ترغب بنشر مسار تعليمي؟ اضغط هنا

Phase Noise Model for Continuous-Variable Quantum Key Distribution Using a Local Local Oscillator

339   0   0.0 ( 0 )
 نشر من قبل Bingjie Xu
 تاريخ النشر 2021
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

The value of residual phase noise, after phase compensation, is one of the key limitations of performance improvement for continuous-variable quantum key distribution using a local local oscillator (LLO CV-QKD) system, since it is the major excess noise. However, due to the non-ideality of the realistic devices implemented in practice, for example, imperfect lasers, detectors and unbalanced interferometers, the value of residual phase noise in current system is still relatively large. Here, we develop a phase noise model to improve the phase noise tolerance of the LLO CV-QKD schemes. In our model, part of the phase-reference measurement noise associated with detection efficiency and electronic noise of Bobs detector as well as a real-time monitored phasereference intensity at Bobs side is considered trusted because it can be locally calibrated by Bob. We show that using our phase noise model can significantly improve the secure key rate and transmission distance of the LLO CV-QKD system. We further conduct an experiment to substantiate the superiority of the phase noise model. Based on experimental data of a LLO CV-QKD system in the 25 km optical fiber channel, we demonstrate that the secure key rate under our phase noise model is approximately 40% higher than that under the conventional phase noise model.

قيم البحث

اقرأ أيضاً

396 - Heng Wang , Yaodi Pi , Wei Huang 2020
A high-speed Gaussian modulated continuous-variable quantum key distribution (CVQKD) with a local local oscillator (LLO) is experimentally demonstrated based on pilot-tone-assisted phase compensation. In the proposed scheme, the frequency-multiplexin g and polarization-multiplexing techniques are used for the separate transmission and heterodyne detection between quantum signal and pilot tone, guaranteeing no crosstalk from strong pilot tone to weak quantum signal and different detection requirements of low-noise for quantum signal and high-saturation limitation for pilot tone. Moreover, compared with the conventional CVQKD based on homodyne detection, the proposed LLO-CVQKD scheme can measure X and P quadrature simultaneously using heterodyne detection without need of extra random basis selection. Besides, the phase noise, which contains the fast-drift phase noise due to the relative phase of two independent lasers and the slow-drift phase noise introduced by quantum channel disturbance, has been compensated experimentally in real time, so that a low level of excess noise with a 25km optical fiber channel is obtained for the achievable secure key rate of 7.04 Mbps in the asymptotic regime and 1.85 Mbps under the finite-size block of 10^7.
The shot-noise unit in continuous-variable quantum key distribution plays an important and fundamental role in experimental implementation as it is used as a normalization parameter that contribute to perform security analysis and distill the key inf ormation. However, the traditional calibration procedure and detector model can not cover all system noise in practical application, which will result in some loopholes and influence the practical security. Whats more, the traditional procedure is also rather complicated and has difficulty in compatible with automatic operating system. In this paper we propose a calibration model based on the proposed trusted detector model, which could naturally close the loopholes in practical application. It can help identify the shot-noise unit in only one step, which can not only effectively simplify the evaluation process but also reduce the statistical fluctuation, while two steps are needed in traditional method. We prove its feasibility and derive the complete version of the corresponding entanglement-based model. Detailed security analysis against arbitrary collective attacks and numerous simulation results in both the asymptotic limit regime and the finite-size regime are provided. A proof-of-principle experiment has been implemented and the results indicate that the one-time-calibration model can be employed as a powerful substitution to calibrate the shot-noise unit. Our method paves the way for the deployment of continuous-variable quantum key distribution with real time calibration and automatic operation.
Quantum key distribution (QKD) which enables the secure distribution of symmetric keys between two legitimate parties is of great importance in future network security. Access network that connects multiple end-users with one network backbone can be combined with QKD to build security for end-users in a scalable and cost-effective way. Though previous QKD access networks are all implemented in the upstream direction, in this paper, we prove that downstream access network can also be constructed by using continuous-variable (CV) QKD. The security of the CV-QKD downstream access network is analyzed in detail, where we show the security analysis is secure against other parties in the network. The security analysis we proved corresponds to the downstream access network where only passive beamsplitter is sufficient to distribute the quantum signals and no other active controls are demanded. Moreover, standard CV-QKD systems can be directly fitted in the downstream access network, which makes it more applicable for practical implementations. Numerous simulation results are provided to demonstrate the performance of the CV-QKD downstream access network, where up to 64 end-users are shown to be feasible to access the network. Our work provides the security analysis framework for realizing QKD in the downstream access network which will boost the diversity for constructing practical QKD networks.
Discrete-modulated continuous-variable quantum key distribution with homodyne detection is widely known for the simplicity on implementation, the efficiency in error correction and the compatibility with modern optical communication devices. However, recent work indicates that using homodyne detection will lead to poor tolerance of excess noise and insufficient transmission distance, hence seriously restricting the large-scale deployment of quantum secure communication networks. Here, we propose a homodyne detection protocol using the technique of quadrature phase shift keying. By limiting information leakage, our protocol enhances excess noise tolerance to a high level. Furthermore, we demonstrate that using homodyne detection performs better than heterodyne detection in quaternary-modulated continuous-variable quantum key distribution under the untrusted detector noise scenario. The security is analyzed by tight numerical method against collective attacks in the asymptotic regime. Results imply that our protocol possesses the ability to distribute keys in nearly intercity area. This progress will make our protocol the main force in constructing low-cost quantum secure communication networks.
Continuous-variable quantum key distribution (CV-QKD) with discrete modulation has received widespread attentions because of its experimental simplicity, lower-cost implementation and ease to multiplex with classical optical communication. Recently, some inspiring numerical methods have been applied to analyse the security of discrete-modulated CV-QKD against collective attacks, which promises to obtain considerable key rate over one hundred kilometers of fiber distance. However, numerical methods require up to ten minutes to calculate a secure key rate one time using a high-performance personal computer, which means that extracting the real-time secure key rate is impossible for discrete-modulated CV-QKD system. Here, we present a neural network model to quickly predict the secure key rate of homodyne detection discrete-modulated CV-QKD with good accuracy based on experimental parameters and experimental results. With the excess noise of about $0.01$, the speed of our method is improved by about seven orders of magnitude compared to that of the conventional numerical method. Our method can be extended to quickly solve complex security key rate calculation of a variety of other unstructured quantum key distribution protocols.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا