Next Article in Journal
Multivariate Time Series Feature Extraction and Clustering Framework for Multi-Function Radar Work Mode Recognition
Previous Article in Journal
Persona-Identified Chatbot through Small-Scale Modeling and Data Transformation
Previous Article in Special Issue
Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adjusting Optical Polarization with Machine Learning for Enhancing Practical Security of Continuous-Variable Quantum Key Distribution

1
School of Mathematics and Statistics, Qingdao University, Qingdao 266071, China
2
School of Automation, Central South University, Changsha 410083, China
3
School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(8), 1410; https://doi.org/10.3390/electronics13081410
Submission received: 27 February 2024 / Revised: 6 April 2024 / Accepted: 7 April 2024 / Published: 9 April 2024
(This article belongs to the Special Issue Quantum Computation and Its Applications)

Abstract

:
An available trick to mitigate the interference of environmental noise in quantum communications is to modulate signals with time-polarization multiplexing. Conversely, due to effects of the atmospheric turbulence in free space, the polarization of signals fluctuates randomly, resulting in feasible information leakage when direct polarization demultiplexing is carried out at the receiver, drowning out the noise-contained signals. For enhancing the practical security of the continuous-variable quantum key distribution (CVQKD), we propose a machine learning (ML) approach for optimization of the dynamic polarization control (DPC) of signals transmitted through atmospheric turbulence. An optimal DPC scheme can be adaptively adjusted with ML algorithms, which is based on the received signals at the receiver for solving the loophole problem of information leakage since it provides an accurate response to the polarization changes regarding the anamorphic signals. The performance of the CVQKD system can be increased in terms of secret key rates and maximal transmission distance as well. Numerical simulation shows the positive effect of the ML-based DPC while taking into account the secret key rate of the CVQKD system. The ML-based DPC effectively reduces the feasibility of information leakage and hence results in an increased secret key rate of the practical CVQKD system.

1. Introduction

Quantum key distribution (QKD) is a kind of secure communication [1] that uses the principles of quantum mechanics to enable security for legitimate parties to exchange secret keys in quantum communications. Despite the challenges posed by optical extinction and the detrimental effects of atmospheric turbulence in free space, terrestrial free-space quantum key distribution (QKD) has garnered significant interest due to its inherent flexibility in establishing secure global communication links [2].
Traditional QKD schemes, which produce random secret keys for the two participants, Alice and Bob, can be composed of the discrete-variable (DV) QKD scheme [3,4] and the continuous-variable (CV) QKD scheme [5,6]. DVQKD encodes the secret key information of bits in polarization states of single photons, whereas CVQKD encodes the secret key information with the two related quadratures ( x ^ and p ^ ) of optical fields, including either discretely modulated states (DM) or Gaussian modulation (GM) states. The initial QKD was called DVQKD since it makes full use of single photons for the signal source and the valuable single-photon detector for precise detection. For the counterpart CVQKD, it uses continuous light for the signal source and employs a homodyne detector or heterodyne detector for accurate detection. This method has the advantages of compatibility and usability, great strengths since they can be implemented with the available optical communication technology [6]. Since CVQKD was proposed in practical implementations, many schemes have been proposed in the exploration of their theories and experimentation, such as smart detection of feasible eavesdroppers and different types of modulation of Gaussian states. The security of the corresponding CVQKD system has been proven regarding both the finite-size regime and asymptotic limit [7]. In addition, non-Markovianity has been used to enhance CVQKD system security [8,9]. Noisy propagation of Gaussian states has been demonstrated in optical media with finite bandwidth [10], which can potentially be used for performance improvement. However, there is little work on enhancement of practical security related to secret key generation at the receiver of a system.
In terms of the performance improvement of the CVQKD system, CVQKD can be performed by using quantum signals prepared with Gaussian modulations (GM) [11,12]. However, it is still hard to approach the low bound of quantum signal-to-noise ratios, which results in decreased reconciliation efficiency in practice [13,14]. Fortunately, the discretely modulated (DM) aspect of quantum signals has been suggested for CVQKD to break the low-bound limitations [15,16], and thus the security of the DM-CVQKD system with it has been theoretically proven in an asymptotic regime [17,18]. However, there are still loopholes in the practical CVQKD system that are vulnerable to attack. These loopholes can be used for weakening the security of the system by an eavesdropper who may perform potential attack strategies, such as a local oscillator (LO) attack [19,20], finite sampling bandwidth effects [21], wavelength attack [22,23], polarization attack [24], jitter in clock synchronization [25], and a blinding attack on the detector [26]. Consequently, there are several countermeasures determined to resist the aforementioned attack strategies. For example, measurement–device–measurement (MDI) CVQKD has been suggested in experiments for defending against potential attacks in detectors [27]. In addition, real-time shot-noise measurement detection [28] has been employed at the receiver to defend against LO-involved attacks. However, it is still vulnerable to practical security because of imperfectness of devices or appliances that contain potential loopholes concealed in the practical system.
For decades, continuous-variable quantum key distribution (CVQKD) has been rapidly developed and implemented due to its efficient source preparations and compatibility with current optical devices. For example, a pioneering demonstration of the feasibility of free-space CVQKD has been achieved using coherent polarization states under actual atmospheric circumstances. Building upon the advantages of coherent detection, such as resistance to background noise and high detection efficiency [29], the recent theoretical and experimental results have confirmed the practicality of all-day free-space quantum communications utilizing coherent detection. Some techniques have been proposed for promoting the experimental realization of free-space CVQKD, such as the Kramers–Kronig scheme [30] and discrete modulation scheme [31], where the effects of excess noise on the practical system were demonstrated to weaken the transmittance of quantum signals in atmospheric turbulence channels.
While implementing CVQKD in the free space channels in practice, the transmission coefficient usually fluctuates because of atmospheric turbulence effects. Phase modulation of coherent states plays an important role in performance improvement regarding the system [32]. In addition, probabilistic noiseless linear amplifiers can be employed both at the encoding stage [33] and at the decoding stage [34]. However, the coherent detection of the transmitted quantum signals at the receiver can be distorted by atmospheric turbulence, and the practical security of the CVQKD system will be weakened. Fortunately, dynamic polarization control (DPC) can be employed for mitigating the turbulence-induced wavefront aberrations of the received quantum states.
When considering the performance improvements of practical free-space CVQKD systems, DPC optimization turned out to be a perfect solution to the problem of deteriorated quantum signals through atmospheric turbulence channels [35]. However, the occurrence of fading in atmospheric turbulence channels can intensify the risk of a light leakage challenge [36], potentially leading to a decreased secret key rate of the free-space CVQKD system. The reason is that the polarization state of the weakened quantum signals is deformed during propagation through the atmospheric turbulence channel. If polarization demultiplexing is not accurately estimated for data processing at the receiver, it may result in light leakage of the local oscillator into quantum signals. Consequently, effective and efficient DPC is required for the free-space CVQKD system. In this paper, we focus on an optimized DPC scheme based on machine learning algorithms [37], which can be used to redress the deteriorated quantum signals through atmospheric turbulence channels. Numerical simulations demonstrate the positive effect of the ML-based DPC on the practical security of the CVQKD system.
The organization of this paper is as follows. In Section 2, a DPC scheme is described for the receiver of the CVQKD system. In Section 3, we provide a theoretical derivation of the ML-based DPC to make an argument for the proposed scheme. In Section 4, the effects of the ML-based DPC on the free-space CVQKD system are illustrated with numerical simulations for security analysis. Section 5 draws the conclusions.

2. ML-Based DPC Scheme

The polarization control scheme can be described as follows. As shown in Figure 1, the transmitted local oscillator and signals are received by a telescope, after passing through an atmospheric fading channel. They undergo an adjustment through a dynamic polarization controller (DPC) so that they can be successfully separated by the polarizing beam splitter (PBS). A portion of the light is split before and after PBS, measured via photoelectric detectors (PDs).
The ratio r p of the light intensity of the input light fields of two PDs can be calculated as the feedback input signal to DPC, from which we have [36]
r p = E 2 E 2 E 1 E 1 = R 2 T P B S 1 R 1 R 1 I e 2 I e 1 ,
where E 1 and E 2 are input light fields described as
E 1 = R 1 T e i Δ δ J D P C E , E 2 = R 2 T P B S 1 R 1 T e i Δ δ J P B S J D P C E .
Parameter E is is the Jones vector form of light emitted by Alice, T is the channel transmittance, Δ δ is the channel-induced phase drift, T P B S is the transmittance of the polarization BS, R 1 and R 2 are the reflectivity of the first and the second BS, and J P B S and J D P C are the Jones matrices of DPC and PBS, respectively.
Subsequently, we have the light intensities I e 1 = J D P C E and I e 2 = J P B S J D P C E , respectively. We find that the effect of fluctuations in channel transmittance on light intensity is eliminated by the division operation r e = I e 2 / I e 1 , and then we will focus on how to adjust DPC to maximize the parameter r e .
DPC involves a cascade of fiber optic squeezers, as shown in Figure 1a. Different points on the Poincaré sphere represent the corresponding polarization states, and a cascade of fiber optic squeezers can be suitably adjusted to bring any input polarization state to a specified position. Taking 0-degree- and 45-degree-oriented fiber optic squeezers as an example, the Jones matrix of the DPC can be expressed as
J D P C = J 0 ( γ 3 ) × J 45 ( γ 2 ) × J 0 ( γ 1 ) ,
where γ j , j { 1 , 2 , 3 } is the phase generated by the j-th fiber squeezer, J 0 ( γ j ) and J 45 ( γ j ) are matrices described as
J 0 ( γ j ) = e i γ j / 2 0 0 e i γ j / 2 , J 45 ( γ j ) = cos ( γ j / 2 ) i sin ( γ j / 2 ) i sin ( γ j / 2 ) cos ( γ j / 2 ) .
The Jones matrix of the PBS is provided by
J P B S = cos 2 θ sin θ cos θ sin θ cos θ sin 2 θ ,
where θ is the deflected angle of the optical axis.
When three fiber squeezers are cascaded in an optical fiber system, there exists a challenge to simultaneously adjust their parameters due to the mutual interactions between them. Since each squeezer introduces changes to the path length of the light propagating through the fiber, it results in phase delays that make it difficult for synchronous control. In what follows, we suggest a workflow of the dynamic polarization control system.
Step 1: Power up DPC and turn all fiber optic squeezers to half of the maximum voltage to allow for the direction adjustment of polarization states.
Step 2: Based on the derived ratio r e as inputs to DPC, a machine learning algorithm is used to find the maximum value of r p . Instead of adjusting all three fiber squeezers at the same time, we optimize the parameter r p by independently regulating each fiber squeezer, whereas the voltages of the other squeezers are made constant during the process.
Step 3: When the optimal voltage value for the first DPC is achieved, the voltage on the first DPC will be provided to that voltage, and then repeat Step 2 until the optimal voltage value for each of the three DPCs is obtained.
This approach takes into account the fact that, when three fiber squeezers are cascaded in an optical fiber system, each one causes changes to the path length of the propagating light, resulting in phase delays that make it difficult for synchronous control.

3. Description of the CVQKD System

In the CVQKD system with Gaussian modulation, the transmitter Alice generates a series of Gaussian states α A involving amplitude I A and phase θ [1]. In the phase space, the state α A can be described as
α A = a e i θ = x A + i p A ,
where x A = a cos θ and p A = a sin θ are both independent quadrature variables, with the variance denoted by V A and a mean of zero. The variance V A of quadratures variables x A or p A can be derived from V A = 2 n , which is the average number of photons detected in the quantum signals. We have the relationship between the intensity I A and the amplitude a, which can be described as I A a 2 . When generating the quantum signals in an experiment, the parameters x A and p A demand constant change and adjustment to the suitable values, performed by Alice using the amplitude and phase modulators. After the transmitted quantum signals arrive at the receiver, we assume that x B and p B are quadrature variables of the quantum signals. Therefore, we have the achieved Gaussian-modulated coherent state α B = x B + i p B .
Apart from that, due to the influence of atmospheric turbulence in free space and the light leakage from the optical devices, the intensity of the quantum signals usually deviates from the initial value. Fortunately, effects of optical attenuation on the quantum signals can be avoided while performing real-time shot-noise measurement in practical CVQKD system. To carry out the shot-noise measurement, Bob first splits a part of the received quantum signals, which is put into a balanced homodyne detector. Subsequently, the interference between the separated quantum signals and the vacuum mode is used for evaluating the scattered noise in free space. Therefore, it is feasible to evaluate the variance of the received quantum signals through calibrating the relationship between the variance of scattered noise and the intensity of the quantum signals while we monitor the intensity of the quantum signals in real time. In what follows, we will focus on effect of the leakage of the Gaussian-modulated coherent state from the imperfect DPC on the performance of the CVQKD system.
Before performing the optimized DPC with the machine learning (ML) algorithms to achieve the maximum value of r e , we demonstrate characteristics of quantum signals in what follows.
For any light beam, its Jones vector can be expressed as [36]
I = I x e i k z ω t + ϕ x x + I y e i ( k z ω t + ϕ y ) y ,
where vectors x and y represent the unit vectors in the x-direction and y-direction of the coordinate axes, I x and I y represent the amplitudes, and ϕ x and ϕ y represent the initial phases, respectively. Therefore, I, which depends on two orthogonal components, determines its polarization state. It can be represented by
I = I x e i k z ω t + ϕ x I y e i k z ω t + ϕ y ,
which can be simplified as I = ( I x , I y e i δ ) T with δ = ϕ y ϕ x , omitting its common phase factor and using δ to denote the phase difference of I x with respect to I y . The known Stokes coefficients are a complete set of coefficients used to describe the polarization state of quantum signals provided by
S 0 = I x 2 + I y 2 , S 1 = I x 2 I y 2 , S 2 = 2 I x I y cos δ , S 3 = 2 I x I y sin δ .

4. Security Analysis

4.1. Derivation of the Secret Key Rate

The effect of the ML-based DPC on CVQKD can be assessed through the derived secret key rate. Alice and Bob can distill the secret key using the traditional parameters, such as variance V A , transmittance of quantum channel T, reconciliation efficiency β , excess noise ε , detector efficiency η , and detector noise υ e l . These parameters can be used for derivation of the maximum information available to the eavesdropper. Here, we employ reverse reconciliation as it has been shown to offer an advantage in the security analysis of CVQKD systems. We consider the finite-size effect of secret key rate K provided by [1,13]
K = n N β I A B S E B Δ ( n ) ,
where n = N m represents the number of received pulses that can be used for calculation of the secret key. In addition, the notation I A B represents the mutual information between Alice and Bob, which is compatible with the statistics and can be calculated as follows
I A B = 1 2 log 2 V A + χ t o t + 1 χ t o t + 1 ,
where χ t o t = χ l i n e + χ h o m / T represents channel’s total noise with parameters χ l i n e = 1 / T 1 ε and χ h o m = 1 + ν e l η / T . The notation S E B denotes the maximum value of the Holevo information between Bob and Eve, which is determined by the covariance matrix provided by
Γ = u · d i a g ( 1 , 1 ) s · d i a g ( 1 , 1 ) s · d i a g ( 1 , 1 ) v · d i a g ( 1 , 1 ) ,
where u = V A + 1 , v = T m i n V A + ϵ m a x + 1 , and s = T m i n V A 2 + 2 V A . Here, T m i n represents the lower bound of T and ε m a x represents the upper bound of ε . If the value of m = N / 2 is large enough, then the resulting parameters T m i n and ϵ m a x can be expressed as
T min = t + Δ t 2 η , ϵ max = σ ^ 2 + Δ σ 2 N 0 ( 1 + ν e l ) N 0 t 2 ,
with the notations provided by
t = η T , σ 2 = η T ξ + ν e l + 1 , Δ t = Z ε P E / 2 σ / m V A , Δ σ 2 = Z ε P E / 2 σ 2 2 / m .
Then, S E B can be derived as follows,
S E B = i = 1 2 G γ i 1 2 i = 3 5 G γ i 1 2 ,
where G t = t + 1 log 2 t + 1 t log 2 t . The parameters γ 1 , 2 are the symplectic values that can be calculated as
γ 1 , 2 2 = 1 2 U ± U 2 4 V ,
with the notations
U = u 2 + v 2 2 s 2 , V = u v s 2 .
The parameters γ 3 , 4 are the symplectic values and can be written as
γ 3 , 4 2 = 1 2 M ± M 2 4 F ,
with the notations
M = v + u V + U v + 1 , F = V u + V v + 1 .
In addition, parameter Δ n is related to the security of privacy amplification. In the practical CVQKD system, it can be approximately derived as
Δ n = ( log 2 ε ¯ + 2 log 2 ε P A ) / n ,
where ε ¯ and ε P A represent the smoothing parameter and the failure probability of privacy amplification, respectively. Typically, the above-mentioned parameters are assumed with the same value as ε ¯ since the value of ϵ P A predominantly relies on the number n of the received quantum signals.

4.2. Numerical Simulations

The overnoise caused by the optical leakage of the actual principal vibrations of DPC can be defined as
ξ l e a k = 2 n 0 T R AM R PI ,
where the average number of photons in the local oscillator (LO) is denoted by n 0 , while the extinction ratio of amplitude modulator (AM) is represented by R A M . In addition, let I and I leak be the intensities of the signal light and the leaked light, respectively, and then we can define the gain g of the ML-based DPC. The output intensity of DPC can be denoted as I . The detection efficiency increases as the optical intensity rises, and thus we have T = g T . The additional noise decreases with the increase in optical intensity, from which we have ε = ε / g . Consequently, there are two scenarios occurring in the practical CVQKD system. On the one hand, it involves DPC without the ML-based optimization, resulting in the secret key rate K = ( T , ε , υ e l ) , but, on the other, when the ML-based DPC is employed in CVQKD, we achieve the secret key rate K l e a k = ( T , ε , υ e l ) , where ξ l e a k is included for derivation of υ e l . In numerical simulations, we consider the whale optimization algorithm (WOA) as an example to illustrate effect of the ML-based DPC under the leakage lights. The parameters are set as follows, V A = 4 , n 0 = 4 × 10 8 , R AM = 63 dB , η = 0.5 , υ e l = 0.01 , β = 95 % , ϵ = 10 10 , N = 7 × 10 9 , and g = 1.5 , respectively.
Figure 2 shows the secret key rate with light leakage (denoted as K l e a k ) and the secret key rate without light leakage (denoted as K). To illustrate the performance of the CVQKD system, we compare with secret key rates K l e a k and K. When the ML-based DPC fails to detect the imperfections that result in photon leakage, it may overestimate the actual secure key rate, compromising the practical security. The region below is achieved from the derived secret key rate K l e a k when taking into account the photon leakage. When the secret key rate falls within this region, it is trustworthy, even in the presence of the information leakage of the imperfect DPC. As for the region above K, the security of the derived secret key rate of the system is not ensured. Additionally, the region between K l e a k and K corresponds to the information leakage caused by the effects of the imperfect DPC on the system. When the secret key rate falls within this intersecting region, with the light leakage undetected, the leaked light results in a potential security loophole, which can be potentially employed by Eve to perform the attack strategy to steal the secret key. This loophole causes an overestimation of the secret key rate, leading to vulnerability to the practical security of the CVQKD system. The reason is that an eavesdropper may perform an intercept-resend attack strategy on the imperfect DPC, from which the secret key can be pilfered without being detected. Fortunately, the legal participants can trace back the information leakage with the ML-based DPC scheme, which can be used for defeating the leakage attack in CVQKD. Moreover, it can be observed that the ML-based DPC can raise the secret key rate of the CVQKD system, although the leakage can weaken its security. Consequently, we find an advantage of the ML-based DPC embedded in the CVQKD system.
In a practical CVQKD system, Eve can perform a DPC-involved attack. As shown in Figure 3, we demonstrate the secret key rate of the practical CVQKD system with or without the ML-involved DPC. It is obvious that the evaluated secret key rate k e is overestimated in the absence of the protection of the ML-based DPC, which is compared with the secret key rate K o of the system with the ML-based DPC. Numerical simulations show that, if the system has the ability to detect DPC-involved attacks, the practical secret key rate K p will be made smaller than that of the secret key rate K o with the ML-based DPC. Therefore, the DPC-involved attack will make the estimated secret key rate untrustworthy, whereas the estimated secret key rate can be increased with the ML-based DPC. In addition, in the absence of the ML-based DPC protection, the increase in output light intensity will give birth to the leakage of key information. The more output light intensity caused by the DPC-involved attack means the larger the difference between the evaluated security key rate and the actual value. Namely, the difference between the estimated secret key rate without protection of DPC and the actual secret key rate under the same conditions shows that Eve can open a security loophole to distill the secret key from the practical CVQKD system.

5. Conclusions

We suggested an ML-based DPC for optimizing the practical CVQKD system over fading channels with randomly fluctuating transmittance. The ML-based DPC can be improved in terms of its ability to handle the polarization deteriorations of the transmitted quantum signals in fading channels. An ML-involved optimization algorithm was used to deliver a precise response to the abnormal transformation of polarization states. Numerical simulations confirmed the robustness and adaptability of the ML-based DPC while demonstrating its ability to quickly converge to the optimal configuration of quantum signals even under dynamic conditions. The proposed scheme demonstrated effectiveness in suppressing light leakage and preserving the integrity of deteriorated quantum signals, leading to increased reliability of practical CVQKD systems. We focused on revealing the oblivious imperfectness of DPC, which compromises the theoretical security of the CVQKD system. We note that assessment of DPC-involved light leakage allowed us to precisely evaluate the channel parameters, enabling the practical security enhancement of the CVQKD system. Actually, machine learning has been used for the design and implementation of quantum communications [38,39]. However, there are few studies regarding ML-involved DPC in a practical CVQKD system. As for the practical security of the system in terms of the ML-based DPC, we will consider its effects on the CVQKD system in our future work.

Author Contributions

Writing—original draft preparation, Z.Z.; writing—review and editing, Y.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the key research and development project in Hunan Province (grant no. 2022GK2016), the Scientific Research Fund of Hunan Provincial Education Department (grant no. 22C0446), Key project of Scientific Research of Hunan Provincial Education Department (grant nos. 21A0470 and 22A0669), and the Natural Science Foundation of Hunan Province (grant nos. 2023JJ50268 and 2023JJ50269).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–699. [Google Scholar] [CrossRef]
  2. Pirandola, S.; Andersen, U.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  3. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef]
  4. Scarani, V.; Renner, R. Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 2008, 100, 200501. [Google Scholar] [CrossRef]
  5. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  6. Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef]
  7. Laudenbach, F.; Pacher, C.; Fung, C.H.F.; Poppe, A.; Peev, M.; Schrenk, B.; Hentschel, M.; Walther, P.; Hübel, H. Continuous-variable quantum key distribution with gaussian modulation–the theory of practical implementations. Adv. Quantum Technol. 2018, 1, 1800011. [Google Scholar] [CrossRef]
  8. Vasile, R.; Olivares, S.; Paris, M.A.; Maniscalco, S. Continuous-variable quantum key distribution in non-Markovian channel. Phys. Rev. A 2011, 83, 042321. [Google Scholar] [CrossRef]
  9. Teklu, B. Continuous-variable entanglement dynamics in Lorentzian environment. Phys. Lett. A 2022, 432, 128022. [Google Scholar] [CrossRef]
  10. Teklu, B.; Bina, M.; Paris, M.A. Noisy propagation of Gaussian states in optical media with finite bandwidth. Sci. Rep. 2022, 12, 11646. [Google Scholar] [CrossRef]
  11. Gottesman, D.; Preskill, J. Secure quantum key distribution using squeezed states. Phys. Lett. A 2001, 63, 022309. [Google Scholar] [CrossRef]
  12. Usenko, V.C.; Grosshans, F. Unidimensional continuous-variable quantum key distribution. Phys. Lett. A 2015, 92, 062337. [Google Scholar] [CrossRef]
  13. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397–402. [Google Scholar] [CrossRef]
  14. Becir, A.; El-Orany, F.A.A.; Wahiddin, M.R.B. Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier. Int. J. Quantum Inf. 2010, 10, 12500041. [Google Scholar]
  15. Guo, Y.; Liao, Q.; Huang, D.; Zeng, G. Quantum relay schemes for continuous-variable quantum key distribution. Phys. Lett. A 2017, 95, 042326. [Google Scholar] [CrossRef]
  16. Leverrier, A.; Grangier, P. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 2008, 102, 180504. [Google Scholar] [CrossRef] [PubMed]
  17. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems. Phys. Lett. A 2013, 88, 022339. [Google Scholar] [CrossRef]
  18. Liao, Q.; Xiao, G.; Xu, C.G.; Xu, Y.; Guo, Y. Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source. Phys. Lett. A 2020, 102, 032604. [Google Scholar] [CrossRef]
  19. Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Lett. A 2013, 87, 062313. [Google Scholar] [CrossRef]
  20. Huang, J.Z.; Weedbrook, C.; Yin, Z.Q.; Wang, S.; Li, H.W.; Chen, W.; Guo, G.C.; Han, Z.F. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack. Phys. Lett. A 2013, 87, 062329. [Google Scholar] [CrossRef]
  21. Wang, C.; Huang, P.; Huang, D.; Lin, D.; Zeng, G. Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects. Phys. Lett. A 2016, 93, 022315. [Google Scholar] [CrossRef]
  22. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol. Phys. Lett. A 2013, 87, 052309. [Google Scholar] [CrossRef]
  23. Qin, H.; Kumar, R.; Alléaume, R. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution. Phys. Lett. A 2016, 94, 012325. [Google Scholar] [CrossRef]
  24. Zhao, Y.; Zhang, Y.; Huang, Y.; Xu, B.; Yu, S.; Guo, H. Polarization attack on continuous-variable quantum key distribution. J. Phys. B 2018, 52, 015501. [Google Scholar] [CrossRef]
  25. Xie, C.; Guo, Y.; Liao, Q.; Zhao, W.; Huang, D.; Zhang, L.; Zeng, G. Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization. Phys. Lett. A 2018, 382, 811–817. [Google Scholar] [CrossRef]
  26. Qin, H.; Kumar, R.; Makarov, V.; Alléaume, R. Homodyne-detector-blinding attack in continuous-variable quantum key distribution. Phys. Lett. A 2018, 98, 012312. [Google Scholar] [CrossRef]
  27. Li, Z.; Zhang, Y.C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Lett. A 2014, 89, 052301. [Google Scholar] [CrossRef]
  28. Kunz-Jacques, S.; Jouguet, P. Robust shot-noise measurement for continuous-variable quantum key distribution. Phys. Lett. A 2015, 91, 022307. [Google Scholar] [CrossRef]
  29. Wang, S.Y.; Huang, P.; Wang, T.; Zeng, G.H. Feasibility of All-Day Quantum Communication with Coherent Detection. Phys. Lett. App. 2019, 12, 024041. [Google Scholar] [CrossRef]
  30. Zhen, Q.; Djordjevic, I.B. High-Speed Free-Space Optical Continuous Variable-Quantum Key Distribution Based on Kramers–Kronig Scheme. IEEE Photonics J. 2018, 10, 7600807. [Google Scholar]
  31. Zhen, Q.; Djordjevic, I.B. Approaching Gb/s Secret Key Rates in a Free-Space Optical CV-QKD System Affected by Atmospheric Turbulence. In Proceedings of the 2017 European Conference on Optical Communication (ECOC), Gothenburg, Sweden, 17–21 September 2017. [Google Scholar] [CrossRef]
  32. Teklu, B.; Genoni, M.G.; Olivares, S.; Paris, M.A. Phase estimation in the presence of phase diffusion: The qubit case. Phys. Scr. 2010, 2010, 140. [Google Scholar] [CrossRef]
  33. Adnane, H.; Teklu, B.; Paris, M.A. Quantum phase communication channels assisted by non-deterministic noiseless amplifiers. J. Opt. Soc. Am. B 2019, 36, 2938–2945. [Google Scholar] [CrossRef]
  34. Rosati, M.; Mari, A.; Giovannetti, V. Coherent-state discrimination via nonheralded probabilistic amplification. Phys. Lett. A 2016, 93, 062315. [Google Scholar] [CrossRef]
  35. Karinou, F.; Comandar, L.; Brunner, H.H.; Hillerkuss, D.; Peev, M. Experimental evaluation of the impairments on a QKD system in a 20-channel WDM co-existence scheme. In Proceedings of the 2017 IEEE Photonics Society Summer Topical Meeting Series (SUM), San Juan, PR, USA, 10–12 July 2017. [Google Scholar]
  36. Wang, S.Y.; Huang, P.; Wang, T.; Zeng, G.H. Dynamic polarization control for free-space continuous-variable quantum key distribution. Opt. Lett. 2020, 45, 5921–5924. [Google Scholar] [CrossRef] [PubMed]
  37. Elhani, D.; Megherbi, A.C.; Zitouni, A.; Dornaika, F.; Sbaa, S.; Taleb-Ahmed, A. Optimizing convolutional neural networks architecture using a modified particle swarm optimization for image classification. Expert Syst. Appl. 2023, 229, 120411. [Google Scholar] [CrossRef]
  38. Wallnöfer, J.; Melnikov, A.A.; Dür, W.; Briegel Hans, J. Machine Learning for Long-Distance Quantum Communication. PRX Quantum 2020, 1, 010301. [Google Scholar]
  39. Melnikov, A.A.; Sekatski, P.; Sangouard, N. Setting Up Experimental Bell Tests with Reinforcement Learning. Phys. Rev. Lett. 2020, 125, 160401. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of the dynamic polarization control scheme. (a) A cascade of 0-degree- and 45-degree-oriented fiber optic squeezers can be suitably adjusted to bring any input polarization state to a specified position regarding DPC. TELE, telescope; DPC, dynamic polarization controller; BS, beam splitter; PD, photodetector; PBS, polarizing beam splitter.
Figure 1. Schematic diagram of the dynamic polarization control scheme. (a) A cascade of 0-degree- and 45-degree-oriented fiber optic squeezers can be suitably adjusted to bring any input polarization state to a specified position regarding DPC. TELE, telescope; DPC, dynamic polarization controller; BS, beam splitter; PD, photodetector; PBS, polarizing beam splitter.
Electronics 13 01410 g001
Figure 2. Secret key rate of the DPC-based CVQKD system using the whale optimization algorithm with light leakage.
Figure 2. Secret key rate of the DPC-based CVQKD system using the whale optimization algorithm with light leakage.
Electronics 13 01410 g002
Figure 3. Secret key rate as a function of the transmission distance from Alice to Bob. The solid line represents the secret key rate without the ML-based DPC. The dashed curves represent the evaluated secret key rate K e with the ML-based DPC. The dotted curves show the actual secret key rate K p due to the optical leakage.
Figure 3. Secret key rate as a function of the transmission distance from Alice to Bob. The solid line represents the secret key rate without the ML-based DPC. The dashed curves represent the evaluated secret key rate K e with the ML-based DPC. The dotted curves show the actual secret key rate K p due to the optical leakage.
Electronics 13 01410 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, Z.; Guo, Y. Adjusting Optical Polarization with Machine Learning for Enhancing Practical Security of Continuous-Variable Quantum Key Distribution. Electronics 2024, 13, 1410. https://doi.org/10.3390/electronics13081410

AMA Style

Zhou Z, Guo Y. Adjusting Optical Polarization with Machine Learning for Enhancing Practical Security of Continuous-Variable Quantum Key Distribution. Electronics. 2024; 13(8):1410. https://doi.org/10.3390/electronics13081410

Chicago/Turabian Style

Zhou, Zicheng, and Ying Guo. 2024. "Adjusting Optical Polarization with Machine Learning for Enhancing Practical Security of Continuous-Variable Quantum Key Distribution" Electronics 13, no. 8: 1410. https://doi.org/10.3390/electronics13081410

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop