Abstract

A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions.

Highlights

  • Quantum key distribution (QKD) [1,2,3,4], as one of the most prominent applications of quantum information science, allows two legitimate partners, i.e., Alice and Bob, to achieve the secure key distribution phase of an encrypted communication

  • The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions

  • Compared with one-way CV-QKD protocols, the secret key of CV-MDI QKD protocols is established by the measurement results of an untrusted third party, which reduces the performance of the protocols [42]

Read more

Summary

Introduction

Quantum key distribution (QKD) [1,2,3,4], as one of the most prominent applications of quantum information science, allows two legitimate partners, i.e., Alice and Bob, to achieve the secure key distribution phase of an encrypted communication. Compared with one-way CV-QKD protocols, the secret key of CV-MDI QKD protocols is established by the measurement results of an untrusted third party, which reduces the performance of the protocols [42]. CV-QKD protocol with untrusted detection under realistic conditions, including three different schemes based on using unidimensional modulated coherent states at each side (Alice’s side or Bob’s side), and both sides (both Alice’s and Bob’s side). It is found that the optimal performance, in terms of both key rates and maximal transmission distance, of the protocol is achieved using unidimensional modulated coherent states at both Alice’s and Bob’s side. An independent work [61] was posted on arXiv. This work studied the performance of the measurement-device-independent CV-QKD protocol using unidimensional modulated coherent states in both Alice’s and Bob’s sides

Unidimensional CV-QKD Protocol with Untrusted Detection
Security Analysis
Using Unidimensional Modulated Coherent States Only in Alice’s Side
B1 matrix γ A
Using Unidimensional Modulated Coherent States ONLY in Bob’s Side
Using Unidimensional Modulated Coherent States Both in Alice’s and Bob’s Side
Numeral Simulation
Discussion and Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call