Abstract
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.
Highlights
Quantum key distribution (QKD) [1] is an effective way to ensure communication security and resist the impact of quantum computing on an encryption system [2,3]
Bob still uses conventional Gaussian modulation to reduce the complexity of security analysis, and to avoid dramatic degradation of the protocol performance caused by multiple use of unidimensional modulation
To get the worst protocol performance degradation caused by the loss of correlation parameters, the worst correlation parameter Cor worst which minimize the secret key rate is used for security analysis [28,29,30,31,32,33,34,35,36]
Summary
Quantum key distribution (QKD) [1] is an effective way to ensure communication security and resist the impact of quantum computing on an encryption system [2,3]. Alice’s side instead of the conventional Gaussian modulation, which enables the two-way system to work with a single quadrature modulation In this way, the complexity of the protocol and the number of quantum random numbers required are reduced. The complexity of the protocol and the number of quantum random numbers required are reduced In this protocol, Bob still uses conventional Gaussian modulation to reduce the complexity of security analysis, and to avoid dramatic degradation of the protocol performance caused by multiple use of unidimensional modulation. For the one-mode attack, there is no correlation between the two attack modes, while for the optimal two-mode attack, Eve is able to find the optimal attack correlations and minimize the performance of the protocol Under these two attack strategies, performances of the protocol within secure transmission distances are simulated and compared with that of symmetrical modulated counterparts
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.