Abstract

Discrete-modulated continuous-variable quantum key distribution with homodyne detection is widely recognized for its ease of implementation, efficiency with respect to error correction, and its compatibility with modern optical communication devices. However, recent studies report that the application of homodyne detection obtains poor tolerance to excess noise and insufficient transmission distance, hence seriously restricting the large-scale deployment of quantum secure communication networks. In this paper, we propose a homodyne detection protocol using the quadrature phase shift keying technique. By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level. Furthermore, we demonstrate that homodyne detection performs better than heterodyne detection in quaternary-modulated continuous-variable quantum key distribution under the untrusted detector noise scenario. The security is analyzed using the tight numerical method against collective attacks in the asymptotic regime. Our results imply that the current protocol is able to distribute keys in nearly intercity area and thus paves the way for constructing low-cost quantum secure communication networks.

Highlights

  • In recent years, the rapid development of quantum computing [1,2] has signaled the coming quantum era, which threatens modern secure communications

  • Since the protocol proposed by Bennett and Brassard in 1984 [6], a large number of discrete-variable quantum key distribution (DV-Quantum key distribution (QKD)) protocols, based on various discrete degrees of freedom of a single photon, have

  • We propose a quaternarymodulated homodyne detection protocol with very high excess noise tolerance and long transmission distance that has never been reached by previous discrete-modulated homodyne detection protocols [51,61,62]

Read more

Summary

INTRODUCTION

The rapid development of quantum computing [1,2] has signaled the coming quantum era, which threatens modern secure communications. The security proof of a binary-modulated protocol has been proposed in the finite-key-size regime against general coherent attacks [55]. Unlike in previous quaternary-modulated protocols [50,51], we prepare each signal with the phase chosen from {(π/4), (3π /4), (5π /4), (7π /4)}, which can be implemented using classical quadrature phase shift keying (QPSK) technology. We require the sender to generate raw keys according to quadrature choices of the receiver According to this interesting operation, our protocol shows good tolerance to excess noise and promises significantly longer transmission distances than the previous homodyne detection protocol [51]. The sender Alice prepares randomly one of four coherent states αei(π/4) , αei(3π/4) , αei(5π/4) , αei(7π/4) with equal probabilities.

PROTOCOL DESCRIPTION
SECRET KEY RATE
Entanglement-based protocol
Key rate formula
Numerical method
PERFORMANCE
Findings
DISCUSSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call