Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance
- URL: http://arxiv.org/abs/2104.11152v4
- Date: Sat, 13 Nov 2021 07:53:03 GMT
- Title: Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance
- Authors: Wen-Bo Liu, Chen-Long Li, Yuan-Mei Xie, Chen-Xun Weng, Jie Gu, Xiao-Yu
Cao, Yu-Shuo Lu, Bing-Hong Li, Hua-Lei Yin, Zeng-Bing Chen
- Abstract summary: We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
- Score: 7.87972015113057
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Discrete-modulated continuous-variable quantum key distribution with homodyne
detection is widely recognized for its ease of implementation, efficiency with
respect to error correction, and its compatibility with modern optical
communication devices. However, recent studies report that the application of
homodyne detection obtains poor tolerance to excess noise and insufficient
transmission distance, hence seriously restricting the large-scale deployment
of quantum secure communication networks. In this paper, we propose a homodyne
detection protocol using the quadrature phase shift keying technique. By
limiting information leakage, our proposed protocol enhances excess noise
tolerance to a high level. Furthermore, we demonstrate that homodyne detection
performs better than heterodyne detection in quaternary-modulated
continuous-variable quantum key distribution under the untrusted detector noise
scenario. The security is analyzed using the tight numerical method against
collective attacks in the asymptotic regime. Our results imply that the current
protocol is able to distribute keys in nearly intercity area and thus paves the
way for constructing low-cost quantum secure communication networks.
Related papers
- Practical No-Switching Continuous-Variable Quantum Key Distribution with
Biased Quadrature Detection [4.559900583044687]
The security of an ideal No-Switching protocol has been proved against general attacks in finite-size regime and composable security framework.
We propose a modified No-Switching protocol with biased quadrature detection, where the asymmetry of the heterodyne detection is modeled to match the practical systems.
An optimization strategy is proposed to achieve the optimal secret key rate by adjusting the transmittance of the beam splitter.
arXiv Detail & Related papers (2024-02-01T02:02:56Z) - Continuous-variable quantum key distribution over multispan links
employing phase-insensitive and phase-sensitive amplifiers [1.4732811715354455]
We address a key distribution protocol over a multispan link employing either phase-insensitive or phase-sensitive amplifiers.
We perform the security analysis under both unconditional and composable security frameworks.
We compare the resulting key generation rate for both kinds of amplified links with the no-amplifier protocol, identifying the enhancement introduced by optical amplification.
arXiv Detail & Related papers (2023-09-14T22:01:52Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - General treatment of Gaussian trusted noise in continuous variable
quantum key distribution [1.0499611180329804]
A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
arXiv Detail & Related papers (2023-05-28T10:38:36Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Trusted detector noise analysis for discrete modulation schemes of
continuous-variable quantum key distribution [4.977851927269835]
Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment.
We calculate key rates against collective attacks in the trusted detector noise scenario.
Our results show that we can thus cut out most of the effect of detector noise and obtain key rates similar to those had we access to ideal detectors.
arXiv Detail & Related papers (2020-06-11T03:11:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.