Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Practical continuous-variable quantum key distribution without finite sampling bandwidth effects

Open Access Open Access

Abstract

In a practical continuous-variable quantum key distribution system, finite sampling bandwidth of the employed analog-to-digital converter at the receiver’s side may lead to inaccurate results of pulse peak sampling. Then, errors in the parameters estimation resulted. Subsequently, the system performance decreases and security loopholes are exposed to eavesdroppers. In this paper, we propose a novel data acquisition scheme which consists of two parts, i.e., a dynamic delay adjusting module and a statistical power feedback-control algorithm. The proposed scheme may improve dramatically the data acquisition precision of pulse peak sampling and remove the finite sampling bandwidth effects. Moreover, the optimal peak sampling position of a pulse signal can be dynamically calibrated through monitoring the change of the statistical power of the sampled data in the proposed scheme. This helps to resist against some practical attacks, such as the well-known local oscillator calibration attack.

© 2016 Optical Society of America

1. Introduction

Quantum key distribution (QKD), an important application of the quantum information sciences, enables two correspondents to share a secret key, which in turn allows them to communicate with full security [1]. Its unconditional security is guaranteed by the Heisenberg’s uncertainty principle and the quantum no-cloning theorem. Compared with the discrete variable QKD, it has been shown theoretically that the continuous variable (CV) QKD has potential advantages, e.g., higher secret key rate and better compatibility with the current optical networks [2, 3]. Since it was proposed, the CVQKD has achieved great progress both in theory and experiment. The most valuable achievement is the Gaussian-modulated coherent state (GMCS) CVQKD protocol, which has been proven to be secure against general collective attacks [4–7] and coherent attacks [8–10]. Recently, long secure distance [11,12] and high speed [13,14] GMCS CVQKD have been experimentally demonstrated by using commercial components. Especially, field tests of the GMCS CVQKD protocol in telecommunication optical networks have also been successfully performed [15–17]. These pave the way for the practical application of CVQKD.

However, due to imperfections of the employed devices in the practical CVQKD system, there are deviations between the theoretical CVQKD protocol and its practical implementation. Recently, the practical security due to imperfections of the employed devices in the practical CVQKD system has attracted much attentions [18–23]. By far, several typical attack strategies, such as the local oscillator (LO) fluctuation attack, wavelength attack, LO calibration attack, saturation attack etc., have been found and their countermeasures have also been proposed.

Recently, it has been found that the finite sampling bandwidth (FSB) effects may influence the performance and the practical security of the practical CVQKD system [24]. In detail, the FSB of the employed analog-to-digital converter (ADC) will decrease the lower bound of secret key rate and restrain the linear relationship between secret key rate and system repetition rate. Moreover, the FSB effects open security loopholes for eavesdropper to implement attacks. To prevent the FSB effects, a countermeasure named dual sampling detection scheme was proposed in [24]. This scheme performs real-time parameter estimation by using two identical ADCs, which are triggered by the same electronic circuits. One ADC is used to sample the output of homodyne while the other ADC is used to sample the LO.

In this paper, we propose a more available scheme by making use of a dynamic delay adjusting module (DDM) and a statistical power feedback-control algorithm. In this way, the peak values of the transmitted pulses can be sampled accurately so that the FSB effects are removed. Subsequently, one can eliminate the deviations generated in the parameter estimation and the secret key rate calculation. In addition, the receiver, i.e., Bob, can detect easily any disturbances induced by environment or attackers through monitoring the statistical power of sampled data in real time. This helps to resist the practical attacks which do not change the distribution of receiver’s data. Clearly, the well-known LO calibration attack is invalid in the proposed scheme.

The remainder is organized as follows. In Section 2, we first recall the procedure of data acquisition in a practical GMCS CVQKD system, and then present the proposed high-precision data acquisition method. In Section 3, we investigate the effectiveness of the proposed scheme in removing the FSB effects. Finally, conclusions are drawn in Section 4.

2. High-precision data acquisition in practical CVQKD system

In the CVQKD protocol, the key information is generally encoded on continuous variables, i.e., the quadratures X and P, and usually transmitted using pulsed laser signal. To obtain the secret key, a homodyne or heterodyne detector at receiver’s side is employed to obtain the measurement results. As the output is an analog signal, a data acquisition card (commonly, the ADC) is necessary to obtain the transmitted quadratures, which are carried on the peaks of pulses. Theoretically, the sampling bandwidth of the employed device should be infinite so that all the selected quadratures are obtained accurately. However, it is impossible for Bob to sample all the peak values ideally, because the sampling bandwidth of commercial ADCs is finite. This results in the FSB effects, which will influence the performance and practical security of the involved CVQKD system. To remove the FSB effects, we propose a novel way of obtaining high-precision data in this section. Without loss of generality, we investigate how to remove the FSB effects in the GMCS CVQKD system.

2.1. Previous data acquisition process

Before presenting the proposed high-precision data acquisition scheme, we introduce briefly the data acquisition process in previous GMCS CVQKD system. Generally, the sender Alice chooses two random numbers XA and PA from a set of Gaussian random numbers with variance VA and zero mean, and modulates those random numbers on pulsed laser signal by using an amplitude and a phase modulator. After having been modulated, the information is carried on the peaks of pulsed signal. Making use of the polarization-multiplexing and time-multiplexing techniques, the quantum signal together with the LO signal are sent to the receiver Bob through a quantum channel. The structure of Bob’s apparatus in previous CVQKD system is described in Fig. 1. The inputs of PBS are quantum signal and LO which are multiplexed both in time domain and polarization. A 10:90 beam splitter is used to split out 10 percent of the LO to generate clock signal and monitor the intensity of LO in real time. A phase modulator is used to perform basis selection with random phase ψ (0 or π/2). Then the demultiplexed LO and signal interface in a homodyne detector. After detection, the output analog signal of the homodyne detector is send to the data acquisition sub-system to obtain the transmitted data. In general, the data acquisition sub-system of Bob’s system is consist of two modules, i.e., a ADC data acquisition card and a data pre-processing module. The former is driven by the clock generated using LO, and used to sample the output signal of homodyne detector. The latter is used to handle the sampled data (such as frame synchronization [25]) to obtain raw key strings. Subsequently, the raw key strings are sent to the data post-processing sub-system, which includes reconciliation, decoding, error correction and privacy amplification procedures to generate the final secret key.

 figure: Fig. 1

Fig. 1 The structure of Bob’s apparatus in previous CVQKD system. PBS: polarization beam splitter; PD: phtodiode; LO: local oscillator; PM: phase modulator; ψ: random phase of 0 or π/2; 10:90 and 50:50 (reflectivity:transmittance), beam splitters. Data Pre-Processing: a module of the data acquisition sub-system, used to obtain raw key from the output data of ADC; Data Post-Processing Sub-system: used to obtain final secret key, including reconciliation, decoding, error correction and privacy amplification procedures.

Download Full Size | PDF

For the data acquisition sub-system in a practical CVQKD system, to ensure the peak values of all pulses are accurately obtained by using sampling techniques, two conditions should be satisfied. Firstly, the clock of DACs (used to generate modulation signals) at Alice’s side and the sampling clock of ADC at Bob’s side should have a very high relative stability. Secondly, the relative position between the rising edge of the sampling clock and the peak position of pulse signal in each clock cycle should be aligned precisely. The first condition can be satisfied by using homologous clocks as shown in Fig. 1, in which the sampling clock is generated by the LO that transmitted from Alice. However, it’s nearly impossible for previous schemes to meet the second condition, because the sampling bandwidth of commercial ADCs is finite, which is limited to GHz level currently [26]. Under this condition, the transmitted data can not be obtained accurately. Thus, if Bob still use the linear relationship between the shot noise and the intensity of LO to calibrate the shot noise, he will underestimate the excess noise introduced by inaccurate peak sampling, and derive an overestimated secret key rate bound.

Clearly, how to obtain accurately the peak values of the pulsed signal is the core task for the data acquisition sub-system of Bob’s system. Moreover, this is also very important for guaranteeing the practical security and high performance of the involved practical GMCS CVQKD system.

2.2. CVQKD with high-precision data acquisition

In this subsection, a new CVQKD system with high-precision data acquisition is proposed to improve the sampling accuracy and remove the FSB effects. As shown in Fig. 2, a DDM is adopted at Bob’s side in the proposed system. More specifically, the DDM is used to adjust dynamically the timing of the clock signal to a specified value under the control of certain feedback signals. In addition, the DDM is set on the clock path instead of signal path to minimize the introduced excess noise to the quantum signal. Moreover, compared with previous schemes, a statistical power feedback-control algorithm is employed in the data pre-processing module, which is used to generate feedback signals to control the DDM. What should be noted is that the LO is monitored in real time and the shot noise N0 is still measured by using optical power detection in the proposed system.

 figure: Fig. 2

Fig. 2 The structure of Bob’s apparatus in the proposed CVQKD system. PBS: polarization beam splitter; PD: photodiode; LO: local oscillator; PM: phase modulator; ψ: random phase of 0 or π/2; 10:90 and 50:50 (reflectivity:transmittance), beam splitters; DDM: Dynamic delay adjusting module; Data Pre-Processing: a module of data acquisition sub-system, used to obtain raw key from the output data of ADC; Data Post-Processing Sub-system: used to obtain final secret key, including reconciliation, decoding, error correction and privacy amplification procedures.

Download Full Size | PDF

For a practical CVQKD system, after power up, the initial relative position difference (represented in time scale) between the rising edge of the sampling clock and the peak of pulse in each clock cycle is uncertain. Denote the initial relative position difference by tinit, the pulse period of the system by Tr, and the step size of DDM by ts, which is the minimum time delay unit, then one has the following relationship,

Tr=M*ts+Δt,
where Δt ∈ [0, ts], Tr = 1/fr with fr being the system repetition rate, and M is an integer. It means that if the timing of sampling clock can be adjust by the unit of ts, Bob could sample the pulsed signal at M different positions within one pulse period through setting different clock delays of DDM. Under this condition, the statistical power value of the sampled data at a given position i (i ∈ [0, M − 1]) within a period of time Tc can be calculated by using the following ways, i.e.,
Pi=j=1LAi(j)2,
and
ti=i*ts,i[0,M1],
where Ai(j) is the amplitude of the jth sampled value at the relative position i, L = Tc/Tr is the total number of sampling points within Tc, and ti is the adjusted timing delay at the relative position i. Therefore, Bob can obtain M different statistical power values by setting the delay of the sampling clock to all M different timing delays.

Because the statistical power value of the sampled data at the peak position in each pulse period is the maximum one of all, i.e.,

Pmax=max{Pi,i=0,1,2,,M2,M1}=Pm0,m0[0,1,2,,M2,M1].
Then
tfinal=|tinitm0*ts|=Δt0,
where tfinal is the final relative position difference between the rising edge of sampling clock and peak position in each pulse period, and Δt0 ∈ [0, ts/2]. It means that after m0 steps’ timing adjustment, one may minimize the relative position difference between the rising edge of sampling clock and the peak position of pulse in each pulse period to Δt0, and finally the peak values of all pulses can be sampled accurately.

Here, three aspects have attracted our attentions. Firstly, when ts → 0 one has Δt0 → 0, which means the sampling precision may be controlled by choosing appropriate ts. Secondly, the longer Tc, the higher accuracy of statistical power value. However, there is a trade-off between accuracy and efficiency in a practical CVQKD system. Thirdly, the whole process of finding the optimal sampling position in each pulse period can be viewed as an initial calibration procedure of the system. Once this calibration procedure is completed, Bob can determine the optimal sampling position and monitor the corresponding statistical power in the whole process of quantum communication.

3. Effectiveness of high sampling precision

In this section, we investigate the effectiveness of the proposed high-precision data acquisition scheme in removing the FSB effects. Three aspects of the FSB effects are addressed, including the estimation of the excess noise, the calculation of the secret key rate bound, and the security loopholes for practical security.

3.1. Influence of high sampling precision on excess noise

In a GMCS CVQKD system, to obtain a better detection response, the bandwidth of the detection device should be significantly higher than the repetition rate of the pulsed laser signal [28]. Currently, bandwidth of the available homodyne detectors for quantum communication may reach 1 GHz [13, 29], which is much higher than the system repetition rates that reported yet [11, 13, 14], and guarantees us preferable detection response. Therefore, it’s reasonable to assume that the homodyne detector works in its linear region, and the response of the homodyne detector is linear with respect to the input optical filed quadrature. Under the circumstances, the pulse signals before and after detection are generally Gaussian with the following shape function [24,30],

r(t)=Ape(tμ)2/(2σ2),
where Ap is the peak value of the Gaussian pulse, μ and σ2 are the mean and variance, respectively. Choosing μ = tp/2 and σ2 = (tp/8)2, where tp = 1/fp is the duration of each pulse, the amplitude of sampled data can be expressed as,
As=Ape8δ2,
with δ ∈ [−ts/tp, ts/tp]. From Eq. (7), we can see that the precision of sampled data is only determined by the step size of the DDM, and the maximum normalized sampling error is
Enorml=1e8δ2.

Considering that the excess noise plays an important role, we firstly investigate the influence of sampling precision on the excess noise in a practical CVQKD system. After the quantum communication, Alice and Bob share N couples of correlated variables {(xi, yi)|i = 1, 2, . . . , N}. Here, x is the quadrature modulated by Alice, y is the quadrature measured by Bob, N is the total number of transmitted data, and N = m + n. Then, n couples of variables are randomly selected to estimate the quantities that required to compute the secret key rate, and the rest m pairs of variables are used for the key establishment. Consider the involved quantum channel as a normal linear model, the correlated variables shared by Alice and Bob can be expressed by

y=tx+z,
where t=ηT and z is the noise term which follows a centered normal distribution with variance σz2 = N0 + ηTξ + Vel. The involved parameter η is the detection efficiency, T is the channel transmittance, N0 is the variance of shot noise, ξ is the excess noise, and Vel is the electric noise (all expressed in their respective units).

If the transmitted signals are obtained ideally, one has

x2=VA,xy=ηTVA,
y2=ηT(VA+ξ)+N0+Vel,
where VA is the modulation variance. The maximum-likelihood estimators , σ̂z2 and A are known as [6,27]:
t^=i=1mxiyii=1mxi2,
σ^z2=1mi=1m(yit^xi)2,
V^A=1mi=1mxi2.
These are independent estimators with the following distributions
t^~𝒩(t,σz2i=1mxi2),
mσ^z2σz2,mV^AVA~χ2(m1),
where t, σz2 and VA are the true values of the parameters. In the limit of large N, the confidence intervals for these parameters can be computed as
t[t^ΔT,t^+ΔT],
σz2[σ^z2Δσz2,σ^z2+Δσz2],
VA[V^AΔVA,V^A+ΔVA],
where ΔT=zPE/2σ^z2mVA, Δσz2=zPE/2σ^z2m, ΔVA=zPE/2V^A2m and zPE/2 satisfies 1erf(zPE/2/2)=PE/2. PE is the probability that the estimated parameters do not belong to the confidence region computed from the parameter estimation procedure, and the error function erf(x) is defined as
erf(x)=2π0xet2dt.
Using the previous estimators, we obtain T and ξ with the following formulas
T=t^2/η,
ξ=(σ^z2N0Vel)/t^2.

Actually, as implied by Eq. (8), there are deviations between the actual sampling values and the ideal sampling values. In the realistic model [28, 30], Eve has no ability to manipulate Bob’s detection devices. Thus, the detection efficiency η and the electronic noise Vel does not change during the whole QKD process. Moreover, when the shot noise N0 is measured using optical power, if the intensity of LO does not change, N0 is considered to remain unchanged whether sampling errors or attacks are introduced or not. Therefore, Eqs. (10) and (11) should be modified as follows when sampling errors are considered,

x2=VA,xyreal=e8δ2ηTrealVA,
yreal2=e16δ2[ηTreal(VA+ξreal)+N0]+Vel.
It means that, if Alice and Bob do not aware the deviations introduced by the limited capability of data acquisition part in a practical CVQKD system, they will still use Eq. (10) and Eq. (11) to calculate the related parameters and the secret key rate. Accordingly, one has,
xy=xyreal,
y2=yreal2.
Namely
ηTestVA=e8δ2ηTrealVA,
ηTest(VA+ξest)+N0+Vel=e16δ2[ηTreal(VA+ξreal)+N0]+Vel,
and yield
Treal=e16δ2Test,
ξreal=ξest+1ηTest(1e16δ2)N0,
where the subscript ‘real’ indicates the true parameters that should be used in the secret key rate calculation procedure, while the subscript ‘est’ means the estimated parameters without considering the FSB effects.

Now we consider a common CVQKD system setup with a repetition rate of fr. Generally, the duty cycle of the generated light pulses is less than 10% [11, 13, 15, 30] in a practical CVQKD system. Moreover, there is pulse broadening when the light pulses are transmitted in fiber channel, and it has been well studied in classical optical communications. In our case, the system repetition rate and the light power of pulses are relatively low, so we do not consider the nonlinear effect. Therefore, the pulse broadening factor can be expressed [31]

Bf(z)=[1+14σ4(0zβ2(z)dz)2]1/2,
and the group velocity dispersion β2(z) = 0, then we have Bf (z) = 1, which means pulse broadening can be ignored in our condition. Therefore, we choose a typical value tp = 1/(10 fr) in the following analyses and simulations for simplicity, which does not loss of generality. Then Eqs. (29) and (30) may be rewritten as
Treal=e1600fr2ts2Test,
ξreal=ξest+1ηTest(1e1600fr2ts2)N0.
Expressed in shot noise units, Eq. (33) can be rewritten as
εreal=εest+1ηTest(1e1600fr2ts2).
Subsequently, the excess noise εfsb due to the FSB effects is given by
εfsb=εrealεest=1ηTest(1e1600fr2ts2).

The estimated excess noise as a function of the system repetition rate is shown in Fig. 3 with transmission distance L = 25 km and εreal = 0.04. From top to bottom, the three dashed curves correspond to ts = 5 ps, 10 ps and 20 ps, and the three solid curves correspond to fsamp = 5 GHz, 3 GHz and 1 Ghz, respectively. We find that the estimated excess noise εest decreases with the increase of system repetition rate. In previous schemes, εest decreases quickly even at the sampling rate of 5 GHz. While in the proposed scheme, the decrease rate of εest is much slow with the increase of system repetition rate. When ts is chosen to 5 ps, the estimated excess noise εest decreases slightly even at a high system repetition rate of 45 MHz. The result indicates that the proposed high-precision data acquisition scheme can remove the deviation between the estimated excess noise and the real excess noise, which is induced by the FSB effects in the practical GMCS CVQKD system.

 figure: Fig. 3

Fig. 3 The estimated excess noise as a function of system repetition rate. The transmission distance L = 25 km and εreal = 0.04. From top to bottom, the three dashed curves are obtained with ts = 5 ps, 10 ps and 20 ps, while the three solid curves are obtained with fsamp = 5 GHz, 3 GHz and 1 GHz, respectively.

Download Full Size | PDF

3.2. Influence of sampling precision on secret key rate bound

Next we address the influence of sampling precision on the secret key rate bound. After the parameters and their respective confidence intervals been determined, the secret key rate for collective attacks including the finite size effects can be computed as [6],

Kfinite=nN[βI(X:Y)SPE(Y:E)Δ(n)],
Rfinite=fr*Kfinite,
where β ∈ [0, 1] is the reconciliation efficiency, I(X:Y) is the amount of mutual information shared by Alice and Bob, SPE (Y:E) is the maximal value of the Holevo information compatible with the statistics except with probability PE and Δ(n) is related to the security of the privacy amplification [6].

Figure 4 shows the relationship between sampling precision and the secret key rate. The solid and dashed curves represent the secret key rates obtained in previous schemes and the proposed scheme, respectively. The secret key rate bound as a function of the transmission distance is shown in Fig. 4(a). Compared with the ideal data acquisition condition, the secret key rate bound has a very slight deviation in the proposed scheme (the four curves are overlapped and can not be distinguished clearly). While the secret key rate bound deteriorates a lot in previous schemes because of the FSB effects [24], even a very high sampling bandwidth (such as fsamp = 5 GHz) of ADC is used. Furthermore, as shown in Fig. 4(b), the linear relationship between the secret key rate and the system repetition rate is restrained in previous schemes, and the secret key rate reaches to a maximal value at a relatively low system frequency (about 5 MHz when fsamp is as high as 5 GHz). In comparison, the secret key rate increases proportionately with the system repetition rate in the proposed scheme. Clearly, the FSB effects on the secret key rate can be removed completely with the high-precision data acquisition approach.

 figure: Fig. 4

Fig. 4 Secret key rates under different conditions. Parameters are set as: VA = 5N0, β = 0.95, ξ = 0.01N0, Vel = 0.01N0, PE = 10−10, N = 109, η = 0.6. (a) The secret key rate bound of CVQKD system as a function of distance. The system repetition rate fr =10 MHz, the three solid curves from left to right are obtained with fsamp = 1 GHz, 3 GHz and 5 GHz, corresponding to previous schemes. The three dashed curves are obtained with ts =5 ps, 10 ps and 20 ps, corresponding to the new scheme. (b) The secret key rate of CVQKD system as a function of the system repetition rate. The transmission distance L = 50 km.

Download Full Size | PDF

3.3. Influence of sampling precision on security loopholes

Now we analyze the influence of sampling precision on the security loopholes which may compromise the practical security of the involved CVQKD system. For the practical security of CVQKD system, several practical attack scenarios have been proposed so far as addressed in the introduction. Some of these attacks can be resisted by simply inserting optical devices, for example, the wavelength attacks [19–21] can be prevented with a fiber Bragg grating at Bob’s side. Since the Gaussian distribution of the received data is necessary in GMCS CVQKD, here we mainly discuss the influence of sampling precision on the security loopholes, which do not change the distribution of Bob’s data. A practical attack which meets this requirement is the LO calibration attack.

As mentioned in Sec. 3, Bob’s detection devices are not accessible to Eve in the realistic model, so the transmitted X and P quadratures reserved by Bob are always carried on the peaks of the pulses. Suppose a tdly delay is introduced on the pulse signal under the attack of Eve, then we have

Asdly=Apexp[8(2tdly+ts)2/tp2],
r=Asdly/As=exp[32tdly(tdly+ts)/tp2],
Psdly=i=1LAsdly(i)2,Ps=i=1LAs(i)2,
R=Psdly/Ps=r2Ps/Ps=exp[64tdly(tdly+ts)/tp2],
where Asdly is the amplitude value, Psdly is the statistical power value of the sampled data, and they are obtained under the condition of pulse signal been shifted tdly. While Ps is the statistical power value of the sampled data without this practical attack. We note that Ps is a calibrated value, which is obtained after the optimal peak sampling position in each pulse period has been determined. It is computed by using the statistical power method proposed in Sec. 2.2. Therefore, under the assumption that tp = 1/(10 fr), Eq. (41) can be expressed as
R=exp[64tdly(tdly+ts)/(tr/10)2]=exp[6400fr2tdly(tdly+ts)],
where R represents the relative change of statistical power with tdly.

Simulations in Fig. 5 show the relationship between the statistical power and the delay introduced by Eve under different system repetition rates. From top to bottom, the curves are obtained with fr = 10MHz, 25MHz, 50MHz, 80MHz and 100MHz, respectively. It’s clear that the sensitivity of statistical power increases quickly with the system repetition rate, and the delay tdly has a significant effect on the statistical power of the sampled data. We note that the statistical power of the sampled data will change slightly even the practical attack, e.g., a calibration attack, is absent, because statistical errors can not be eliminated completely in the proposed scheme. Accordingly, the proposed method may not sensitive enough in a practical CVQKD system when the pulse shift is very small, e.g., several picoseconds. However, as implied by Eqs. (5)(9) in [23], a successful LO calibration attack with a full intercept-resend implementation should satisfied the following inequality

ξ^calibIRN0=N0N0[2.1+1ηT(1N0N0)]0.1,
N0N00.1+1ηT2.1+1ηT,
where ξ^calibIR is the excess noise introduced by the LO calibration attack and the full intercept-resend attack, N′0 is the variance of the calibrated shot noise, N0 is the variance of the true shot noise under the LO calibration attack in [23], and 0.1 is a typical value of excess noise represented in shot noise units. Then, for a channel transmittance T = 0.5 and a homodyne detection efficiency η = 0.5, we have
N0N041610.6721.
As analyzed in previous sections and in [24], the variance of true shot noise N0 is affected by the shift of pulse signal in time domain, the relationship between N0 and N′0 satisfies the following equation
N0=r2N0.
Combining the Eqs. (39)(41) and Eq. (45), we have
PsdlyPs=N0N041610.6721,
which means the statistical power of the received data will decrease more than 32.79% after the LO calibration attack is implemented.

 figure: Fig. 5

Fig. 5 The relative change of statistical power with the change of the tdly. Curves from top to bottom are obtained with fr = 10 MHz, 25 MHz, 50 MHz, 80 MHz, 100 MHz and ts is set to 10 ps.

Download Full Size | PDF

The result indicates that the LO calibration attack will introduce a large disturbance on Bob’s data. Therefore, Bob can perceive this disturbance from the perspective of statistical power of the received data, and re-evaluate the accuracy of peak sampling to determine the optimal sampling position in each pulse period. Thus, in this way, the LO calibration attack with full intercept-resend implementation can always be resisted by Bob.

4. Conclusion

In conclusion, we propose a novel scheme for practical CVQKD systems with a high-precision data acquisition method which consists of two parts, i.e., a dynamic delay adjusting module and a statistical power feedback-control algorithm. Making use of the proposed scheme, Bob can accurately obtain the peak values of the transmitted pulses, and completely remove the FSB effects in the practical CVQKD system. Moreover, with the help of the statistical power feedback-control algorithm, the proposed scheme may help to resist the practical attacks which do not change the distribution of Bob’s data. For instance, the typical LO calibration attack is invalid in the proposed scheme.

Funding

National Natural Science Foundation of China (NSFC) (61170228, 61332019, 61471239 and 61501290); National Program On Key Research Project of China (2016YFA0302600).

References and links

1. R. García-Patrón and N. J. Cerf, “Continuous-variable quantum key distribution protocols over noisy channels,” Phys. Rev. Lett. 102, 130501 (2009). [CrossRef]   [PubMed]  

2. F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88, 057902 (2002). [CrossRef]   [PubMed]  

3. F. Grosshans, G. V. Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003). [CrossRef]   [PubMed]  

4. M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006). [CrossRef]   [PubMed]  

5. R. García-Patrón and N. J. Cerf, “Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006). [CrossRef]   [PubMed]  

6. A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81, 062343 (2010). [CrossRef]  

7. A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett. 114, 070501 (2015). [CrossRef]   [PubMed]  

8. R. Renner and J. I. Cirac, “de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102, 110504 (2009). [CrossRef]   [PubMed]  

9. F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012). [CrossRef]   [PubMed]  

10. A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110, 030502 (2013). [CrossRef]  

11. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7, 378–381 (2013). [CrossRef]  

12. D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6, 19201 (2016). [CrossRef]   [PubMed]  

13. D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23, 17511–17519 (2015). [CrossRef]   [PubMed]  

14. C. Wang, D. Huang, P. Huang, D. Lin, J. Peng, and G. Zeng, “25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel,” Sci. Rep. 5, 14607 (2015). [CrossRef]  

15. S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New J. Phys. 11, 045023 (2009). [CrossRef]  

16. P. Jouguet, S. Kunz-Jacques, T. Debuisschert, S. Fossier, E. Diamanti, R. Alléaume, R. Tualle-Brouri, P. Grangier, A. Leverrier, P. Pache, and P. Painchault, “Field test of classical symmetric encryption with continuous variables quantum key distribution,” Opt. Express 20, 14030–14041 (2012). [CrossRef]   [PubMed]  

17. D. Huang, P. Huang, H. Li, T. Wang, Y. Zhou, and G. Zeng, “Field demonstration of a continuous-variable quantum key distribution network,” Opt. Lett. 41, 3511–3514 (2016). [CrossRef]   [PubMed]  

18. X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013). [CrossRef]  

19. X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol,” Phys. Rev. A 87, 052309 (2013). [CrossRef]  

20. J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013). [CrossRef]  

21. J. Z. Huang, S. Kunz-Jacques, P. Jouguet, C. Weedbrook, Z. Q. Yin, S. Wang, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking on quantum key distribution using homodyne detection,” Phys. Rev. A 89, 032304 (2014). [CrossRef]  

22. H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A 94, 012325 (2016). [CrossRef]  

23. P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013). [CrossRef]  

24. C. Wang, P. Huang, D. Huang, D. Lin, and G. H. Zeng, “Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects,” Phys. Rev. A 93, 022315 (2016). [CrossRef]  

25. D. K. Lin, P. Huang, D. Huang, C. Wang, J. Y. Peng, and G. H. Zeng, “High performance frame synchronization for continuous variable quantum key distribution systems,” Opt. Express 23, 22190–22198 (2015). [CrossRef]   [PubMed]  

26. EV10AQ190 datasheet, “EV10AQ190A low power quad 10-bit 1.25 Gsps ADC operating up to 5 Gsps quadruple analog to digital converter,” http://www.e2v.com/products/semiconductors/adc/ev10aq190a/.

27. P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfections in practical continuous-variable quantum key distribution,” Phys. Rev. A 86, 032309 (2012). [CrossRef]  

28. Y-M. Chi, B. Qi, W. Zhu, L. Qian, H-K. Lo, S-H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13, 013003 (2011). [CrossRef]  

29. M. Heurs, J. G. Webb, A. E. Dunlop, C. C. Harb, T. C. Ralph, and E. H. Huntington, “Multiplexed communication over a high-speed quantum channel,” Phys. Rev. A 81, 032325 (2010). [CrossRef]  

30. B. Qi, L. L. Huang, L. Qian, and H-K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007). [CrossRef]  

31. A. Andalib, A. Rostami, and N. Granpayeh, “Analytical investigation and evaluation of pulse broadening factor propagating through nonlinear optical fibers (traditional and optimum dispersion compensated fibers),” Progress In Electromagnetics Research 79, 119–136 (2008). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1 The structure of Bob’s apparatus in previous CVQKD system. PBS: polarization beam splitter; PD: phtodiode; LO: local oscillator; PM: phase modulator; ψ: random phase of 0 or π/2; 10:90 and 50:50 (reflectivity:transmittance), beam splitters. Data Pre-Processing: a module of the data acquisition sub-system, used to obtain raw key from the output data of ADC; Data Post-Processing Sub-system: used to obtain final secret key, including reconciliation, decoding, error correction and privacy amplification procedures.
Fig. 2
Fig. 2 The structure of Bob’s apparatus in the proposed CVQKD system. PBS: polarization beam splitter; PD: photodiode; LO: local oscillator; PM: phase modulator; ψ: random phase of 0 or π/2; 10:90 and 50:50 (reflectivity:transmittance), beam splitters; DDM: Dynamic delay adjusting module; Data Pre-Processing: a module of data acquisition sub-system, used to obtain raw key from the output data of ADC; Data Post-Processing Sub-system: used to obtain final secret key, including reconciliation, decoding, error correction and privacy amplification procedures.
Fig. 3
Fig. 3 The estimated excess noise as a function of system repetition rate. The transmission distance L = 25 km and εreal = 0.04. From top to bottom, the three dashed curves are obtained with ts = 5 ps, 10 ps and 20 ps, while the three solid curves are obtained with fsamp = 5 GHz, 3 GHz and 1 GHz, respectively.
Fig. 4
Fig. 4 Secret key rates under different conditions. Parameters are set as: VA = 5N0, β = 0.95, ξ = 0.01N0, Vel = 0.01N0, PE = 10−10, N = 109, η = 0.6. (a) The secret key rate bound of CVQKD system as a function of distance. The system repetition rate fr =10 MHz, the three solid curves from left to right are obtained with fsamp = 1 GHz, 3 GHz and 5 GHz, corresponding to previous schemes. The three dashed curves are obtained with ts =5 ps, 10 ps and 20 ps, corresponding to the new scheme. (b) The secret key rate of CVQKD system as a function of the system repetition rate. The transmission distance L = 50 km.
Fig. 5
Fig. 5 The relative change of statistical power with the change of the tdly. Curves from top to bottom are obtained with fr = 10 MHz, 25 MHz, 50 MHz, 80 MHz, 100 MHz and ts is set to 10 ps.

Equations (47)

Equations on this page are rendered with MathJax. Learn more.

T r = M * t s + Δ t ,
P i = j = 1 L A i ( j ) 2 ,
t i = i * t s , i [ 0 , M 1 ] ,
P max = max { P i , i = 0 , 1 , 2 , , M 2 , M 1 } = P m 0 , m 0 [ 0 , 1 , 2 , , M 2 , M 1 ] .
t final = | t init m 0 * t s | = Δ t 0 ,
r ( t ) = A p e ( t μ ) 2 / ( 2 σ 2 ) ,
A s = A p e 8 δ 2 ,
E norml = 1 e 8 δ 2 .
y = t x + z ,
x 2 = V A , x y = η T V A ,
y 2 = η T ( V A + ξ ) + N 0 + V el ,
t ^ = i = 1 m x i y i i = 1 m x i 2 ,
σ ^ z 2 = 1 m i = 1 m ( y i t ^ x i ) 2 ,
V ^ A = 1 m i = 1 m x i 2 .
t ^ ~ 𝒩 ( t , σ z 2 i = 1 m x i 2 ) ,
m σ ^ z 2 σ z 2 , m V ^ A V A ~ χ 2 ( m 1 ) ,
t [ t ^ Δ T , t ^ + Δ T ] ,
σ z 2 [ σ ^ z 2 Δ σ z 2 , σ ^ z 2 + Δ σ z 2 ] ,
V A [ V ^ A Δ V A , V ^ A + Δ V A ] ,
erf ( x ) = 2 π 0 x e t 2 d t .
T = t ^ 2 / η ,
ξ = ( σ ^ z 2 N 0 V el ) / t ^ 2 .
x 2 = V A , x y real = e 8 δ 2 η T real V A ,
y real 2 = e 16 δ 2 [ η T real ( V A + ξ real ) + N 0 ] + V el .
x y = x y real ,
y 2 = y real 2 .
η T est V A = e 8 δ 2 η T real V A ,
η T est ( V A + ξ est ) + N 0 + V el = e 16 δ 2 [ η T real ( V A + ξ real ) + N 0 ] + V el ,
T real = e 16 δ 2 T est ,
ξ real = ξ est + 1 η T est ( 1 e 16 δ 2 ) N 0 ,
B f ( z ) = [ 1 + 1 4 σ 4 ( 0 z β 2 ( z ) d z ) 2 ] 1 / 2 ,
T real = e 1600 f r 2 t s 2 T est ,
ξ real = ξ est + 1 η T est ( 1 e 1600 f r 2 t s 2 ) N 0 .
ε real = ε e s t + 1 η T est ( 1 e 1600 f r 2 t s 2 ) .
ε f s b = ε real ε est = 1 η T est ( 1 e 1600 f r 2 t s 2 ) .
K finite = n N [ β I ( X : Y ) S PE ( Y : E ) Δ ( n ) ] ,
R finite = f r * K finite ,
A sdly = A p exp [ 8 ( 2 t dly + t s ) 2 / t p 2 ] ,
r = A sdly / A s = exp [ 32 t dly ( t dly + t s ) / t p 2 ] ,
P sdly = i = 1 L A sdly ( i ) 2 , P s = i = 1 L A s ( i ) 2 ,
R = P sdly / P s = r 2 P s / P s = exp [ 64 t dly ( t dly + t s ) / t p 2 ] ,
R = exp [ 64 t dly ( t dly + t s ) / ( t r / 10 ) 2 ] = exp [ 6400 f r 2 t dly ( t dly + t s ) ] ,
ξ ^ calib IR N 0 = N 0 N 0 [ 2.1 + 1 η T ( 1 N 0 N 0 ) ] 0.1 ,
N 0 N 0 0.1 + 1 η T 2.1 + 1 η T ,
N 0 N 0 41 61 0.6721 .
N 0 = r 2 N 0 .
P sdly P s = N 0 N 0 41 61 0.6721 ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.