1. Introduction
Quantum information science involves a variety of fields such as quantum cryptography [
1], quantum teleportation [
2] and quantum communication [
3]. The quantum key distribution (QKD) protocol is one of the most feasible and practical applications of quantum information, which allows the two remote parties, normally known as Alice and Bob, to generate and establish a series of secure keys through an insecure quantum channel controlled by an eavesdropper called Eve [
4]. The generated key can then be applied in other cryptographic protocols to improve the security. Several achievements have been made in both discrete-variable (DV) QKD [
5,
6] and continuous-variable (CV) QKD [
7,
8] in recent years. CVQKD has been promoted as an alternative to DVQKD because it provides higher key distribution rates compared to its DV counterpart [
9]. However, the security of QKD lies in the idea that any perturbation on quantum signals will surely introduce some noise, which limits the maximum transmission distance in the quantum channel between the two legitimate parties.
In recent decades, numerous experiments on both DVQKD [
9,
10] and CVQKD [
11,
12] have been carried out. In the CVQKD field, generally, the experiments were demonstrated based on the one-way Gaussian-modulated coherent-states (GMCS) scheme. In the one-way experiments, quantum signals obtained from the coherent state were transmitted with a strong local oscillator (LO) over a noisy and lossy optical-fiber channel [
13], and the quantum signals were transmitted only once. A recent demonstration of one-way GMCS CVQKD has been achieved over 150 km of optical fiber by controlling excess noise [
12]. However, the ignorance of the nonlocal arrangement of LO will lead to wavelength attacks [
14], calibration attacks [
15] and LO fluctuation attacks [
16], which are all related to the loopholes of LO. Therefore, self-referenced CVQKD without sending an LO is proposed, and it can effectively remove the loopholes introduced by the LO transmission [
17]. Nevertheless, in the real-life experiments, it is a hard problem to realize content detection for two separate lasers, since the frequency instability, the fluctuation of the polarizations and the phase drifts caused by phase transmission [
18] of the two lasers will ruin the homodyne detection.
In contrast to the above schemes, the plug-and-play configuration [
19] can generate a local LO with a single laser source for the two legitimate parties. Unfortunately, the plug-and-play protocol shows higher sensitivity to excess noise compared with one-way GMCS QKD and suffers from Trojan-horse attack [
20]. More recently, a plug-and-play CVQKD protocol based on dual-phase-modulated coherent states (DPMCS) [
21] is proposed and experimentally demonstrated over a 20-km fiber. This plug-and-play DPMCS protocol can solve the loopholes associated with transmitting LO, as well as remove the instability from the polarization drifts. From the experiment results, this proposed protocol can derive security bounds against collective attacks and provide greater flexibility of shot-noise-limited measurement by controlling the light power of the Local LO. However, in the practical experiments, the excess noise in plug-and-play DPMCS CVQKD is larger than that in normal one-way GMCS CVQKD, and thus, the secure transmission distance is limited to some extent.
In this paper, we consider using a heralded noiseless linear amplifier (NLA) [
22] before the homodyne detection as a way to develop the robustness of the plug-and-play DPMCS protocol against noises and losses. Ordinary linear amplifiers can recover classical signals effectively, but when dealing with quantum signals, they only provide limited advantages, as amplification is bound to retain the original signal to noise ratio [
23,
24]. The probabilistic NLA can amplify the amplitude of a coherent state while obtaining the initial level of noise [
25]. The successful running of NLA can compensate the influence of losses and noises, and therefore, it could be used to improve the performance of CVQKD [
26]. The availability of NLA has been demonstrated in one-way CVQKD experiments over the last few years, which have provided a solid proof-of-principle. A more practical method of implementing NLA in the CVQKD protocol just by post-selection of the measurements has been proposed [
27], which allows one to avoid physical implementation with NLA. A recent research work also shows that a heralded noiseless amplification can be used in a two-way protocol [
28].
The question arises whether the sophisticated NLA can be applied to the plug-and-play DPMCS protocol to improve the whole performance. Here, we address this problem, by investigating the most general NLA device. We can obtain the equivalent parameters of the plug-and-play DPMCS and then transferring the situation based on reformulated entanglement-based version (EB) into that without the NLA to compute the secret-key rate. Due to the non-deterministic nature of the NLA, the security proofs with the NLA before homodyne detection are similar to those relevant protocols with secure post-selection. Subsequently, we can find that inserting the NLA can truly help improve the maximum transmission distance of the plug-and-play DPMCS CVQKD while tolerating more excess to some extent.
The paper is organized as follows. In
Section 2, we first review the prepare-and-measure (P&M)-based and EB version of the plug-and-play DPMCS CVQKD protocol and the derivation of the expressions of its secret-key rate. In
Section 3, the most general NLA is inserted before the homodyne detector, and then, we calculate the equivalent parameters, based on the transmission channel of our protocol. In
Section 4, the secret-key rates are computed with the NLA and without the NLA in the plug-and-play DPMCS, and we make the analysis of the performance improvement. Finally, we come to the conclusion and provide discussions in
Section 5.
3. Channel Equivalence of Plug-and-Play DPMCS CVQKD with NLA
From the above section, we have analyzed the security of the plug-and-play DPMCS CVQKD scheme with its equivalent EB scheme. In this section, we use the most general NLA before Alice’s homodyne detection in our scheme shown in
Figure 3. In this new version of the scheme, Alice and Bob implement the plug-and-play DPMCS protocol, while Alice adds an NLA before her homodyne detection to her stage; here, we assume Alice’s homodyne detector is perfect (
and
), and all the rest of our calculations are based on this condition. Then, only the events in accord with a successful amplification can be used to extract the secret-key rate, which can be regarded as similar to those protocols with suitable post-selection.
Since the plug-and-play protocol is quite similar to the one-way protocol with the noisy and lossy Gaussian quantum channel and the output of the NLA remains in the Gaussian regime, it is reasonable for us to derive the equivalent parameters , , of the state sent from Bob to Alice to help us keep the same average value and variance, thus finally obtaining the secret-key rates.
Firstly, to simplify the model, the input state
is a thermal state before Alice’s homodyne detector, which can be expressed as
with variance
. Then, the state is displaced by
, and it comes out as:
This would be the state received when Alice knows Bob’s heterodyne measurement results. As discussed in detail in [
22], when the state passes through the NLA, we can conclude that the state is transformed into:
where
equals
. The parameter
g should satisfy
to keep the system’s physical interpretation. Let us find the the values of
and
corresponding to the equivalent EB scheme in the above parts. When Bob encodes the Gaussian variables and obtains the results
after heterodyne detection on one mode of the EPR mode
, the second mode is projected on a coherent state with an amplitude proportional to
. Additionally, when the second state is sent through the quantum channel of transmittance
T, the displacement
can be taken as:
From the last section, we can clearly see the incoming state before Alice’s homodyne detector with the variance
. Then, the variance
of the thermal state corresponds to Alice’s variance when
can be expressed as:
Next, the action of the NLA on a displaced thermal state given in Equation (
20) produces the transformation:
The next step is to think about the action of the NLA when Alice does not have any knowledge of Bob’s measurement. In such a situation, her state is a thermal state
, and we can obtain:
where
. Since the NLA always transform a thermal state with a gain of
g, we can derive:
Now, all the equations required to resolve the equivalent expression of the effective parameters
,
,
are obtained. Using the equations above, those parameters should satisfy:
This system can be resolved and the solution can be expressed as below:
Then, we should pay attention to the effective parameters satisfying
,
, so we can obtain:
Then, we can derive the maximum gain
for those physical-value parameters as:
After deriving these results, we must consider the validity of these expressions. Firstly, these parameters naturally degenerate to the real physical parameters without the NLA where
,
Then, when there is no excess noise
, they match the similar results in previous outcomes:
Through complex calculations, we can use the equivalent parameters to calculate and compare the secret-key rate with and without an ideal NLA in the next section.
4. Increase of the Maximum Transmission Distance
In
Section 2, we have analyzed the DPMCS scheme and obtained the secret-key rate analysis. In
Section 3, we get our needed parameters to calculate the secret-key rate with the NLA. The secret-key rate comparison must be performed in a given channel with fixed transmittance
T and total excess noise
, which cannot be controlled by the two legitimate parties. Bob is allowed to optimize his modulation variance
in order to maximize the secret-key rates, for the modulation cannot be infinite. Here, we come to the successful amplification of the NLA with the probability
. The precise value of the
depends on practical implementations. Since we only care about the maximum distance and endurable excess noise, the precise value of the
is not crucial to our study because the NLA cannot transform a negative secret-key into a positive one. We can assume
is constant and reaches the upper limitation of
[
22] when the NLA has a sufficient dynamics to neglect distortions. Therefore,
Before calculation, let us find out if the maximum gain of NLA
only depends on
T,
and
from Equation (
31); we give the relationship in
Figure 4 between the
and the channel losses in dB, while the parameter
is 0.04, which is achievable from previous experiments [
32]. The parameter
here means the maximum gain to satisfy the physical meaning constraints
, and all the equivalent parameters take physical values.
From the illustration, we cannot use a fixed to match every value of T. For instance, in the above illustration, when the loss is 0 dB, which means the transmittance T is one, can be derived as one, which means the NLA cannot be used in the channel with no losses. However, for general strong losses, is large enough, and the NLA has a sufficient dynamics; thus, we can use the NLA with constant g to help us to improve the performance of the plug-and-play DPMCS CVQKD scheme.
The simulations of
and
with the same parameter transmittance
T and excess noise
are shown in
Figure 5. We can see that the secret-key rates with the NLA of gain
g remain positive for losses, which can be maximally improved by
log
dB. Here, we briefly calculate this result. The transmittance
T with the NLA of gain
g can be transformed into
of high losses. When calculating the maximum distance, we set the maximum losses with positive secret-key rates to zero, which can be derived as:
where
M and
m represent the maximum losses when the secret-key rates remain positive with and without the NLA. After calculation, we could obtain
log
.
There are some other points we need to address from
Figure 5. From the simulations, the parameter
to model Fred’s behaviors can affect the transmission distance, and we see that with the increased
, the maximal transmission distance will decrease. Additionally, when
is zero, the numerical curve is in great agreement with the analytical series expansion curve without NLA; however, with the increase in
, we can clearly see the departure between the numerical curve and the analytical series expansion curve without NLA. The reason can be explained as the increase in
G reduces the maximum transmission, as well as it breaks the high-loss condition, which can be regarded as the main reason. Therefore, to improve the performance, it is reasonable for us to reduce the influence controlled by Fred when we use our plug-and-play DPMCS scheme with the NLA.
The other important quality for the plug-and-play DPMCS scheme with the NLA is the tolerable excess noise. The maximum tolerable excess noise against losses for our proposed protocol by using an NLA with gain
and
is shown in
Figure 6, where we can also get the maximal excess noise against losses without the NLA.
Here, we do not compare the maximum tolerable excess noise when
(refers to
) because from
Figure 5, we can see its analytical expansion secret-key rates drop to zero quickly within the loss around 4 dB, which cannot satisfy the high-loss condition, so it is not necessary for us to draw its illustration to prove our conclusion. From the scene where
, we can clearly see that the NLA can help to tolerate more excess noise, and with increased
g, the maximum tolerable excess noise will increase, as well. We can also see that the permitted maximum losses can be maximally extended as 20log
dB with the NLA in the analytical expansion.
Finally, we come to the optimal parameters analysis. Here, we consider the parameters including reverse reconciliation efficiency
, the variance
and the gain of NLA
g. From
Figure 7a, we can clearly see with the increase of
that the maximized secret-key rates will also increase. However, the parameter
introduced by Fred can affect the secret-key rates, and we can see when
, the minimum value of
for positive secret-key rates is around 0.8 while the minimum value is around 0.87 when
when the loss is 16 dB and the gain
g is three. Physically,
, here introduced by Fred referring to the increased excess noise, corresponds to the imperfections of the coherent states of the signal source. From
Figure 7b, the increased variance
can help increase the maximized secret-key rates when
reaches a certain value, but beyond that value, the secret-key rates will drop and even become negative when
is too large. Therefore, there exists an optimal variance
to obtain the maximized secret-key rates, and from
Figure 7, we can see that the optimal
is almost the same as the increased gain
g of the NLA.
From
Figure 8, we can see that the NLA can help increase the secret-key rates when the gain
g is up to a certain value, but beyond that certain value, the secret-key rates will drop and even become negative when
g is too large. So there exists an optimal value
g, and the optimal value of
g slightly increases with the excess noise
. The reason can be mainly explained by the fact that when
g is too large, the effective excess noise
would be too large from Equation (
29), though the transmittance
is higher, to give a positive secret-key rate. Furthermore, when
is introduced by Fred, the maximized secret-key rates and the positive range will both decrease.