Abstract

Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment due to the large technological overlap with deployed modern optical communication devices. The security of discrete modulation schemes has previously analyzed in the ideal detector scenario in the asymptotic limit. In this work, we calculate asymptotic key rates against collective attacks in the trusted detector noise scenario. Our results show that we can thus cut out most of the effect of detector noise and obtain asymptotic key rates similar to those had we access to ideal detectors.

Highlights

  • Quantum key distribution (QKD) [1,2] is a key establishment protocol with the provable information-theoretic security

  • We remark that Gaussian modulation schemes have been analyzed in the trusted detector noise scenario [11,32,33,34] and it is known that the effects of electronic noise and detector inefficiency on the key rates are not very significant in the trusted detector noise scenario compared to the ideal detector scenario under realistic experimental conditions

  • We provide a method to analyze the asymptotic security of a discrete modulation scheme of CVQKD in the trusted detector noise scenario where both nonunity detector efficiency and electronic noise are trusted

Read more

Summary

INTRODUCTION

Quantum key distribution (QKD) [1,2] is a key establishment protocol with the provable information-theoretic security. We extend our previous analysis [31] to the trusted detector noise scenario where detector imperfections (detector inefficiency and electronic noise) are not accessible to Eve. We remark that Gaussian modulation schemes have been analyzed in the trusted detector noise scenario [11,32,33,34] and it is known that the effects of electronic noise and detector inefficiency on the key rates are not very significant in the trusted detector noise scenario compared to the ideal detector scenario under realistic experimental conditions. In our analysis, based on a (commonly used) quantum optical model of the imperfect detector, we find its corresponding mathematical description in terms of positive operator-valued measure (POVM) and use this POVM to construct observables corresponding to quantities that are measured experimentally These observables are used in our security proof.

BACKGROUND
Quadrature phase-shift keying protocol
Source-replacement scheme
Key-rate optimization
NOISY HETERODYNE DETECTION
Trusted detector noise model
POVM description
KEY-RATE OPTIMIZATION PROBLEM
Revised optimization problem in the trusted detector noise scenario
SIMULATION METHOD
Channel model for simulation
Simulated statistics
Estimation of error-correction cost
KEY RATE IN THE ABSENCE OF POSTSELECTION
Comparison between trusted and untrusted detector noise scenarios
Detector imperfection in the trusted detector noise scenario
KEY RATE WITH POSTSELECTION
VIII. SUMMARY AND FUTURE DIRECTIONS
Basic Wigner functions
Derivation
Simple case
General case
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.