Impact of transmitter imbalances on the security of continuous variables quantum key distribution

被引:0
作者
Daniel Pereira
Margarida Almeida
Armando N. Pinto
Nuno A. Silva
机构
[1] University of Aveiro,Instituto de Telecomunicações
[2] University of Aveiro,Department of Electronics, Telecommunications and Informatics
来源
EPJ Quantum Technology | 2023年 / 10卷
关键词
Continuous variables; Quantum key distribution; Device imperfections; Excess noise; Discrete modulated; Probabilistic constellation shaping;
D O I
暂无
中图分类号
学科分类号
摘要
Continuous-variable quantum key distribution (CV-QKD) provides a theoretical unconditionally secure solution to distribute symmetric keys among users in a communication network. However, the practical devices used to implement these systems are intrinsically imperfect, and, as a result, open the door to eavesdropper attacks. In this work, we study the impact of transmitter stage imperfections on the performance and security of a Discrete Modulated (DM) CV-QKD system using M-symbol Quadrature Amplitude Modulation (M-QAM) and Amplitude and Phase Shift Keying (M-APSK) coupled with Probabilistic Constellation Shaping (PCS). Assuming two different modulation stage topologies, we first deform the constellations and then evaluate the secure key rate achievable with the deformed constellation. The presented results show that, due to the erroneously estimated channel parameters, non-monitored imbalances greatly reduce the system’s performance, with situations where Bob and Alice estimate that no secure bits can be obtained while the real value of the key rate is still positive. Our results show the importance of monitoring these constellation imbalances and show that the optimal constellation may vary depending on the degree of device imperfection.
引用
收藏
相关论文
共 116 条
[1]  
Grosshans F(2002)Continuous variable quantum cryptography using coherent states Phys Rev Lett 88 1588-1591
[2]  
Grangier P(2018)Continuous-variable quantum key distribution with Gaussian modulation—the theory of practical implementations Adv Quantum Technol 1 3948-3951
[3]  
Laudenbach F(2010)Finite-size analysis of a continuous-variable quantum key distribution Phys Rev A 81 1-13
[4]  
Pacher C(1999)Continuous variable quantum cryptography Phys Rev A 61 3414-3435
[5]  
Fung C-HF(2015)Generating the local oscillator “locally” in continuous-variable quantum key distribution based on coherent detection Phys Rev X 5 undefined-undefined
[6]  
Poppe A(2013)Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol Phys Rev A 87 undefined-undefined
[7]  
Peev M(2013)Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack Phys Rev A 87 undefined-undefined
[8]  
Schrenk B(2014)Quantum hacking on quantum key distribution using homodyne detection Phys Rev A 89 undefined-undefined
[9]  
Hentschel M(2013)Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution Phys Rev A 87 undefined-undefined
[10]  
Walther P(2017)Continuous variable quantum key distribution with a real local oscillator using simultaneous pilot signals Opt Lett 42 undefined-undefined