly systems
provide more information on
B than separately. Alternatively, when the joint information is less than the sum of the individual ones, i.e.,
, the system
is called redundant in accessing the information on the system
B. In this terms, the optimal regime of the minimized leakage
is achieved when entangling cloner
is neither synergistic, nor redundant, while varying the modulated signal variance
V we access both redundancy and synergy regimes of an entangling cloner, used to optimally estimate the signal.
Importantly, this means that for the sub-shot-noise modulated signal
the optimality of the entangling cloner individual attack [
9], well-known in CV QKD and broadly used to study the security of the protocols, does not hold anymore. So do the security bounds set by the Heisenberg uncertainty principle, as the product of uncertainties of
knowing the outcomes of the measurements on the purifying system
E and the modulation
is below 1 SNU. It turns out, that in this regime a more efficient attack can be implemented by treating the measurement outcomes of the two modes of an entangling cloner separately.
The typical regimes of an entangling cloner inferring a transmitted signal are given in
Figure 2 in terms of two types of mutual information analytically given by (
5)–(
7) with respect to the signal variance for different values of channel transmittance (cloner coupling ratio)
. It is evident from the graph that the joint information
is constantly minimized upon signal variance being equal to a shot-noise unit,
. When the signal remains squeezed (
) the redundancy of the cloner is observed, while as signal becomes more noisy than the shot noise,
, the synergy of the cloner takes place.
Similarly, we can revert the scheme and consider the communication between the cloner modes
and the role the measurement results on the mode
B take in this communication. Out of the minimum leakage regime
given by (
11), when the state in mode
B before the coupling
has shot-noise variance in the measured quadrature, the mutual information between the cloner modes can be increased on decreased by conditioning on the measurement results at
B. The typical dependencies of
and
, given by (
12) and (
15), i.e., before and after conditioning on
B, respectively, depending on the variance of the state in mode
B prior to the interaction with the cloner, are given in
Figure 3.
It is evident from the plots in
Figure 3, that, contrary to the mutual information quantities between the channel output and the cloner modes (joint or separate) given in
Figure 2, which are the convex functions of the modulated signal variance
V, the mutual information between the cloner modes
continuously increases with the increase of the signal variance
V if conditioned on the output of mode
B or continuously decreases without the conditioning. Indeed, the variance of mode
B then plays the role of an external noise, which either contributes to the mutual information once conditioning is performed, or does not, once the measurements on
B are not taken into account. We further extend the scheme to interaction between two entangling cloners and show how conditioning on an auxiliary cloner modes changes the mutual information between the modes of the main one.
5. Two Interacting Entangling Cloners
To generalize the result of the effect of conditioning on the external noise in mode
B on the mutual information between the modes of an entangling cloner, we consider the scheme of two mutually interacting entangling cloners, as shown in
Figure 4.
Prior to interaction each of the cloners can be described in x-quadrature by a covariance matrix of the form (
2) with variances
N and
V. We consider the communication between the cloner modes
and
(which can be also seen as a purification of the modulation performed on a single mode
[
9]) and study the effect of conditioning on (using the knowledge of the quadrature values of) the auxiliary cloner modes
. We analytically derive the covariance matrices of the two cloners and obtain the respective mutual information quantities as discussed below.
After the coupling
between the modes
B and
the x-quadrature covariance matrices of the two cloners have the form
and their correlation matrix reads
Without the conditioning, the mutual information
between the cloner modes is given by (
12). After the conditioning performed on mode
B, the x-quadrature covariance matrix of the state in modes
has the form (
14) and the respective conditional mutual information
is given by (
15). As the variance
V of the cloner in modes
is always
(equality means the cloner reduces to two uncorrelated vacuum states), which is implied by the physicality constraint given by the Heisenberg uncertainty principle [
15], the mutual relation of those two mutual information quantities for the two-cloner scheme corresponds to the right part of the plot in
Figure 3. Hence, conditioning on the state in mode
B having variance larger than the shot noise level improves the mutual information between the cloner modes. Since the thermal state in mode
B, after it is split between modes
B and
by the beamsplitter
, introduces correlations between the two modes, the conditioning can be seen as application of additional controllable modulation to the mode
of the entangling cloner. Such additional modulation is known to improve the entangled resource for quantum communication [
16].
If instead of measurement and conditioning on mode
B, the measurement on mode
A is taken into account, the covariance matrix of the conditional state in modes
obtains the form (note that the mode
is not affected as it is not correlated to mode
A):
the resulting mutual information
is then exactly the same as
given by (
15). Hence, conditioning on either mode of the auxiliary cloner
improves the mutual information between the modes
due to the strong correlation between the modes
A and
B. Finally, if the measurements on both modes
is taken into account, the resulting conditional matrix reads
and the resulting mutual information
is exactly the same as
without any conditioning, given by (
12). Hence, conditioning on both modes of the auxiliary cloner cancels the positive effect of the additional correlations in modes
B and
.