Next Article in Journal
EXONEST: The Bayesian Exoplanetary Explorer
Next Article in Special Issue
Enhancing Metastability by Dissipation and Driving in an Asymmetric Bistable Quantum System
Previous Article in Journal
Comparative Statistical Mechanics of Muscle and Non-Muscle Contractile Systems: Stationary States of Near-Equilibrium Systems in A Linear Regime
Previous Article in Special Issue
Harvesting Large Scale Entanglement in de Sitter Space with Multiple Detectors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Improvement of Plug-and-Play Dual-Phase-Modulated Quantum Key Distribution by Using a Noiseless Amplifier

State Key Laboratory of Advanced Optical Communication Systems and Networks, Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
*
Authors to whom correspondence should be addressed.
Entropy 2017, 19(10), 546; https://doi.org/10.3390/e19100546
Submission received: 9 August 2017 / Revised: 13 October 2017 / Accepted: 13 October 2017 / Published: 20 October 2017
(This article belongs to the Special Issue Entropy and Information in the Foundation of Quantum Physics)

Abstract

:
We show that the successful use of a noiseless linear amplifier (NLA) can help increase the maximum transmission distance and tolerate more excess noise of the plug-and-play dual-phase-modulated continuous-variable quantum key distribution. In particular, an equivalent entanglement-based scheme model is proposed to analyze the security, and the secure bound is derived with the presence of a Gaussian noisy and lossy channel. The analysis shows that the performance of the NLA-based protocol can be further improved by adjusting the effective parameters.

1. Introduction

Quantum information science involves a variety of fields such as quantum cryptography [1], quantum teleportation [2] and quantum communication [3]. The quantum key distribution (QKD) protocol is one of the most feasible and practical applications of quantum information, which allows the two remote parties, normally known as Alice and Bob, to generate and establish a series of secure keys through an insecure quantum channel controlled by an eavesdropper called Eve [4]. The generated key can then be applied in other cryptographic protocols to improve the security. Several achievements have been made in both discrete-variable (DV) QKD [5,6] and continuous-variable (CV) QKD [7,8] in recent years. CVQKD has been promoted as an alternative to DVQKD because it provides higher key distribution rates compared to its DV counterpart [9]. However, the security of QKD lies in the idea that any perturbation on quantum signals will surely introduce some noise, which limits the maximum transmission distance in the quantum channel between the two legitimate parties.
In recent decades, numerous experiments on both DVQKD [9,10] and CVQKD [11,12] have been carried out. In the CVQKD field, generally, the experiments were demonstrated based on the one-way Gaussian-modulated coherent-states (GMCS) scheme. In the one-way experiments, quantum signals obtained from the coherent state were transmitted with a strong local oscillator (LO) over a noisy and lossy optical-fiber channel [13], and the quantum signals were transmitted only once. A recent demonstration of one-way GMCS CVQKD has been achieved over 150 km of optical fiber by controlling excess noise [12]. However, the ignorance of the nonlocal arrangement of LO will lead to wavelength attacks [14], calibration attacks [15] and LO fluctuation attacks [16], which are all related to the loopholes of LO. Therefore, self-referenced CVQKD without sending an LO is proposed, and it can effectively remove the loopholes introduced by the LO transmission [17]. Nevertheless, in the real-life experiments, it is a hard problem to realize content detection for two separate lasers, since the frequency instability, the fluctuation of the polarizations and the phase drifts caused by phase transmission [18] of the two lasers will ruin the homodyne detection.
In contrast to the above schemes, the plug-and-play configuration [19] can generate a local LO with a single laser source for the two legitimate parties. Unfortunately, the plug-and-play protocol shows higher sensitivity to excess noise compared with one-way GMCS QKD and suffers from Trojan-horse attack [20]. More recently, a plug-and-play CVQKD protocol based on dual-phase-modulated coherent states (DPMCS) [21] is proposed and experimentally demonstrated over a 20-km fiber. This plug-and-play DPMCS protocol can solve the loopholes associated with transmitting LO, as well as remove the instability from the polarization drifts. From the experiment results, this proposed protocol can derive security bounds against collective attacks and provide greater flexibility of shot-noise-limited measurement by controlling the light power of the Local LO. However, in the practical experiments, the excess noise in plug-and-play DPMCS CVQKD is larger than that in normal one-way GMCS CVQKD, and thus, the secure transmission distance is limited to some extent.
In this paper, we consider using a heralded noiseless linear amplifier (NLA) [22] before the homodyne detection as a way to develop the robustness of the plug-and-play DPMCS protocol against noises and losses. Ordinary linear amplifiers can recover classical signals effectively, but when dealing with quantum signals, they only provide limited advantages, as amplification is bound to retain the original signal to noise ratio [23,24]. The probabilistic NLA can amplify the amplitude of a coherent state while obtaining the initial level of noise [25]. The successful running of NLA can compensate the influence of losses and noises, and therefore, it could be used to improve the performance of CVQKD [26]. The availability of NLA has been demonstrated in one-way CVQKD experiments over the last few years, which have provided a solid proof-of-principle. A more practical method of implementing NLA in the CVQKD protocol just by post-selection of the measurements has been proposed [27], which allows one to avoid physical implementation with NLA. A recent research work also shows that a heralded noiseless amplification can be used in a two-way protocol [28].
The question arises whether the sophisticated NLA can be applied to the plug-and-play DPMCS protocol to improve the whole performance. Here, we address this problem, by investigating the most general NLA device. We can obtain the equivalent parameters of the plug-and-play DPMCS and then transferring the situation based on reformulated entanglement-based version (EB) into that without the NLA to compute the secret-key rate. Due to the non-deterministic nature of the NLA, the security proofs with the NLA before homodyne detection are similar to those relevant protocols with secure post-selection. Subsequently, we can find that inserting the NLA can truly help improve the maximum transmission distance of the plug-and-play DPMCS CVQKD while tolerating more excess to some extent.
The paper is organized as follows. In Section 2, we first review the prepare-and-measure (P&M)-based and EB version of the plug-and-play DPMCS CVQKD protocol and the derivation of the expressions of its secret-key rate. In Section 3, the most general NLA is inserted before the homodyne detector, and then, we calculate the equivalent parameters, based on the transmission channel of our protocol. In Section 4, the secret-key rates are computed with the NLA and without the NLA in the plug-and-play DPMCS, and we make the analysis of the performance improvement. Finally, we come to the conclusion and provide discussions in Section 5.

2. Plug-and-Play DPMCS Scheme

2.1. The Model of Plug-and-Play DPMCS Scheme

Generally, in the one-way protocol, Alice prepares the Gaussian signals and sends the signals together with the LO to Bob. The plug-and-play DPMCS protocol aims to overcome some limitations in the normal one-way GMCS protocol, and we first describe the physical models of the proposed plug-and-play DPMCS CVQKD scheme with the untrusted coherent source in the middle under the prepare-and-measure (P&M) and the equivalent entanglement-based (EB) schemes. With the P&M model illustrated in Figure 1, we can depict the scheme as follows. Alice uses the laser source to generate a strong LO and the classical light via a beam splitter. Then, Alice sends the classical light regarded as an ideal coherent source with shot noise ( δ X s , δ P s ) without Gaussian modulation through the optical fiber to Bob. Under the realistic assumption, Eve can control the classical light, and this would inevitably increase excess noise. In this scenario, the untrusted source noise is characterized by introducing a PIA (phase-insensitive amplifier) [29] with a gain of G ( G 1 ), in order to model the intervention by Eve. The source noise induced by G can be measured carefully using a practical detector at Bob’s side. The quadratures ( δ X A , δ P A ) denoting the untrusted coherent source transmitted from Alice to Bob can be described as:
δ X A = G δ X s + G 1 δ X I , δ P A = G δ P s + G 1 δ P I .
where ( δ X s , δ P s ) satisfy ( δ X s ) 2 = ( δ P s ) 2 = 1 (in shot noise units) and ( X I , P I ) denotes an idle input ideally in a vacuum state with a noise variance V I . Then, Bob uses a dual-phase-modulation scheme to prepare the coherent state, and Bob generates two random Gaussian numbers X B and P B of mean value zero and variances V B . The coherent state ( δ X A , δ P A ) is dual-phase-modulated by using two polarization-independent phase modulators installed in a perpendicular position to compensate for the birefringence of the transmission medium automatically. The prepared quadratures sent from Bob to Alice are:
X = X B + δ X A , P = P B + δ P A .
The modulated random input from RNG satisfies the Gaussian distribution, so the variances of X and P satisfy:
X 2 = P 2 = V + ξ s ,
where V = V B + 1 , ξ s = G 1 + ( G 1 ) V I and V I can be set to one (in shot noise units) to model a vacuum state. Bob sends the prepared coherent state to Alice through a quantum channel with a transmittance efficiency T and excess noise ε c ; the channel-added noise referred to the channel input can be expressed as χ l i n e = 1 / T 1 + ϵ c (in shot-noise units). In this scheme, Alice uses homodyne detection to randomly measure one of the two quadratures. A practical homodyne detector for Alice can be modeled with the electrical noise V e l and an efficiency η A . Therefore, the detection-added noise referred to Alice’s input can be expressed in shot-noise units as χ h o m = [ ( 1 η A ) + V e l ] / η A . Then, the total added-noise can be denoted as χ t o t = χ l i n e + χ h o m / T . The following procedures such as classical reverse reconciliation and privacy amplification are similar to those in the normal one-way GMCS protocols.
After analyzing the P&M scheme above, the equivalent EB scheme is derived in Figure 2 with homodyne detections. We should remark that the optimality of a Gaussian attack is guaranteed under a general collective attack. In the EB scheme, Alice’s detector efficiency can be modeled by a beam splitter (BS) with transmission efficiency η A and an Einstein–Podolsky–Rosen (EPR) state ρ G H 0 with a variance V d coupled to the BS. V d is valued as V d = η A χ h o m / ( 1 η A ) = ( 1 η A + V e l ) / ( 1 η A ) when Alice uses homodyne detection to correspond with the P&M detection-added noise. When Bob’s detection and the EPR state are hidden in the black box, Eve cannot distinguish which scheme is applied between the P&M scheme and the EB scheme to ensure safety. It should be mentioned here when G = 1 , the noise ξ s = 0 , so in this situation, the plug-and-play DPMCS EB scheme can be regarded as a typical GMCS EB scheme.

2.2. Calculation of Secret-Key Rate with Reverse Reconciliation

In the above part, we analyzed the plug-and-play DPMCS in detail, and in this part, we will analyze the secret-key rate based on the EB protocol with reverse reconciliation. As mentioned before, to derive a tight security bound, Fred is assumed to be controlled by Eve, which means Eve may acquire some extra secret-key information. What should be further pointed out is that Bob might prepare an impure state; thus, the security bound is a lower and tight bound under Gaussian attack. As we did in the one-way GMCS scheme, the secret-key rate against collective attacks [30] can be calculated as:
Δ I = β I A B χ A E .
where β is the reconciliation efficiency, I A B is the Shannon mutual information between the two legitimate parties and χ A E represents the maximum information Eve could get from Alice. It should be mentioned here that the security proofs show that the derived bounds in the collective attacks remain asymptotically valid for arbitrary coherent attacks, and therefore, the results in this paper are valid for both collective attacks and coherent attacks. The mutual information between Alice and Bob when Alice uses homodyne detection can be calculated as:
I A B h o m = 1 2 log 2 V A V A | B = 1 2 log 2 V + ξ s + χ t o t 1 + ξ s + χ t o t .
where the variance measured by Alice V A = η A T ( V + ξ s + χ t o t ) and the conditional variance V A | B = η A T ( 1 + ξ s + χ t o t ) . V, ξ s , χ t o t and χ l i n e take the corresponding forms in the above part. Using the fact that Eve can purify the system ρ B F A 1 E and Alice’s measurement can purify the system ρ F B E H G , with the fact that S ( ρ F B E H G m A ) is independent of m A for Gaussian protocols and the global pure state will collapse to ρ F B E H G , the maximum information available to Eve on Alice is bounded by the Holevo quantity [31]. We can derive the form as:
χ A E h o m = S ( ρ E ) d m A p ( m A ) S ( ρ E m A ) , = S ( ρ B F A 1 E ) S ( ρ F B E H G m A ) , = i = 1 2 G ( λ i 1 2 ) i = 3 5 G ( λ i 1 2 ) .
where m A is the measurement of Alice and in the homodyne detection, and it can be m A = x A or m A = p A ( d m A = d x A or d m A = d p A ). ρ E m A is the eavesdropper’s conditional state on Alice. S is the Neumann entropy of the quantum state ρ , and p ( m A ) is the probability of Alice’s measurement. G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x . λ 1 , 2 are the symplectic eigenvalues of the covariance matrix γ B F A 1 E , which characterizes the state ρ F B A 1 E , and λ 3 , 4 , 5 represent the symplectic eigenvalues of the covariance matrix γ F B E H G m A characterizing the state ρ F B E H G m A after Alice’s projective measurement. The covariance matrix γ B F A 1 E has the following expression due to its dependence on the system including Bob and the lossy and noisy quantum channel.
γ B F A 1 E = V · I 2 T ( V 2 1 ) · σ z T ( V 2 1 ) · σ z T ( V + ξ s + χ l i n e ) · I 2 ,
where I 2 is the 2 × 2 unit matrix and σ z = 1 0 0 1 . The symplectic eigenvalues of the above covariance matrix can be expressed in the form as:
λ 1 , 2 2 = 1 2 [ A ± A 2 4 B ] ,
where A and B can be expressed as:
A = V 2 ( 1 2 T ) + 2 T + T 2 ( V + ξ s + χ l i n e ) 2 , B = T 2 ( 1 + V χ l i n e + V ξ s ) 2 .
The covariance matrix γ F B E H G m A can be expressed as:
γ F B E H G m A = γ F B E H G σ F B E H G A 3 T H h o m σ F B E H G A 3 .
In the above equation, H h o m = ( X γ A 3 X ) M P stands for the homodyne detection on mode A 3 ; here, X = 1 0 0 0 and Moore–Penrose pseudo-inverse of a matrix MP. The matrices γ A 3 , γ F B E H G , γ F B E H G A 3 can be all obtained from the decomposition of the covariance matrix:
γ F B E H G A 3 = γ F B E H G σ F B E H G A 3 T σ F B E H G A 3 γ A 3 .
can be derived with appropriate rearrangements of columns and lines from the matrix describing the system F B E A 3 H G (Figure 3):
γ F B E A 3 H G = ( Y B S ) T [ γ F B A 1 E γ H 0 G ] Y B S .
Here, γ F B A 1 E is given in Equation (7), and γ H 0 G is the matrix that describes the EPR state of variance v d used to model the homodyne detector’s electronic noise. The matrix can be written as:
γ H 0 G = v d · I 2 ( v d 2 1 ) · σ z ( v d 2 1 ) · σ z v d · I 2 .
where v d is mentioned before as v d = ( 1 η A + v e l ) / ( 1 η A ) . The matrix Y B S describes the beam splitter transformation, which models the inefficiency of the homodyne detector on acting mode A 2 and H 0 . It can be written as:
Y B S = I F I B Y A 2 H 0 B S I G Y A 2 H 0 B S = η A · I 2 1 η A · I 2 1 η A · I 2 η A · I 2 .
Till now, we get all the elements to calculate the symplectic eigenvalues λ 3 , 4 , 5 , and they are given by expressions with homodyne detection as:
λ 3 , 4 2 = 1 2 [ C h o m ± C h o m 2 4 D h o m ] , λ 5 = 1 ,
where:
C h o m = A χ h o m + V B + T ( V + ξ s + χ l i n e ) T ( V + ξ s + χ t o t ) D h o m = V B + B χ h o m T ( V + ξ s + χ t o t ) .
where χ l i n e and χ h o m can be expressed as:
χ h o m = ( 1 η A ) + v e l η A .
χ t o t = χ l i n e + χ h o m T .
Using the related equations above, we can calculate the asymptotic lower bound of the secret-key rates in Equation (4) against collective attacks.

3. Channel Equivalence of Plug-and-Play DPMCS CVQKD with NLA

From the above section, we have analyzed the security of the plug-and-play DPMCS CVQKD scheme with its equivalent EB scheme. In this section, we use the most general NLA before Alice’s homodyne detection in our scheme shown in Figure 3. In this new version of the scheme, Alice and Bob implement the plug-and-play DPMCS protocol, while Alice adds an NLA before her homodyne detection to her stage; here, we assume Alice’s homodyne detector is perfect ( η A = 1 and V e l = 0 ), and all the rest of our calculations are based on this condition. Then, only the events in accord with a successful amplification can be used to extract the secret-key rate, which can be regarded as similar to those protocols with suitable post-selection.
Since the plug-and-play protocol is quite similar to the one-way protocol with the noisy and lossy Gaussian quantum channel and the output of the NLA remains in the Gaussian regime, it is reasonable for us to derive the equivalent parameters ζ , ε t o t g , η of the state sent from Bob to Alice to help us keep the same average value and variance, thus finally obtaining the secret-key rates.
Firstly, to simplify the model, the input state ρ ^ is a thermal state before Alice’s homodyne detector, which can be expressed as ρ t h ^ ( λ c h ) = ( 1 λ c h 2 ) n = 0 λ c h 2 n | n > < n | with variance V ( λ ) = 1 + λ 2 1 λ 2 . Then, the state is displaced by α = α x + i α y , and it comes out as:
ρ ^ = D ^ ( α ) ρ ^ t h ( λ c h ) D ^ ( α )
This would be the state received when Alice knows Bob’s heterodyne measurement results. As discussed in detail in [22], when the state passes through the NLA, we can conclude that the state is transformed into:
ρ ^ = D ^ ( g ˜ α ) ρ ^ t h ( g λ c h ) D ^ ( g ˜ α ) .
where g ˜ equals g 1 λ c h 2 1 g 2 λ c h 2 . The parameter g should satisfy g λ c h < 1 to keep the system’s physical interpretation. Let us find the the values of α and λ c h corresponding to the equivalent EB scheme in the above parts. When Bob encodes the Gaussian variables and obtains the results β B after heterodyne detection on one mode of the EPR mode | B A = | λ , the second mode is projected on a coherent state with an amplitude proportional to λ β B . Additionally, when the second state is sent through the quantum channel of transmittance T, the displacement α can be taken as:
α = T λ β B .
From the last section, we can clearly see the incoming state before Alice’s homodyne detector with the variance T V B + 1 + T ξ s + T ϵ c . Then, the variance 1 + λ c h 2 1 λ c h 2 of the thermal state corresponds to Alice’s variance when V B = 0 can be expressed as:
1 + λ c h 2 1 λ c h 2 = 1 + T ( ξ s + ϵ c ) λ c h 2 = T ( ξ s + ϵ c ) 2 + T ( ξ s + ϵ c ) .
Next, the action of the NLA on a displaced thermal state given in Equation (20) produces the transformation:
T λ β B N L A g 1 λ c h 2 1 g 2 λ c h 2 T λ β B T ( ξ s + ϵ c ) T ( ξ s + ϵ c ) + 2 N L A g 2 T ( ξ s + ϵ c ) 2 + T ( ξ s + ϵ c ) .
The next step is to think about the action of the NLA when Alice does not have any knowledge of Bob’s measurement. In such a situation, her state is a thermal state ρ B ^ = ( 1 λ * 2 ) n = 0 ( λ * ) 2 n | n > < n | , and we can obtain:
1 + λ * 2 1 λ * 2 = 1 + T V B + T ( ξ s + ϵ c ) , λ * 2 = T ( 2 λ 2 + ( ξ s + ϵ c ) ( 1 λ 2 ) ) 2 2 λ 2 λ 2 T ( ξ s + ϵ c 2 ) + T ( ϵ c + ξ s ) .
where V B = V 1 = 1 + λ 2 1 λ 2 1 . Since the NLA always transform a thermal state with a gain of g, we can derive:
T ( 2 λ 2 + ( ξ s + ϵ c ) ( 1 λ 2 ) ) 2 2 λ 2 λ 2 T ( ξ s + ϵ c 2 ) + T ( ξ s + ϵ c ) N L A g 2 T ( 2 λ 2 + ( ξ s + ϵ c ) ( 1 λ 2 ) ) 2 2 λ 2 λ 2 T ( ξ s + ϵ c 2 ) + T ( ξ s + ϵ c ) .
Now, all the equations required to resolve the equivalent expression of the effective parameters ζ , ϵ t o t g , η are obtained. Using the equations above, those parameters should satisfy:
η ζ = g 1 λ c h 2 1 g 2 λ c h 2 T λ .
η ϵ t o t g η ϵ t o t g + 2 = g 2 T ( ξ s + ϵ c ) T ( ξ s + ϵ c ) + 2 .
η ( 2 ζ 2 + ϵ t o t g ( 1 ζ 2 ) ) 2 2 ζ 2 ζ 2 η ( ϵ t o t g 2 ) + η ϵ t o t g = g 2 T ( 2 λ 2 + ( ξ s + ϵ c ) ( 1 λ 2 ) ) 2 2 λ 2 λ 2 T ( ξ s + ϵ c 2 ) + T ( ξ s + ϵ c ) .
This system can be resolved and the solution can be expressed as below:
ζ = λ T ( g 2 ( ξ s + ϵ c 2 ) ( ξ s + ϵ c 2 ) ) 2 η ( g 2 1 ) ( ξ s + ϵ c ) 2 , η = g 2 T T ( g 2 1 ) ( 1 4 T ( ξ s + ϵ c ) ( g 2 1 ) ( ξ s + ϵ c 2 ) + 1 ( ξ s + ϵ c ) ) + 1 , ϵ t o t g = ( ξ s + ϵ c ) 1 2 ( ξ s + ϵ c ) T ( g 2 1 ) ( ξ s + ϵ c 2 ) .
Then, we should pay attention to the effective parameters satisfying 0 λ < 1 , 0 η < 1 , so we can obtain:
0 λ < ( T ( g 2 ( ξ s + ϵ c 2 ) ( ξ s + ϵ c 2 ) ) 2 T ( g 2 1 ) ( ξ s + ϵ c ) 2 ) 1 .
Then, we can derive the maximum gain g m a x for those physical-value parameters as:
g m a x = ( ξ s + ϵ c ) ( T ( ξ s + ϵ c 4 ) + 2 ) + 4 T ( ξ s + ϵ c 2 ) + 2 ξ s + ϵ c 2 ( ξ s + ϵ c ) ( T ( ξ s + ϵ c 2 ) + 2 ) + 4 T 4 T ( ξ s + ϵ c 2 ) 2 .
After deriving these results, we must consider the validity of these expressions. Firstly, these parameters naturally degenerate to the real physical parameters without the NLA where g = 1 ,
g = 1 ζ = λ , η = T , ϵ t o t g = ξ s + ϵ c .
Then, when there is no excess noise ( ξ s + ϵ c = 0 ) , they match the similar results in previous outcomes:
ϵ t o t g = 0 ζ = λ 1 + ( g 2 1 ) T , η = g 2 T 1 + g 2 T T , ϵ g = 0 .
Through complex calculations, we can use the equivalent parameters to calculate and compare the secret-key rate Δ I N L A with and without an ideal NLA in the next section.

4. Increase of the Maximum Transmission Distance

In Section 2, we have analyzed the DPMCS scheme and obtained the secret-key rate analysis. In Section 3, we get our needed parameters to calculate the secret-key rate with the NLA. The secret-key rate comparison must be performed in a given channel with fixed transmittance T and total excess noise ϵ t o t , which cannot be controlled by the two legitimate parties. Bob is allowed to optimize his modulation variance V B in order to maximize the secret-key rates, for the modulation cannot be infinite. Here, we come to the successful amplification of the NLA with the probability P s s f . The precise value of the P s s f depends on practical implementations. Since we only care about the maximum distance and endurable excess noise, the precise value of the P s s f is not crucial to our study because the NLA cannot transform a negative secret-key into a positive one. We can assume P s s f is constant and reaches the upper limitation of 1 / g 2 [22] when the NLA has a sufficient dynamics to neglect distortions. Therefore,
Δ I N L A = P s s f Δ I ( η , ϵ t o t g ) .
Before calculation, let us find out if the maximum gain of NLA g m a x only depends on T, ξ s and ϵ c from Equation (31); we give the relationship in Figure 4 between the g m a x and the channel losses in dB, while the parameter ϵ c is 0.04, which is achievable from previous experiments [32]. The parameter g m a x here means the maximum gain to satisfy the physical meaning constraints 0 η < 1 , and all the equivalent parameters take physical values.
From the illustration, we cannot use a fixed g m a x to match every value of T. For instance, in the above illustration, when the loss is 0 dB, which means the transmittance T is one, g m a x can be derived as one, which means the NLA cannot be used in the channel with no losses. However, for general strong losses, g m a x is large enough, and the NLA has a sufficient dynamics; thus, we can use the NLA with constant g to help us to improve the performance of the plug-and-play DPMCS CVQKD scheme.
The simulations of Δ I and Δ I N L A with the same parameter transmittance T and excess noise ϵ c are shown in Figure 5. We can see that the secret-key rates with the NLA of gain g remain positive for losses, which can be maximally improved by Δ = 20 log 10 g = 9.5 dB. Here, we briefly calculate this result. The transmittance T with the NLA of gain g can be transformed into T N L A = T / g 2 of high losses. When calculating the maximum distance, we set the maximum losses with positive secret-key rates to zero, which can be derived as:
10 m 10 = g 2 10 M 10
where M and m represent the maximum losses when the secret-key rates remain positive with and without the NLA. After calculation, we could obtain M m = 20 log 10 g .
There are some other points we need to address from Figure 5. From the simulations, the parameter ξ s to model Fred’s behaviors can affect the transmission distance, and we see that with the increased ξ s = ( G 1 ) + ( G 1 ) V I , the maximal transmission distance will decrease. Additionally, when ξ s is zero, the numerical curve is in great agreement with the analytical series expansion curve without NLA; however, with the increase in ξ s , we can clearly see the departure between the numerical curve and the analytical series expansion curve without NLA. The reason can be explained as the increase in G reduces the maximum transmission, as well as it breaks the high-loss condition, which can be regarded as the main reason. Therefore, to improve the performance, it is reasonable for us to reduce the influence controlled by Fred when we use our plug-and-play DPMCS scheme with the NLA.
The other important quality for the plug-and-play DPMCS scheme with the NLA is the tolerable excess noise. The maximum tolerable excess noise against losses for our proposed protocol by using an NLA with gain g = 2 and g = 3 is shown in Figure 6, where we can also get the maximal excess noise against losses without the NLA.
Here, we do not compare the maximum tolerable excess noise when G = 1.02 (refers to ξ s = 0.04 ) because from Figure 5, we can see its analytical expansion secret-key rates drop to zero quickly within the loss around 4 dB, which cannot satisfy the high-loss condition, so it is not necessary for us to draw its illustration to prove our conclusion. From the scene where G = 1.01 , we can clearly see that the NLA can help to tolerate more excess noise, and with increased g, the maximum tolerable excess noise will increase, as well. We can also see that the permitted maximum losses can be maximally extended as 20log 10 g dB with the NLA in the analytical expansion.
Finally, we come to the optimal parameters analysis. Here, we consider the parameters including reverse reconciliation efficiency β , the variance V B and the gain of NLA g. From Figure 7a, we can clearly see with the increase of β that the maximized secret-key rates will also increase. However, the parameter ξ s introduced by Fred can affect the secret-key rates, and we can see when ξ s = 0 , the minimum value of β for positive secret-key rates is around 0.8 while the minimum value is around 0.87 when ξ s = 0.02 when the loss is 16 dB and the gain g is three. Physically, ξ s , here introduced by Fred referring to the increased excess noise, corresponds to the imperfections of the coherent states of the signal source. From Figure 7b, the increased variance V B can help increase the maximized secret-key rates when V B reaches a certain value, but beyond that value, the secret-key rates will drop and even become negative when V B is too large. Therefore, there exists an optimal variance V B to obtain the maximized secret-key rates, and from Figure 7, we can see that the optimal V B is almost the same as the increased gain g of the NLA.
From Figure 8, we can see that the NLA can help increase the secret-key rates when the gain g is up to a certain value, but beyond that certain value, the secret-key rates will drop and even become negative when g is too large. So there exists an optimal value g, and the optimal value of g slightly increases with the excess noise ξ s . The reason can be mainly explained by the fact that when g is too large, the effective excess noise ϵ t o t g would be too large from Equation (29), though the transmittance η is higher, to give a positive secret-key rate. Furthermore, when ξ s is introduced by Fred, the maximized secret-key rates and the positive range will both decrease.

5. Conclusions and Discussions

In this paper, we have reviewed the plug-and-play DPMCS scheme, and based on its equivalent protocol, we analyze its security. Then, we propose the scheme using a noiseless linear amplifier before the receiver’s homodyne detection to improve the performance against losses and noises. Our calculation of the secret-key rates with the NLA is based on an effective system, which is equivalent to the EB-based protocol where the quantum signals are sent through a Gaussian noisy and lossy quantum channel. We demonstrate that the NLA can help increase the distance by the equivalent 20log 10 g dB of losses, and it may help the scheme to tolerate more excess. However, we should here closely address the noise ξ s controlled by Fred, which will affect the maximum improved transmission distance to get better performance.
For future work, we will further consider the adjustments of the system parameters and the use of the same NLA before Bob’s heterodyne detection to get better performance, as well as keep the symmetry of the whole scheme. Moreover, it should be mentioned here that the gap analysis between practical implementations and theoretical models with NLA should also be considered, and the effects of the imperfections are also influential in our experiments. If more complex parameters are considered, the experimental conditions will deserve more investigation.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61332019, 61671287, 61631014) and the national key research and development program (Grant No. 2016YFA0302600).

Author Contributions

Dongyun Bai designed the conception of the study, accomplished the formula derivation and numerical simulations and drafted the article. Peng Huang gave the general idea of the study, checked the draft and provided feasible suggestions and critical revision of the manuscript. Hongxin Ma gave feasible advice and helped with the calculation. Tao Wang conceived of the study and reviewed relevant studies. Guihua Zeng reviewed relevant studies and literature, conceived of and designed the study and performed critical revision of the manuscript. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ekert, A.K. Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed]
  2. Bennett, C.H.; Brassard, G.; Crépeau, C.; Jozsa, R.; Peres, A.; Wootters, W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993, 70, 1895–1899. [Google Scholar] [CrossRef] [PubMed]
  3. Bennett, C.H.; Wiesner, S.J. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 1992, 69, 2881–2884. [Google Scholar] [CrossRef] [PubMed]
  4. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dus̃ek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301. [Google Scholar] [CrossRef]
  5. Lo, H.-K.; Curty, M.; Tamaki, K. Secure quantum key distribution. Nat. Photonics 2014, 8, 595–604. [Google Scholar] [CrossRef]
  6. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef]
  7. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621. [Google Scholar] [CrossRef]
  8. Samuel, L.B.; Peter, V.L. Quantum information with continuous variables. Rev. Mod. Phys. 2005, 77, 513. [Google Scholar]
  9. Grosshans, F.; Grangier, P. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [PubMed]
  10. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum Cryptography without Switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef] [PubMed]
  11. Huang, D.; Lin, D.K.; Huang, P.; Wang, C.; Liu, W.Q.; Fang, S.H.; Zeng, G.H. Continuous-variable quantum key distribution with 1 Mbps secure key rate. Opt. Express 2015, 23, 17511. [Google Scholar] [CrossRef] [PubMed]
  12. Huang, D.; Huang, P.; Lin, D.K.; Zeng, G.H. Long-distance continuous-variable quantum key distribution by controlling excess noise. Sci. Rep. 2016, 6, 19201. [Google Scholar] [CrossRef] [PubMed]
  13. Jouguet, P.; kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378. [Google Scholar] [CrossRef]
  14. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol. Phys. Rev. A 2013, 87, 052309. [Google Scholar] [CrossRef]
  15. Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 2013, 87, 062313. [Google Scholar] [CrossRef]
  16. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems. Phys. Rev. A 2013, 88, 022339. [Google Scholar] [CrossRef]
  17. Qi, B.; Lougovski, P.; Pooser, R.; Grice, W.; Bobrek, M. Generating the Local Oscillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection. Phys. Rev. X 2015, 5, 041009. [Google Scholar]
  18. Marie, A.; Alléaume, R. Self-coherent phase reference sharing for continuous-variable quantum key distribution. Phys. Rev. A 2017, 95, 012316. [Google Scholar] [CrossRef]
  19. Legre, M.; Zbinden, H.; Gisin, N. Implementation of continuous variable quantum cryptography in optical fibres using a go-&-return configuration. Quantum Inf. Comput. 2006, 6, 326. [Google Scholar]
  20. Jain, N.; Anisimova, E.; Khan, I.; Markarov, V.; Marquardt, C.; Leuchs, G. Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 2014, 16, 123030. [Google Scholar] [CrossRef]
  21. Huang, D.; Huang, P.; Wang, T.; Li, H.S.; Zhou, Y.M.; Zeng, G.H. Bass-SIR model for diffusion of new products in social networks. Phys. Rev. A 2016, 94, 032305. [Google Scholar] [CrossRef]
  22. Blandino, R.; Leverrier, A.; Barbieri, M.; Etesse, J.; Grangier, P.; Tualle-Brouri, R. Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier. Phys. Rev. A 2012, 86, 012–327. [Google Scholar] [CrossRef]
  23. Ferreyrol, F.; Blandino, R.; Barbieri, M.; Tualle-Brouri, R.; Grangier, P. Experimental realization of a nondeterministic optical noiseless amplifier. Phys. Rev. A 2011, 83, 063–081. [Google Scholar] [CrossRef]
  24. Caves, C.M. Quantum limits on noise in linear amplifiers. Phys. Rev. D 1982, 26, 1817. [Google Scholar] [CrossRef]
  25. Ralph, T.C.; Lund, A.P. Nondeterministic noiseless linear amplification of quantum systems. AIP Conf. Proc. 2009, 1110, 155–160. [Google Scholar]
  26. Ralph, T.C. Quantum error correction of continuous-variable states against Gaussian noise. Phys. Rev. A 2011, 84, 022339. [Google Scholar] [CrossRef]
  27. Fiurás̆ek, J.; Cerf, N.J. Gaussian post-selection and virtual noiseless amplification in continuous-variable quantum key distribution. Phys. Rev. A 2012, 86, 060302. [Google Scholar] [CrossRef]
  28. Li, C.Y.; Miao, R.H.; Gong, X.B.; Guo, Y.; He, G.Q. Performance Improvement of Two-way Quantum Key Distribution by Using a Heralded Noiseless Amplifier. Int. J. Theor. Phys. 2016, 55, 2199–2211. [Google Scholar] [CrossRef]
  29. Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B At. Mol. Opt. Phys. 2009, 42, 114014. [Google Scholar] [CrossRef]
  30. Lodewyck, J.; Bloch, M.; Garcá-Patrón, R.; Fossier, S.; Karpov, E.; Diamanti, E.; Debuisschert, T.; Cerf, N.J.; Tualle-Brouri, R.; McLaughlin, S.W.; et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 2007, 76, 042305. [Google Scholar] [CrossRef]
  31. Holevo, A.S.; Sohma, M.; Hirota, O. Capacity of quantum Gaussian channels. Phys. Rev. A 1999, 59, 1820–1828. [Google Scholar] [CrossRef]
  32. Xuan, Q.D.; Zhang, Z.S.; Voss, P.L. A 24 km fiber-based discretely signaled continuous variable quantum key distribution system. Opt. Express 2009, 17, 24244. [Google Scholar]
Figure 1. (a) The prepare-and-measure (P&M) scheme of the plug-and-play dual-phase-modulated coherent states (DPMCS) protocol with the untrusted laser coherent source. A phase-insensitive amplifier (PIA) can amplify both quadratures symmetrically, while the input noise will increase as the result of the coupling process to internal modes. A PIA can be ideally described as a nondegenerate optical parametric amplifier. RNG is random number generator. (b) The dual-phase-modulated scheme. FM, Faraday mirror; PM, phase modulator; BS, beam splitter.
Figure 1. (a) The prepare-and-measure (P&M) scheme of the plug-and-play dual-phase-modulated coherent states (DPMCS) protocol with the untrusted laser coherent source. A phase-insensitive amplifier (PIA) can amplify both quadratures symmetrically, while the input noise will increase as the result of the coupling process to internal modes. A PIA can be ideally described as a nondegenerate optical parametric amplifier. RNG is random number generator. (b) The dual-phase-modulated scheme. FM, Faraday mirror; PM, phase modulator; BS, beam splitter.
Entropy 19 00546 g001
Figure 2. The schematic of the equivalent entanglement-based scheme of the plug-and-play DPMCS protocol. Although Eve has no access to the users’ apparatus, the source is regarded to be equivalently controlled in the plug-and-play protocol. Eve can either control Fred or not, to derive a tight secure bound, and Fred will be assumed to be controlled by Eve instead of a mere neutral party. EPR, Einstein–Podolsky–Rosen.
Figure 2. The schematic of the equivalent entanglement-based scheme of the plug-and-play DPMCS protocol. Although Eve has no access to the users’ apparatus, the source is regarded to be equivalently controlled in the plug-and-play protocol. Eve can either control Fred or not, to derive a tight secure bound, and Fred will be assumed to be controlled by Eve instead of a mere neutral party. EPR, Einstein–Podolsky–Rosen.
Entropy 19 00546 g002
Figure 3. (a) Plug-and-play DPMCS scheme with the noiseless linear amplifier (NLA) before Alice’s homodyne detection. Eve uses the EPR states to perform the collective attack, and Fred might be controlled by Eve. (b) The basic equivalent protocol with and without the NLA. The lower bound of the secret-key rate corresponding to the successful amplification in the protocol ( λ , ε c , T ) and the virtually equivalent protocol ( ζ , ε t o t g , η ) .
Figure 3. (a) Plug-and-play DPMCS scheme with the noiseless linear amplifier (NLA) before Alice’s homodyne detection. Eve uses the EPR states to perform the collective attack, and Fred might be controlled by Eve. (b) The basic equivalent protocol with and without the NLA. The lower bound of the secret-key rate corresponding to the successful amplification in the protocol ( λ , ε c , T ) and the virtually equivalent protocol ( ζ , ε t o t g , η ) .
Entropy 19 00546 g003
Figure 4. In the curve, g m a x against the losses in dB, where ϵ c = 0.04 , V I = 1 represents that the noise variance of the PIA in Figure 1 is one (in shot-noise units); G has different values of 1, 1.01, 1.02. We can clearly see g m a x increase with the increase of the losses.
Figure 4. In the curve, g m a x against the losses in dB, where ϵ c = 0.04 , V I = 1 represents that the noise variance of the PIA in Figure 1 is one (in shot-noise units); G has different values of 1, 1.01, 1.02. We can clearly see g m a x increase with the increase of the losses.
Entropy 19 00546 g004
Figure 5. Maximized secret-key rates against losses in dB units. The maximization is performed in different ξ s , which is determined by the eavesdropper. Due to the probability of success 1 / g 2 , it is reasonable for us to keep the information on its positivity. The parameters needed are as below: β = 0.9 , V = 3.3 , ϵ c = 0.04 . From left to right, the dashed, solid and dash-dotted lines represent the analytical series expansion without NLA, the numerical expansion without NLA and using the NLA corresponding to the secret-key rates for G = 1, 1.01, 1.02.
Figure 5. Maximized secret-key rates against losses in dB units. The maximization is performed in different ξ s , which is determined by the eavesdropper. Due to the probability of success 1 / g 2 , it is reasonable for us to keep the information on its positivity. The parameters needed are as below: β = 0.9 , V = 3.3 , ϵ c = 0.04 . From left to right, the dashed, solid and dash-dotted lines represent the analytical series expansion without NLA, the numerical expansion without NLA and using the NLA corresponding to the secret-key rates for G = 1, 1.01, 1.02.
Entropy 19 00546 g005
Figure 6. Maximum excess noise in analytical expansion against losses when the secret-key rates are positive. (a) represents G = 1 with and without NLA. (b) represents G = 1.01 with and without NLA. The curves only depend on the positivity of the secret-key rates rather than the success probability. We can see that NLA can help tolerate more excess noise in high losses.
Figure 6. Maximum excess noise in analytical expansion against losses when the secret-key rates are positive. (a) represents G = 1 with and without NLA. (b) represents G = 1.01 with and without NLA. The curves only depend on the positivity of the secret-key rates rather than the success probability. We can see that NLA can help tolerate more excess noise in high losses.
Entropy 19 00546 g006
Figure 7. Maximized secret-key rates against reverse reconciliation efficiency β and the variance V B . In (a), the excess noise ϵ c is 0.04; the loss is 16 dB; λ is optimized in accord with β from [22]. In (b), the excess noise ϵ c is 0.04; the loss is 16 dB; and the reverse reconciliation is 0.9. In both (a,b), ξ s introduced by Fred will affect the secret-key rates.
Figure 7. Maximized secret-key rates against reverse reconciliation efficiency β and the variance V B . In (a), the excess noise ϵ c is 0.04; the loss is 16 dB; λ is optimized in accord with β from [22]. In (b), the excess noise ϵ c is 0.04; the loss is 16 dB; and the reverse reconciliation is 0.9. In both (a,b), ξ s introduced by Fred will affect the secret-key rates.
Entropy 19 00546 g007
Figure 8. Maximized secret-key rates against the gain g of the NLA. The probability of success is 1 / g 2 ; the excess noise ϵ c is 0.04; the loss is 16 dB; and the reverse reconciliation efficiency is 0.9. With the increased g, the secret-key rates will increase to a certain value. Beyond the certain value, the secret-key rates will drop and even become negative.
Figure 8. Maximized secret-key rates against the gain g of the NLA. The probability of success is 1 / g 2 ; the excess noise ϵ c is 0.04; the loss is 16 dB; and the reverse reconciliation efficiency is 0.9. With the increased g, the secret-key rates will increase to a certain value. Beyond the certain value, the secret-key rates will drop and even become negative.
Entropy 19 00546 g008

Share and Cite

MDPI and ACS Style

Bai, D.; Huang, P.; Ma, H.; Wang, T.; Zeng, G. Performance Improvement of Plug-and-Play Dual-Phase-Modulated Quantum Key Distribution by Using a Noiseless Amplifier. Entropy 2017, 19, 546. https://doi.org/10.3390/e19100546

AMA Style

Bai D, Huang P, Ma H, Wang T, Zeng G. Performance Improvement of Plug-and-Play Dual-Phase-Modulated Quantum Key Distribution by Using a Noiseless Amplifier. Entropy. 2017; 19(10):546. https://doi.org/10.3390/e19100546

Chicago/Turabian Style

Bai, Dongyun, Peng Huang, Hongxin Ma, Tao Wang, and Guihua Zeng. 2017. "Performance Improvement of Plug-and-Play Dual-Phase-Modulated Quantum Key Distribution by Using a Noiseless Amplifier" Entropy 19, no. 10: 546. https://doi.org/10.3390/e19100546

APA Style

Bai, D., Huang, P., Ma, H., Wang, T., & Zeng, G. (2017). Performance Improvement of Plug-and-Play Dual-Phase-Modulated Quantum Key Distribution by Using a Noiseless Amplifier. Entropy, 19(10), 546. https://doi.org/10.3390/e19100546

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop