Next Article in Journal
Numerical Investigation of the Collapse of a Steel Truss Roof and a Probable Reason of Failure
Next Article in Special Issue
A Scheme for Controlled Cyclic Asymmetric Remote State Preparation in Noisy Environment
Previous Article in Journal
Transfer Learning-Based Fault Diagnosis under Data Deficiency
Previous Article in Special Issue
Quantum Proxy Signature Scheme with Discrete Time Quantum Walks and Quantum One-Time Pad CNOT Operation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lengthening Transmission Distance of Continuous Variable Quantum Key Distribution with Discrete Modulation through Photon Catalyzing

1
College of Information Engineering, Shaoyang University, Shaoyang 422000, China
2
Jiangsu Key Construction Laboratory of IoT Application Technology, Taihu University, Wuxi 214064, China
3
School of Automation, Central South University, Changsha 410083, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2020, 10(21), 7770; https://doi.org/10.3390/app10217770
Submission received: 18 September 2020 / Revised: 26 October 2020 / Accepted: 26 October 2020 / Published: 3 November 2020
(This article belongs to the Special Issue Quantum Communications and Quantum Networks)

Abstract

:
Establishing global secure networks is a potential implementation of continuous-variable quantum key distribution (CVQKD) but it is also challenged with respect to long-distance transmission. The discrete modulation (DM) can make up for the shortage of transmission distance in that it has a unique advantage against all side-channel attacks; however, its further performance improvement requires source preparation in the presence of noise and loss. Here, we consider the effects of photon catalysis (PC) on the DM-involved source preparation for improving the transmission distance. We address a zero-photon-catalysis (ZPC)-based source preparation for enhancing the DM–CVQKD system. The statistical fluctuation is taken into account for the practical security analysis. Numerical simulations show that the ZPC-based source preparation can not only achieve the long-distance transmission, but also contributes to the reasonable increase of the secret key rate.

1. Introduction

Quantum key distribution (QKD) [1,2,3,4] allows legal participants to share a secret key and enables theoretically information-secure communications [5,6,7]. Recently, it has spurred much interest, resulting in two approaches, i.e., discrete-variable (DV) QKD [8,9] and continuous-variable (CV) QKD [10,11,12,13,14,15,16,17,18,19,20]. A possible breakthrough may come from the practical implementation of CVQKD, which has an advantage of being practically implemented with modern telecommunications, thus allowing for the exploitation of the heritage of integrability in existing optical communication system.
At present, there are several mainstream modulations in CVQKD, such as Gaussian modulation (GM) [11,12,13,14,15] and discrete modulation (DM) [16,17,18,19,20]. In the former, the transmitter generates the key bits in the quadratures of the Gaussian modulated optical field, while the receiver recovers the secret key using a coherent detector [13]. It is GM–CVQKD that could achieve the potential high secret key rate. Unfortunately, it is still limited to the transmission distance, compared with its DVQKD counterpart. A challenge is that the resulting reconciliation efficiency [14,15] is still low, which is unsuitable for long-distance transmission, whereas in the latter, one can solve this problem by using a DM source for CVQKD [16], where it generates nonorthogonal coherent states, taking advantage of the randomly measured quadrature for information encoding rather than exploiting the fixed quadrature in source preparation [17]. Consequently, it results in a merit of both high reconciliation efficiency and high tolerance against the excess noise [11,12,13,14,15] such that it can extend the transmission distance of the CVQKD system [18]. Actually, GM–CVQKD is simpler for theoretical performance analysis than DM–CVQKD, and the secret key rates can approach the theoretical limits [17], whereas GM–CVQKD itself is alway approximated by the DM sources, which may be taken into account for security analysis [18]. Moreover, as GM–CVQKD usually requires more resources in terms of randomness and classical post-processing resources, DM–CVQKD can offer further simplified implementation in experiments. While theoretics and experiments of DM–CVQKD have suggested that we can achieve the above-mentioned goal, there are still some potential challenges while promoting its performances.
Currently, photon catalysis (PC) [21,22,23,24,25], which is a non-Gaussian operation with n-photon state input/output in essence, has been utilized for security improvement attributed to the photon catalyzing operation, which increases the entanglement degree of the two-participant system by increasing the correlation between the transmitter and the receiver [21]. In a certain low-squeezing parameter, the entanglement of the two-mode squeezed vacuum (TMSV) state can be enhanced by increasing the catalysis photon number [22]. Due to equivalence of the entanglement-based (EB) CVQKD system and the prepare-and-measure (PM) CVQKD system [11,12,13,14,15,16,17,18,19,20], the PC-involved DM–CVQKD system may be implemented with existing optical technologies. Motivated by the above advantages, we propose an improved DM–CVQKD system through photon catalyzing. The DM scheme is employed for the source preparation because it can tolerate a lower signal-to-noise ratio (SNR) well, resulting in the long-distance transmission of the CVQKD system. Meanwhile, a zero-photon catalysis (ZPC) operation with zero-photon state input/output is adopted in the DM-involved source preparation at the transmitter. The ZPC-based CVQKD protocol has been proven to be beneficial for tolerating lower reconciliation efficiency [24,25] and extending the maximal transmission distance, thus promoting its practical implementations with underlying technology.
As for the performance analysis of the proposed DM–CVQKD system, we take into account the asymptotic case [17] where the secure key rate can be obtained via the covariance matrix approach. It is a theoretically calculated value without involving the finite-size effect. Unfortunately, the derived upper bound is difficult to obtain in practical implementations. Therefore, we have to consider the finite-size effects [26,27]. Though the secure key rate is still pessimistic, it approaches to the practical implementation. Its security analysis is based on the finite-size effects; hence, we can achieve the upper bound of the maximal transmission distance.
This paper is structured as follows. In Section 2, we propose the PC-based DM source for CVQKD, and then elaborate on the characteristics of the ZPC-based scheme for improving the DM–CVQKD system. In Section 3, we demonstrate the transmission distance improvement of the DM–CVQKD system via the ZPC-based source preparation scheme. Finally, we draw a conclusion in Section 4.

2. The DM Source Preparation via ZPC Operations

In what follows, we elaborate the ZPC-involved DM source preparation for performance improvement of the CVQKD system. To make the derivation self-contained, we suggest the ZPC-involved CVQKD system with the DM source preparation.

2.1. The CVQKD System with the DM Source Preparation

For the prepare-and-measure (PM) version of CVQKD that can be used for practical implementations, Alice randomly draws n quaternary or octal variables, each corresponding to a coherent state of α k N = α e i k π / N , k { 1 , 2 , , N } , where α is a real positive number related to the modulation variance of coherent state given by V A = 2 α 2 [16,17,18,19,20]. For N = 4 and N = 8 , we have the four-state DM source and the eight-state DM source, as shown in Figure 1 [28,29].
Alice generates n coherent states, which are sent through quantum channel characterized by transmission T and excess noise ε . Then, for the received state, Bob measures one of quadratures (i.e., x ^ or p ^ ) by homodyne detector.
Theoretical analysis of CVQKD is considered through using its equivalent entanglement-based (EB) version. The transmitter Alice starts with a pure bipartite state Ψ with variance V = V A + 1 . Subsequently, she performs a projective measurement on the first half of this state, whereas the second half is sent to the receiver Bob. For the DM–CVQKD protocol, to apply the security analysis technique as the GM–CVQKD protocol [11,12,13,14,15], we therefore want to find a purification Ψ with a covariance matrix γ . This covariance matrix has the form given by [26,27]
γ N = ( V A + 1 ) I Z N σ z Z N σ z ( V A + 1 ) I ,
where I = diag ( 1 , 1 ) and σ z = diag ( 1 , 1 ) . For example, taking N = 4 into account, we have the four-state scheme given by
Z 4 = V A k = 0 3 λ k 1 3 / 2 λ k ,
with the parameters λ 0 , 2 and λ 1 , 3 given by λ 0 , 2 = 1 2 e α 2 ( cosh ( α 2 ) ± cos ( α 2 ) ) and λ 1 , 3 = 1 2 e α 2 ( sinh ( α 2 ) ± sin ( α 2 ) ) [24].
We note that the DM source has a positive effect on CVQKD. For example, we have Z 4 Z 8 Z G for N = 4 and N = 8 in the DM–CVQKD protocol, where Z G = V A 2 + 2 V A represents the GM–CVQKD protocol. However, it is difficult to distinguish Z 4 , Z 8 and Z G for V A 0.5 , as shown in Figure 2. Therefore, we attempt to derive the security bounds of DM–CVQKD referring to that of GM–CVQKD.

2.2. The ZPC-Based DM Source Preparation

It is known that ZPC, which is a non-Gaussian operation with zero-photon state input/output [21,22], can enhance the correlation of the two-participant entangled quantum system [25,30]. In what follows, we suggest an improved CVQKD system with ZPC operation for the DM source preparation, as shown in Figure 3. In the auxiliary mode C, the zero-photon Fock state 0 is injected at one input port of beam splitter (BS) with transmittance τ , and quantum state ψ i n of the mode B is simultaneously injected at another input port. Subsequently, we detect the zero-photon Fock state 0 at one of the output ports of the BS using a photon number resolving detector (PNRD), resulting in the ZPC-enhanced quantum state ψ o u t from another output port.
Similar to the traditional photon subtraction operation [30,31,32,33], the ZPC operation can be used for performance improvement of CVQKD. In order to describe the ZPC-based DM source preparation, the ZPC operation can be described as [22,25]
O ^ 0 = ( τ ) b b .
For an input ψ i n , we have output ψ o u t given by
ψ o u t = O ^ 0 P 0 ψ i n ,
where P 0 denotes the success probability of the operation given by P 0 = e ( T 1 ) | α k | 2 as function of parameters V A and τ , as shown in Figure 4. We find that the large V A and τ result in the high success probability. Note that we have ψ o u t = ψ i n for τ = 1 , indicating that there is no ZPC effect.
In the PM version of CVQKD, Alice randomly draws n quaternary or octal variables, each corresponding to a coherent state of α k N . Subsequently, Alice performs the ZPC operation on these n coherent states, which is modeled (BS) with transmittance τ , resulting in the catalyzed state
α ˜ k = e ( τ 1 ) | α | 2 P 0 τ α k .
We note that the relationship of the transformed amplitudes can be written as α ˜ k = τ α k . After that, the catalyzed quantum state is sent to Bob through the Eve-controlled channel. Bob may perform either homodyne (Hom) or heterodyne (Het) detection on the resulting quantum state. Finally, Alice and Bob distill the shared secret key after they conduct the classical post-processing procedure. In the EB version of the CVQKD system, as shown in Figure 3, Alice prepares for Ψ N , and performs heterodyne detection (Het) on mode A. Mode B, which is performed with the ZPC operation, is sent to Bob. The role of the ZPC operation is for source-entanglement enhancement while promoting the mode transition between B and B 1 , resulting in the covariance matrix γ A B 1 of the catalyzed state ρ A B 1 given by
γ A B 1 = ( τ V A + 1 ) I Z N σ z Z N σ z ( τ V A + 1 ) I ,
with the parameters
Z N = τ V A k = 0 N 1 λ ˜ N 1 3 / 2 λ ˜ k ,
where the calculation of λ ˜ k is similar to that of λ k in Equation (2), but note that α is replaced by τ α .
We note that we can obtain the effect of the ZPC operation on the DM source from the derived covariance matrix γ A B 1 . The parameter Z N , which can be calculated from modulation variances of the initially prepared coherent states, demonstrates the relation of the modes A and B 1 for source preparation. In what follows, we will show the effect of Z N on the performance of the CVQKD system.
In addition, there are the other similar operations, such as local Gaussian operation [34], photon subtraction and addition operations [35], which can be used for improving entanglement of a two-mode state. These operations, whether they are Gaussian or not, may be similarly employed for source preparation while considering performance improvement of the CVQKD system. However, due to the elegant structure of the ZPC operation that can be conventionally integrated with the practical quantum system, in this paper, we consider the ZPC-based DM source preparation for extending the maximal transmission distance of the CVQKD system.

3. Security Analysis

In this section, we demonstrate the effect of the DM source preparation on CVQKD in both asymptotic [32,33] and finite-size cases [33] with numeric simulation results. For the detailed derivation of the secret key rate of the CVQKD system in asymptotic and finite-size cases, please see Appendices Appendix A and Appendix B, respectively.
For the ZPC-based DM source preparation, we show the success probability of ZPC operation in Figure 4. We find that the success probability increases with the increased modulation variance, and simultaneously increases with the increased transmittance. In the security analysis, the transmittance τ is tunable to satisfy the optimality of the ZPC operation. Taking V A 0.5 into account, no matter what the value of V A is, the success probability can remain more than 0.75. This is a feasible solution to improve the CVQKD system.
As usual, it is necessary to select an optimal modulation variance V A for the performance improvement of CVQKD involving the ZPC operation. As shown in Figure 5, solid lines denote the secret key rate of the eight state CVQKD system, while dashed lines represent that of the four-state CVQKD system. In addition, we let β = 90 % , η = 0.6 and v e l = 0.05 . We find that for ε = 0.01 , the secret key rate decreases as the transmission distance, while the inserted subgraph shows that the secret key rate decreases with the excess noise at the distance of 80km. Moreover, for V A = 0.5 the secret key rate can reach the optimal value, and hence we let V A = 0.5 in the subsequent simulations.
In Figure 6a, we show the asymptotic secret key rate of the ZPC-based CVQKD system, where solid lines denote homodyne detection and dashed lines represent heterodyne detection. It seems that performances of homodyne and heterodyne detectors are almost similar, and thus we employ the homodyne detector in security analysis. The performance of the ZPC-based CVQKD is better than that of the traditional CVQKD whether it is four-state modulation or not.
The eight-state modulation scheme demonstrates better performance than the four-state modulation scheme in the traditional CVQKD system. However, after performing the ZPC operation, the performance of the ZPC-based four-state modulation scheme exceeds the eight-state modulation scheme. Therefore, the ZPC-based source preparation is an effective way to improve the DM–CVQKD system. We note that the effect of the ZPC operation does not work over the whole transmission distance. In the short distance range, there are few catalytic effects. As shown in Figure 6b, the performance of the ZPC-based system is almost similar to that of the traditional system for τ = 1 . For the four-state DM source preparation, the ZPC effect occurs at the distance of L = 60 km, whereas for the eight-state DM source preparation, it occurs at L = 30 km.
Usually, one assumes that the quantum channel is given in an asymptotic regime. However, one does not know the quantum channel in advance in the finite-size scenario. Therefore, we take into account effect of the finite-size on the ZPC-based CVQKD. As shown in Figure 7, the proposed CVQKD system in finite-size scenario performs worse than that in the asymptotic limit. As the number N of the exchanged signals is increased, the corresponding curves approach to the asymptotic scenario. The reason is that the large number of the exchanged signals results in the perfect signals parameter estimation. However, it is infeasible to achieve the infinite number of the exchanged signals in practice. Nonetheless, it still has resulted in an improvement, compared with the traditional system in the finite-size regime, as shown in Figure 8.
In addition, we show the effect of the ZPC-involved source on the tolerable excess noise of CVQKD, as shown in Figure 9. We find that CVQKD involving the ZPC-involved source performs better than the traditional system in terms of maximal transmission distance.
Moreover, reconciliation efficiency is the other important parameter that has an effect on the performance of CVQKD. Figure 10 suggests the effect of the ZPC-based source on the secret key rate of CVQKD related to the reconciliation efficiency. We find that the ZPC-based source can tolerate low reconciliation efficiency. Therefore, the ZPC-based source preparation can reduce the requirements for reconciliation efficiency, thereby reducing costs of practical implementation of the high-rate long-distance quantum communications.

4. Conclusions

We have suggested a ZPC-based source preparation scheme for improving the DM–CVQKD system in metropolitan areas. The PC operation, which is non-Gaussian, has been deployed for the source preparation at the transmitter. We consider the effect of the ZPC-based DM source on the performance of CVQKD. Numerical simulations show that the ZPC-involved DM source can extend the maximal transmission distance of the CVQKD system. Moreover, it can tolerate high excess noise and low reconciliation efficiency, compared with the traditional CVQKD system. Taking the finite-size effect into account, we obtain the tight bound of the maximal transmission distance, which can be experimentally achieved with state-of-the-art technologies.

Author Contributions

Writing–original draft preparation, Z.Z. and Y.G.; software, S.Z.; validation and formal analysis, T.H.; supervision, Y.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (Grant No. 61871407).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Calculation of Asymptotic Secret Key Rate

We assume that Eve performs the Gaussian collective attack to achieve the useful results, and the information obtained is limited to the Holevo range S ( E : y ) . The definition of secret key rate in the case of reverse reconciliation under collective attacks can be given by
K a = P 0 ( β I ( x : y ) S ( E : y ) ) ,
where β is the reconciliation efficiency, I ( x : y ) is the Shannon mutual information between Alice and Bob, and S ( E : y ) is the Holevo bound of the mutual information between Eve and Bob. The mutual information I ( x : y ) for homodyne detection is derived as
I ( x : y ) = 1 2 log 2 V + χ t o t 1 + χ t o t ,
where χ t o t represents the total noise given by χ t o t = χ l i n e + χ h o m ( h e t ) / T and χ l i n e represents the total channel-added noise given by χ l i n e = 1 / T + ε 1 . The transmission efficiency T is calculated as T = 10 μ L / 10 , where μ = 0.2 dB/km is the loss coefficient for the standard optical fibers and L is the length of the fiber optics. For homodyne detection, the detection-added noise referred to Bob’s input can be given by
χ h o m = ( 1 η ) + ν e l η .
Note that in the case of heterodyne detection, we have,
χ h e t = 1 + ( 1 η ) + 2 ν e l η .
After Bob applies homodyne or heterodyne measurement, Eve purifies the whole system so that the mutual information between Eve and Bob can be expressed as
S ( E : y ) = S ( E ) S ( E | y ) = S ( x y ) S ( x | y ) ,
where the first term S ( x y ) is a function of the symplectic eigenvalues λ 1 , 2 of γ A B 2 , which is given by
S ( x y ) = G λ 1 1 2 + G λ 2 1 2 ,
where G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x and λ 1 , 2 are symplectic eigenvalues of covariance matrix
γ A B 2 = ( τ V A + 1 ) I T Z N σ z T Z N σ z T ( τ V A + 1 + χ l i n e ) I .
Consequently, we have
λ 1 , 2 = 1 2 A ± A 2 4 B ,
where A and B are parameters given by
A = det γ A + det γ B 2 + 2 det σ AB 2 , B = det γ AB 2 .
The second term S ( x | y ) is a function of the symplectic eigenvalues λ 3 , 4 of the convariance matrix of Alice’s mode after Bob performs homodyne (heterodyne) detection, which is given by
S ( x | y ) = G λ 3 1 2 + G λ 4 1 2 ,
with the symplectic eigenvalues
λ 3 , 4 = 1 2 C ± C 2 4 D .
For homodyne detection, we have
C h o m = A χ h o m + V B + T T ( V + χ t o t ) , D h o m = B V + B χ h o m T ( V + χ t o t ) ,
with T = T ( V + χ l i n e ) . For heterodyne detection, we have
C h e t = A χ h e t 2 + B + 1 + 2 χ h e t ( V B + T ) + 2 T Z 8 2 T 2 ( V + χ t o t ) 2 , D h e t = V + B χ h e t T ( V + χ t o t ) 2 .

Appendix B. Secret Key Rate in the Finite-Size Scenario

In the following, let the notation N represent the total number of signals exchanged by Alice and Bob during the protocol. The x and y represent the classical data of Alice and Bob after they have measured their quantum states, and E refers to the quantum state of the eavesdropper. In the case of the CVQKD system, the secret key rate obtained for a finite size analysis can be given by
K f = n N β I ( x : y ) S e P E ( y : E ) Δ ( n ) ,
where n N represents n signals are used for the establishment of the key, out of the N signals exchanged. The notation S e P E ( y : E ) is defined as the maximum of the Holevo information compatible with the statistics except with probability e P E , where e P E is the failure probability of parameter estimation. The parameter Δ ( n ) is related to the security of the privacy amplification given by
Δ ( n ) = ( 2 dim H y + 3 ) log 2 ( 2 / e ¯ ) n + 2 n log 2 ( 1 / e PA ) ,
where H y is the Hilbert space corresponding to the variable y used in the raw key. Since the raw key is usually encoded on binary bits, we have dim H y = 2 . In addition, e ¯ is a smoothing parameter, and e P A is the failure probability of the privacy amplification procedure. Both the smoothing parameter e ¯ and e P A are intermediate parameters which should be optimized numerically. One needs to fix an overall security parameter e for the performance analysis of the CVQKD system. Compared with the unconditional security in the case of asymptotic scenario, the CVQKD system is limited to e-security in a finite-size setting. The parameter e corresponds to the failure probability of the whole protocol, meaning that the protocol is assured to performed as it is supposed to except with a probability at most e. The failure probability e can be computed from the various parameters as follows
e = e P E + e E C + e ¯ + e P A ,
where e E C is the probability that the reconciliation fails. The above-mentioned error probabilities can be set to e e P E = e E C = e ¯ = e P A = 10 10 .
In the finite-size scenario, S e P E ( y : E ) needs to be calculated in parameter estimation procedure where one can find a covariance matrix γ A B 2 e P E , which minimizes the secret key rate with a probability of at least 1 e P E . The estimation of γ A B 2 e P E can be calculated by m = N n couples of correlated variables ( x i , y i ) i = 1 , , m in the following form
γ A B 1 e P E = ( τ V A + 1 ) I t m i n Z N σ z t m i n Z N σ z ( t m i n 2 τ V A + σ m a x 2 ) I ,
where t m i n and σ m a x 2 correspond respectively to the minimal value of t and the maximal value of σ 2 compatible with the sampled data, except with probability e P E / 2 . With the maximum likelihood estimators, we have
t m i n T z e P E / 2 1 + T ε m V A , σ m a x 2 1 + T ε + z e P E / 2 ( 1 + T ε ) 2 m ,
where z e PE / 2 is such that 1 erf ( z e PE / 2 / 2 ) = e PE / 2 and e r f is the error function given by
e r f ( x ) = 2 π 0 x e t 2 dt .

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef] [Green Version]
  2. Zhou, J.; Huang, D.; Guo, Y. Long-distance continuous-variable quantum key distribution using separable Gaussian states. Phys. Rev. A 2018, 98, 042303. [Google Scholar] [CrossRef] [Green Version]
  3. Guo, Y.; Xie, C.; Huang, P.; Li, J.; Zhang, L.; Huang, D.; Zeng, G. Channel-parameter estimation for satellite-to-submarine continuous-variable quantum key distribution. Phys. Rev. A 2018, 97, 052326. [Google Scholar] [CrossRef]
  4. Liao, Q.; Wang, Y.; Huang, D.; Guo, Y. Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution. Opt. Express 2018, 26, 19907–19920. [Google Scholar] [CrossRef] [Green Version]
  5. Lo, H.K.; Curty, M.; Tamaki, K. Secure quantum key distribution. Nat. Photon 2014, 8, 595. [Google Scholar] [CrossRef] [Green Version]
  6. Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802. [Google Scholar] [CrossRef]
  7. Bang, J.Y.; Berger, M.S. Quantum mechanics and the generalized uncertainty principle. Phys. Rev. D 2006, 74, 125012. [Google Scholar] [CrossRef] [Green Version]
  8. Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [CrossRef] [Green Version]
  9. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [Green Version]
  10. Soh, D.B.S.; Brif, C.; Coles, P.J.; Lutkenhaus, N.; Camacho, R.M.; Urayama, J.; Sarovar, M. Self-referenced continuous-variable quantum key distribution protocol. Phys. Rev. X 2015, 5, 041010. [Google Scholar] [CrossRef] [Green Version]
  11. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [Green Version]
  12. Grosshans, F.; van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238. [Google Scholar] [CrossRef] [Green Version]
  13. Liao, Q.; Guo, Y.; Huang, D.; Huang, P.; Zeng, G. Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection. New. J. Phys. 2018, 023015. [Google Scholar] [CrossRef]
  14. Braunstein, S.L.; van Loock, P. Quantum information with continuous variables. Rev. Mod. Phys. 2005, 77, 513. [Google Scholar] [CrossRef] [Green Version]
  15. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Gui, M.; Liang, L.M. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 042335. [Google Scholar] [CrossRef] [Green Version]
  16. Leverrier, A.; Grangier, P. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 2009, 102, 180504. [Google Scholar] [CrossRef] [Green Version]
  17. Takeoka, M.; Guha, S.; Wilde, M.M. Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 2014, 5, 5235. [Google Scholar] [CrossRef]
  18. Furrer, F.; Franz, T.; Berta, M.; Leverrier, A.; Scholz, V.B.; Tomamichel, M.; Werner, R.F. Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks. Phys. Rev. Lett. 2012, 109, 100502. [Google Scholar] [CrossRef]
  19. Leverrier, A.; Grangier, P. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation. Phys. Rev. A 2011, 83, 042312. [Google Scholar] [CrossRef] [Green Version]
  20. Mao, Y.; Wang, Y.; Huang, W.; Zhong, H.; Qin, H.; Guo, Y.; Huang, D. Detecting quantum attacks: A machine learning based defense strategy for practical continuous-variable quantum key distribution. New J. Phys. 2020, 22, 083073. [Google Scholar] [CrossRef]
  21. Guo, Y.; Ye, W.; Zhong, H.; Liao, Q. Continuous-variable quantum key distribution with non-Gaussian quantum catalysis. Phys. Rev. A 2019, 99, 032327. [Google Scholar] [CrossRef] [Green Version]
  22. Ye, W.; Zhong, H.; Liao, Q.; Huang, D.; Hu, L.; Guo, Y. Improvement of self-referenced continuous-variable quantum key distribution with quantum photon catalysis. Opt. Express 2019, 27, 17186–17198. [Google Scholar] [CrossRef]
  23. Xu, X. Enhancing quantum entanglement and quantum teleportation for two-mode squeezed vacuum state by local quantum-optical catalysis. Phys. Rev. A 2015, 92, 012318. [Google Scholar] [CrossRef] [Green Version]
  24. Guo, Y.; Ding, J.Z.; Mao, Y.; Ye, W.; Liao, Q.; Huang, D. Quantum catalysis-based discrete modulation continuous variable quantum key distribution with eight states. Phys. Lett. A 2020, 384, 126340. [Google Scholar] [CrossRef]
  25. Ye, W.; Guo, Y.; Xia, Y.; Zbinden, H.; Zhang, H.; Ding, J.Z.; Hu, L.Y. Discrete modulation continuous-variable quantum key distribution based on quantum catalysis. Acta Phys. Sinica 2020, 69, 060301. [Google Scholar]
  26. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef] [Green Version]
  27. Guo, Y.; Li, R.J.; Liao, Q.; Zhou, J.; Huang, D. Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier. Phys. Lett. A 2018, 382, 372–381. [Google Scholar] [CrossRef]
  28. Mao, Y.; Wang, Y.; Huang, W.; Qin, H.; Huang, D.; Guo, Y. Hidden-Markov-model-based calibration-attack recognition for continuous-variable quantum key distribution. Phys. Rev. A 2020, 101, 062320. [Google Scholar] [CrossRef]
  29. Wang, Y.; Mao, Y.; Huang, W.; Huang, D.; Guo, Y. Optical frequency comb-based multichannel parallel continuous-variable quantum key distribution. Opt. Express 2019, 27, 25314–25329. [Google Scholar] [CrossRef] [PubMed]
  30. Li, Z.; Zhang, Y.; Wang, X.; Xu, B.; Peng, X.; Guo, H. Non-Gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution. Phys. Rev. A 2016, 93, 012310. [Google Scholar] [CrossRef] [Green Version]
  31. He, Y.Q.; Mao, Y.; Zhong, H.; Huang, D.; Guo, Y. Hybrid linear amplifier-involved detection for continuous variable quantum key distribution with thermal states. Chin. Phys. B 2020, 29, 050309. [Google Scholar] [CrossRef]
  32. Guo, Y.; Liao, Q.; Wang, Y.; Huang, D.; Huang, P.; Zeng, G. Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction. Phys. Rev. A 2017, 95, 032304. [Google Scholar] [CrossRef] [Green Version]
  33. Wu, X.; Wang, Y.; Zhong, H.; Ye, W.; Huang, D.; Guo, Y. Continuous-variable measurement-device-independent quantum key distribution via quantum catalysis. Quantum Infor. Process. 2020, 19, 234. [Google Scholar] [CrossRef]
  34. Ryu, J.; Lim, J.; Lee, C.; Lee, J. Nonlocality for continuous variable system with local symplectic operation. J. Mod. Opt. 2010, 57, 1550–1554. [Google Scholar] [CrossRef]
  35. Lee, S.-Y.; Ji, S.-W.; Kim, H.-J.; Nha, H. Enhancing quantum entanglement for continuous variables by a coherent superposition of photon subtraction and addition. Phys. Rev. A 2011, 84, 012302. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The discrete-modulation (DM)-based sources for four states (left) and eight states (right).
Figure 1. The discrete-modulation (DM)-based sources for four states (left) and eight states (right).
Applsci 10 07770 g001
Figure 2. The correlation comparison of Z 4 , Z 8 and Z G .
Figure 2. The correlation comparison of Z 4 , Z 8 and Z G .
Applsci 10 07770 g002
Figure 3. Schematic diagram of continuous-variable quantum key distribution (CVQKD) with zero-photon-catalysis (ZPC)-based DM source preparation.
Figure 3. Schematic diagram of continuous-variable quantum key distribution (CVQKD) with zero-photon-catalysis (ZPC)-based DM source preparation.
Applsci 10 07770 g003
Figure 4. Success probabilities of ZPC with transmittances τ and modulation variance V A .
Figure 4. Success probabilities of ZPC with transmittances τ and modulation variance V A .
Applsci 10 07770 g004
Figure 5. Asymptotic secret key rate of the CVQKD system with the ZPC-based DM source preparation for ε = 0.01 , where solid lines denote the eight-state DM source preparation, while dashed lines represent the four-state DM source preparation. The inserted subgraph shows that asymptotic secret key rate of the CVQKD system for L = 80 km.
Figure 5. Asymptotic secret key rate of the CVQKD system with the ZPC-based DM source preparation for ε = 0.01 , where solid lines denote the eight-state DM source preparation, while dashed lines represent the four-state DM source preparation. The inserted subgraph shows that asymptotic secret key rate of the CVQKD system for L = 80 km.
Applsci 10 07770 g005
Figure 6. (a) Asymptotic secret key rate of DM–CVQKD involving the ZPC operation for ε = 0.01 , where solid lines denote homodyne detection, while dashed lines heterodyne detection. (b) Corresponding to (a), the transmittance τ varies with the transmission distance.
Figure 6. (a) Asymptotic secret key rate of DM–CVQKD involving the ZPC operation for ε = 0.01 , where solid lines denote homodyne detection, while dashed lines heterodyne detection. (b) Corresponding to (a), the transmittance τ varies with the transmission distance.
Applsci 10 07770 g006
Figure 7. Finite-size key rate of CVQKD involving the ZPC operation for ε = 0.01 , where solid lines represent the eight-state DM source preparation and dotted lines represent the four-state DM source preparation, respectively.
Figure 7. Finite-size key rate of CVQKD involving the ZPC operation for ε = 0.01 , where solid lines represent the eight-state DM source preparation and dotted lines represent the four-state DM source preparation, respectively.
Applsci 10 07770 g007
Figure 8. Finite-size key rate of CVQKD involving the ZPC operation for ε = 0.01 , where the (a) represents eight-state DM source preparation, and inset (b) represents four-state DM source preparation.
Figure 8. Finite-size key rate of CVQKD involving the ZPC operation for ε = 0.01 , where the (a) represents eight-state DM source preparation, and inset (b) represents four-state DM source preparation.
Applsci 10 07770 g008
Figure 9. The maximal tolerable excess noise of CVQKD involving the ZPC operation (dotted lines and solid lines) for the traditional CVQKD (dotted lines) and the ZPC-based CVQKD (solid lines), where (a) represents eight-state DM source preparation, and inset (b) represents four-state DM source preparation.
Figure 9. The maximal tolerable excess noise of CVQKD involving the ZPC operation (dotted lines and solid lines) for the traditional CVQKD (dotted lines) and the ZPC-based CVQKD (solid lines), where (a) represents eight-state DM source preparation, and inset (b) represents four-state DM source preparation.
Applsci 10 07770 g009
Figure 10. The secret key rate of the CVQKD system involving the ZPC operation with L = 50 km and ε = 0.01 for the traditional CVQKD system (dotted lines) and the ZPC-based CVQKD system (solid lines), where (a) represents eight-state DM source preparation, and inset (b) represents four-state DM source preparation.
Figure 10. The secret key rate of the CVQKD system involving the ZPC operation with L = 50 km and ε = 0.01 for the traditional CVQKD system (dotted lines) and the ZPC-based CVQKD system (solid lines), where (a) represents eight-state DM source preparation, and inset (b) represents four-state DM source preparation.
Applsci 10 07770 g010
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhou, Z.; Zou, S.; Huang, T.; Guo, Y. Lengthening Transmission Distance of Continuous Variable Quantum Key Distribution with Discrete Modulation through Photon Catalyzing. Appl. Sci. 2020, 10, 7770. https://doi.org/10.3390/app10217770

AMA Style

Zhou Z, Zou S, Huang T, Guo Y. Lengthening Transmission Distance of Continuous Variable Quantum Key Distribution with Discrete Modulation through Photon Catalyzing. Applied Sciences. 2020; 10(21):7770. https://doi.org/10.3390/app10217770

Chicago/Turabian Style

Zhou, Zhengchun, Shanhua Zou, Tongcheng Huang, and Ying Guo. 2020. "Lengthening Transmission Distance of Continuous Variable Quantum Key Distribution with Discrete Modulation through Photon Catalyzing" Applied Sciences 10, no. 21: 7770. https://doi.org/10.3390/app10217770

APA Style

Zhou, Z., Zou, S., Huang, T., & Guo, Y. (2020). Lengthening Transmission Distance of Continuous Variable Quantum Key Distribution with Discrete Modulation through Photon Catalyzing. Applied Sciences, 10(21), 7770. https://doi.org/10.3390/app10217770

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop