Floodlight quantum key distribution: A practical route to gigabit-per-second secret-key rates

被引:43
作者
Zhuang, Quntao [1 ,2 ]
Zhang, Zheshen [1 ]
Dove, Justin [1 ]
Wong, Franco N. C. [1 ]
Shapiro, Jeffrey H. [1 ]
机构
[1] MIT, Elect Res Lab, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] MIT, Dept Phys, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
CRYPTOGRAPHY; CAPACITY; THEOREM;
D O I
10.1103/PhysRevA.94.012322
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The channel loss incurred in long-distance transmission places a significant burden on quantum key distribution (QKD) systems: they must defeat a passive eavesdropper who detects all the light lost in the quantum channel and does so without disturbing the light that reaches the intended destination. The current QKD implementation with the highest long-distance secret-key rate meets this challenge by transmitting no more than one photon per bit [M. Lucamarini et al., Opt. Express 21, 24550 (2013)]. As a result, it cannot achieve the Gbps secret-key rate needed for one-time pad encryption of large data files unless an impractically large amount of multiplexing is employed. We introduce floodlight QKD (FL-QKD), which floods the quantum channel with a high number of photons per bit distributed over a much greater number of optical modes. FL-QKD offers security against the optimum frequency-domain collective attack by transmitting less than one photon per mode and using photon-coincidence channel monitoring, and it is completely immune to passive eavesdropping. More importantly, FL-QKD is capable of a 2-Gbps secret-key rate over a 50-km fiber link, without any multiplexing, using available equipment, i.e., no new technology need be developed. FL-QKD achieves this extraordinary secret-key rate by virtue of its unprecedented secret-key efficiency, in bits per channel use, which exceeds those of state-of-the-art systems by two orders of magnitude.
引用
收藏
页数:17
相关论文
共 27 条
[1]   Quantum data processing [J].
Ahlswede, R ;
Löber, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (01) :474-478
[2]  
Bennett C H, 1984, P IEEE INT C COMP SY, V175, P175
[3]   Entanglement-assisted capacity of a quantum channel and the reverse Shannon theorem [J].
Bennett, CH ;
Shor, PW ;
Smolin, JA ;
Thapliyal, AV .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (10) :2637-2655
[4]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[5]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[6]   Continuous variable quantum cryptography using coherent states [J].
Grosshans, F ;
Grangier, P .
PHYSICAL REVIEW LETTERS, 2002, 88 (05) :4
[7]   Evaluating capacities of bosonic Gaussian channels [J].
Holevo, A.S. ;
Werner, R.F. .
Physical Review A. Atomic, Molecular, and Optical Physics, 2001, 63 (03) :323121-323121
[8]   Continuous-variable quantum key distribution with 1 Mbps secure key rate [J].
Huang, Duan ;
Lin, Dakai ;
Wang, Chao ;
Liu, Weiqi ;
Fang, Shuanghong ;
Peng, Jinye ;
Huang, Peng ;
Zeng, Guihua .
OPTICS EXPRESS, 2015, 23 (13) :17511-17519
[9]   Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation (vol 102, 180504, 2009) [J].
Leverrier, Anthony ;
Grangier, Philippe .
PHYSICAL REVIEW LETTERS, 2011, 106 (25)
[10]   Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation [J].
Leverrier, Anthony ;
Grangier, Philippe .
PHYSICAL REVIEW A, 2011, 83 (04)