Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol

被引:50
作者
Huang, Duan [1 ,2 ]
Huang, Peng [1 ,2 ]
Wang, Tao [1 ,2 ]
Li, Huasheng [1 ,2 ]
Zhou, Yingming [1 ,2 ]
Zeng, Guihua [1 ,2 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, State Key Lab Adv Opt Commun Syst & Networks, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Ctr Quantum Informat Sensing & Proc, Shanghai 200240, Peoples R China
[3] Northwest Univ, Coll Informat Sci & Technol, Xian 710127, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
CRYPTOGRAPHY; IMPLEMENTATION; SYSTEM;
D O I
10.1103/PhysRevA.94.032305
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We propose and experimentally demonstrate a continuous-variable quantum key distribution (CV-QKD) protocol using dual-phase-modulated coherent states. We show that the modulation scheme of our protocol works equivalently to that of the Gaussian-modulated coherent-states (GMCS) protocol, but shows better experimental feasibility in the plug-and-play configuration. Besides, it waives the necessity of propagation of a local oscillator (LO) between legitimate users and generates a real local LO for quantum measurement. Our protocol is proposed independent of the one-way GMCS QKD without sending a LO [Opt. Lett. 40, 3695 (2015); Phys. Rev. X 5, 041009 (2015); 5, 041010 (2015)]. In those recentworks, the system stability will suffer the impact of polarization drifts induced by environmental perturbations, and two independent frequency-locked laser sources are necessary to achieve reliable coherent detection. In the proposed protocol, these previous problems can be resolved. We derive the security bounds for our protocol against collective attacks, and we also perform a proof-of-principle experiment to confirm the utility of our proposal in real-life applications. Such an efficient scheme provides a way of removing the security loopholes associated with the transmitting LO, which have been a notoriously hard problem in continuous-variable quantum communication.
引用
收藏
页数:11
相关论文
共 60 条
  • [1] Continuous-variable quantum key distribution with noisy coherent states
    Filip, Radim
    [J]. PHYSICAL REVIEW A, 2008, 77 (02):
  • [2] Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers
    Fossier, S.
    Diamanti, E.
    Debuisschert, T.
    Tualle-Brouri, R.
    Grangier, P.
    [J]. JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2009, 42 (11)
  • [3] Field test of a continuous-variable quantum key distribution prototype
    Fossier, S.
    Diamanti, E.
    Debuisschert, T.
    Villing, A.
    Tualle-Brouri, R.
    Grangier, P.
    [J]. NEW JOURNAL OF PHYSICS, 2009, 11
  • [4] Fred Fung C.-H., 2007, PHYS REV A, V75
  • [5] Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks
    Furrer, F.
    Franz, T.
    Berta, M.
    Leverrier, A.
    Scholz, V. B.
    Tomamichel, M.
    Werner, R. F.
    [J]. PHYSICAL REVIEW LETTERS, 2012, 109 (10)
  • [6] Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution
    Garcia-Patron, Raul
    Cerf, Nicolas J.
    [J]. PHYSICAL REVIEW LETTERS, 2006, 97 (19)
  • [7] Gehring T., ARXIV150701003V2
  • [8] Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
    Gehring, Tobias
    Haendchen, Vitus
    Duhme, Joerg
    Furrer, Fabian
    Franz, Torsten
    Pacher, Christoph
    Werner, Reinhard F.
    Schnabel, Roman
    [J]. NATURE COMMUNICATIONS, 2015, 6
  • [9] Trojan-horse attacks on quantum-key-distribution systems
    Gisin, N
    Fasel, S
    Kraus, B
    Zbinden, H
    Ribordy, G
    [J]. PHYSICAL REVIEW A, 2006, 73 (02):
  • [10] Quantum cryptography
    Gisin, N
    Ribordy, GG
    Tittel, W
    Zbinden, H
    [J]. REVIEWS OF MODERN PHYSICS, 2002, 74 (01) : 145 - 195