| Literature DB >> 35961965 |
Nitin Jain1, Hou-Man Chin2,3, Hossein Mani2, Cosmo Lupo4,5, Dino Solar Nikolic2, Arne Kordts2, Stefano Pirandola6, Thomas Brochmann Pedersen7, Matthias Kolb8, Bernhard Ömer8, Christoph Pacher8, Tobias Gehring9, Ulrik L Andersen10.
Abstract
A quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure. Furthermore, the theoretical proof responsible for security analysis and key generation should cater to the number N of the distributed quantum states being finite in practice. Continuous-variable (CV) QKD based on coherent states, despite being a suitable candidate for integration in the telecom infrastructure, has so far been unable to demonstrate composability as existing proofs require a rather large N for successful key generation. Here we report a Gaussian-modulated coherent state CVQKD system that is able to overcome these challenges and can generate composable keys secure against collective attacks with N ≈ 2 × 108 coherent states. With this advance, possible due to improvements to the security proof and a fast, yet low-noise and highly stable system operation, CVQKD implementations take a significant step towards their discrete-variable counterparts in practicality, performance, and security.Entities:
Year: 2022 PMID: 35961965 PMCID: PMC9374721 DOI: 10.1038/s41467-022-32161-y
Source DB: PubMed Journal: Nat Commun ISSN: 2041-1723 Impact factor: 17.694
Fig. 1Composability in continuous-variable quantum key distribution (CVQKD) with coherent states.
Alice and Bob obtain quantum correlations over the quantum channel by means of modulation (MOD) and local oscillator (LO) aided homodyne/heterodyne detection (HD) to prepare and measure, respectively, optical coherent states. After going through the remaining steps of the protocol that involve the authenticated channel, they obtain correlated bitstreams s and s, respectively. Certain criteria associated with correctness, robustness, and secrecy of the protocol must be satisfied, for the application to assure composable security[7,10]. For instance, ϵ-correctness implies that Alice and Bob possess the same symmetric key s( = s = s) except with a probability ϵcor that bounds the probability of them having non-identical keys (Pr[s ≠ s]≤ϵcor). This key can be used for encrypting a message and decrypting the corresponding ciphertext across the communication channel. Dashed lines with arrows indicate classical communication across the channel and local operations. Eve is assumed to control all the channels. Further details of our CVQKD protocol implementation are presented in later sections of this article.
Fig. 2Schematic of the experiment.
The transmitter (Tx) and receiver (Rx) were built from polarization maintaining fiber components. The transmitter comprised a 1550 nm continuous-wave laser (Tx laser), an in-phase and quadrature electro-optic modulator (IQmod) with automatic bias controller (ABC) for carrier suppression and single sideband modulation, and a variable attenuator (VATT) and Faraday isolator (FI). An arbitrary waveform generator (AWG) with 16 bit resolution and sampling rate of 1 GSps supplied waveforms RF1 and RF2 for driving IQmod. A quantum random number generator (QRNG) delivered Gaussian-distributed symbols for discrete Gaussian modulation of coherent states. The receiver comprised a laser (Rx laser; same type as Tx laser), a polarization controller (PC) to tune the incoming signal field's polarization, a symmetric beam splitter followed by a homemade balanced detector for RF heterodyning. The detector's output was sampled by a 16 bit analog-to-digital converter (ADC) at 1 GSps. BS: beam splitter, PD: photo detector. Left inset: Power spectrum of the complex waveform RF1 + ι RF2 driving the IQmod. Right inset: Power spectra of the receiver from 3 different measurements described in section “Experimental implementation”. The noise peak at 250 MHz is an interleaving spur of the ADC.
Comparison of notable parameters from prepare-and-measure QKD experiments conducted in the last decade with similar physical channels, as indicated by the column showing loss and length
| Protocol implementation keywords | Loss/ Length [dB/km] | SKF [bits/symbol] | ||||||
|---|---|---|---|---|---|---|---|---|
| Huang et al. (ref. | CV, Gaussian, Homodyne via RLO | 5.0/25.0 | 2.00 | 0.025* | 100 | 0.02 | 0.0010* | |
| Xu et al. (ref. | DV, phase coding, Avalanche diode | 4.5/20.0 | 0.37 | 2.73 | 5 | 7.84 | 0.0001* | |
| Islam et al. (ref. | DV, time-bin coding, Superconducting | 4.0/20.0 | 0.45 | 5.49 | 2500 | 62.5 | 0.0105 | |
| Wang et al. (ref. | CV, Gaussian, Heterodyne via RLO | 5.0/25.0 | 1.62 | 0.011 | 100 | 0.01 | 0.0185 | |
| Zhang et al. (ref. | CV, Gaussian, Homodyne via TLO | 4.4/27.3 | 7.19 | 0.002 | 5 | 100 | 0.0560 | |
| Current work | CV, Gaussian, Heterodyne via RLO | 4.6/20.3 | 1.45 | 0.005 | 100 | 1 | 0.0471 |
Values with a superscript * may be somewhat inaccurate as they were inferred from a graph. μ, mean photon number of the quantum state alphabet; ξ, untrusted noise (referred to channel output); ξ, quantum bit error rate; B, repetition rate in pulsed or quantum data bandwidth in CW implementations; N, number of transmitted quantum data symbols or pulses in the experiment; secret key fraction (SKF), secret key length in bits divided by N. It is possible to parametrize ξ and ξ by the same quantity, namely the mean number of noise photons from the channel, in CV and DV systems, respectively[36]. Also, assuming symmetry between the quadratures, 1 photon number unit (PNU) corresponds to a variance of 2 shot noise units (SNU).
R/TLO: real/transmitted LO.
Fig. 3Composable SKF results.
a Pseudo-temporal evolution of the composable SKF with the time parameter calculated as the ratio of the cumulative number N of complex symbols available for the classical steps of the protocol and the rate B = 100 MHz at which these symbols are modulated. b Variation of untrusted noise ξ measured in the experiment (lower point) and its worst-case estimator (upper point), and the noise threshold to beat to get a positive composable SKF. The deviation of the simulation traces in (a) from the experimental data between 1 and 5 s is due to the slight increase in ξ. c, d Comparison of confidence intervals derived in this manuscript (Beta; solid-red trace and Gaussian; dotted-green trace) with those derived in the original composable security proof (ref. 10; dashed-blue trace) as a function of N. Using the confidence intervals from ref. 10 leads to no key generation until almost the end (filled-blue square in (a) at N/B ≈ 10).