Secret key rate of a continuous-variable quantum-key-distribution scheme when the detection process is inaccessible to eavesdroppers

被引:6
作者
Namiki, Ryo [1 ]
Kitagawa, Akira [2 ]
Hirano, Takuya [1 ]
机构
[1] Gakushuin Univ, Dept Phys, Toshima Ku, 1-5-1 Mejiro, Tokyo 1718588, Japan
[2] Kochi Univ, Fac Educ, 2-5-1 Akebono Cho, Kochi 7808520, Japan
关键词
DISTRIBUTION NETWORK; FIELD-TEST; SECURITY; AREA;
D O I
10.1103/PhysRevA.98.042319
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We have developed a method to calculate a secret key rate of a continuous-variable quantum-key-distribution scheme using four coherent states and postselection for a general model of Gaussian attacks. We assume that the transmission line and detection process are described by a pair of Gaussian channels. In our analysis, while the loss and noise on the transmission line are induced by an eavesdropper, Eve, who can replace the transmission line with a lossless and noiseless optical fiber, she is assumed inaccessible to the detection process. By separating the transmission noise and detection noise, we can always extract a larger key compared with the case that all loss and noises are induced by an eavesdropper's interference. An asymptotic key rate against collective Gaussian attacks can be determined numerically for the given channels' parameters. The improvement of the key rates turns out to be more significant for the reverse-reconciliation scheme.
引用
收藏
页数:9
相关论文
共 49 条
[11]   Characterization of Gaussian operations and distillation of Gaussian states [J].
Giedke, G ;
Cirac, JI .
PHYSICAL REVIEW A, 2002, 66 (03) :7
[12]  
Grosshans F, 2003, QUANTUM INF COMPUT, V3, P535
[13]   Upper bounds of eavesdropper's performances in finite-length code with the decoy method [J].
Hayashi, Masahito .
PHYSICAL REVIEW A, 2007, 76 (01)
[14]   Security of coherent-state quantum cryptography in the presence of Gaussian noise [J].
Heid, Matthias ;
Luetkenhaus, Norbert .
PHYSICAL REVIEW A, 2007, 76 (02)
[15]   Efficiency of coherent-state quantum cryptography in the presence of loss:: Influence of realistic error correction [J].
Heid, Matthias ;
Luetkenhaus, Norbert .
PHYSICAL REVIEW A, 2006, 73 (05)
[16]   Quantum cryptography using pulsed homodyne detection [J].
Hirano, T ;
Yamanaka, H ;
Ashikaga, M ;
Konishi, I ;
Namiki, R .
PHYSICAL REVIEW A, 2003, 68 (04) :7
[17]   Implementation of continuous-variable quantum key distribution with discrete modulation [J].
Hirano, Takuya ;
Ichikawa, Tsubasa ;
Matsubara, Takuto ;
Ono, Motoharu ;
Oguri, Yusuke ;
Namiki, Ryo ;
Kasai, Kenta ;
Matsumoto, Ryutaroh ;
Tsurumaru, Toyohiro .
QUANTUM SCIENCE AND TECHNOLOGY, 2017, 2 (02)
[18]   Field demonstration of a continuous-variable quantum key distribution network [J].
Huang, Duan ;
Huang, Peng ;
Li, Huasheng ;
Wang, Tao ;
Zhou, Yingming ;
Zeng, Guihua .
OPTICS LETTERS, 2016, 41 (15) :3511-3514
[19]   High-speed continuous-variable quantum key distribution without sending a local oscillator [J].
Huang, Duan ;
Huang, Peng ;
Lin, Dakai ;
Wang, Chao ;
Zeng, Guihua .
OPTICS LETTERS, 2015, 40 (16) :3695-3698
[20]   Notes on a Continuous-Variable Quantum Key Distribution Scheme [J].
Ichikawa, Tsubasa ;
Hirano, Takuya ;
Matsubara, Takuto ;
Ono, Motoharu ;
Namiki, Ryo .
JOURNAL OF THE PHYSICAL SOCIETY OF JAPAN, 2017, 86 (09)