Abstract

Quantum key distribution (QKD) protocols allow two trusted parties to distribute a cryptographic key which they can further use for the unconditionally secure classical communication. During the last decades the field has grown mature with the commercial prototypes being available. They mostly rely on the faint laser pulses implementing the protocols on the basis of single qubits and qubit pairs. Alternatively, the continuous-variable (CV) protocols based on the multi-photon states of light were developed recently. They are typically built using the quadrature modulation of the coherent or squeezed states and subsequent homodyne detection. In the case of Gaussian modulation the security of the protocols is based on the extremality of Gaussian states, which allows estimating bounds on the leaked information. The Gaussian CV QKD protocols were shown secure for any degree of channel attenuation, but are restricted by the channel noise. Moreover, the applicability of Gaussian CV QKD protocols is limited by the effectiveness of classical post-processing algorithms, used by the trusted parties to process the measured data and distill the cryptographic key. On the other hand, the squeezedstate CV QKD protocols were previously considered ineffective under limited degrees of squeezing, while strong squeezing remains experimentally challenging. In the present work we distinguish between the classical and quantum resources in the Gaussian CV QKD and address the role of nonclassicality in the Gaussian protocols. We demonstrate, that by properly combining squeezed resource and coherent modulation, trusted parties are able to decouple eavesdropper from the channel, thus being able to establish the secure key from any amount of the classical mutual information. Our result shows a very promising path towards the long-distance CV QKD.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call