Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States

We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a gene...

Full description

Bibliographic Details
Main Authors: Yiming Bian, Luyu Huang, Yichen Zhang
Format: Article
Language:English
Published: MDPI AG 2021-02-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/23/3/294
_version_ 1797417262226866176
author Yiming Bian
Luyu Huang
Yichen Zhang
author_facet Yiming Bian
Luyu Huang
Yichen Zhang
author_sort Yiming Bian
collection DOAJ
description We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.
first_indexed 2024-03-09T06:16:09Z
format Article
id doaj.art-eec777e60c104666aff20c289c40d519
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-03-09T06:16:09Z
publishDate 2021-02-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-eec777e60c104666aff20c289c40d5192023-12-03T11:53:45ZengMDPI AGEntropy1099-43002021-02-0123329410.3390/e23030294Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent StatesYiming Bian0Luyu Huang1Yichen Zhang2State Key Laboratory of Information Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Information Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaState Key Laboratory of Information Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaWe propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.https://www.mdpi.com/1099-4300/23/3/294continuous-variable quantum key distributiontwo-way schemeunidimensional modulationgeneral two-mode attacksoptimal attack strategy
spellingShingle Yiming Bian
Luyu Huang
Yichen Zhang
Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
Entropy
continuous-variable quantum key distribution
two-way scheme
unidimensional modulation
general two-mode attacks
optimal attack strategy
title Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
title_full Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
title_fullStr Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
title_full_unstemmed Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
title_short Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States
title_sort unidimensional two way continuous variable quantum key distribution using coherent states
topic continuous-variable quantum key distribution
two-way scheme
unidimensional modulation
general two-mode attacks
optimal attack strategy
url https://www.mdpi.com/1099-4300/23/3/294
work_keys_str_mv AT yimingbian unidimensionaltwowaycontinuousvariablequantumkeydistributionusingcoherentstates
AT luyuhuang unidimensionaltwowaycontinuousvariablequantumkeydistributionusingcoherentstates
AT yichenzhang unidimensionaltwowaycontinuousvariablequantumkeydistributionusingcoherentstates