Author:
Zhong Hai,Guo Ying,Mao Yun,Ye Wei,Huang Duan
Abstract
AbstractQuantum catalysis is a feasible approach to increase the performance of continuous-variable quantum key distribution (CVQKD), involving the special zero-photon catalysis (ZPC) operation. However, in the practical point of view, the improvement effect of this operation will be limited by the imperfection of the photon detector. In this paper, we show that the ZPC operation at the sender can be simulated by a post-selection method without implementing it in practical devices. While performing this virtual version of ZPC in CVQKD, we can not only reach the ideal case of its practical implementation with minimal hardware requirement, but also keep the benefit of Gaussian security proofs. Based on Gaussian modulated coherent state protocols with achievable parameters, we enhance the security of the proposed scheme from the asymptotical case to the finite-size scenario and composable framework. Simulation results show that similar to the asymptotical case, both the maximal transmission distance and the tolerable excess noise of virtual ZPC-involved CVQKD outperform the original scheme and the scheme using virtual photon subtraction while considering finite-size effect and composable security. In addition, the virtual ZPC-involved CVQKD can tolerate a higher imperfection of the detector, enabling its practical implementation of the CVQKD system with state-of-the-art technology.
Funder
Postgraduate Independent Exploration and Innovation Project of Central South University
National Natural Science Foundation of China
Postgraduate Scientific Research Innovation Project of Hunan Province
Publisher
Springer Science and Business Media LLC
Reference58 articles.
1. Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. in Proceedings of IEEE International Conference on Computers Systems, and Signal Processing, Bangalore, India, 175–179 (1984).
2. Grosshans, F. & Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88, 057902. https://doi.org/10.1103/PhysRevLett.88.057902 (2002).
3. Lo, H. K., Curty, M. & Tamaki, K. Secure quantum key distribution. Nat. Photon. 8, 595–604. https://doi.org/10.1038/nphoton.2014.149 (2015).
4. Braunstein, S. L. & van Loock, P. Quantum information with continuous variables. Rev. Mod. Phys. 77, 513–577. https://doi.org/10.1103/RevModPhys.77.513 (2005).
5. Weedbrook, C. et al. Gaussian quantum information. Rev. Mod. Phys. 84, 621–669. https://doi.org/10.1103/RevModPhys.84.621 (2012).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献