Next Article in Journal
Information Geometry, Fluctuations, Non-Equilibrium Thermodynamics, and Geodesics in Complex Systems
Next Article in Special Issue
Networking Feasibility of Quantum Key Distribution Constellation Networks
Previous Article in Journal
A New Generator of Probability Models: The Exponentiated Sine-G Family for Lifetime Studies
Previous Article in Special Issue
Quantum Probes for the Characterization of Nonlinear Media
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Continuous-Variable Quantum Key Distribution Based on Heralded Hybrid Linear Amplifier with a Local Local Oscillator

School of Automation, Central South University, Changsha 410083, China
*
Authors to whom correspondence should be addressed.
Submission received: 12 September 2021 / Revised: 13 October 2021 / Accepted: 20 October 2021 / Published: 24 October 2021
(This article belongs to the Special Issue Quantum Communication)

Abstract

:
An improved continuous variable quantum key distribution (CVQKD) approach based on a heralded hybrid linear amplifier (HLA) is proposed in this study, which includes an ideal deterministic linear amplifier and a probabilistic noiseless linear amplifier. The CVQKD, which is based on an amplifier, enhances the signal-to-noise ratio and provides for fine control between high gain and strong noise reduction. We focus on the impact of two types of optical amplifiers on system performance: phase sensitive amplifiers (PSA) and phase insensitive amplifiers (PIA). The results indicate that employing amplifiers, local local oscillation-based CVQKD systems can enhance key rates and communication distances. In addition, the PIA-based CVQKD system has a broader application than the PSA-based system.

1. Introduction

Quantum key distribution (QKD) provides a secret key sharing method guaranteed by quantum mechanics for trusted communication parties, namely Alice and Bob, in the presence of potential eavesdroppers [1,2,3]. Currently, there are two methods available for key distribution: discrete variable (DV) QKD [4,5] and continuous variable (CV) QKD [6,7,8,9]. Among them, the CVQKD has two main advantages. On the one hand, it circumvents the drawbacks of single-photon counting. On the other hand, it ensures that standard optical communication components are compatible [10,11]. The unconditional security of CVQKD has been established in the information-theoretical in both the asymptotic case [12,13] and the finite-size regime [14,15,16] to against general collective eavesdropping attacks.
The strong local oscillator (LO) for coherent detection as an important part of the CVQKD system can be employed as a filter to effectively suppress noise. However, the imperfections of the actual CVQKD system have led to potential loopholes and endangered the security of the communication system. Since Eve performs intercept-resend attacks by manipulating the LO, almost all of the attacks are related to the LO [17,18,19,20,21]. The CVQKD system based on local local oscillation (LLO), for example, prevents LO-related attacks by sending LO directly to the receiving end [22,23,24,25].
The transmission distance of CVQKD is currently limited compared to discrete variable systems, making it unsuitable for long-distance distribution. In the detection process, a heralded noiseless linear amplifier (NLA) is an excellent instrument for strengthening the amplitude of the coherent state while keeping the starting noise level low [26,27,28,29]. The practicality of this device has been proven in recent years, providing convincing evidence of the theory [30,31,32,33,34,35]. Furthermore, in Bob’s quadrature measurement, the defects associated with practical detectors cause a secret key rate constraint [36]. To compensate for this weakness, optical amplifier compensation technology offers a viable solution that can also improve transmission distance in specific situations [37,38,39].
We propose a CVQKD scheme based on LLO in this paper by placing an HLA at the detection end, which consists of a predictive measurement (MB)-based NLA and an optimal deterministic linear amplifier (DLA) that can amplify the amplitude of the coherent state while maintaining low noise and a high success rate. The signal-to-noise ratio is amplified by the NLA part, while the signal and success probability are amplified by the DLA part. In addition, we take into account the NLA’s restrictions. The addition of a hybrid amplifier to the LLO-based CVQKD protocol efficiently increases the key rate and the maximum secure transmission distance according to simulation results.
The paper is organized as follows. In Section 2, we describe the LLO-CVQKD system based on optical amplifiers. In Section 3, we conduct a theoretical analysis of excess noise. We performed a detailed analysis in Section 4, comparing the performance of practical systems that implement two different types of optical amplifiers. Finally, we conclude the paper in Section 5.

2. Description of the LLO-CVQKD Scheme Based on Optical Amplifiers

In this section, we introduce the LLO-CVQKD scheme by using heralded HLA. As shown in Figure 1, Alice randomly chooses two Gaussian random variables (with a mean of zero and a variance of V A ), generates a coherent state to modulate the continuous waves emitted by the laser [40,41]. An arbitrary phase rotation is generated by a quantum channel to change the states. To restore the original signal, a relatively strong phase reference pulse is alternately sent with the quantum signal. The beam then passes through the optical channel. At Bob’s side, a heralded HLA is placed in the signal beam to improve system performance. Besides, Bob performs optical heterodyne detection to measure quadrature x and p.

2.1. Amplifier Compensation Scheme

The above-mentioned heralded HLA is composed of a MB-NLA and an optimal DLA. In theory, NLA can increase the amplitude of the coherent state while keeping the original noise level constant [26]. The output after an initial channel and NLA action, given any quantum state ρ ^ i n = d 2 γ P i n ( γ ) γ γ , can be represented as
ρ ^ o u t N L A d 2 γ P i n ( γ ) σ ^ ( γ ) e γ 2 T ( g N 2 1 ) ( 1 λ c h 2 ) 1 g N 2 λ c h 2 ,
where g N describes the operator of NLA. The initial channel transforms the coherent state of the mean amplitude γ into the thermal state of the parameter λ c h and the average amplitude T γ . The displaced thermal state can be expressed by
σ ^ ( γ ) = D ^ ( g N ˜ T γ ) ρ ^ t h ( g N λ c h ) D ^ ( g N ˜ T γ ) ,
of parameter g λ c h and mean amplitude g N ˜ T γ , where the gain g ˜ is given by
g N ˜ = g N 1 λ c h 2 1 g N 2 λ c h 2 .
We mainly consider two modes of DLA, phase-sensitive amplifiers (PSA) and phase-insensitive amplifiers (PIA) [42,43,44,45]. PSA ideally allows noiseless amplification of a selected quadrature. The structure of PSA is shown in Figure 2a. X B i and P B i correspond to the outputs at point i in Figure 1. The output of the amplifier is written as
X B 0 P B 0 = g D 0 0 1 / g D X A P A
where g D is the amplifier coefficient of DLA. Besides, the noise introduced by the real amplifier is ignored here.
PIA is a non-degenerate optical parametric amplifier whose structure is shown in Figure 2b. It consists of a noiseless amplifier and a two-mode squeezed vacuum (EPR) state of variance N E P R , which is used to simulate the inherent noise of the amplifier. The output of PIA is written as
X B 0 P B 0 = X A X I P A P I g D g D 1 ,
where I is an idler mode that is ideally in a vacuum state or in a state featuring a noise variance V I = N E P R > 1 .

2.2. Phase Recovery Scheme

Bob’s measurement results are described by
X B 1 P B 1 = c o s φ s i n φ s i n φ c o s φ X B 0 P B 0 + N X N P ,
where φ respects the phase drift in a quantum channel. N X and N P are independent and identically distributed (i.i.d.) Gaussian noises.
Assuming that the channel drift is known, Bob’s measurement can be corrected as
X B 2 P B 2 = c o s φ s i n φ s i n φ c o s φ X B 1 P B 1 ,
Based on PSA scheme, the final output can be obtained according to Equations (4), (6) and (7), which can easy to show
X B 2 P B 2 = g D 0 0 1 / g D X A P A + N X N P ,
where noise terms can be expressed as
N X N P = c o s φ s i n φ s i n φ c o s φ N X N P .
Based on PIA scheme, the final output can be obtained according to Equations (5)–(7), which can easily show
X B 2 P B 2 = g D X A P A + N X N P ,
where noise terms can be described by
N X N P = c o s φ s i n φ s i n φ c o s φ N X N P + g D 1 X I P I .
Next, calculate the phase shift. Assume that the phase drift is slow enough to remain constant over the frame time of Δ T . Since Alice alternately sends the quantum signal and the reference pulse, the phase shift of the signal pulse can be calculated from the phase shift of the reference pulse [46]. The phase of the reference pulse can be expressed as
φ R i = t a n 1 P R i X R i .
The phase shift of the signal pulse can be calculated as
φ S i = φ R i + φ R i + 1 2 = φ R i + 2 π f d T d ,
where f i = ( φ R i + 1 φ R i / 4 π T d ) is the frequency difference between two adjacent reference pulsed lasers in a short time.

3. Excess Noise Analysis

The excess noise analysis of the LLO CV-QKD system based on the heralded HLA is shown in this section. Although the signal’s pulse phase was approximated using the reference pulse phase in the preceding section, it was not exact enough, and there were inaccuracies. In the phase recovery phase, the excess noise induced by the uncertainty of φ can be described as
ε φ = V A σ φ ,
where σ φ is the variance of noise generated by the uncertainty of phase φ . The noise variance σ φ is expressed as
σ φ = 1 2 { ( Δ φ S T d ) 2 + ( Δ φ L T d ) 2 } ,
where ( Δ φ S T d ) 2 and ( Δ φ L T d ) 2 are the phase noise of signal light and auxiliary light, respectively. T d represents the time interval between the signal pulse and the reference pulse (see Figure 1). Assuming that the laser phase at t = 0 is φ 0 , the phase noise φ ( t ) can be modeled as a Gaussian random variable with a mean of 0 and a variance of
( Δ φ S t ) 2 = 2 t α ,
where α 1 π Δ f respects the coherence time of the laser. Δ f is the linewidth of α .

4. Security Analysis

This section will analyze the impact of the amplifier on the performance of the LLO-CVQKD system. Our simulation is based on the security of GMCS QKD system given in Refs. [14,47].
An NLA-based CV-QKD system with a variance V ( δ ) = 1 + δ 2 1 δ 2 , channel transmittance T = 10 α L / 10 , and excess noise ε can be transformed into another typical CV-QKD system with variance V ( δ N ) = 1 + δ N 2 1 δ N 2 , channel transmittance T N , excess noise ε N , and loss coefficient α = 0.2 dBkm 1 . The parameter expression that has been equivalently converted is as follows:
δ N = δ ( g N 2 1 ) ( ε 2 ) T 2 ( g N 2 1 ) ε T 2 , T N = g 2 T ( g N 2 1 ) T [ 1 4 ( g N 2 1 ) ( ε 2 ) ε T ε + 1 ] + 1 , ε N = ε 1 2 ( g 2 1 ) ( ε 2 ) ε T .
When the parameters in the CVQKD system above satisfy a specified condition, the system can be viewed as equivalent. The limitations are written as
0 δ N < 1 0 δ < ( ( g N 2 1 ) ( ε 2 ) T 2 ( g N 2 1 ) ε T 2 ) 1 .
Figure 3 shows the limitations of VA taking under various settings when the excess noise is equal to 0.01. In addition the success probability of the amplifier is taken into account. According to Ref. [27], the upper bound on the amplifier success probability is
P s u c c e s s 1 g N 2 .
The secure key rate with finite-size effect is given by
R = n P s u c c e s s N [ β I A B χ B E Δ ( n ) ] ,
where I A B is defined as the Shannon mutual information of Alice and Bob, χ B E respects the upper bound of the Holevo information between Eve and Bob, Δ ( n ) is related to the security of the privacy amplification and β is the reconciliation efficiency. The privacy amplification Δ ( n ) is given by
Δ ( n ) ( 2 d i m H X + 3 ) l o g 2 ( 2 / ϵ ¯ ) n + 2 n ( 1 + ϵ P A ) ,
where ϵ ¯ and ϵ P A are the smoothing parameter and failure probability of the privacy amplification, respectively. H X is the Hilbert space corresponding to the variable X used in the raw key. The square-root term in Δ ( n ) actually corresponds to the pace with which the smooth min-entropy of an independently and identically distributed (i.i.d.) state approaches the von Neumann entropy. Indeed, the smooth min-entropy of an i.i.d. state is identical to its von Neumann entropy only at the asymptotic limit. The second term is proportional to the privacy amplification procedure’s failure probability.
The Shannon mutual information of Alice and Bob, as well as the Holevo information of Eve and Bob, differ depending on the amplifier type. The CVQKD scheme based on PSA is first studied. The detection-added noise of quadrature X and P is considered separately, as shown below
χ P S A x = 1 + ( 1 + η ) + 2 ϑ e l g D η , χ P S A p = g D ( 1 + ( 1 + η ) + 2 ϑ e l ) η ,
where ϑ e l is the detector electronics noise, η is detector efficiency. The total noise is defined as
χ t o t x , p = χ l i n e + χ P S A x , p ,
where χ l i n e = 1 / T N 1 + ε N is the total channel-added noise. The Shannon mutual information of Alice and Bob is written by [48]
I A B = l o g 2 V B V B | A ,
where V B = η T N 2 [ ( V N + χ t o t x ) ( V N + χ t o t p ) ] 1 / 2 , and V B | A = η T N 2 [ ( 1 + χ t o t x ) ( 1 + χ t o t p ) ] 1 / 2 . The Holevo information between Eve and Bob is defined as [12,13]
χ B E = i = 1 2 G ( λ i 1 2 ) i = 3 5 G ( λ i 1 2 ) ,
where G ( x ) = ( x + 1 ) l o g 2 ( x + 1 ) x l o g 2 x . The symplectic eigenvalues λ 1 , 2 are given by
λ 1 , 2 = 1 2 [ A ± A 2 4 B ] ,
where A = V N 2 ( 1 2 T N ) + 2 T N + T N 2 ( V N + χ l i n e ) 2 and B = T N 2 ( V χ l i n e + 1 ) 2 . The symplectic eigenvalues λ 3 , 4 are expressed as
λ 3 , 4 = 1 2 [ C ± C 2 4 D ] ,
where
C P A S = A χ P S A x χ P S A p + B + 1 + ( χ P S A x + χ P S A p ) ( V N B + T N ( V N + χ l i n e ) ) + 2 T N ( V N 2 1 ) ( T N ( V N + χ t o t x ) ) ( T N ( V N + χ t o t p ) ) ,
and
D P S A = ( V N + B χ P S A x T N ( V N + χ t o t x ) ) ( V N + B χ P S A p T ( V N + χ t o t p ) ) .
The last eigenvalue is λ 5 = 1 .
Then, the LLO-CVQKD scheme based on PIA is analyzed. The detection-added noise is shown as
χ P I A = 1 + ( 1 η ) + 2 ϑ e l + N E P R ( g 1 ) η g η ,
where N E P R is the variance of the EPR state to model the amplifier’s inherent noise. A similar change was made to the Shannon information. We now have
V B = η T N ( V + χ t o t ) / 2 , V B | A = η T N ( 1 + χ t o t ) / 2 .
χ B E is calculated from
χ B E = i = 1 2 G ( λ i 1 2 ) i = 3 7 G ( λ i 1 2 ) ,
The parameters ( λ 1 , 2 , 3 , 4 ) are calculated according to Equations (26) and (27), while λ 5 , 6 , 7 = 1 . The parameters ( λ 3 , 4 ) are calculated from
C P I A = A χ P I A 2 + B + 1 + 2 χ P I A ( V N B + T N ( V N + χ l i n e ) ) + 2 T N ( V N 2 1 ) ( T N ( V N + χ t o t ) ) 2 ,
and
D P I A = ( V N + B χ P I A T N ( V N + χ t o t ) ) 2 .
The secret key rate as a function of transmission distance is shown in Figure 4 using HLA with PSA. For simulation, the parameters stated in Table 1 are utilized, which is in accordance with the most advanced experimental methods [22,24]. The secure communication distance increases as the amplifier coefficient g N and g D increases when the modulation variance V A = 0.6 . In terms of both key rate and distance, NLA-based schemes perform better than PSA-based systems. When the solution is based on HLA, the performance is optimal.
The secret key rate as a function of transmission distance is plotted in Figure 5 using HLA with PIA. The PIA-based LLO-CVQKD is similar to the psa-based LLO-CVQKD. The system performance improves as the amplification parameters are increased. When N E P R is increased, however, the system performance degrades due to an increase in the introduced noise.

5. Conclusions

In this study, we offer a practical LLO-CVQKD system based on an HLA, which consists of an MB-NLA and a DLA, with the latter compensating for the former’s signal-to-noise ratio degradation. Two HLA schemes based on two separate DLAs, a phase-sensitive amplifier and a phase-insensitive amplifier, were analyzed to verify system performance. The system’s noise was initially studied, with all conceivable consequences taken into account. Following that, simulations were run to determine the situations under which the NLA is applicable. Finally, the system’s performance was assessed utilizing two alternative amplifier methods. The results demonstrated that HLAs based on various forms of DLA can help improve system performance. Furthermore, when compared to the PSA-based scheme, the PIA-based strategy performs better. Because the majority of the simulation parameters were derived from existing experiments, our research was extremely practical.
In addition, we supplemented the scheme in Refs. [28,29]. Ref. [28] proposes a basic CVQKD scheme for Gaussian modulated coherent states based on hybrid amplifiers. Ref. [29] proposes a CVQKD scheme based on a four-state modulation scheme using a hybrid amplifier under seawater channel conditions. Our scheme is mainly based on the improvement of Ref. [28]. We mainly analyze the performance of the HLA scheme in the case of local local oscillation. Furthermore, the effective case of HLA is analyzed.

Author Contributions

Conceptualization, Y.W.; data curation, W.P.; formal analysis, Y.M.; investigation, Y.L.; methodology, Y.M.; resources, Y.W.; software, Y.L.; supervision, Y.G.; validation, Y.G.; visualization, W.P.; writing—original draft, Y.L.; writing—review and editing, D.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61871407, 61801522).

Data Availability Statement

The data used are included in the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  2. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef] [Green Version]
  3. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photon. 2020, 12, 1012–1236. [Google Scholar] [CrossRef] [Green Version]
  4. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef] [Green Version]
  5. Lo, H.K.; Curty, M.; Tamaki, K. Secure quantum key distribution. Nat. Photonics 2014, 8, 595–604. [Google Scholar] [CrossRef] [Green Version]
  6. Braunstein, S.L.; van Loock, P. Quantum information with continuous variables. Rev. Mod. Phys. 2005, 77, 513–577. [Google Scholar] [CrossRef] [Green Version]
  7. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  8. Huang, D.; Huang, P.; Lin, D.; Zeng, G. Long-distance continuous-variable quantum key distribution by controlling excess noise. Sci. Rep. 2016, 6, 19201. [Google Scholar] [CrossRef] [Green Version]
  9. Zhong, H.; Zou, S.; Huang, D.; Guo, Y. Continuous-variable quantum key distribution coexisting with classical signals on few-mode fiber. Opt. Express 2021, 29, 14486–14504. [Google Scholar] [CrossRef]
  10. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum Cryptography Without Switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef] [Green Version]
  11. Guo, Y.; Xie, C.; Liao, Q.; Zhao, W.; Zeng, G.; Huang, D. Entanglement-distillation attack on continuous-variable quantum key distribution in a turbulent atmospheric channel. Phys. Rev. A 2017, 96, 022320. [Google Scholar] [CrossRef]
  12. García-Patrón, R.; Cerf, N.J. Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef] [Green Version]
  13. Navascués, M.; Grosshans, F.; Acín, A. Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef] [Green Version]
  14. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef] [Green Version]
  15. Furrer, F.; Franz, T.; Berta, M.; Leverrier, A.; Scholz, V.B.; Tomamichel, M.; Werner, R.F. Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks. Phys. Rev. Lett. 2012, 109, 100502. [Google Scholar] [CrossRef] [PubMed]
  16. Leverrier, A. Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef] [Green Version]
  17. Huang, J.Z.; Weedbrook, C.; Yin, Z.Q.; Wang, S.; Li, H.W.; Chen, W.; Guo, G.C.; Han, Z.F. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack. Phys. Rev. A 2013, 87, 062329. [Google Scholar] [CrossRef] [Green Version]
  18. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol. Phys. Rev. A 2013, 87, 052309. [Google Scholar] [CrossRef] [Green Version]
  19. Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 2013, 87, 062313. [Google Scholar] [CrossRef] [Green Version]
  20. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems. Phys. Rev. A 2013, 88, 022339. [Google Scholar] [CrossRef] [Green Version]
  21. Qin, H.; Kumar, R.; Alléaume, R. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution. Phys. Rev. A 2016, 94, 012325. [Google Scholar] [CrossRef] [Green Version]
  22. Qi, B.; Lougovski, P.; Pooser, R.; Grice, W.; Bobrek, M. Generating the Local Oscillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection. Phys. Rev. X 2015, 5, 041009. [Google Scholar] [CrossRef] [Green Version]
  23. Soh, D.B.S.; Brif, C.; Coles, P.J.; Lütkenhaus, N.; Camacho, R.M.; Urayama, J.; Sarovar, M. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol. Phys. Rev. X 2015, 5, 041010. [Google Scholar] [CrossRef] [Green Version]
  24. Huang, D.; Huang, P.; Lin, D.; Wang, C.; Zeng, G. High-speed continuous-variable quantum key distribution without sending a local oscillator. Opt. Lett. 2015, 40, 3695–3698. [Google Scholar] [CrossRef] [PubMed]
  25. Wu, X.; Wang, Y.; Guo, Y.; Zhong, H.; Huang, D. Passive continuous-variable quantum key distribution using a locally generated local oscillator. Phys. Rev. A 2021, 103, 032604. [Google Scholar] [CrossRef]
  26. Ralph, T.C.; Lund, A.P. Nondeterministic Noiseless Linear Amplification of Quantum Systems. AIP Conf. Proc. 2009, 1110, 155–160. [Google Scholar] [CrossRef] [Green Version]
  27. Blandino, R.; Leverrier, A.; Barbieri, M.; Etesse, J.; Grangier, P.; Tualle-Brouri, R. Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier. Phys. Rev. A 2012, 86, 012327. [Google Scholar] [CrossRef] [Green Version]
  28. Zhou, J.; Shi, R.; Feng, Y.; Shi, J.; Guo, Y. Enhancing continuous variable quantum key distribution with a heralded hybrid linear amplifier. J. Phys. A Math. Theor. 2019, 52, 245303. [Google Scholar] [CrossRef]
  29. Xiang, Y.; Wang, Y.; Ruan, X.; Zuo, Z.; Guo, Y. Improving the discretely modulated underwater continuous-variable quantum key distribution with heralded hybrid linear amplifier. Phys. Scr. 2021, 96, 065103. [Google Scholar] [CrossRef]
  30. Ferreyrol, F.; Barbieri, M.; Blandino, R.; Fossier, S.; Tualle-Brouri, R.; Grangier, P. Implementation of a Nondeterministic Optical Noiseless Amplifier. Phys. Rev. Lett. 2010, 104, 123603. [Google Scholar] [CrossRef] [Green Version]
  31. Ferreyrol, F.; Blandino, R.; Barbieri, M.; Tualle-Brouri, R.; Grangier, P. Experimental realization of a nondeterministic optical noiseless amplifier. Phys. Rev. A 2011, 83, 063801. [Google Scholar] [CrossRef] [Green Version]
  32. Barbieri, M.; Ferreyrol, F.; Blandino, R.; Tualle-Brouri, R.; Grangier, P. Nondeterministic noiseless amplification of optical signals: A review of recent experiments. Laser Phys. Lett. 2011, 8, 411–417. [Google Scholar] [CrossRef]
  33. Zavatta, A.; Fiurášek, J.; Bellini, M. A high-fidelity noiseless amplifier for quantum light states. Nat. Photonics 2011, 5, 52–56. [Google Scholar] [CrossRef] [Green Version]
  34. Xiang, G.Y.; Ralph, T.C.; Lund, A.P.; Walk, N.; Pryde, G.J. Heralded noiseless linear amplification and distillation of entanglement. Nat. Photonics 2010, 4, 316–319. [Google Scholar] [CrossRef]
  35. Usuga, M.A.; Müller, C.R.; Wittmann, C.; Marek, P.; Filip, R.; Marquardt, C.; Leuchs, G.; Andersen, U.L. Noise-powered probabilistic concentration of phase information. Nat. Physics 2010, 6, 767–771. [Google Scholar] [CrossRef] [Green Version]
  36. Hillery, M. Quantum cryptography with squeezed states. Phys. Rev. A 2000, 61, 022309. [Google Scholar] [CrossRef] [Green Version]
  37. Leonhardt, U.; Paul, H. High-Accuracy Optical Homodyne Detection with Low-Efficiency Detectors: “Preamplification” from Antisqueezing. Phys. Rev. Lett. 1994, 72, 4086–4089. [Google Scholar] [CrossRef]
  38. Levenson, J.A.; Abram, I.; Rivera, T.; Fayolle, P.; Garreau, J.C.; Grangier, P. Quantum optical cloning amplifier. Phys. Rev. Lett. 1993, 70, 267–270. [Google Scholar] [CrossRef]
  39. Bencheikh, K.; Lopez, O.; Abram, I.; Levenson, J.A. Improvement of photodetection quantum efficiency by noiseless optical preamplification. Appl. Phys. Lett. 1995, 66, 399–401. [Google Scholar] [CrossRef]
  40. Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef] [Green Version]
  41. Grosshans, F.; Grangier, P. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [Green Version]
  42. Caves, C.M. Quantum limits on noise in linear amplifiers. Phys. Rev. D 1982, 26, 1817–1839. [Google Scholar] [CrossRef]
  43. Fasel, S.; Gisin, N.; Ribordy, G.; Scarani, V.; Zbinden, H. Quantum Cloning with an Optical Fiber Amplifier. Phys. Rev. Lett. 2002, 89, 107901. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  44. Ou, Z.Y.; Pereira, S.F.; Kimble, H.J. Quantum noise reduction in optical amplification. Phys. Rev. Lett. 1993, 70, 3239–3242. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  45. Levenson, J.A.; Abram, I.; Rivera, T.; Grangier, P. Reduction of quantum noise in optical parametric amplification. J. Opt. Soc. Am. B 1993, 10, 2233–2238. [Google Scholar] [CrossRef]
  46. Qi, B.; Huang, L.L.; Qian, L.; Lo, H.K. Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers. Phys. Rev. A 2007, 76, 052323. [Google Scholar] [CrossRef] [Green Version]
  47. Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B At. Mol. Opt. Phys. 2009, 42, 114014. [Google Scholar] [CrossRef] [Green Version]
  48. Lodewyck, J.; Bloch, M.; García-Patrón, R.; Fossier, S.; Karpov, E.; Diamanti, E.; Debuisschert, T.; Cerf, N.J.; Tualle-Brouri, R.; McLaughlin, S.W.; et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 2007, 76, 042305. [Google Scholar] [CrossRef] [Green Version]
Figure 1. System layout of LLO-CVQKD scheme based on a heralded HLA. The signal light is in red (gray) solid line, and the local oscillator light is in red (gray) dashed line. LO, local oscillator; AM, amplitude modulator; PM, phase modulator; HD, heterodyne detection.
Figure 1. System layout of LLO-CVQKD scheme based on a heralded HLA. The signal light is in red (gray) solid line, and the local oscillator light is in red (gray) dashed line. LO, local oscillator; AM, amplitude modulator; PM, phase modulator; HD, heterodyne detection.
Entropy 23 01395 g001
Figure 2. Two different amplifier model. (a) Model for a phase-sensitive amplifier. (b) Model for a phase-insensitive amplifier.
Figure 2. Two different amplifier model. (a) Model for a phase-sensitive amplifier. (b) Model for a phase-insensitive amplifier.
Entropy 23 01395 g002
Figure 3. Maximum value of the modulation variance. Five cases at different transmittance (from T = 0.2 to 1 in steps of 0.2 ) and four amplification factor of NLA (from g N = 2 to 5 in steps of 1) are investigated.
Figure 3. Maximum value of the modulation variance. Five cases at different transmittance (from T = 0.2 to 1 in steps of 0.2 ) and four amplification factor of NLA (from g N = 2 to 5 in steps of 1) are investigated.
Entropy 23 01395 g003
Figure 4. The secret key rate as a function of transmission distance based on PSA. Blue line, red line, and green line correspond, respectively, to a value of the amplifier coefficient of g D = 1 (initial), g D = 5, and g D = 20. Full lines and dashed lines correspond to two cases where the number of g N links is 1 and 2, respectively.
Figure 4. The secret key rate as a function of transmission distance based on PSA. Blue line, red line, and green line correspond, respectively, to a value of the amplifier coefficient of g D = 1 (initial), g D = 5, and g D = 20. Full lines and dashed lines correspond to two cases where the number of g N links is 1 and 2, respectively.
Entropy 23 01395 g004
Figure 5. The secret key rate as a function of transmission distance based on PIA. Blue line, red line, and black line correspond, respectively, to a value of the amplifier coefficient of g D = 1 (initial), g D = 5 , and g D = 20 . The green line represents the case of N E P R = 2 . Full lines and dashed lines correspond to two cases where the number of g N links is 1 and 2, respectively.
Figure 5. The secret key rate as a function of transmission distance based on PIA. Blue line, red line, and black line correspond, respectively, to a value of the amplifier coefficient of g D = 1 (initial), g D = 5 , and g D = 20 . The green line represents the case of N E P R = 2 . Full lines and dashed lines correspond to two cases where the number of g N links is 1 and 2, respectively.
Entropy 23 01395 g005
Table 1. The parameters to simulate the secret key rate.
Table 1. The parameters to simulate the secret key rate.
ParameterValueDescription
V A 0.6Modulation variance
β 98%Reconciliation efficiency
η 0.6Detector efficiency
ν e l 0.05Detector noise
σ φ 0.04Phase noise variance
ϵ ¯ , ϵ P A 10 20 Security parameter
N 10 10 Total photons
n N 1 2 Photon ratio used for key
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, Y.; Wang, Y.; Mao, Y.; Peng, W.; Jin, D.; Guo, Y. Continuous-Variable Quantum Key Distribution Based on Heralded Hybrid Linear Amplifier with a Local Local Oscillator. Entropy 2021, 23, 1395. https://0-doi-org.brum.beds.ac.uk/10.3390/e23111395

AMA Style

Li Y, Wang Y, Mao Y, Peng W, Jin D, Guo Y. Continuous-Variable Quantum Key Distribution Based on Heralded Hybrid Linear Amplifier with a Local Local Oscillator. Entropy. 2021; 23(11):1395. https://0-doi-org.brum.beds.ac.uk/10.3390/e23111395

Chicago/Turabian Style

Li, Yin, Yijun Wang, Yun Mao, Weishao Peng, Di Jin, and Ying Guo. 2021. "Continuous-Variable Quantum Key Distribution Based on Heralded Hybrid Linear Amplifier with a Local Local Oscillator" Entropy 23, no. 11: 1395. https://0-doi-org.brum.beds.ac.uk/10.3390/e23111395

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop