Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Optimization of a New Design of Molten Salt-to-CO2 Heat Exchanger Using Exergy Destruction Minimization
Next Article in Special Issue
Strategies for Positive Partial Transpose (PPT) States in Quantum Metrologies with Noise
Previous Article in Journal
Characteristics of Shannon’s Information Entropy of Atomic States in Strongly Coupled Plasma
Previous Article in Special Issue
Wave–Particle–Entanglement–Ignorance Complementarity for General Bipartite Systems
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Improvement of Discretely Modulated Continuous-Variable Quantum Key Distribution with Untrusted Source via Heralded Hybrid Linear Amplifier

1
School of Traffic and Transportation Engineering, Central South University, Changsha 410083, China
2
Jiangsu Key Construction Laboratory of IoT Application Technology, Taihu University, Wuxi 214064, China
3
School of Automation, Central South University, Changsha 410083, China
4
College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2020, 22(8), 882; https://doi.org/10.3390/e22080882
Submission received: 1 July 2020 / Revised: 5 August 2020 / Accepted: 7 August 2020 / Published: 12 August 2020
(This article belongs to the Special Issue Quantum Entanglement)
Figure 1
<p>(Color online) Schematic of the entangled source in middle (ESIM) CVQKD using a hybrid amplifier. In the entanglement-based model, Alice detects one of the EPR states by heterodyne detector and the hybrid linear amplifier is installed before Bob uses either the homodyne or heterodyne detector to measure the other half of EPR states. Eve’s attack consists of two entangling cloner attacks on either side of the source. The yellow box of <math display="inline"><semantics> <msup> <mi>g</mi> <mover accent="true"> <mi>n</mi> <mo stretchy="false">^</mo> </mover> </msup> </semantics></math> shows the hybrid linear amplifier.</p> ">
Figure 2
<p>(Color online) Four-state discrete modulation in phase space.</p> ">
Figure 3
<p>(Color online) An EPR state <math display="inline"><semantics> <mrow> <mo stretchy="false">|</mo> <mi>λ</mi> <mo stretchy="false">〉</mo> </mrow> </semantics></math> sent through a Gaussian quantum channel with transmittance <math display="inline"><semantics> <msub> <mi>T</mi> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>T</mi> <mn>2</mn> </msub> </semantics></math>, excess noise <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math>, and detection-added noise <math display="inline"><semantics> <mi>χ</mi> </semantics></math> has been replaced by an EPR state <math display="inline"><semantics> <mrow> <mo stretchy="false">|</mo> <mi>ζ</mi> <mo stretchy="false">〉</mo> </mrow> </semantics></math> sent through a Gaussian quantum channel with transmittance <math display="inline"><semantics> <msub> <mi>η</mi> <mi>a</mi> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>η</mi> <mn>2</mn> </msub> </semantics></math>, excess noise <math display="inline"><semantics> <msub> <mi>ϵ</mi> <mrow> <mi>g</mi> <mi>n</mi> </mrow> </msub> </semantics></math>, and detection-added noise <math display="inline"><semantics> <msub> <mi>χ</mi> <mrow> <mi>g</mi> <mi>d</mi> </mrow> </msub> </semantics></math>, but without the hybrid amplifier.</p> ">
Figure 4
<p>(Color online) The heralded hybrid linear amplifier is applied at Bob side. The mode <math display="inline"><semantics> <msub> <mi>B</mi> <mn>1</mn> </msub> </semantics></math> first goes through into a beam splitter with transmissivity <math display="inline"><semantics> <msub> <mi>T</mi> <mi>g</mi> </msub> </semantics></math>, then the reflected mode goes through into the MB-NLA concatenated by a dual-heterodyne detection and NLA. Here, the dual-heterodyne detection is used to measure the <span class="html-italic">X</span> and <span class="html-italic">P</span> quadrature of the reflected mode, respectively. After that we set a DLA and an elector-optic modulator (EOM) to dispose the amplified signal pulse and output mode <math display="inline"><semantics> <msub> <mi>B</mi> <mn>2</mn> </msub> </semantics></math> by a beam splitter with transmissivity 99:1.</p> ">
Figure 5
<p>(Color online) The optimal value range for <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>N</mi> <mi>L</mi> <mi>A</mi> </mrow> </msub> </semantics></math>. The X-coordination and Y-coordination represent gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detector (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 1. Here, the distance be set as 15, 20, and 25 km. Moreover, the fixed parameter values are set with <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>.</p> ">
Figure 6
<p>(Color online) The optimal value range for <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>N</mi> <mi>L</mi> <mi>A</mi> </mrow> </msub> </semantics></math>. The X-coordination and Y-coordination represent the gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detectors (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 2. Here, the distance be set as 30, 35, 40, and 45 km. Moreover, the fixed parameter values are set with <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>.</p> ">
Figure 7
<p>(Color online) The optimal value range for <math display="inline"><semantics> <msub> <mi>g</mi> <mrow> <mi>N</mi> <mi>L</mi> <mi>A</mi> </mrow> </msub> </semantics></math>. The X-coordination and Y-coordination represent gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detector (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 3. Here, the distance be set as 90, 95, and 100 km. Moreover, the fixed parameter values are set with <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>.</p> ">
Figure 8
<p>(Color online) Considering the above three public areas denoted in <a href="#entropy-22-00882-f005" class="html-fig">Figure 5</a>, <a href="#entropy-22-00882-f006" class="html-fig">Figure 6</a> and <a href="#entropy-22-00882-f007" class="html-fig">Figure 7</a>, we get the overlapping region in this figure, which represents the optimal gain value range of proposed scheme.</p> ">
Figure 9
<p>(Color online) The performance of proposed schemes for different <math display="inline"><semantics> <msub> <mi>L</mi> <mn>1</mn> </msub> </semantics></math>. The fixed parameters are set with <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>N</mi> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>. Here, the light blue solid lines and red solid lines express the scheme without hybrid amplifier, moreover dark blue solid lines and orange lines represent the scheme with hybrid amplifier.</p> ">
Figure 10
<p>(Color online) The performance of schemes with four-state untested source via hybrid amplifier and heterodyne detection in different <math display="inline"><semantics> <msub> <mi>L</mi> <mn>1</mn> </msub> </semantics></math>. The fixed parameters are set with <math display="inline"><semantics> <msub> <mi>g</mi> <mi>N</mi> </msub> </semantics></math> = 8, <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>.</p> ">
Figure 11
<p>(Color online) The performance of schemes with four-state untested source via hybrid amplifier and homodyne detection in different <math display="inline"><semantics> <msub> <mi>L</mi> <mn>1</mn> </msub> </semantics></math>. The fixed parameters are set with <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>N</mi> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math><math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>.</p> ">
Figure 12
<p>(Color online) Panel (<b>a</b>) shows the relationship between the transmission distance and secret key rate. It demonstrates the maximal transmission distance for the scheme with Gaussian modulation. Here, the parameters are set as <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>N</mi> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>. The dot-dash lines in the figure represent Gaussian modulation with an untested source. Furthermore, the solid lines represent Gaussian modulation with untested source via hybrid amplifier. Panel (<b>b</b>) also shows the relationship between transmission distance and secret key rate. Here, the parameters are also set as <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>N</mi> </msub> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>D</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ε</mi> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>V</mi> <mi>M</mi> </msub> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>. In panel (<b>b</b>), the green, dark blue, red, and light blue solid lines represent the Gaussian modulation with untested source via hybrid amplifier. Furthermore, the red dash line and yellow solid line represent the four-state discrete modulation with untested source. The red dot-dash line and yellow dot-dash line denote our proposed scheme (four-state discrete modulation with untested source via hybrid amplifier).</p> ">
Review Reports Versions Notes

Abstract

:
In practical quantum communication networks, the scheme of continuous-variable quantum key distribution (CVQKD) faces a challenge that the entangled source is controlled by a malicious eavesdropper, and although it still can generate a positive key rate and security, its performance needs to be improved, especially in secret key rate and maximum transmission distance. In this paper, we proposed a method based on the four-state discrete modulation and a heralded hybrid linear amplifier to enhance the performance of CVQKD where the entangled source originates from malicious eavesdropper. The four-state CVQKD encodes information by nonorthogonal coherent states in phase space. It has better transmission distance than Gaussian modulation counterpart, especially at low signal-to-noise ratio (SNR). Moreover, the hybrid linear amplifier concatenates a deterministic linear amplifier (DLA) and a noiseless linear amplifier (NLA), which can improve the probability of amplification success and reduce the noise penalty caused by the measurement. Furthermore, the hybrid linear amplifier can raise the SNR of CVQKD and tune between two types of performance for high-gain mode and high noise-reduction mode, therefore it can extend the maximal transmission distance while the entangled source is untrusted.

1. Introduction

Quantum key distribution (QKD) allows two legitimate parties to share the secure key string over an insure quantum channel [1,2,3,4,5]. The continuous-variable QKD (CVQKD) is one of alternative protocol of QKD, can provide higher detection efficiencies than original discrete-variable QKD (DVQKD) [6,7,8,9,10,11,12]. Furthermore, using the lase to generate the entangled source makes it easier to integrate with existing fiber network systems. However, compared with the DVQKD, the CVQKD has one of fatal disadvantages, which is the short secure transmission distance [11,13,14], especially if the entangled source is untrusted [15]. In fact the safety of CVQKD protocol has been proved where the entangle source is originated from the malicious eavesdropper [15], and it still can distill a positive key rate. However, the performance of this protocol is not great in terms of secret key rate and transmission distance, and thus could restrict the practical application of CVQKD in development. One of the main reasons for the short transmission distance of CVQKD is that traditional Gaussian modulation CVQKD cannot maintain relatively high reconciliation efficiency in long-distance transmission, but discretely the modulation scheme can solve this problem even better than using error correcting code [16]. The four-state discretely modulation scheme produces four nonorthogonal coherent states in phase space and thus it can randomly select those coherent states by different quadrature to encode information rather than using the x ^ and p ^ quadratures themselves. Due to the fact that, the received coherent state will be easier to distinguish with a traditional Gaussian counterpart. That is the reason why the discrete modulation scheme can reach relative longer transmission distance even at very low SNR [16].
The penalty noise caused by detector in Bob side will also directly affect the transmission distance performance of CVQKD protocol where the entanglement source is untrusted. In practice, the intrinsic disadvantage of the receiver’s apparatus, such as the efficiency of detector and the electrical noise referred by measurement, will decrease the secret key rate and thus shorten the transmission distance. In fact, optical amplifiers can solve such problem, for instance, the noiseless linear amplifier (NLA) is one of existing methods to overcome this limitation of detector. It can compensate the noise penalty and thus preserve the signal-to-noise ratio (SNR) [17,18,19,20,21]. However, the CVQKD scheme with non-traditional light source modulation and non-Gaussian operation, such as the discrete or unimensional modulation and photon subtraction operation, cannot directly implement via NLA. To overcome this problem, the measurement-based NLA (MB-NLA) has been proposed [22,23], which installs a dual homodyne detection ahead of NLA. The MB-NLA not only solve the application problem of NLA in CVQKD shceme with non-Gaussian modulation, but also can simulate the action of post-selection with amplifier. Furthermore, the quantum filter induced by the MB-NLA can simply model an appropriate postprocessing [24,25]. Although MB-NLA has the advantages mentioned above, its property of post-selective restricts it in point-to-pint application such as CVQKD. To overcome this defect, the hybrid amplifier has been proposed, which concatenates a deterministic liner amplifier (DLA) behind the MB-NLA to form a feed-forward loop [25]. Due to the installation of the DLA, the amplification function uncertainty caused by NLA has been solved [24]. Furthermore, the DLA also can compensate the degeneration of SNR caused by NLA. It is worth noting that DLA can be divided into a phase-sensitive amplifier (PSA) and phase-insensitive amplifier (PIA) [26,27]. If Bob adopts heterodyne measurement, we only can deploy PIA as the DLA, on the contrary, it can deploy PSA [28,29].
From the inspiration of the discrete modulation and hybrid amplifier mentioned above, in this paper, we proposed a scheme of discretely modulated CVQKD with hybrid amplifier to improve the performance of CVQKD with untested entangled source. Here, the four-state discrete modulation can improve the transmission distance of CVQKD even on the low SNR. Moreover, a hybrid amplifier deployed on the Bob side can reduce the influence of electrical noise caused by the detection and thus further enhance the transmission distance and secret key rate. The hybrid amplifier not only integrates the advantages of MB-NLA and DLA, but also provides a fully tunable gain for NLA and DLA. The proposed scheme outperforms the classical Gaussian modulation CVQKD with untested source in terms of the key rate, and also transcends the traditional discrete modulation CVQKD with untested source in terms of the maximal transmission distance.
This paper is structured as follows. In Section 2, we introduce the scheme design for four-sate discrete modulation CVQKD with untested source involving the hybrid amplifier. In Section 3, we demonstrate the secret key rate for the proposed scheme. In Section 4, we analyze the results of its performance. In Section 5, we provide a conclusion.

2. Discretely Modulated CVQKD with Untested Source via Hybrid Amplifier

In this paper, we consider to integrate a hybrid amplifier at Bob side in discretely modulated CVQKD scheme with untested source and thus leading to the performance improvement of transmission distance at low SNR. In this section, we will introduce the Alice side, Eve side, and Bob side according to the order from left to right in Figure 1, namely, the four-state discrete modulation will be introduced at first, next we consider about the CVQKD scheme with untested source model, and the last part is the description of hybrid amplifier.

2.1. Deploying a Four-State Discrete Modulation at Alice Side

We first begin by introducing the four-state discrete modulation scheme. The four-state protocol is belonged to the discrete modulation protocol. In the discrete modulation CVQKD, Alice produces N coherent states at phase space with
| α k N = | α e i 2 k π N .
For the four-state protocol, we only prepare four coherent states at phase space (see the Figure 2) [12], namely, here we have | α k N = | α e i ( 2 k + 1 ) π 4 , k { 0 , 1 , 2 , 3 } , and α is a positive parameter and relates to the modulation variance with α = V M 2 .
In the scheme of prepare-and-measure (PM), Alice randomly selects one of coherent state | α k 4 , k { 0 , 1 , 2 , 3 } , and transmits it to Bob by quantum channel with transmission efficiency T and excess noise ϵ . Bob use detector to measure the received coherent states with detection efficiency T d and electronics noise v e l . The mixture of four coherent state received by Bob can be denoted as
ρ 4 c = 1 4 k = 0 3 | α k 4 α k 4 | .
At the equivalent scheme of entanglement-based (EB), we can more convenient to calculate the secret key rate. First, the ρ 4 c is transformed to
ρ 4 c = t r A ( | Φ Φ | ) ,
the mixture coherent state can be diagonalized and thus rewritten as the following form,
ρ 4 c = μ 0 | ϕ 0 ϕ 0 | + μ 1 | ϕ 1 ϕ 1 | + μ 2 | ϕ 2 ϕ 2 | + μ 3 | ϕ 3 ϕ 3 | ,
here
μ 0 , 2 = 1 2 e α 2 [ c o s h ( α 2 ) ± c o s ( α 2 ) ] ,
μ 1 , 3 = 1 2 e α 2 [ s i n h ( α 2 ) ± s i n ( α 2 ) ] ,
and
| ϕ k = e α 2 2 μ k n = 0 α 4 n + k ( 4 n + k ) ! ( 1 ) n | 4 n + k .
Then, we purify the system by the Schmidt decomposition
| Φ = 1 2 k = 0 3 | ψ k | α k ,
where the non-Gaussian (NG) state | ψ k can be expressed as
| ψ k = 1 2 m = 0 3 e i ( 1 + 2 k ) m ( π 4 ) | ϕ m .

2.2. Eve Producing the Untrusted Entanglement Source

In practice, we need to consider any possible scenarios like that Eve that could have controlled the entangled source and generate it to any state. In this case, we first assume that Eve adopts Gaussian modulation and compare its performance to discrete modulation counterpart. That is because the Gaussian state can produce the maximum Shannon mutual information. In Gaussian attack, Eve perfectly uses its own quantum channel to replace the quantum channel which is placed between Alice and Bob. The loss channels are simulated by two independent beam splitters with transmissions T 1 and T 2 [12]. Note that if there is a symmetric transmission ( T 1 = T 2 ), it can be considered as entangled source in middle (ESIM) CVQKD protocol, and if these two transmissions are asymmetric with T 1 = 1 ( T 1 T 2 ), it can be recovered to the traditional CVQKD protocol where entangled source is generated at Alice or Charlie. In this case, we hypothesize entangled source is generated by Eve, but Eve is close to Alice side. Here, we have the distance between Alice and Eve with L 1 and Eve between Bob with L 2 , therefore the channels transmissions can be rewritten as T 1 = 10 0.02 L 1 , T 2 = 10 0.02 L 2 , and thus T = T 1 T 2 .
Eve’s Einstein–Podolsky–Rosen (EPR) state | ψ A B is created by two single-mode squeezed states, | z and | z with
| z i = O ^ i ( z | 0 ,
here O ^ i ( z ) is the squeezing operator and can be expressed with
O ^ i ( z ) = e x p [ z 2 ( a ^ i 2 a ^ i 2 ) ] ,
where a ^ i and a ^ i represent the creation and annihilation operation, and z is the squeezing parameter. The combining two single-mode squeezed states ( z ^ A 0 and z ^ B 0 ) become a EPR state | ψ A B by a 50:50 beam splitter. We can denote each entangled mode ( X ^ A and X ^ B ) as
X ^ A = ( z ^ A 0 + z ^ B 0 ) 2 ,
X ^ B = ( z ^ A 0 z ^ B 0 ) 2 .
The EPR state | ψ A B can be represent as
| ψ = O ^ A B ( z ) | 0 A | 0 B = δ n = 0 λ n | n , n ,
where O ^ A B represents a squeezing operator on two modes (modes A and B), O ^ A B ( z ) = e x p [ z ( a ^ A a ^ B a ^ A a ^ B ) ] , λ = V 1 V + 1 , here V is variance of two modes and δ = 1 λ 2 . Then, we assume that Eve performs the best collective Gaussian attack on the entangled source modes. The entangling cloner, a common collective Gaussian attack, is used to prepare two ancilla modes, X ^ E 1 and X ^ E 2 , from an entangled Gaussian state with symmetrized variance ( W 1 = W 2 ). In each pulse, Eve stores modes E 11 and E 21 in her quantum memory and injects the other two modes E 12 and E 22 into the beam splitter, thus obtains the output modes E 13 and E 23 . In the end of protocol, Eve measures the quadratures of E 11 and E 21 to obtain the communication information between Alice and Bob.

2.3. Implementing a Hybrid Linear Amplifier at Bob Side

First, we introduce the conceptual layout of our scheme, and in order to overcome the post-selective nature and thus promote the point-to-point application for traditional linear amplifier, we set a feed-forward loop outputted to a quantum state instead of the original state as follows [24],
ρ ^ o u t = Z T r v { D ^ g D g N n ^ ρ ^ i n | 0 0 | v g N n ^ D ^ g D } .
where the Z is the normalization factor and the operators D ^ g D and g N n ^ are used to model the action of NLA and DLA. In addition, the input coherent state can be written as
ρ ^ i n = 1 π 1 λ 2 λ 2 d 2 α e 1 λ 2 λ 2 | α | 2 | α α | .
here the λ ( 0 λ < 1 ) relates to the variance of coherent states with V. Due to the operations of NLA and DLA, the variance has been changed to
V = 1 + λ 2 1 λ 2 V g = 1 + g N 2 λ 2 1 g N 2 λ 2 .
The mean variance of two quadratures of the electric field can be written as
X ^ = a ^ + a ^ ,
P ^ = i ( a ^ a ^ ) .
when the signal feed through the hybrid amplifier, the expectation of the measurable value M ^ = ( a ^ , a ^ ) is further amplified by DLA, and the outcomes can be expressed as
a ^ o u t = a ^ i n g D + a ^ i n t g D 2 1 ,
a ^ o u t = a ^ i n g D + a ^ i n t g D 2 1 .
So that, according to above Equations (18)–(21), we can give the corresponding outcome quadratures of amplitude and phase as
X ^ o u t = X ^ i n g N g D ,
P ^ o u t = P ^ i n g N g D .
In this proposed scheme, we take the GG02 protocol [2] (the GG02 protocol is a fundamental CVQKD protocol) as usual but add a hybrid amplifier at Bob side, so that the secure key rate should depend on the covariance matrix with presence of the hybrid amplifier. However, the output of the linear hybrid amplifier remains in the Gaussian regime, therefore we use an equivalent channel to replace the previous one (Figure 3). Here, the corresponding system parameters are changed from ( | λ , T 1 , T 2 , ϵ , χ ) to ( | ζ , η 1 , η 2 , ϵ g n , χ g d ), those equivalent parameters are listed below,
ζ = λ ( g N 2 1 ) ( ϵ 2 ) T 2 ( g N 2 1 ) ϵ T 2 ,
η = g N 2 T ( g N 2 1 ) T [ 1 4 ( g N 2 1 ) ( ϵ 2 ) ϵ T ϵ + 1 ] + 1 ,
ϵ g N = ϵ 1 2 ( g N 2 1 ) ( ϵ 2 ) ϵ T ,
χ h o m g D = ( 1 T d ) + v e l g D T d ,
and
χ h e t g D = 1 + ( 1 T d ) + 2 v e + ( g D 1 ) T d g D T d .
Finally, we present the equivalent experimental layout for our scheme. As mentioned above, we consider applying a hybrid linear amplifier at Bob’s station (as shown in Figure 4). The input mode B 1 is first fed through a beam splitter with transmissivity T g = ( g N / g D ) 2 , here g N and g D represent gains of NLA and DLA, respectively. After that, the reflected mode is fed through a measurement-based noiseless linear amplifier (MB-NLA), which consists by a dual-heterodyne detection and a noiseless linear amplifier. Here, one of the heterodyne detectors is used to measure the X quadrature of the coherent state, and other one measures the P quadrature. The MB-NLA has some special features, including a probabilistic of Gaussian filter and rescaling of amplifier gain factors. Here, the rescaling of gain NLA is given as g N = 1 g N , and thus the success probability of Gaussian filter is given as [25,30]
P ( α m ) = e x p ( | α m | 2 | α c | 2 ) [ 1 ( g N ) 2 ] , | α m | α c 1 . | α m | > α c
The measurement outcomes of the dual-heterodyne detection is applied as [23]
α m = x m + i p m 2 ,
and α c represents a tunable cut-off parameter, which directly determines the success probability of the protocol and how closely the MB-NLA approximates to an ideal NLA ( α c > 0 ). In this scheme, we couple a DLA before the MB-NLA to further improve the probability of success by g D = 2 ( g D 2 1 ) . Finally, the output signal feeds through an elector-optic modulator (EOM) and a beam splitter with transmissivity 99:1.
Notice that the performance of our hybrid amplifier depends on the respective gain of two different amplifiers. A relatively larger NLA gain cloud increases the signal-to-noise ratio (SNR), but also leads to a lower success probability. In contrast, a relatively larger DLA gain would increase the success probability, but will also bring the added noise.

3. Simulation of the Secret Key Rate

In this section, we will demonstrate the calculation process of the asymptotic secret key rate for traditional Gaussian modulation and discrete modulation. The traditional Gaussian modulation scheme is based on two quantum states (coherent or squeezed states) and two measurement methods (homodyne or heterodyne detection). The discrete modulation scheme is based on coherent state four-state modulation and homodyne detection.

3.1. The Gaussian Modulation with Untested Source via Hybrid Amplifier Scheme

In the Gaussian modulation scheme, we will mainly introduce calculation of direct reconciliation, and for the reverse reconciliation the calculation process can be simply derived form the covariance matrix Γ A 2 B 2 by switching a and b. The secret key rate is defined as [2]
K = β I ( A 2 : B 3 ) χ E ,
here β represents the reconciliation efficiency and I ( A 2 : B 3 ) is the Shannon mutual information between Alice and Bob [31]; furthermore, the χ E is Eve’s mutual information connected between Eve and Alice for direct reconciliation or between Eve and Bob for reverse reconciliation. When we consider the situation of untested entangled source CVQKD protocol with hybrid amplifier at Bob side, the covariance matrix of the Gaussian state ζ A 2 B 3 is given by (notice that here we assume that Alice and Bob both have deployed the ideal detectors)
Γ A 2 B 3 = a I c σ z c σ z b I ,
where I and σ z are the Pauli matrices a = η 1 V + ( 1 η 1 ) W 1 , b = η 2 V + ( 1 η 2 ) W 2 , and c = η 1 η 2 V 2 1 ; therefore, the covariance matrix Γ A 2 B 3 can be rewritten as
η 1 V + ( 1 η 1 ) W 1 I η 1 η 2 V 2 1 σ z η 1 η 2 V 2 1 σ z η 2 V + ( 1 η 2 ) W 2 I ,
here W i = η i χ l i n e / ( 1 η i ) ( i = 1 , 2 ) and χ l i n e = ( 1 η i ) / ( η i + ϵ g n ) represents the added noise inputted by Gaussian channel. We first introduce the case of squeezed states with homodyne or heterodyne detection. In this case, when Bob adopts homodyne measurement, the mutual information between Alice and Bob can be defined as [2]
I ( A 2 : B 3 ) h o m S = 1 2 l o g 2 ( a a c 2 / b ) ,
with heterodyne measurement the mutual information is given as
I ( A 2 : B 3 ) h e t S = 1 2 l o g 2 ( a a ( c 2 / ( b + 1 ) ) ) .
Then, we will introduce the Eve’s mutual information, namely, the χ E mentioned in Equation (31). Here,
χ E = S ( E ) S ( E | A ) ,
and it has the same calculation process for both homodyne and heterodyne detections. Due to the direction reconciliation implemented in this scheme, which only depends on the measurement results with Alice but not Bob. Furthermore, Eve provides a purification for Alice and Bob’s matrix, so that we can rewrite S ( E ) as
S ( A B ) = G [ ( λ 1 1 ) / 2 ] + G [ ( λ 2 1 ) / 2 ] .
Here, G ( x ) = ( x + 1 ) l o g 2 ( x + 1 ) x l o g 2 x , thus the symplectic eigenvalues are represented as
λ 1 , 2 2 = 1 2 [ A ± A 2 4 B 2 ] .
where A = a 2 + b 2 2 c 2 and B = a b c 2 , then Eve uses the same purification for Alice and Bob’s matrix, thus we can rewrite S ( E | A ) as S ( B | A ) . Here, S ( B | A ) = G [ ( λ 3 1 ) / 2 ] and λ 3 = b ( b ( c 2 / a ) ) . Therefore, we now can calculate the secret key rate mentioned in Equation (31).
Next, when Alice adopts coherent state, the mutual information for Alice and Bob with homodyne and heterodyne detections are given by
I ( A 2 : B 3 ) h o m C = 1 2 l o g 2 ( a + 1 a + 1 c 2 / b ) ,
I ( A 2 : B 3 ) h e t C = l o g 2 ( b + 1 b + 1 c 2 / ( a + 1 ) ) .
in the case of coherent state with homodyne detection and heterodyne detection, the S ( E ) mentioned in Equation (34) is same with the counterpart of squeezed state, but the S ( E | A ) is replaced by S ( B C | A ) and expressed as follows,
S ( B C | A ) = G [ ( λ 4 1 ) / 2 ] + G [ ( λ 5 1 ) / 2 ] ,
here
λ 4 , 5 2 = 1 2 [ C h o m ± C h o m 2 4 D h o m ] .
where, in the case of homodyne detection, the C h o m and D h o m can be denoted as
C h o m = A χ h o m g D + V B + η ( V + χ l i n e ) η ( V + χ t o t ) ,
D h o m = B V + B χ h o m g D η ( V + χ t o t ) .
For the heterodyne case, the symplectic eigenvalues 6 and 7 can be expressed as
λ 6 , 7 2 = 1 2 [ C h e t ± C h e t 2 4 D h e t ] ,
and C h e t and D h e t are denoted as follows,
C h e t = A ( χ h e t g D ) 2 + B + 1 + 2 χ h e t g D [ V B + η ( V + χ l i n e ) ] + 2 η ( V 2 1 ) [ η ( V + χ t o t ) ] 2 ,
D h e t = ( V + B χ h e t g D η ( V + χ t o t ) ) 2 .
χ l i n e = 1 / η 1 + ε is shot noise units and χ t o t = χ l i n e + χ h / η is channel total noise, here χ h is detection added noise mentioned in Equations (27) and (28) with χ h o m g D and χ h e t g D . We can now plot the final secret key rate for both the Gaussian modulation squeezed state and coherent state.

3.2. The Discrete Modulation with Untested Source via Hybrid Amplifier Scheme

In the discrete modulation scheme, we mainly consider direct reconciliation with the coherent state scheme. The secret key rate is also same as Equation (31), but due to the state ζ A 2 B 3 D M , is not Gaussian anymore, and we should replace the Gaussian state ζ A 2 B 3 to ζ A 2 B 3 D M as follows,
Γ A 2 B 3 D M = a D M I c D M σ z c D M σ z b D M I ,
here a D M = η 1 a 0 + ( 1 η 1 ) W 1 , b D M = η 2 b o + ( 1 η 2 ) W 2 , and c D M = η c 0 , the a 0 , b 0 and c 0 can express as following
a 0 = 1 + 2 α 2 ,
b 0 = 1 + 2 α 2 ,
c 0 = 2 α 2 k = 0 3 μ k 1 3 / 2 μ k 1 / 2 .
where α = V M 2 and V M = V 1 ; the mutual information between Alice and Bob is also the same with Gaussian counterpart in Equation (37), but the χ E has been changed, χ E = S ( E ) S ( E | A ) , here the S ( E ) can be denoted as
S ( E ) = S ( A B ) = G [ ( λ 1 D M 1 ) / 2 ] + G [ ( λ 2 D M 1 ) / 2 ] .
Here G ( x ) = ( x + 1 ) l o g 2 ( x + 1 ) x l o g 2 x , thus the symplectic eigenvalues are represented as
λ 1 , 2 D M = 1 2 ( A D M ± A D M 2 4 B D M 2 ) ,
with A D M = a D M 2 + b D M 2 2 c D M 2 and B D M = a D M b D M c D M 2 , furthermore the S ( E | A ) is also replaced by S ( B C | A )
S ( B C | A ) = G [ ( λ 3 D M 1 ) / 2 ] + G [ ( λ 4 D M 1 ) / 2 ] ,
with
λ 3 , 4 D M = 1 2 [ C h o m D M ± ( C h o m D M ) 2 4 D h o m D M ] .
Here, C h o m D M and D h o m D M can be denoted as
C h o m D M = A D M χ h o m g D + V B D M + η ( V + χ l i n e ) η ( V + χ t o t ) ,
D h o m D M = B D M V + B D M χ h o m g D η ( V + χ t o t ) .
In the case of heterodyne detection, the symplectic eigenvalues are expressed as
λ 5 , 6 D M = 1 2 [ C h e t D M ± ( C h e t D M ) 2 4 D h e t D M ] ,
and
C h e t D M = A D M ( χ h e t g D ) 2 + B D M + 1 + 2 χ h e t g D [ V B D M + η ( V + χ l i n e ) ] + 2 η ( V 2 1 ) [ η ( V + χ t o t ) ] 2 ,
D h e t D M = [ V + B D M χ h e t g D η ( V + χ t o t ) ] 2 .
Finally, we can plot the secret key rate for proposed scheme in terms of discrete modulation.

4. Performance Analysis and Results Discussion

In the process of parameter setting of the hybrid amplifier, an appropriate gain value of the amplifier will directly determine the final performance of the scheme. As the main function of DLA is to improve the functional uncertainty caused by NLA, its gain value does not significant improvement for the performance of proposed scheme. Therefore, we mainly discuss the optimal range of NLA gain first. As shown in Figure 5, Figure 6 and Figure 7, here we set the tunable distance to derive the optimal range for g N in our proposed scheme. The parameters are set as fixed value with g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
In the first scenario, we set different distance with d = 15 km, d = 20 km, and d = 25 km. As shown in Figure 5, the public zone 1 highlighted with light gray denotes that two kinds of proposed scheme can obtain relative higher secret key rate in this gain value range of g N ( 6.1 g N 8.6 ) .
In the second scenario, we have different distance values with d = 30 km, d = 35 km, d = 40 km, and d = 45 km. The public zone 2 has been highlighted with light gray in Figure 6, which represents our proposed schemes can obtain relative higher secret key rate in this gain range with NLA ( 6 g N 14 ) .
In the final scenario, the distance value are given as d = 90 km, d = 95 km, and d = 100 km. Our proposed scheme can reach the relative higher secret key rate in the public zone 3, which has been shown in Figure 7 with the gain value range ( 7.5 g N 20 ) .
Therefore, considering the above three scenarios, we can get the overlapping area ( 7.5 g N 8.6 ) in Figure 8, which represents the optimal gain range for proposed scheme.
Moreover, we find that the distance between Alice and Eve ( L 1 ) can also influence the performance of our scheme. In Figure 9, here we set different distances, L 1 , to observe the schemes performance with L 1 = 0.2 km, L 1 = 0.3 km, L 1 = 0.4 km, L 1 = 0.5 km, and L 1 = 0.6 km. The fixed parameters are set with g N = 8 , g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 . As shown in Figure 9, the light blue solid lines and red solid lines represent four-state discrete modulation with untested source via heterodyne detection and homodyne detection, respectively. Furthermore, the dark blue solid lines and orange solid lines denote four-state discrete modulation with untested source via hybrid amplifier by heterodyne and homodyne detection, respectively. We can find that with the increasing of L 1 the maximum transmission distance of all schemes is increasing, and the increasing of scheme with four-state untested source via homodyne detection is the most obvious, which is almost catching up the scheme with four-state untested source by hybrid amplifier via heterodyne detection. However, when the distance exceeds 0.6 ( L 1 > 0.6 km), the four-state with untested source schemes are on longer to generate the secret key rate, and it has the same situation with the counterpart schemes of hybrid amplifier in L 1 > 50 km and L 1 > 2 km, respectively (as shown in Figure 10 and Figure 11). Therefore, in our scheme we set the distance between Alice and Eve with L 1 = 0.5 .
Based on the calculation process in the previous section, we show the performances of various protocols over the lossy quantum channel. According to different modulation methods, we divide these protocols into two categories that includes the protocol based on Gaussian modulation and discrete modulation. For these schemes, we set the entanglement source in untested side, and implement a hybrid amplifier at Bob side. In the case of Gaussian modulation we have the squeezed-state with homodyne and heterodyne detection, or, equivalently, coherent-state with homodyne and heterodyne detection (in Figure 12a). In the scenario of discrete modulation, we select coherent-state with homodyne and heterodyne detection (in Figure 12b). The dashed lines (in Figure 12a) indicate the scheme without hybrid amplifier, and the solid lines denote the scheme implemented hybrid amplifier. Where the red dashed line indicates that the scheme by coherent state with untested source and heterodyne detection is far behind its corresponding scheme with hybrid amplifier, and the red solid line, in terms of transmission distance by 36 km. Furthermore, although the scheme of coherent sate with untested source via hybrid amplifier homodyne detection (the green solid line) has lower initial secret key rate than its counterpart (the green dashed line), its transmission distance has been increased 7 km compared to the same scheme without hybrid amplifier (the green dashed line). The squeezed sate with untested source via hybrid amplifier schemes are indicated as a dark blue solid line and light blue solid line, respectively; here, the scheme with homodyne detection (the light blue solid line) reaches the maximal transmission distance of approximately 45 km, and the scheme of heterodyne detection (the dark blue solid line) reaches it in 17 km. Therefore, in the case of the scheme adopting traditional Gaussian modulation, the hybrid amplifier is helpful in improving the transmission distance indeed.
Next, Figure 12b will show the performance result for Gaussian modulation and discrete modulation schemes. In Figure 12b, the dot-dashed lines represent the discrete modulation with untested source via hybrid amplifier, corresponding to the original schemes that did not adopt the hybrid amplifier, marked with red dashed line and yellow solid line, respectively. The remaining schemes are the Gaussian modulation with untested source and hybrid amplifier. We can see the detailed relationship between each line of the scheme, and find that the scheme of classical four-state modulation with untested source heterodyne detection has poorer performance than the same scheme with Gaussian modulation adopted hybrid amplifier, in terms of transmission distance (20 km behind) and initial secret key rate (1.83 bit per pulse behind). However, after being amplified by the hybrid amplifier, the four-state modulation with heterodyne detection scheme, the red dot-dashed line, has better transmission distance performance by 72 km ahead than the Gaussian modulation (red solid line) and 92 km ahead than the unamplified scheme (red dashed line). The scheme of four-state modulation untested source via hybrid amplifier and homodyne detection, the yellow dot-dashed line, reaches the maximal transmission distance with over 146 km. It is 68 km beyond the scheme of discrete modulation unadopted hybrid amplifier (the yellow solid line), and 128 km ahead the scheme of Gaussian modulation with hybrid amplifier. All the simulation results show that even if the entangled source is untested, the discrete modulation with four-state modulation has better performance in key rate and transmission distance than the scheme with Gaussian modulation.

5. Conclusions

In this paper, we proposed a scheme of four-state discrete modulation with hybrid amplifier to improve the performance of traditional Gaussian modulation CVQKD while the entangle source is untested. The hybrid amplifier is composed of a MB-NLA and a DLA in series. Due to deployment of the MB-NLA, the noise penalty caused by the detector in the Bob side can be compensated. Moreover, the adoption of DLA compensated the problem of SNR degeneration and amplification probability caused by NLA. The numerical simulations show that our proposed scheme can improve the maximal transmission distance in the four-state modulation CVQKD and Gaussian modulation CVQKD for both homodyne and heterodyne detection, where the entangled source is untested. In terms of possible future research, it could be focusing to implement the hybrid amplifier in Alice and Bob side.

Author Contributions

Data curation, X.W.; investigation, K.Z.; resources, Q.L.; software, Y.M.; supervision, Z.C. and Y.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China (Grant No.61871407), National Key R & D Project (No. 2018YFB0704000), Hunan Provincial Natural Science Foundation of China (Grant No. 2020JJ5088), and the Fundamental Research Funds for the Central Universities (No. 531118010371).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Brassard, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  2. Gisin, N.; Grégoire, R.; Tittel, W. Quantum Cryptography. Rev. Mod. Phys. 2002, 74, 154–195. [Google Scholar] [CrossRef] [Green Version]
  3. Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
  4. Bang, J.Y.; Berger, M.S. Quantum Mechanics and the Generalized Uncertainty Principle. Phys. Rev. 2006, 74, 125012. [Google Scholar] [CrossRef] [Green Version]
  5. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.; Dušek, M.; Lütkenhaus, N.; Peev, M. The Security of Practical Quantum Key Distribution. Rev. Mod. Phys. 2009, 81, 1301. [Google Scholar] [CrossRef] [Green Version]
  6. Pirandola, S.; Ottaviani, C.; Spedalieri, G. High-rate measurement-device-independent quantum cryptography. Nat. Photonics 2015, 9, 397–402. [Google Scholar] [CrossRef] [Green Version]
  7. Ma, X.C.; Sun, S.H.; Jiang, M.S. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution. Phys. Rev. A 2013, 89, 23–35. [Google Scholar] [CrossRef] [Green Version]
  8. Lance, A.M.; Symul, T.; Sharma, V. No-Switching Quantum Key Distribution using Broadband Modulated Coherent Light. Phys. Rev. Lett. 2005, 95, 0503. [Google Scholar] [CrossRef] [Green Version]
  9. Huang, P.; Fang, J.; Zeng, G. State-discrimination attack on discretely modulated continuous-variable quantum key distribution. Phys. Rev. A 2014, 89, 2330. [Google Scholar] [CrossRef]
  10. Zhang, H.; Fang, J.; He, G. Improving the performance of the four-state continuous-variable quantum key distribution by using optical amplifiers. Phys. Rev. A 2012, 86, 022338. [Google Scholar] [CrossRef] [Green Version]
  11. Leverrier, A.; Grangier, P. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation. Phys. Rev. A 2011, 83, 2312. [Google Scholar] [CrossRef] [Green Version]
  12. Leverrier, A.; Grangier, P. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 2009, 102, 0504. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Ma, X.F.; Qi, B.; Zhao, Y.; Lo, H.K. Practical Decoy State for Quantum Key Distribution. Phys. Rev. A 2005, 72, 012326. [Google Scholar] [CrossRef] [Green Version]
  14. Zhao, Y.; Qi, B.; Ma, X.F.; Lo, H.K.; Qian, L. Experimental Quantum Key Distribution with Decoy States. Phys. Rev. Lett. 2006, 96, 070502. [Google Scholar] [CrossRef] [Green Version]
  15. Weedbrook, C. Continuous-Variable Quantum Key Distribution with Entanglement in the Middle. Phys. Rev. A 2012, 87, 1110–1116. [Google Scholar] [CrossRef] [Green Version]
  16. Leverrier, A.; Grangier, P. Erratum: Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation. Phys. Rev. Lett. 2011, 106, 259902. [Google Scholar] [CrossRef]
  17. Rémi, B.; Leverrier, A.; Barbieri, M. Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier. Phys. Rev. A 2012, 86, 2327. [Google Scholar]
  18. Wang, T.; Song, T. Improving the maximum transmission distance of continuous-variable quantum key distribution with noisy coherent states using a noiseless amplifier. Phys. Lett. A. 2014, 378, 2808–2812. [Google Scholar] [CrossRef]
  19. Weedbrook, C.; Lance, A.M.; Bowen, W.P. Quantum cryptography without switching. Phys. Rev. Lett. 2004, 93, 0504. [Google Scholar] [CrossRef] [Green Version]
  20. Weedbrook, C.; Lance, A.M.; Bowen, W.P. Coherent state quantum key distribution without random basis switching. Phys. Rev. A 2006, 73, 2316. [Google Scholar] [CrossRef] [Green Version]
  21. García-Patrón, R.; Cerf, N.J. Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 2009, 102, 0501. [Google Scholar] [CrossRef] [Green Version]
  22. Qi, B.; Zhao, Y.; Ma, X.F.; Lo, H.K.; Qian, L. Dual detectors scheme in practical quantum key distribution systems. Phys. Rev. A 2007, 75, 2304. [Google Scholar] [CrossRef] [Green Version]
  23. Zhao, J.; Haw, J.Y.; Symul, T. Characterization of a measurement-based noiseless linear amplifier and its applications. Phys. Rev. A 2017, 96, 2319. [Google Scholar] [CrossRef]
  24. Jie, Z.; Josephine, D.; Yan, H.J. Quantum enhancement of signal-to-noise ratio with a heralded linear amplifier. Optica 2017, 4, 1421. [Google Scholar]
  25. Haw, J.Y.; Zhao, J.; Dias, J. Surpassing the no-cloning limit with a heralded hybrid linear amplifier for coherent states. Nat. Commun. 2016, 7, 13222. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Takada, A.; Imajuku, W. Amplitude noise suppression using a high gain phase sensitive amplifier as a limiting amplifier. Electron. Lett. 1996, 32, 677–679. [Google Scholar] [CrossRef]
  27. Yoshikawa, J.I.; Miwa, Y.; Filip, R. Demonstration of reversible phase-insensitive optical amplifier. Phys. Rev. A 2011, 83, 4861–4865. [Google Scholar] [CrossRef] [Green Version]
  28. Müller, C.R.; Wittmann, C.; Marek, P.; Filip, R.; Marquardt, C.; Leuchs, G.; Andersen, U.L. Probabilistic cloning of coherent states without a phase reference. Phys. Rev. A 2011, 86, 18515–18524. [Google Scholar] [CrossRef] [Green Version]
  29. Zhang, Y.C.; Li, Z.; Weedbrook, C. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers. J. Phys. B At. Mol. Opt. Phys. 2014, 47, 5501. [Google Scholar] [CrossRef] [Green Version]
  30. Ralph, T.C.; Lund, P.A. Nondeterministic Noiseless linear amplification of quantum systems. Am. Inst. Phys. Conf. 2009, 1110, 155–160. [Google Scholar]
  31. Shannon, C.E.; Syst, B. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
Figure 1. (Color online) Schematic of the entangled source in middle (ESIM) CVQKD using a hybrid amplifier. In the entanglement-based model, Alice detects one of the EPR states by heterodyne detector and the hybrid linear amplifier is installed before Bob uses either the homodyne or heterodyne detector to measure the other half of EPR states. Eve’s attack consists of two entangling cloner attacks on either side of the source. The yellow box of g n ^ shows the hybrid linear amplifier.
Figure 1. (Color online) Schematic of the entangled source in middle (ESIM) CVQKD using a hybrid amplifier. In the entanglement-based model, Alice detects one of the EPR states by heterodyne detector and the hybrid linear amplifier is installed before Bob uses either the homodyne or heterodyne detector to measure the other half of EPR states. Eve’s attack consists of two entangling cloner attacks on either side of the source. The yellow box of g n ^ shows the hybrid linear amplifier.
Entropy 22 00882 g001
Figure 2. (Color online) Four-state discrete modulation in phase space.
Figure 2. (Color online) Four-state discrete modulation in phase space.
Entropy 22 00882 g002
Figure 3. (Color online) An EPR state | λ sent through a Gaussian quantum channel with transmittance T 1 , T 2 , excess noise ϵ , and detection-added noise χ has been replaced by an EPR state | ζ sent through a Gaussian quantum channel with transmittance η a , η 2 , excess noise ϵ g n , and detection-added noise χ g d , but without the hybrid amplifier.
Figure 3. (Color online) An EPR state | λ sent through a Gaussian quantum channel with transmittance T 1 , T 2 , excess noise ϵ , and detection-added noise χ has been replaced by an EPR state | ζ sent through a Gaussian quantum channel with transmittance η a , η 2 , excess noise ϵ g n , and detection-added noise χ g d , but without the hybrid amplifier.
Entropy 22 00882 g003
Figure 4. (Color online) The heralded hybrid linear amplifier is applied at Bob side. The mode B 1 first goes through into a beam splitter with transmissivity T g , then the reflected mode goes through into the MB-NLA concatenated by a dual-heterodyne detection and NLA. Here, the dual-heterodyne detection is used to measure the X and P quadrature of the reflected mode, respectively. After that we set a DLA and an elector-optic modulator (EOM) to dispose the amplified signal pulse and output mode B 2 by a beam splitter with transmissivity 99:1.
Figure 4. (Color online) The heralded hybrid linear amplifier is applied at Bob side. The mode B 1 first goes through into a beam splitter with transmissivity T g , then the reflected mode goes through into the MB-NLA concatenated by a dual-heterodyne detection and NLA. Here, the dual-heterodyne detection is used to measure the X and P quadrature of the reflected mode, respectively. After that we set a DLA and an elector-optic modulator (EOM) to dispose the amplified signal pulse and output mode B 2 by a beam splitter with transmissivity 99:1.
Entropy 22 00882 g004
Figure 5. (Color online) The optimal value range for g N L A . The X-coordination and Y-coordination represent gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detector (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 1. Here, the distance be set as 15, 20, and 25 km. Moreover, the fixed parameter values are set with g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Figure 5. (Color online) The optimal value range for g N L A . The X-coordination and Y-coordination represent gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detector (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 1. Here, the distance be set as 15, 20, and 25 km. Moreover, the fixed parameter values are set with g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Entropy 22 00882 g005
Figure 6. (Color online) The optimal value range for g N L A . The X-coordination and Y-coordination represent the gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detectors (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 2. Here, the distance be set as 30, 35, 40, and 45 km. Moreover, the fixed parameter values are set with g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Figure 6. (Color online) The optimal value range for g N L A . The X-coordination and Y-coordination represent the gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detectors (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 2. Here, the distance be set as 30, 35, 40, and 45 km. Moreover, the fixed parameter values are set with g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Entropy 22 00882 g006
Figure 7. (Color online) The optimal value range for g N L A . The X-coordination and Y-coordination represent gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detector (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 3. Here, the distance be set as 90, 95, and 100 km. Moreover, the fixed parameter values are set with g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Figure 7. (Color online) The optimal value range for g N L A . The X-coordination and Y-coordination represent gain value of NLA and secret key rate, respectively. The figure shows that the proposed scheme with different detector (homodyne detector and heterodyne detector) can obtain relative higher secrete key rate in the public area 3. Here, the distance be set as 90, 95, and 100 km. Moreover, the fixed parameter values are set with g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Entropy 22 00882 g007
Figure 8. (Color online) Considering the above three public areas denoted in Figure 5, Figure 6 and Figure 7, we get the overlapping region in this figure, which represents the optimal gain value range of proposed scheme.
Figure 8. (Color online) Considering the above three public areas denoted in Figure 5, Figure 6 and Figure 7, we get the overlapping region in this figure, which represents the optimal gain value range of proposed scheme.
Entropy 22 00882 g008
Figure 9. (Color online) The performance of proposed schemes for different L 1 . The fixed parameters are set with g N = 8 , g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 . Here, the light blue solid lines and red solid lines express the scheme without hybrid amplifier, moreover dark blue solid lines and orange lines represent the scheme with hybrid amplifier.
Figure 9. (Color online) The performance of proposed schemes for different L 1 . The fixed parameters are set with g N = 8 , g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 . Here, the light blue solid lines and red solid lines express the scheme without hybrid amplifier, moreover dark blue solid lines and orange lines represent the scheme with hybrid amplifier.
Entropy 22 00882 g009
Figure 10. (Color online) The performance of schemes with four-state untested source via hybrid amplifier and heterodyne detection in different L 1 . The fixed parameters are set with g N = 8, g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Figure 10. (Color online) The performance of schemes with four-state untested source via hybrid amplifier and heterodyne detection in different L 1 . The fixed parameters are set with g N = 8, g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Entropy 22 00882 g010
Figure 11. (Color online) The performance of schemes with four-state untested source via hybrid amplifier and homodyne detection in different L 1 . The fixed parameters are set with g N = 8 g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Figure 11. (Color online) The performance of schemes with four-state untested source via hybrid amplifier and homodyne detection in different L 1 . The fixed parameters are set with g N = 8 g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 .
Entropy 22 00882 g011
Figure 12. (Color online) Panel (a) shows the relationship between the transmission distance and secret key rate. It demonstrates the maximal transmission distance for the scheme with Gaussian modulation. Here, the parameters are set as g N = 8 , g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 . The dot-dash lines in the figure represent Gaussian modulation with an untested source. Furthermore, the solid lines represent Gaussian modulation with untested source via hybrid amplifier. Panel (b) also shows the relationship between transmission distance and secret key rate. Here, the parameters are also set as g N = 8 , g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 . In panel (b), the green, dark blue, red, and light blue solid lines represent the Gaussian modulation with untested source via hybrid amplifier. Furthermore, the red dash line and yellow solid line represent the four-state discrete modulation with untested source. The red dot-dash line and yellow dot-dash line denote our proposed scheme (four-state discrete modulation with untested source via hybrid amplifier).
Figure 12. (Color online) Panel (a) shows the relationship between the transmission distance and secret key rate. It demonstrates the maximal transmission distance for the scheme with Gaussian modulation. Here, the parameters are set as g N = 8 , g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 . The dot-dash lines in the figure represent Gaussian modulation with an untested source. Furthermore, the solid lines represent Gaussian modulation with untested source via hybrid amplifier. Panel (b) also shows the relationship between transmission distance and secret key rate. Here, the parameters are also set as g N = 8 , g D = 12 , η = 1 , ε = 0.01 , and V M = 0.3 . In panel (b), the green, dark blue, red, and light blue solid lines represent the Gaussian modulation with untested source via hybrid amplifier. Furthermore, the red dash line and yellow solid line represent the four-state discrete modulation with untested source. The red dot-dash line and yellow dot-dash line denote our proposed scheme (four-state discrete modulation with untested source via hybrid amplifier).
Entropy 22 00882 g012

Share and Cite

MDPI and ACS Style

Zhou, K.; Wu, X.; Mao, Y.; Chen, Z.; Liao, Q.; Guo, Y. Performance Improvement of Discretely Modulated Continuous-Variable Quantum Key Distribution with Untrusted Source via Heralded Hybrid Linear Amplifier. Entropy 2020, 22, 882. https://doi.org/10.3390/e22080882

AMA Style

Zhou K, Wu X, Mao Y, Chen Z, Liao Q, Guo Y. Performance Improvement of Discretely Modulated Continuous-Variable Quantum Key Distribution with Untrusted Source via Heralded Hybrid Linear Amplifier. Entropy. 2020; 22(8):882. https://doi.org/10.3390/e22080882

Chicago/Turabian Style

Zhou, Kunlin, Xuelin Wu, Yun Mao, Zhiya Chen, Qin Liao, and Ying Guo. 2020. "Performance Improvement of Discretely Modulated Continuous-Variable Quantum Key Distribution with Untrusted Source via Heralded Hybrid Linear Amplifier" Entropy 22, no. 8: 882. https://doi.org/10.3390/e22080882

APA Style

Zhou, K., Wu, X., Mao, Y., Chen, Z., Liao, Q., & Guo, Y. (2020). Performance Improvement of Discretely Modulated Continuous-Variable Quantum Key Distribution with Untrusted Source via Heralded Hybrid Linear Amplifier. Entropy, 22(8), 882. https://doi.org/10.3390/e22080882

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop