Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a gene...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-02-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/23/3/294 |
_version_ | 1797417262226866176 |
---|---|
author | Yiming Bian Luyu Huang Yichen Zhang |
author_facet | Yiming Bian Luyu Huang Yichen Zhang |
author_sort | Yiming Bian |
collection | DOAJ |
description | We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect. |
first_indexed | 2024-03-09T06:16:09Z |
format | Article |
id | doaj.art-eec777e60c104666aff20c289c40d519 |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-03-09T06:16:09Z |
publishDate | 2021-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-eec777e60c104666aff20c289c40d5192023-12-03T11:53:45ZengMDPI AGEntropy1099-43002021-02-0123329410.3390/e23030294Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent StatesYiming Bian0Luyu Huang1Yichen Zhang2State Key Laboratory of Information Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Information Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Information Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaWe propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.https://www.mdpi.com/1099-4300/23/3/294continuous-variable quantum key distributiontwo-way schemeunidimensional modulationgeneral two-mode attacksoptimal attack strategy |
spellingShingle | Yiming Bian Luyu Huang Yichen Zhang Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States Entropy continuous-variable quantum key distribution two-way scheme unidimensional modulation general two-mode attacks optimal attack strategy |
title | Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States |
title_full | Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States |
title_fullStr | Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States |
title_full_unstemmed | Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States |
title_short | Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States |
title_sort | unidimensional two way continuous variable quantum key distribution using coherent states |
topic | continuous-variable quantum key distribution two-way scheme unidimensional modulation general two-mode attacks optimal attack strategy |
url | https://www.mdpi.com/1099-4300/23/3/294 |
work_keys_str_mv | AT yimingbian unidimensionaltwowaycontinuousvariablequantumkeydistributionusingcoherentstates AT luyuhuang unidimensionaltwowaycontinuousvariablequantumkeydistributionusingcoherentstates AT yichenzhang unidimensionaltwowaycontinuousvariablequantumkeydistributionusingcoherentstates |