Literature DB >> 33267046

Simultaneous Classical Communication and Quantum Key Distribution Based on Plug-and-Play Configuration with an Optical Amplifier.

Xiaodong Wu1, Yijun Wang1, Qin Liao1, Hai Zhong1, Ying Guo1,2.   

Abstract

We propose a simultaneous classical communication and quantum key distribution (SCCQ) protocol based on plug-and-play configuration with an optical amplifier. Such a protocol could be attractive in practice since the single plug-and-play system is taken advantage of for multiple purposes. The plug-and-play scheme waives the necessity of using two independent frequency-locked laser sources to perform coherent detection, thus the phase noise existing in our protocol is small which can be tolerated by the SCCQ protocol. To further improve its capabilities, we place an optical amplifier inside Alice's apparatus. Simulation results show that the modified protocol can well improve the secret key rate compared with the original protocol whether in asymptotic limit or finite-size regime.

Entities:  

Keywords:  classical communication; optical amplifier; plug-and-play configuration; quantum key distribution; simultaneous

Year:  2019        PMID: 33267046      PMCID: PMC7514817          DOI: 10.3390/e21040333

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

Quantum key distribution (QKD) is one of the most active areas in quantum information science, which promises to generate a secure key between two authenticated parties (Alice and Bob) over insecure quantum and classical channels [1,2,3,4]. The security of a key is guaranteed by the fundamental laws of quantum mechanics [5,6]. Generally speaking, there are two main approaches for the implementation of QKD, namely, discrete-variable (DV) QKD [7] and continuous-variable (CV) QKD [8,9,10,11]. Different from the DVQKD, in CVQKD, there is no requirement to use expensive single-photon detectors. Instead, the key bits are encoded in the quadrature variables (X and P) of the optical field, and the secret key bits are decoded through high-efficiency homodyne or heterodyne detection techniques [12,13,14,15]. At present, the CVQKD protocol, especially for the Gaussian-modulated coherent-state (GMCS) scheme, has been demonstrated over 100-km telecom fiber through controlling excess noise [16] and designing high-efficiency error correction codes [17,18,19]. From a practical point of view, the hardware needed in the implementation of the GMCS QKD is amazingly similar to that needed in classical coherent optical communication [20]. On the basis of this similarity, it is viable to take advantage of the same communication facility for both QKD and classical communication. Recently, a simultaneous classical communication and quantum key distribution (SCCQ) scheme was proposed [21,22]. In this scheme, the Gaussian distributed random numbers for GMCS QKD and bits for classical communication are encoded on the same weak coherent pulse and decoded through the same coherent receiver, which provides a more cost-effective solution in practice. However, a major obstacle to the SCCQ scheme is that it can only tolerate a very small amount of phase noise [21]. This problem could lead to poor performance and thus obstruct its further development. In this paper, we propose a SCCQ protocol based on plug-and-play configuration with an optical amplifier. Different from the GMCS QKD protocols using a true local oscillator (LO) [23,24,25], the plug-and-play CVQKD scheme waives the necessity of using two independent frequency-locked laser sources and automatically compensating the polarization drifts [26]. Since the LO and signal pulses are generated from the same laser source, we can obtain a small phase noise which can be tolerated by the SCCQ protocol in the framework of plug-and-play configuration. To further improve its capabilities, we insert an optical amplifier (OA) at the output of the quantum channel [27,28,29]. The modified protocol (SCCQ protocol based on plug-and-play configuration with an OA) can well increase the secret key rate by compensating the imperfection of Alice’s detector with only little cost in transmission distance. Here, both the asymptotic limit and the finite-size regime are taken into consideration. This paper is structured as follows. In Section 2, we first introduce the plug-and-play dual-phase modulated coherent states (DPMCS) scheme, then present the model of SCCQ protocol based on plug-and-play configuration and the proposed modified protocol. In Section 3, we perform the noise analysis and show numeric simulations in view of practical system parameters. Finally, conclusions are drawn in Section 4. Detailed calculation of equations is shown in the Appendix.

2. Protocol Description

In this section, we first introduce the plug-and-play DPMCS protocol. Then, we present the model of SCCQ protocol based on the plug-and-play configuration and its modified protocol (with OA). To simplify the analysis, we adopt the binary phase-shift keying (BPSK) modulation for the classical communication and the GMCS for QKD protocol in this paper.

2.1. The Plug-and-Play DPMCS Protocol

The prepare-and-measurement scheme of plug-and-play DPMCS protocol is illustrated in Figure 1. The source of light is sent from Alice to Bob, then Bob performs the dual-phase-modulation work after receiving the light. During the modulated process, random numbers drawn from a random number generator are utilized to modulate the amplitude and phase quadrature (X and P quadrature). This is really different from previous one-way CV-QKD protocols where the symmetrical Gaussian modulation is performed at Alice’s side. When Bob completes the modulation work, the dual-quadrature modulated coherent-state is directly reflected to Alice with the help of Faraday mirrors. After passing through the untrusted channel characterized by transmittance T and excess noise , Alice receives the modulated signal. Then, she performs homodyne detection to measure the incoming mode. After this, Alice can obtain the list of data which is correlated with the list of Bob. Note that this correction is important in generating a secret key through error reconciliation and privacy amplification. Here, the classical source mentioned above is controlled by Fred [26]. Besides, the untrusted source noise is characterized by taking advantage of a phase-insensitive amplifier (PIA) with a gain of g. In such a practical scheme, the detector used by Alice features an electronic noise and an efficiency . Therefore, the detector-added noise referred to Alice’s input can be expressed as .
Figure 1

The prepared-and-measure scheme of plug-and-play dual-phase modulated coherent states (DPMCS) protocol. (a) Gaussian modulation scheme by using two phase modulators. PIA, phase insensitive amplifier; RNG, random number generator; PM, phase modulator; FM, Faraday mirror.

2.2. SCCQ Protocol Based on Plug-and-Play Configuration

In the BPSK modulation scheme, the bit value is encoded by , where is a real number. While, in plug-and-play DPMCS protocol, Bob prepares coherent state and transmits it to Alice. Here and are assumed to be Gaussian random numbers with zero mean and a variance of , where represents the shot-noise variance. The SCCQ protocol based on plug-and-play configuration is straightforward and combines these two communication schemes. Namely, as shown in Figure 2, both the classical bit and Gaussian random numbers are encoded on a coherent state . It is remarkable that in the plug-and-play DPMCS protocol, Alice performs homodyne detection to measure either the X or P quadrature of each incoming signal. In order to obtain deterministic classical communication, the same classical bit should be encoded on both X and P quadratures.
Figure 2

Simultaneous classical communication and quantum key distribution (SCCQ) protocol based on plug-and-play configuration. The probability distributions of X-quadrature measurement is shown at Alice’s side.

Suppose Alice measures the X quadrature (P quadrature) and obtains the measurement result (). The sign of () can be utilized to determine a classical bit . In other words, the value of is assigned as 0 if () > 0 and the value of is assigned as 1 if () < 0. Note that according to the overall transmittance and the value of , Alice’s measurement result can be rescaled and displaced to generate a secure key, which is given by On the basis of the raw keys and , Alice and Bob can distill a secure key by proceeding with classical data postprocessing, as in the case of traditional GMCS QKD. The prepare-and-measurement (PM) version of our protocol shown above is equivalent to the entanglement-based (EB) version. In the EB scheme, Fred prepares a three-mode entanglement state . Bob keeps one mode (B) with variance and measures it by using a heterodyne detector. The other mode () is sent to Alice through an untrusted quantum channel. At Alice’s side, a beam splitter with transmission is taken advantage of to model her detector inefficiency, while an EPR state of variance is utilized to model its electronics. For the homodyne detection case, we have . Finally, to distill the secret key, Alice and Bob perform information reconciliation and privacy amplification procedures. Here, we mainly consider the reverse reconciliation since it has been proved to provide a great advantage in performance of QKD schemes [11].

2.3. Addition of an Optical Amplifier

In practice, becuase of some inherent imperfection inevitably existing in Alice’s detection apparatus, the ideal detection process cannot be achieved. Therefore, we can only obtain a lower secret key rate than expected. In order to improve the performance of our protocol, here, an optical amplifier is applied to compensate for the detectors’ imperfections. In the following, two types of amplifiers are considered, namely, the phase-sensitive amplifier (PSA) and phase-insensitive amplifier (PIA). Phase-sensitive amplifier. The PSA can be deemed as a degenerate amplifier which allows ideally noiseless amplification of a chosen quadrature. We use a matrix to describe its properties, which is given by where G represents the gain of amplification and . Phase-insensitive amplifier. The PIA can be regarded as a non-degenerate amplifier, which is able to amplify both quadratures symmetrically. Different from the PSA, the amplification process of the PIA is related to the inherent noise. The transform of the PIA can be modeled as The inherent noise of the PIA can be given by where g is the gain of the PIA and stands for variance of noise. We have introduced the PIA in the above analysis. Different from the PIA which is inserted into the output of the quantum channel in our protocol, the PIA is placed at the channel to characterize the untrusted source noise. That is to say the gain g of the PIA can be used to weight the source noise in the plug-and-play scheme. As illustrated in Figure 3, after the amplification process, mode is measured using Alice’s detector. A beam splitter with transmission is taken advantage of to model her detector inefficiency. Besides, an EPR state of variance is utilized to model its electronics. It is worth mentioning that we adopt homodyne detection in our scheme, thus it is suitable for us to choose the PSA to compensate for Alice’s apparatus imperfection [27,28]. Then, the modified parameter for this case is given by
Figure 3

Schematic diagram of the modified protocol (SCCQ protocol based on plug-and-play configuration with an optical amplifier).

Consequently, we can achieve the modified secure key rate by substituting for in homodyne detection case.

3. Performance Analysis and Discussion

The noises which originated from the practical system have important effects on the performance of the SCCQ protocol. In this section, we first introduce the noise model which we adopt in this paper and present the computation of the BER in BPSK modulation scheme. Then, we show and discuss the simulation results.

3.1. Noise Model of SCCQ Protocol Based on Plug-and-Play Configuration

Note that the main noise sources analyzed here are (1) the detector noise assumed as , (2) the vacuum noise, (3) the excess noise due to the untrusted sources denoted by , (4) excess noise caused by Rayleigh backscattering photons, (5) the Gaussian modulation for QKD with a variance of . All the noises mentioned above are defined in the shot-noise unit. Now let’s calculate the BER of the BPSK modulation scheme, which is expressed by [21] where represents the complementary error function. In order to make the value of BER small enough in the classical channel, namely, obtain a BER of , the displacement is required as The numerical simulations of the required displacement as a function of the transmission distance and modulation variance are illustrated in Figure 4. It shows that the longer transmission distance needs a larger displacement for a typical modulation variance in the range of 1 to 20.
Figure 4

The required displacement as a function of modulation variance and transmission distance to obtain a BER of in the classical channel. Parameters , , and .

The untrusted source noise is deemed to be one of the most important excess noises in the plug-and-play configuration. It can be expressed as , where g is a gain of a PIA and is the noise variance of a vacuum state . That is to say, the untrusted source noise can be weighted by parameter g. The other excess noise we need to consider here is , which is caused by Rayleigh backscattering photons. Since the reflected light in the plug-and-play configuration is of the same frequency as the initial laser source, we cannot use the “in-band” photon to filter or attenuate it. The excess noise is given by where is Rayleigh backscattering photons. Then, the backscattered photons per second is expressed as [30] where stands for the the Rayleigh backscattering coefficient, represents the insertion loss inside Bob (round-trip), R represents the system repetition rate, is a fiber loss, and L is the length of an infinite fiber used as a QKD link. Under the assumption that the electronic integral time of Alice’s homodyne detector is , the excess noise can be rewritten as Note that Equation (10) shows the excess noise which is caused by the quantum channel, namely, here can be used to represent . In the following, we perform an analysis of the effect of phase noise, which commonly exists in a coherent communication system. The excess noise caused by the phase instability is given by where represents the phase-noise variance. Here Equation (11) is derived with the assumption of [21]. It is worth mentioning that the excess noise not only contains the phase noise between the signal and the LO but also the other modulation errors. On the basis of the above analysis, the overall excess noise outside Alice’s system can be defined as Note that excess noises and are independent of .

3.2. Simulation Results

In Figure 5, we conduct numerical simulations of the asymptotic secret key rate as a function of transmission distance in different imperfect source scenarios. Note that means no source noise case. We adopt the optimal value of modulation in the analysis (see Appendix A). Here, the solid lines in Figure 5 stand for the case of the original protocol (), while the dashed lines represent the case of the modified protocol (a protocol with homodyne detection and a PSA, G = 3). On the one hand, we observed that for each imperfect source scenario, the secret key rate is well improved within a relatively long distance by utilizing an optical preamplifier. On the other hand, we also found that the maximum secure distance of the modified protocol is slightly shorter compared with the original protocol. That is to say, by utilizing the optical amplifier, the secret key rate of the modified protocol increases in a large range of distance with a slight cost of the maximum transmission distance. It is remarkable that the PLOB bound has been plotted in Figure 5, which illustrates the ultimate limit of point-to-point QKD [31]. Here, we should note that the phase noise in our protocol is very small since the LO and signal pulses are generated from the same laser source in the plug-and-play scheme. Therefore, we can achieve the phase noise . Detailed calculation of the asymptotic secret key rate is shown in Appendix B.
Figure 5

Comparison of secret key rate between the modified protocol (homodyne detection with phase-sensitive amplifier (PSA)) and the original protocol (without PSA) under different imperfect source scenarios. Solid lines represent the original protocol (G = 1) while the dashed lines represent the modified protocol (G = 3). From left to right, the green curves correspond to , the black curves correspond to , the red curves correspond to , and the blue curves correspond to (no source noise). The simulation parameters are , , , , .

In addition, it is necessary to consider the finite-size effect since the length of secret key is impossibly unlimited in practice. Different from the asymptotic case, in the finite-size scenario, the characteristics of the quantum channel cannot be known before the transmission is performed. The reason is that a portion of the exchanged signals needs to be taken advantage of for parameter estimation instead of generating the secret key. We conduct numerical simulations of the finite-size secret key rate in different imperfect source scenarios, as shown in Figure 6. The solid lines in Figure 6 stand for the case of the original protocol (), while the dashed lines represent the case of the modified protocol (G = 3). From left to right, the green curves, the black curves, and the red curves correspond to the finite-size scenario of block length , , and , respectively, and the blue curves represent the asymptotic scenario. Here, Figure 6a–d show the proposed protocol with (no source noise), , , and . We observe that the performance of the asymptotic scenario is better than that of the finite-size scenario whether the PSA is placed at Alice’s detection apparatus or not. Furthermore, the curves of the finite-size scenario are more and more close to the curve of asymptotic case with the increased number of exchanged signals N. That is to say that the more exchanged signals we have, the more the signal parameter estimation step can be utilized, and thus the parameter estimation is approaching perfection. Interestingly, for each imperfect source scenario, the finite-size secret key rate of the modified protocol is well improved without the price of reducing the maximum transmission distance, especially for the small-length block, compared with the original protocol, which is different from the asymptotic case. Detailed calculation of finite-size secret key rate is shown in Appendix C.
Figure 6

Finite-size secret key rate of SCCQ protocol based on plug-and-play configuration with PSA as a function of transmission distance under different imperfect source scenarios. Solid lines represent the original protocol (G = 1) while the dashed lines represent the modified protocol (G = 3). From left to right, the green curves, the black curves, and the red curves correspond to finite-size scenario of block length , , and , respectively, and the blue curves represent the asymptotic scenario. (a) The parameter (no source noise). (b) The parameter . (c) The parameter . (d) The parameter . Other parameters are set to be the same as Figure 5.

4. Conclusions

We propose a SCCQ protocol based on plug-and-play configuration with an optical amplifier. Benefiting from the plug-and-play scheme where a real local LO is generated from the same laser of quantum signal at Alice’s side, the phase noise existing in our protocol is very small, which can be tolerated by the SCCQ protocol. Therefore, our research may bring the SCCQ technology into real life and thus reduce the cost of QKD effectively. To further improve its capabilities, we inserted an optical amplifier inside Alice’s apparatus. The simulation results show that the secret key rate is greatly enhanced in a large range of distances for each imperfect source scenario in both asymptotic limit and finite-size regime compared with the original protocol.
  13 in total

1.  Continuous variable quantum cryptography using coherent states.

Authors:  Frédéric Grosshans; Philippe Grangier
Journal:  Phys Rev Lett       Date:  2002-01-16       Impact factor: 9.161

2.  Simple proof of security of the BB84 quantum key distribution protocol

Authors: 
Journal:  Phys Rev Lett       Date:  2000-07-10       Impact factor: 9.161

3.  Quantum key distribution using gaussian-modulated coherent states.

Authors:  Frédéric Grosshans; Gilles Van Assche; Jérôme Wenger; Rosa Brouri; Nicolas J Cerf; Philippe Grangier
Journal:  Nature       Date:  2003-01-16       Impact factor: 49.962

4.  High-speed continuous-variable quantum key distribution without sending a local oscillator.

Authors:  Duan Huang; Peng Huang; Dakai Lin; Chao Wang; Guihua Zeng
Journal:  Opt Lett       Date:  2015-08-15       Impact factor: 3.776

5.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.

Authors:  R Renner; J I Cirac
Journal:  Phys Rev Lett       Date:  2009-03-19       Impact factor: 9.161

6.  Entanglement swapping between discrete and continuous variables.

Authors:  Shuntaro Takeda; Maria Fuwa; Peter van Loock; Akira Furusawa
Journal:  Phys Rev Lett       Date:  2015-03-09       Impact factor: 9.161

7.  Field demonstration of a continuous-variable quantum key distribution network.

Authors:  Duan Huang; Peng Huang; Huasheng Li; Tao Wang; Yingming Zhou; Guihua Zeng
Journal:  Opt Lett       Date:  2016-08-01       Impact factor: 3.776

8.  High speed error correction for continuous-variable quantum key distribution with multi-edge type LDPC code.

Authors:  Xiangyu Wang; Yichen Zhang; Song Yu; Hong Guo
Journal:  Sci Rep       Date:  2018-07-12       Impact factor: 4.379

9.  Long-distance continuous-variable quantum key distribution by controlling excess noise.

Authors:  Duan Huang; Peng Huang; Dakai Lin; Guihua Zeng
Journal:  Sci Rep       Date:  2016-01-13       Impact factor: 4.379

10.  Fundamental limits of repeaterless quantum communications.

Authors:  Stefano Pirandola; Riccardo Laurenza; Carlo Ottaviani; Leonardo Banchi
Journal:  Nat Commun       Date:  2017-04-26       Impact factor: 14.919

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.