Abstract
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states. The bound is valid against collective attacks and is obtained by formulating the problem as a semidefinite program. We illustrate our general approach with the quadrature-phase-shift-keying modulation scheme and show that distances over 100 km are achievable for realistic values of noise. We also discuss the application to more complex quadrature-amplitude-modulation schemes. This result opens the way to establishing the full security of continuous-variable protocols with a discrete modulation, and thereby to the large-scale deployment of these protocols for quantum key distribution.
- Received 15 February 2019
- Revised 10 May 2019
DOI:https://doi.org/10.1103/PhysRevX.9.021059
Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.
Published by the American Physical Society
Physics Subject Headings (PhySH)
Synopsis
Making Quantum Cryptography Safe and Practical
Published 25 June 2019
A theoretical study suggests that “continuous variable” quantum key distribution—an approach to quantum cryptography compatible with telecom networks—could be made absolutely secure against hacking.
See more in Physics
Popular Summary
Quantum key distribution allows two parties to establish a secret key for encrypting information under the sole assumption that any attack must respect the laws of quantum mechanics. For deploying quantum key distribution at large scale, it must conform as much as possible to telecom standards, which currently involve discrete constellations of coherent states and coherent detection. This is exactly the point of “continuous-variable” (CV) protocols. However, establishing their security is significantly harder than for qubit-based protocols that rely on single-photon detectors. In this paper, we take a major step towards a full security proof for CV protocols.
Up until now, security proofs for CV protocols were restricted to idealized protocols that rely on the exchange of quantum states chosen from a continuous distribution. In practice, such protocols are impossible to implement. By contrast, we consider protocols that rely on discrete modulation, meaning that the states are chosen from a finite set.
In quantum key distribution, the secret key rate (a measure of the number of secret bits) depends only on the amount of information leaked to the adversary. Using techniques from convex optimization, we prove that this secret key rate can be inferred by solving a semidefinite program, which can be done efficiently. This, in turn, provides the minimum number of bits guaranteed to remain secure.
For realistic estimates of noise, we show that it is possible to distribute secret keys along fiber-optic links more than 100 km long, well on par with the performance of qubit-based protocols.