• Featured in Physics
  • Open Access

Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation

Shouvik Ghorai, Philippe Grangier, Eleni Diamanti, and Anthony Leverrier
Phys. Rev. X 9, 021059 – Published 25 June 2019
Physics logo See Synopsis: Making Quantum Cryptography Safe and Practical

Abstract

We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states. The bound is valid against collective attacks and is obtained by formulating the problem as a semidefinite program. We illustrate our general approach with the quadrature-phase-shift-keying modulation scheme and show that distances over 100 km are achievable for realistic values of noise. We also discuss the application to more complex quadrature-amplitude-modulation schemes. This result opens the way to establishing the full security of continuous-variable protocols with a discrete modulation, and thereby to the large-scale deployment of these protocols for quantum key distribution.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Received 15 February 2019
  • Revised 10 May 2019

DOI:https://doi.org/10.1103/PhysRevX.9.021059

Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.

Published by the American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & Technology

Synopsis

Key Image

Making Quantum Cryptography Safe and Practical

Published 25 June 2019

A theoretical study suggests that “continuous variable” quantum key distribution—an approach to quantum cryptography compatible with telecom networks—could be made absolutely secure against hacking.

See more in Physics

Authors & Affiliations

Shouvik Ghorai1, Philippe Grangier2, Eleni Diamanti1, and Anthony Leverrier3

  • 1LIP6, CNRS, Sorbonne Université, 75005 Paris, France
  • 2Laboratoire Charles Fabry, IOGS, CNRS, Université Paris Saclay, F91127 Palaiseau, France
  • 3Inria Paris, 2 rue Simone Iff, CS 42112, 75589 Paris Cedex 12, France

Popular Summary

Quantum key distribution allows two parties to establish a secret key for encrypting information under the sole assumption that any attack must respect the laws of quantum mechanics. For deploying quantum key distribution at large scale, it must conform as much as possible to telecom standards, which currently involve discrete constellations of coherent states and coherent detection. This is exactly the point of “continuous-variable” (CV) protocols. However, establishing their security is significantly harder than for qubit-based protocols that rely on single-photon detectors. In this paper, we take a major step towards a full security proof for CV protocols.

Up until now, security proofs for CV protocols were restricted to idealized protocols that rely on the exchange of quantum states chosen from a continuous distribution. In practice, such protocols are impossible to implement. By contrast, we consider protocols that rely on discrete modulation, meaning that the states are chosen from a finite set.

In quantum key distribution, the secret key rate (a measure of the number of secret bits) depends only on the amount of information leaked to the adversary. Using techniques from convex optimization, we prove that this secret key rate can be inferred by solving a semidefinite program, which can be done efficiently. This, in turn, provides the minimum number of bits guaranteed to remain secure.

For realistic estimates of noise, we show that it is possible to distribute secret keys along fiber-optic links more than 100 km long, well on par with the performance of qubit-based protocols.

Key Image

Article Text

Click to Expand

References

Click to Expand
Issue

Vol. 9, Iss. 2 — April - June 2019

Subject Areas
Reuse & Permissions
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review X

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 4.0 International license. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

×

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×