Literature DB >> 30518943

Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel.

Xiao-Long Hu1, Yuan Cao2,3, Zong-Wen Yu1,4, Xiang-Bin Wang5,6,7.   

Abstract

We show that a high key rate of Measurement-Device-Independent Quantum Key Distribution (MDIQKD) over asymmetric and unstable quantum channel can be obtained by full optimization and compensation. Employing a gradient optimization method, we make the full optimization taking both the global optimization for the 12 independent parameters and the joint constraints for statistical fluctuations. We present a loss-compensation method by monitoring the channel loss for an unstable channel. The numerical simulation shows that the method can produce high key rate for both the asymmetric channel and the unstable channel. Compared with the existing results of independent constraints, our result here improves the key rate by 1 to tens of times in typical experimental conditions.

Entities:  

Year:  2018        PMID: 30518943      PMCID: PMC6281621          DOI: 10.1038/s41598-018-35507-z

Source DB:  PubMed          Journal:  Sci Rep        ISSN: 2045-2322            Impact factor:   4.379


Introduction

Quantum key distribution (QKD) provides the communication users with secure keys to encrypt their information. Bennett and Brassard proposed BB84 protocol[1] to realize QKD, but the lack of practical single-photon sources limited the use of origin BB84 protocol. BB84 protocol with imperfect single-photon sources would suffer from the photon-number-splitting (PNS) attack[2-4]. This loophole can be fixed by the decoy-state method[5-8]. With the decoy-state method, QKD can be used in the practical system between users with longer distace[9-11]. After that, measurement-device-independent QKD (MDIQKD) was proposed to avoid any loophole from the imperfect detection devices[12-15]. Combined with decoy-state method, MDIQKD can also avoid the loophole from the imperfect single-photon sources[15,16]. Nowadays, the decoy-state MDIQKD has become the mainstream of the studies of quantum key distribution both theoretically[16-29] and experimentally[30-43]. Various numerical models and optimization methods[21-24] have improved the key rate and secure distance a lot. The numerical model by Xu et al.[21] can apply to the case of asymmetrical channel rather precisely. The maximum distance of MDIQKD has been experimentally increased to 404 kilometers[38] using the 4-intensity protocol[24] with joint constraints for statistical fluctuations[23]. Another experiment exceeding 400-kilometer distance applying the decoy-state method but not using MDIQKD scheme was reported recently[43]. In the scheme of decoy-state MDIQKD, at each time the user Alice (Bob) randomly chooses her (his) basis, bit value and intensity to send a pulse in a corresponding state, e.g. BB84 state in a polarization-coding MDIQKD, to an untrusted third party (UTP) Charlie. Charlie performs a collective measurement on each pulse pair and announces the measurement result in the public channel. After Charlie announces the measurement results, Alice and Bob announce the bases and intensities they use. Based on all announcement, Alice and Bob can calculate the yield and the error rate of single-photon pulse pairs, and then distill the secure key. For the practical applications, the asymmetric and unstable channels are common cases both in fiber and free space. For example, when we consider the quantum network, due to the different geographical locations of users, the channel losses can be largely different. And if we want implement MDIQKD in free space, the channels are always asymmetric and unstable too, due to the atmospheric turbulence or moving sites (such as the satellite). Although the security of MDIQKD doesn’t make any assumption to the channel, the unstable and/or asymmetric quantum channel decreases the key rate quite a lot. Therefore, directly applying the optimized parameters for symmetric channel does not give a good performance in an asymmetric channel or an unstable channel. Here, we propose full optimization of four-intensity decoy-state MDIQKD protocol to largely increase the key rate in asymmetric channels than existing results of partial optimization. For full optimization, we mean: (1) Using 12 independent parameters, (2) Applying joint constraints[23,24] for statistical fluctuations. If one only use one of the above two operations, that is partial optimization. Moreover, a loss-compensation method is presented with optimization to increase the performance of MDIQKD in unstable channels.

Results

Four-intensity decoy-state MDIQKD

Among all existing protocols of decoy-state MDIQKD, the 4-intensity protocol seems to be the most efficient one[24] which has been extensively verified experimentally[37-40]. As was stated in the four-intensity decoy-state method in Ref.[24], Alice and Bob each uses 4 different intensities, including one vacuum. This means in general, there are 7 different intensities for both sides with 6 independent parameters for non-vacuum intensities. Together with the frequencies of using each intensities, there are 12 independent parameters in general in the protocol. Also, the four-intensity protocol suggests using the joint constraints in statistical fluctuation of different observable[23,24]. A full implementation of the four-intensity protocol means doing optimization among all those 12 parameters with joint constraints fully. Explicitly, in the four-intensity decoy-state method in ref.[24], Alice (Bob) uses a source z (z) with intensity μ (μ) that only emits photons in the Z basis, two sources x and y (x and y) with intensities μ and μ (μ and μ) that only emit photons in the X basis and a vacuum source o (o) that only emits vacuum pulses. At each time, Alice (Bob) randomly chooses a source in the four sources above to send a pulse, with probability . So we call it “four-intensity protocol”. The key rate of the decoy-state MDIQKD is given by:where a and b are the fraction of single photons of sources z and z, and are the bound of yield and phase-flip error rate of single-photon pulse pairs which can be obtained by the decoy-state method, S and E are yield and bit-flip error rate when Alice and Bob both send pulses with source z/z, is the binary entropy function and f is the correction efficiency. Details for calculation of the key rate can be found in the appendix.

Optimization of source parameters

In the numerical simulation, we will estimate what values we would observe for the yields and error rates in a certain model and use these values to calculate the key rate. Given the properties of the channel and the detection devices, we can regard the key rate as a function of source parameters: If we use weak coherent state sources, the relation between the intensity μ and the photon number distribution is . In the calculation of the key rate, we need to take the joint fluctuation and the scan of (the definition of is in the appendix) into consideration. In addition, the number of parameters we need to optimize is large, which means the parameter space is very huge. Therefore, normal optimization method costs a lot of time. We should improve the optimization method to get the optimal parameters quickly. Firstly, we consider the “gradient” of the key rate function[29]: In the case that both (x + Δx, x) and (x − Δx, x) are less than (x, x), we set . Withwe can find the direction that key rate increases the fastest and get close to the optimal parameters quickly. To avoid the case that the optimal parameters are the local optimal point, which satisfies (x + Δx, x) ≤ (x, x) for any k but is not the maximum point in the whole area, we search the points in the nearby area to see whether there is higher key rate. Accurately, we calculate the key rate (x + δΔl); δ = −1, 0, 1; k = 1, …, 12 with a certain Δl. If there are some points with higher key rate, we jump to the point with highest key rate in the nearby area and execute the above procedure again. In our simulation, we found that in most cases, the gradient method brings us to the optimal point. But in some cases, it brings us to the local optimal point.

Loss-compensation method

For the case of unstable channel, according to our MDIQKD protocol, all source parameters should be determined before the QKD process and fixed during the QKD process. Even though we can detect the channel transmittance η at any time, we cannot change the source parameters to optimize the key rate at real time. The decoy state method requests that the intensities of pulses must be fixed. Say, switching among 3 fixed intensities. If one change the intensities beyond these 3 intensities, or change the intensities non-randomly, the result of the decoy-state method will be invalid. With the fixed source parameters μ and μ and unstable channel transmittance η(t) and η(t), which means the transmittance changes dependently on time, there are always some cases that the intensities at the two sides of Charlie’s beam splitter deviate a lot, saying that at some time t, μη(t) and μη(t) deviate a lot. These cases will give a quite high error rate that decreases the key rate a lot. First we consider the case with stable channel that satisfies μη > μη. In an asymmetric channel, if one attenuates one path, the channel will become symmetric and the detected error rate will be small. However, in such a case, the amount of detected bits is also decreased and the final key rate is not necessarily improved. If we add extra loss to the channel between Alice and Charlie, we can get a better key rate. Given the transmittance and the intensities of sources, the specific value of can be determined by numerical simulation. Then we come to the case with unstable channel. Technically, the channel loss cannot be changed too fast. Otherwise the physical compensation cannot be made instantaneously. We assume that the transmittance remains unchanged during each time window, which means the transmittance doesn’t fluctuate too rapidly. Suppose that we are given the transmittance distribution and and fixed μ, μ. A general loss-compensation method is to add different extra loss  < 1 to Alice’s or Bob’s channel for different transmittance pair and we can determine the optimal value of each for each pair. But in practice, the optimization of so many variables is out of any computer’s ability. So we keep only one extra loss and raise a variable δ. When the transmittance pair satisfies , Charlie should add the extra loss to the channel between Alice and Charlie. When the transmittance pair satisfies , Charlie should add the extra loss to the channel between Bob and Charlie. In other cases, Charlie doesn’t have to add any extra loss to the channel. We can use numerical simulation, combined with optimization of source parameters, to determine the values of and δ to get the best key rate when given a specific transmittance distribution. In the simulation of the unstable channel, suppose that we have the transmittance distribution , and the corresponding probability , . We can calculate the “transmittance pair distribution” and the corresponding probability . With a certain source pair lr and a certain transmittance pair , the observed yield and the observed error rate can be calculated as in ref.[44] theoretically. Then the yield and the error rate in the whole process can be calculated byand When the loss-compensation is performed, we can calculate the S, E in the same way except the (ij)-th transmittance pair is changed into if , or if .

Numerical simulation

First we consider the case that the channel is stable but asymmetric. We shall estimate what values would be probably observed for the yields in the normal cases by the linear models[15,21,22] and the errors in X basis by the useful model for misalignment error under asymmetric channel in ref.[21]. We show the optimized key rate in some asymmetric cases in Fig. 1 and some results in certain distances in Table 1, in comparison with the results of independent bounds in ref.[45], with device parameters in Table 2. From Fig. 1, we can find that with full implementation of the four-intensity MDIQKD and full optimization of the source parameters, quite good key rate can be achieved. In particular, we have taken the joint constraints[23,24] for statistical fluctuations, this affects the key rate significantly. Taking joint constraints will consume some more computational time. The computation can be done very fast if we apply formulas of refs[23,24] rather than the linear programming. In our numerical simulation, we have already overcome the problem of unpredictable behavior such as jitters[45]. Actually, the computational time seems not to be a major issue for the practical application. In the application for the unstable channel, one can choose to test the channels and do the optimization for the major loss values of the changing channel before running the protocol.
Figure 1

Optimized key rate versus the total distance between Alice and Bob in asymmetric channel with the device parameters in Table 2.

Table 1

Optimized key rate at different distances in asymmetric channel with the parameters in Table 2.

LA(km)LB(km)Optimized key rate per pulse pair
oursRef.[45]
10606.299 × 10−53.106 × 10−5
43933.151 × 10−71 × 10−8
501006.576 × 10−84.786 × 10−11
30603.117 × 10−51.445 × 10−5
59.389.32.972 × 10−71 × 10−8
701002.490 × 10−80
Table 2

Device parameters for Table 1.

N t η d d \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{\boldsymbol{E}}}_{{\boldsymbol{d}}}^{{\boldsymbol{X}}}$$\end{document}EdX \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{\boldsymbol{E}}}_{{\boldsymbol{d}}}^{{\boldsymbol{Z}}}$$\end{document}EdZ f ε
101165%8 × 10−70.5%0.5%1.1610−7

N: total number of pulse pairs; η: detection efficiency of the detectors; d: dark count rate of the detectors; /: misalignment error rate in the X/Z basis; f: correction efficiency; ε: failure probability for statistical fluctuation evaluation between observable and the mean value.

Optimized key rate versus the total distance between Alice and Bob in asymmetric channel with the device parameters in Table 2. Optimized key rate at different distances in asymmetric channel with the parameters in Table 2. Device parameters for Table 1. N: total number of pulse pairs; η: detection efficiency of the detectors; d: dark count rate of the detectors; /: misalignment error rate in the X/Z basis; f: correction efficiency; ε: failure probability for statistical fluctuation evaluation between observable and the mean value. Then for the unstable channel, we consider a simple case that  dB,  dB with probability for i, j = 1, …, 5 (Here the detector’s efficiency is contained in the total loss). We show the key rate with different δ and with source parameters optimized in Table 3.
Table 3

Optimized key rate with different δ and in unstable channel with the parameters in Table 2.

δ(dB)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\tilde{\eta }^{\prime} $$\end{document}η˜(dB)Optimized key rate per pulse pair
001.7747 × 10−6
−751.5229 × 10−6
−8.54.52.2279 × 10−6
−8.7542.2217 × 10−6
−8.754.52.2283 × 10−6
−8.7552.2184 × 10−6
−94.52.2278 × 10−6
Optimized key rate with different δ and in unstable channel with the parameters in Table 2. The case that δ =  = 0 dB is equal to that we don’t perform the loss-compensation method. In the second line of Table 3, we can see that an improper loss-compensation (δ = −7 dB and  = 5 dB) will decrease the key rate. We can find that in this transmittance distribution, setting δ = −8.75 dB and  = 4.5 dB can maximize the key rate in our loss-compensation method.

Discussion

We propose a full implementation of four-intensity decoy-state MDIQKD. Even if the channels between the users and UTP are asymmetric, our four-intensity protocol still has a good performance. We also propose a loss-compensation method. This method can improve the key rate a lot in unstable channel.

Method: calculation of the key rate

Asymptotic case

We define the yield, the error yield and the error rate as follow. Consider a pulse pair set , which contains pulse pairs totally. These pairs cause effective counts and error counts. In this case, the yield , the error yield and the error rate . In photon number space, the density matrices of the pulses from the sources can be written asand We assume that the states above satisfy these conditions:for k > 2, so that the decoy-state results can apply. Familiar sources used in practice, such as weak-coherent-state sources and heralded single-photon sources out of the parametric-down conversion, satisfy the conditions above. In the following, we will omit the subscript A and B in l and r if it doesn’t cause confusion. A pulse pair of lr is a pair where Alice’s pulse is from l and Bob’s pulse if from r. The two-mode source lr emits all lr pairs. The main idea of decoy state is that the yield of |m〉|n〉 photon pairs from different source pairs should be the same in the asymptotic case, which means Using Eq. (10) and the convex form of yield of lr source pairswe can calculate the lower bound of the yield of single-photon pairs:whereand Eq. (12) holds when In the case of K > K, the lower bound of s11 can be calculated with Eqs (12–15) by making exchange between a and b, and exchange between a and b, for k = 1, 2. Similarly, we can calculate the upper bound of phase-flip error rate of single-photon pairs: With and , we can calculate the key rate with Eq. (1).

Nonasymptotic case

In the nonasymptotic regime, we should consider the statistical fluctuation of the observable, e.g. the difference between observed values and mean values. Given a failure probability ε, the observed value of an observable of a set and its mean value satisfy: If we perform a standard error analysis, Δ can be given bywhere is the number of elements in set and γ = 5.3 given the failure probability ε = 10−7. According to the idea of joint constraints of statistical fluctuation[23], the set can be either all pulse pairs from a source pair, or the combination of all pulse pairs from different source pairs. Taking all these joint constraints into consideration, the bound of 〈s11〉 and can be calculated tighter. As a joint term in and , should fluctuate jointly in Eq. (12) and Eq. (17), instead of taking the worst case independently[24]. We regard R as a function of , scan in its possible range and take the minimum R as the final key rate:

Method: verifying the global optimization

When we search the points in the nearby area in our optimization algorithm, we can change the parameter Δl in our programme. In the cases with different Δl, e.g. Δl = 0.1, 0.001, 0.0001…, we obtain almost the same optimized results. We make another test that to each point, we start from many sets of different initial values of parameters. We then obtain almost the same results for the optimized parameters. These strongly indicate that our result is indeed the globally optimized result.
  21 in total

1.  Quantum key distribution with high loss: toward global secure communication.

Authors:  Won-Young Hwang
Journal:  Phys Rev Lett       Date:  2003-08-01       Impact factor: 9.161

2.  Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution.

Authors:  Chao Wang; Xiao-Tian Song; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Chun-Mei Zhang; Guang-Can Guo; Zheng-Fu Han
Journal:  Phys Rev Lett       Date:  2015-10-15       Impact factor: 9.161

3.  Decoy state quantum key distribution.

Authors:  Hoi-Kwong Lo; Xiongfeng Ma; Kai Chen
Journal:  Phys Rev Lett       Date:  2005-06-16       Impact factor: 9.161

4.  Beating the photon-number-splitting attack in practical quantum cryptography.

Authors:  Xiang-Bin Wang
Journal:  Phys Rev Lett       Date:  2005-06-16       Impact factor: 9.161

5.  Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.

Authors:  Qin Wang; Wei Chen; Guilherme Xavier; Marcin Swillo; Tao Zhang; Sebastien Sauge; Maria Tengner; Zheng-Fu Han; Guang-Can Guo; Anders Karlsson
Journal:  Phys Rev Lett       Date:  2008-03-05       Impact factor: 9.161

6.  Quantum cryptography with coherent states.

Authors: 
Journal:  Phys Rev A       Date:  1995-03       Impact factor: 3.140

7.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

Authors:  Ilja Gerhardt; Qin Liu; Antía Lamas-Linares; Johannes Skaar; Christian Kurtsiefer; Vadim Makarov
Journal:  Nat Commun       Date:  2011-06-14       Impact factor: 14.919

8.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

Authors:  Zhiyuan Tang; Zhongfa Liao; Feihu Xu; Bing Qi; Li Qian; Hoi-Kwong Lo
Journal:  Phys Rev Lett       Date:  2014-05-14       Impact factor: 9.161

9.  Finite-key analysis for measurement-device-independent quantum key distribution.

Authors:  Marcos Curty; Feihu Xu; Wei Cui; Charles Ci Wen Lim; Kiyoshi Tamaki; Hoi-Kwong Lo
Journal:  Nat Commun       Date:  2014-04-29       Impact factor: 14.919

10.  Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources.

Authors:  Qin Wang; Xing-Yu Zhou; Guang-Can Guo
Journal:  Sci Rep       Date:  2016-10-19       Impact factor: 4.379

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.