Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions
A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-11-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/21/11/1100 |
id |
doaj-af57aa65f5204d0f894615f9d229793b |
---|---|
record_format |
Article |
spelling |
doaj-af57aa65f5204d0f894615f9d229793b2020-11-25T02:03:10ZengMDPI AGEntropy1099-43002019-11-012111110010.3390/e21111100e21111100Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic ConditionsLuyu Huang0Yichen Zhang1Ziyang Chen2Song Yu3State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Advanced Optical Communication, Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, ChinaState Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaA unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions.https://www.mdpi.com/1099-4300/21/11/1100unidimensional modulated coherent statescontinuous-variable quantum key distributionuntrusted detection |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Luyu Huang Yichen Zhang Ziyang Chen Song Yu |
spellingShingle |
Luyu Huang Yichen Zhang Ziyang Chen Song Yu Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions Entropy unidimensional modulated coherent states continuous-variable quantum key distribution untrusted detection |
author_facet |
Luyu Huang Yichen Zhang Ziyang Chen Song Yu |
author_sort |
Luyu Huang |
title |
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions |
title_short |
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions |
title_full |
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions |
title_fullStr |
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions |
title_full_unstemmed |
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions |
title_sort |
unidimensional continuous-variable quantum key distribution with untrusted detection under realistic conditions |
publisher |
MDPI AG |
series |
Entropy |
issn |
1099-4300 |
publishDate |
2019-11-01 |
description |
A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions. |
topic |
unidimensional modulated coherent states continuous-variable quantum key distribution untrusted detection |
url |
https://www.mdpi.com/1099-4300/21/11/1100 |
work_keys_str_mv |
AT luyuhuang unidimensionalcontinuousvariablequantumkeydistributionwithuntrusteddetectionunderrealisticconditions AT yichenzhang unidimensionalcontinuousvariablequantumkeydistributionwithuntrusteddetectionunderrealisticconditions AT ziyangchen unidimensionalcontinuousvariablequantumkeydistributionwithuntrusteddetectionunderrealisticconditions AT songyu unidimensionalcontinuousvariablequantumkeydistributionwithuntrusteddetectionunderrealisticconditions |
_version_ |
1724948968245297152 |