We propose a continuous-variable measurement-device-independent quantum key distribution with multi-ring discrete modulation (MR-CV-MDI-QKD) protocol. In our scheme, coherent states are allocated across distinct rings (amplitudes) in the phase space, and each ring is subjected to traditional M-symbol phase shift keying (MPSK) modulation. The analysis and simulation are given to demonstrate the security of our scheme under collective attacks. The results show that, compared with the traditional discrete modulated (DM)-CV-MDI-QKD where only the MPSK is used for modulation with a fixed amplitude, MR-CV-MDI-QKD can decrease the upper bound of the information accessible to an eavesdropper, thereby facilitating an extended transmission distance and increasing the secret key rate, furthermore, it exhibits a higher tolerance to diminished reverse reconciliation efficiency. This work provides an effective way for the practical implementation of the CV-MDI-QKD protocol.

Download full-text PDF

Source
http://dx.doi.org/10.1364/OE.531896DOI Listing

Publication Analysis

Top Keywords

continuous-variable measurement-device-independent
8
measurement-device-independent quantum
8
quantum key
8
key distribution
8
distribution multi-ring
8
multi-ring discrete
8
discrete modulation
8
mpsk modulation
8
modulation
4
modulation propose
4

Similar Publications

We propose a continuous-variable measurement-device-independent quantum key distribution with multi-ring discrete modulation (MR-CV-MDI-QKD) protocol. In our scheme, coherent states are allocated across distinct rings (amplitudes) in the phase space, and each ring is subjected to traditional M-symbol phase shift keying (MPSK) modulation. The analysis and simulation are given to demonstrate the security of our scheme under collective attacks.

View Article and Find Full Text PDF

Continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) can defend all detection-side attacks effectively. Therefore, the source side is the final battlefield for performing quantum hacking attacks. This paper investigates the practical security of a CV-MDI QKD system under a light-injection attack.

View Article and Find Full Text PDF

Building an underwater quantum network is necessary for various applications such as ocean exploration, environmental monitoring, and national defense. Motivated by characteristics of the oceanic turbulence channel, we suggest a machine learning approach to predicting the channel characteristics of continuous variable (CV) quantum key distribution (QKD) in challenging seawater environments. We consider the passive continuous variable (CV) measurement-device-independent (MDI) QKD in oceanic scenarios, since the passive-state preparation scheme offers simpler linear elements for preparation, resulting in reduced interaction with the practical environment.

View Article and Find Full Text PDF

We provide a rigorous security proof of continuous-variable measurement-device-independent quantum key distribution which incorporates finite-size effects and composable terms. In order to use realistic and optimized parameters and be able to derive results close to experimental expectations, we run protocol simulations supported by a Python library, including all the protocol operations, from simulating the quantum communication till the extraction of the final key.

View Article and Find Full Text PDF

A continuous variable (CV), measurement device independent (MDI) quantum key distribution (QKD) protocol is analyzed, enabling three parties to connect for quantum conferencing. We utilise a generalised Bell detection at an untrusted relay and a postselection procedure, in which distant parties reconcile on the signs of the displacements of the quadratures of their prepared coherent states. We derive the rate of the protocol under a collective pure-loss attack, demonstrating improved rate-distance performance compared to the equivalent non-post-selected protocol.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!