Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Security analysis of continuous variable quantum key distribution based on entangled states with biased correlations

Open Access Open Access

Abstract

Einstein-Podolsky-Rosen (EPR) entangled states can significantly enhance the secret key rate and secure distance of continuous-variable quantum key distribution (CV-QKD). In practical imperfections always exist in the preparation of two-mode squeezing (entangled states), which present an asymmetrical variance for the two quadratures. The imperfections induced by the bias effect of the entangled states are commonly treated as part of the untrusted channel to decrease the performance of the system. Here, we theoretically quantify the influence of bias effect on the secret key rate and secure distance, and propose a solution of generating unbiased entangled states protocol. The results demonstrated that the unbiased entangled states protocol guarantees the longest secure distance and highest key rate compared to that of coherent and biased entangled states.

© 2021 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

Quantum key distribution (QKD) [18] is a prominent technology for quantum information science, which shares a pre-established secret key between two trusted parties based on the laws of quantum physics. In continuous-variable (CV) QKD systems, the secret key is encoded in the quadratures of the electromagnetic field, for example, coherent states [913], squeezed/entangled states [25,14], in which homodyne or heterodyne detection techniques are used for signal extraction [2,15,16]. Multiple protocols [9,10,13,17] indicated that the secret key rate and secure distance are mainly limited by the excess noise, optical losses, and finite reconciliation efficiency during the distribution [2,15,16]. Present CV-QKD systems are already working with state-of-the-art optical channels and the reconciliation efficiency [6,1518]. The maximum secure distance has already reached 202 km based on coherent state, in which an ultralow-loss optical fiber combined with a phase compensation and highly-efficient reconciliation procedures was applied for the enhancement [17].

Compared with coherent-state protocol, entangled states protocol is more tolerant to excess noise, loss and reconciliation efficiency [35,15,19]. For instance, a -3.5 dB modulated two-mode squeezed states can significantly boost the robustness and distance for secure communication [3], in which, a secret raw key was generated between two parties connected by a noisy and lossy channel-a channel that is not secure for coherent state protocols. As the squeezing factor is improved to 10 dB, the superiority becomes more obvious. In addition, to further enhance the performance, Alice and Bob, share a pair of Einstein-Podolsky-Rosen (EPR) beams and randomly choose a quadrature (amplitude or phase) base measurement to decrypt the key [19]. Therefore, to keep the advantages of this protocol, the entanglement should be prepared not only with strong quantum correlations [20,21], but also with symmetric quantum correlations between the two quadrature components [22,23]. However, a bias of the two quadratures always accompanies with the preparation of high degree EPR states [2325], which originates from several interdependent factors in the EPR states production [20,22,24,25]. Compared with unbiased EPR protocol, the bias effect in practical entanglement generation is commonly treated as part of the untrusted channel to weaken the secret key rate and secure distance. Currently, EPR states protocol with single-mode squeezing had been studied in detail with asymmetrical quadrature variance [23,26]. Or a position squeezed state with probability $P$ and a momentum one with probability $1-P$, prepared to produce a Gaussian modulated average isotropic thermal state, are theoretically demonstrated to have the same performance as an equivalent entanglement-based protocol [14,26]. However, the two-mode squeezing protocol has been demonstrated without considering the bias effect [3,4,19,27]. In [24], we had experimentally and theoretically researched the bias effect in detail, and given a methodology to produce an unbiased EPR states. This inspires the following works: (1) quantitative analysis of the dependence of the system performance of CV-QKD on the bias effect; (2) how to weaken the influence of the bias effect on the secret key rate and secure distance.

Here, we quantitatively analyze the secret key rate and secure distance for three protocols: coherent, biased, and unbiased entanglement. The results indicate a superiority for unbiased EPR protocol in long-distance communication, compared with biased entanglement and coherent protocols. Further, we model the generation process of EPR entangled states and propose a solution to construct unbiased entangled states protocol.

2. Theoretical analysis of CV-QKD with biased EPR protocol

Our CV-QKD protocol is shown in Fig. 1, which has three parts, the sender Alice with a state preparation (the EPR entanglement source and modulator) and detection, the quantum channel, and the remote receiver Bob with state detection. The entanglement source is prepared by mixing two amplitude squeezed states with amplitude variances ${{V}_{1}}\left ( X \right )$ and ${{V}_{2}}\left ( X \right )$ at a 50/50 beam splitter (BS), which outputs are two entangled modes ${{A}_{0}}$ and ${{B}_{0}}$, and belong to the trusted sender. Mode ${{A}_{0}}$ is a thermal state with a variance of ${{V}_{\textrm {a}}}\left ( X/Y \right )={\left ( {{V}_{\textrm {1}}}\left ( X/Y \right )+{{V}_{\textrm {2}}}\left ( Y/X \right ) \right )}/{2}\;$ ($X$ and $Y$ are the amplitude and phase components, respectively), which is homodyne detected by Alice with a detection efficiency of ${{\eta }_{\textrm {A}}}$. Mode ${{B}_{0}}$ with a variance of ${{V}_{\textrm {b}}}\left ( X/Y \right )={\left ( {{V}_{\textrm {1}}}\left ( X/Y \right )+{{V}_{\textrm {2}}}\left ( Y/X \right ) \right )}/{2}\;$.

 figure: Fig. 1.

Fig. 1. Schematic diagram of the CV-QKD protocol with modulated entangled states. Alice prepares a Gaussian entangled state with variances ${{V}_{\textrm {a}}}$ and ${{V}_{\textrm {b}}}$, which is modulated with a variance ${{V}_{\textrm {M}}}$ controlled by Alice. One of the modulated entangled states mode ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}$ transmits through an untrusted quantum channel with a channel transmittance $\eta$ and excess noise $\varepsilon$, which can be fully eavesdropped by the third part-Eve. Then, the resulting state with variance ${{V}_{\textrm {B}}}$ is homodyne detected by Bob. The other entanglement mode ${{V}_{{{\textrm {A}}_{\textrm {0}}}}}$ is also homodyne detected by Alice with a variance ${{V}_{\textrm {A}}}$. ${{\eta }_{\textrm {A}}}$: detection efficiency of Alice; ${{\nu }_{\textrm {elA}}}$: electronic noise of Alice; ${{\eta }_{\textrm {B}}}$: detection efficiency of Bob; ${{\nu }_{\textrm {elB}}}$: electronic noise of Bob.

Download Full Size | PDF

Then mode ${{B}_{0}}$ transmits through a lossy $\eta$ and noisy $\varepsilon$ quantum channel, which is assumed to be fully controlled by an eavesdropper Eve, consequently, makes the channel untrusted. Then, mode ${{B}_{0}}$ is also homodyne detected by a trusted receiver Bob. $\textrm {Bob's}$ noisy detection is purified by placing a beam splitter with an EPR state ${{\rho }_{{{R}_{0}}G}}$ input, which transmission mimics his electronic noise ${{\nu }_{\textrm {elB}}}$ and detection efficiency ${{\eta }_{\textrm {B}}}$. Then the point-to-point repeaterless Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound can be expressed as $-{{\log }_{2}}\left ( 1-{{\eta }_{\textrm {A}}}{{\eta }_{\textrm {B}}}\eta \right )$ [8,26,28], which provides the exact benchmark and the secret key capacity of the lossy communication channel (pure-loss channel).

In the EPR based CV-QKD protocol, secret key is distilled from the state information shared by the two trusted parties-Alice and Bob. Considering a protocol with reverse reconciliation (RR) and collective attacks, the secret key rate is expressed as [3,4,27,29,30]

$$\Delta I=\beta I_{\textrm{AB}}^{{}}-\chi _{_{\textrm{BE}}}^{{}}.$$
The protocol is secure, while the key rate $\Delta I>0$ [3,31]. ${{I}_{\textrm {AB}}}$ is the Shannon mutual information between Alice and Bob, and ${{\chi }_{\textrm {BE}}}$ is the Holevo quantity. Where $\beta \le 1$ refers to the reconciliation efficiency, which is determined by the signal-to-noise ratio (SNR) and algorithm being used for the reconciliation and computational power in trusted devices [32]. Nevertheless, imperfections always indwell in the devices, such as state generation (imperfect coherent or EPR state) and modulation in sender side, or state detection in $\textrm {Bob's}$ station. The imperfections introduce noises and losses into the detection parts, which can seriously shorten the secure distance or limit the key rate to an extremely lower level [32]. Therefore, the key rate in entanglement-based CV-QKD should be analyzed under imperfection conditions. By introducing the imperfections as trusted noise, the Shannon mutual information ${{I}_{\textrm {AB}}}$ between Alice and Bob related to the variances in the two stations and their correlation, is expressed as [4,27]
$${{I}_{\textrm{AB}}}\textrm{=}\frac{1}{2}{{\log }_{2}}\frac{{{V}_{\textrm{A}}}}{{{V}_{\textrm{A/B}}}}\textrm{=}\frac{1}{2}{{\log }_{2}}\frac{{{V}_{\textrm{A}}}}{{{V}_{\textrm{A}}}-{C_{\textrm{AB}}^{\textrm{2}}}/{{{V}_{\textrm{B}}}}\;},$$
where ${{V}_{\textrm {A}}}$ and ${{V}_{\textrm {B}}}$ are the variances of the quadratures measured by Alice and Bob, respectively. ${{V}_{\textrm {A/B}}}$ is the conditional variance. ${{C}_{\textrm {AB}}}$ is the correlation coefficient between Alice and Bob. We assume the state information from Alice transmits through a Gaussian channel-optical fiber with the transmittance $\eta ={{10}^{{-\alpha L}/{10}\;}}$ and excess noise $\varepsilon$, where $\alpha$ ($L$) is the loss coefficient (length) of the fiber.

For information eavesdropping, the upper bound information ${{\chi }_{\textrm {BE}}}$ accessible to Eve from Bob is limited by the Holevo quantity [27].

$$\begin{aligned}{{\chi }_{\textrm{BE}}}&\textrm{=}S\left( {{\rho }_{\textrm{E}}} \right)-S\left( \rho _{\textrm{E}}^{ {{X}_{\textrm{B}}}} \right) \\ &\textrm{=}\sum_{i=1}^{2}{G\left( \frac{{{\lambda }_{i}}-1}{2} \right)}-\sum_{j=3}^{5}{G\left( \frac{{{\lambda }_{j}}-1}{2} \right)}, \end{aligned}$$
where $G\left ( x \right )\textrm {=}\left ( x+1 \right ){{\log }_{2}}\left ( x+1 \right )-x{{\log }_{2}}\left ( x \right )$ is the bosonic entropic function, ${{{X}}_{\textrm {B}}}({{{Y}}_{\textrm {B}}})$ represents $\textrm {Bob's}$ measurement for amplitude (phase) quadrature, $\rho _{\textrm {E}}^{{{X}_{\textrm {B}}}}$ is $\textrm {Eve's}$ state conditional on the measured result of Bob, and $S$ is the Von Neumann entropy of the quantum state $\rho$. As $\textrm {Eve's}$ system purifies the system ${{A}_{0}}{{B}_{1}}$ ($S\left ( {{\rho }_{\textrm {E}}} \right )=S\left ( {{\rho }_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{\textrm {1}}}}}\right )$), $\textrm {Bob's}$ measurement purifies the system ${{A}_{0}}ERG$ ($S\left ( \rho _{\textrm {E}}^{{{X}_\textrm {B}}} \right )=S\left ( \rho _{{{\textrm {A}}_{\textrm {0}}}\textrm {RG}}^{{{X}_{\textrm {B}}}} \right )$), where ${{A}_{0}}{{B}_{1}}$ and ${{A}_{0}}ERG$ are the pure states. ${{\chi }_{\textrm {BE}}}$ can be rewritten as
$${{\chi }_{\textrm{BE}}}=S\left( {{\rho }_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}}\right)-S\left( \rho _{{{\textrm{A}}_{\textrm{0}}}\textrm{RG}}^{{{X}_{\textrm{B}}}} \right).$$
${{\lambda }_{1,2}}$ and ${{\lambda }_{3,4,5}}$ are the symplectic eigenvalues of the covariance matrix ${{\gamma }_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{\textrm {1}}}}}$ and $\gamma _{{{\textrm {A}}_{\textrm {0}}}\textrm {RG}}^{{{X}_{\textrm {B}}}}$ respectively, which are related to the noise variances of the prepared states at $\textrm {Alice's}$ and $\textrm {Bob's}$ stations (${{V}_{{{\textrm {A}}_{\textrm {0}}}}}$ and ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}$) [27], the transmittance $\eta$ and excess noise $\varepsilon$ of the quantum channel, and the efficiency ${{\eta }_{\textrm {B}}}$ and the electronic noise ${{\nu }_{\textrm {elB}}}$ of the homodyne detector at $\textrm {Bob's}$ station.

Obviously, ${{I}_{\textrm {AB}}}$ and ${{\chi }_{\textrm {BE}}}$ link the noise variances ${{V}_{\textrm {a}}}\left ( X/Y \right )$ and ${{V}_{\textrm {b}}}\left ( X/Y \right )$ to the secret key rate. Therefore, the variances ${{V}_{\textrm {a,b}}}$ of the two EPR modes should be dwelled on the actual preparation of EPR states. In the QKD process, unbiased entangled states with symmetrical quantum correlations are usually considered by coupling two equivalent squeezed states ${{V}_{1}}\left ( X \right )={{V}_{2}}\left ( X \right )$ on a 50/50 BS [3]. In fact, the variances of the two EPR modes are related to the trusted optical channel losses ${{l}_{\textrm {a,b}}}$, the relative phase between the two squeezing beams $\varphi$, variances of the squeezed states ${{V}_{1,2}}\left ( X \right )$ and balance of the BS (1-$T$):$T$ [20,22,24,25]. Any deviation of these parameters from the ideal value may destroy the symmetric correlations and introduce a bias effect as shown in Fig. 2 [22,24,25], which is harmful to the requirements of random quadrature base measurement and also weakens the superiority of the EPR states [23]. Taking into account the bias effect, the amplitude and phase correlation variances can be expressed as (without considering the relative phase between the two squeezing beams $\varphi$, the method is detailedly demonstrated in the Appendix)

$${{V}_{\textrm{a}}}\left( X \right)\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-T \right){{V}_{\textrm{1}}}\left( X \right)+\left( 1-{{l}_{\textrm{a}}} \right)T{{V}_{2}}(Y)+{{l}_{\textrm{a}}},$$
$${{V}_{\textrm{a}}}\left( Y \right)\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-T \right){{V}_{\textrm{1}}}\left( Y \right)+\left( 1-{{l}_{\textrm{a}}} \right)T{{V}_{2}}(X)+{{l}_{\textrm{a}}},$$
$${{V}_{\textrm{b}}}\left( X \right)\textrm{=}\left( 1-{{l}_{\textrm{b}}} \right)T{{V}_{\textrm{1}}}\left( X \right)+\left( 1-{{l}_{\textrm{b}}} \right)\left( 1-T \right){{V}_{2}}(Y)+{{l}_{\textrm{b}}},$$
$${{V}_{\textrm{b}}}\left( Y \right)\textrm{=}\left( 1-{{l}_{\textrm{b}}} \right)T{{V}_{\textrm{1}}}\left( Y \right)+\left( 1-{{l}_{\textrm{b}}} \right)\left( 1-T \right){{V}_{2}}(X) +{{l}_{\textrm{b}}}.$$

 figure: Fig. 2.

Fig. 2. Conceptual illustration of the modulated thermal states protocol. ${{V}_{\textrm {1}}}$ and ${{V}_{\textrm {2}}}$: the variance of two squeezed states; ${{V}_{\textrm {a}}}$ and ${{V}_{\textrm {b}}}$: the variances of the two EPR modes; ${{l}_{\textrm {a}}}$ and ${{l}_{\textrm {b}}}$: the trusted optical losses in the preparation part; ${{V}_{{{\textrm {A}}_{\textrm {0}}}}}$ and ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}$: the variances of the two modulated EPR modes.

Download Full Size | PDF

When ${{V}_{1}}\left ( X \right )={{V}_{2}}\left ( X \right )$, the unbiased entangled states can be prepared by a balanced BS $T=0.5$ or loss ${{l}_{\textrm {a}}}={{l}_{\textrm {b}}}$, and more details can be found in Ref. [24]. In Ref. [24], we had firstly analyzed the origin of the bias effect in detail and directly observed an unbiased entanglement of -10.7 dB by using two single-mode squeezed states. It provides a superior unbiased entangled light source for CV-QKD protocol based on entangled states.

In general EPR states are treated as thermal states [31] with a circular noise distribution for the two quadratures. But for biased EPR states, the quadrature noise distributes to be an elliptical one as describing in Fig. 2 (initial or measured variance before mode B is sent to the untrusted channel), due to the asymmetrical noise redistribution of ${{V}_{1}}\left ( X \right )$ and ${{V}_{2}}\left ( X \right )$ to Alice and Bob. This asymmetrical noise redistribution of the practical systems is commonly treated as an untrusted part. Hence, Eve is able to extract the information from the untrusted channel, by preparing an appropriate squeezed state to restore the variance to the initial level, and pretend no information leakage to her. In this case, it decreases the performance of the system. To maintain the advanced performance with (single-mode or two-mode [3,4,26]) squeezed state, Bob should discard some information in one of the measured quadratures, which weakens the secure distance compared with unbiased protocol [23]. On the other hand, the existing theory for homodyne protocol with EPR state requires the two quadrature of the amplitude and phase variances should be equal with each other. Therefore, a modulated thermal state is proposed for the analysis of biased entanglement, in which the small variance quadrature is modulated to generate a circular thermal state [31], showed by the modulated variance in Fig. 2. Under this circumstance, ${{V}_{\textrm {a,b}}}$ evolves into ${{{V}'}_{{{\textrm {A}}_{\textrm {0}}}\textrm {,}{{\textrm {B}}_{\textrm {0}}}}}$, ${{{V}'}_{{{\textrm {A}}_{\textrm {0}}}}}\left ( X \right )\textrm {=}{{V}_{\textrm {a}}}\left ( X \right )+{{V}_{\textrm {M1}}}\left ( X \right )$, ${{{V}'}_{{{\textrm {A}}_{\textrm {0}}}}}\left ( Y \right )\textrm {=}{{V}_{\textrm {a}}}\left ( Y \right )$, ${{{V}'}_{{{\textrm {B}}_{\textrm {0}}}}}\left ( X \right )\textrm {=}{{V}_{\textrm {b}}}\left ( X \right )$, ${{{V}'}_{{{\textrm {B}}_{\textrm {0}}}}}\left ( Y \right )\textrm {=}{{V}_{\textrm {b}}}\left ( Y \right )+{{V}_{\textrm {M1}}}\left ( Y \right )$, and Eve cannot distinguish the difference between the biased or unbiased EPR protocols. CV-QKD for biased EPR states again restores the performance. Eve is allowed to achieve any attack by emulating the channel transmission and excess noise, and the bias does not affect the leakage information to Eve. Finally, the biased protocol can be treated with the standard CV-QKD theory for the pure state [3,4].

Under a high loss case with RR, i.e., communication in a long-distance fiber, the existing reconciliation algorithm suffers a low efficiency, which severely limits the key rate and distance. To overcome this problem, an additional modulation ${{V}_{\textrm {M2}}}$ is added to the prepared state (modulated thermal state in Fig. 2) to further extend the secure distances [3,4,19]. In an ideal situation (noiseless and lossless in the sender and receiver), arbitrary high modulation ($1\sim +\infty$) can be applied to greatly enhance the key rate and distance. However, a practical schema is always imperfect, and squeezing level can continuously improve the security parameters, while the modulation must be optimized to tolerate the channel noise [3,19,33].

During the key distribution, mode ${{B}_{0}}$ is sent to the remote trusted party-Bob, through a quantum channel characterized by the lossy $\eta$ and noisy $\varepsilon$, and the covariance matrix is expressed as

$${{\gamma }_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}}=\left( \begin{matrix} {{\gamma }_{{{\textrm{A}}_{\textrm{0}}}}} & {{C}_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}} \\ {{C}_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}} & {{\gamma }_{{{\textrm{B}}_{\textrm{1}}}}} \\ \end{matrix} \right)=\left( \begin{matrix} {{V}_{{{\textrm{A}}_{\textrm{0}}}}}\left( X \right) & 0 & {{C}_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}}\left( X \right) & 0 \\ 0 & {{V}_{{{\textrm{A}}_{\textrm{0}}}}}\left( Y \right) & 0 & {{C}_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}}\left( Y \right) \\ {{C}_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}}\left( X \right) & 0 & {{V}_{{{\textrm{B}}_{\textrm{1}}}}}\left( X \right) & 0 \\ 0 & {{C}_{{{\textrm{A}}_{\textrm{0}}}{{\textrm{B}}_{\textrm{1}}}}}\left( Y \right) & 0 & {{V}_{{{\textrm{B}}_{\textrm{1}}}}}\left( Y \right) \\ \end{matrix} \right).$$
where ${{V}_{{{\textrm {A}}_{\textrm {0}}}}}\left ( X \right )\textrm {=}{{V}_{\textrm {a}}}\left ( X \right )+{{V}_{\textrm {M1}}}\left ( X \right )+{{V}_{\textrm {M2}}}\left ( X \right )$ and ${{V}_{{{\textrm {A}}_{\textrm {0}}}}}\left ( Y \right )\textrm {=}{{V}_{\textrm {a}}}\left ( Y \right )+{{V}_{\textrm {M2}}}\left ( Y \right )$ are the variances of mode ${{A}_{0}}$ in the amplitude and phase quadratures; ${{V}_{{{\textrm {B}}_{\textrm {1}}}}}\left ( X \right )=\eta \left ( {{V}_{{{\textrm {B}}_{0}}}}\left ( X \right )+{{\chi }_{\textrm {line}}} \right )$ and ${{V}_{{{\textrm {B}}_{\textrm {1}}}}}\left ( Y \right )=\eta \left ( {{V}_{{{\textrm {B}}_{0}}}}\left ( Y \right )+{{\chi }_{\textrm {line}}} \right )$ are the variances of mode ${{B}_{1}}$ in the amplitude and phase quadratures; ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}\left ( X \right )\textrm {=}{{V}_{\textrm {b}}}\left ( X \right )+{{V}_{\textrm {M2}}}\left ( X \right )$ and ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}\left ( Y \right )\textrm {=}{{V}_{\textrm {b}}}\left ( Y \right )+{{V}_{\textrm {M1}}}\left ( Y \right )+{{V}_{\textrm {M2}}}\left ( Y \right )$ are the variances of mode ${{B}_{0}}$ in the amplitude and phase quadratures; ${{C}_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{1}}}}\left ( X \right )=\sqrt {\eta }{{C}_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{\textrm {0}}}}}\left ( X \right )$ and ${{C}_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{1}}}}\left ( Y \right )=\sqrt {\eta }{{C}_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{\textrm {0}}}}}\left ( Y \right )$ are the correlation between the two modes ${{A}_{0}}$ and ${{B}_{1}}$ in the amplitude and phase quadratures; ${{C}_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{\textrm {0}}}}}\left ( X \right )={{C}_{\textrm {ab}}}\left ( X \right )+{{{V}_{\textrm {M1}}}\left ( X \right )}/{2}\;+{{V}_{\textrm {M2}}}\left ( X \right )$ and ${{C}_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{\textrm {0}}}}}\left ( Y \right )={{C}_{\textrm {ab}}}\left ( Y \right )+{{{V}_{\textrm {M1}}}\left ( Y \right )}/{2}\;+{{V}_{\textrm {M2}}}\left ( Y \right )$ are the correlation between the two modes ${{A}_{0}}$ and ${{B}_{0}}$ in the amplitude and phase quadratures. ${{C}_{\textrm {ab}}}$ is the initial correlation coefficient of the entangled states without modulation, and the detailed analysis method is in Appendix.

To simplify the analysis process, we assume a trusted noise in the detection part, and a narrow-band homodyne detector is applied [32,34,35]. Then, the modified variances of the quadratures measured by Alice and Bob are deduced as

$${{V}_{\textrm{A}}}={{\eta }_{\textrm{A}}}{{V}_{{{\textrm{A}}_{\textrm{0}}}}}+1-{{\eta }_{\textrm{A}}}+{{\nu }_\textrm{elA}},$$
$${{V}_{\textrm{B}}}=\eta {{\eta }_{\textrm{B}}}\left( {{V}_{{{\textrm{B}}_{\textrm{0}}}}}+{{\chi }_{\textrm{tot}}} \right),$$
where
$${{\chi }_{\textrm{tot}}}\textrm{=}{{\chi }_{\textrm{line}}}+{{{\chi }_{\textrm{hom}}}}/{\eta }\;,$$
$${{\chi }_{\textrm{line}}}\textrm{=}{1}/{\eta }\;-1+\varepsilon,$$
$${{\chi }_{\textrm{hom}}}\textrm{=}{\left( 1\textrm{+}{{\nu }_{\textrm{elB}}} \right)}/{{{\eta }_{\textrm{B}}}}\;-1.$$
Here, ${{\eta }_{\textrm {A}}}$ and ${{\nu }_{\textrm {elA}}}$ are the detection efficiency and electronic noise of $\textrm {Alice's}$ station; ${{\eta }_{\textrm {B}}}$ and ${{\nu }_{\textrm {elB}}}$ are that of Bob. ${{V}_{{{\textrm {A}}_{\textrm {0}}}}}$ and ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}$ are the variances of the two modulated EPR modes. ${{\chi }_{\textrm {tot}}}$ (${{\chi }_{\textrm {line}}}$) denotes the total (channel) added noise of the channel input site; ${{\chi }_{\textrm {hom}}}$ is the added noise of the homodyne detector for $\textrm {Bob's}$ input site. Then, the correlation coefficient between Alice and Bob is deduced as [3]
$${{C}_{\textrm{AB}}}=\sqrt{\eta {{\eta }_{\textrm{A}}}{{\eta }_{\textrm{B}}}}\left( {{C}_{\textrm{ab}}}+{{{V}_{\textrm{M1}}}}/{2}\;+{{V}_{\textrm{M2}}} \right).$$
Substituting with ${{V}_{{{\textrm {A}}_{\textrm {0}}}\textrm {,}{{\textrm {B}}_{\textrm {0}}}}}=V$, the symplectic eigenvalues ${{\lambda }_{1,2}}$ of the covariance matrix ${{\gamma }_{{{\textrm {A}}_{\textrm {0}}}{{\textrm {B}}_{\textrm {1}}}}}$ for the analytical formula of ${{\chi }_{\textrm {BE}}}$ are reduced to
$${{\lambda }_{1,2}}=\sqrt{\frac{1}{2}\left( \Delta \pm \sqrt{{{\Delta }^{2}}-4D} \right)},$$
where
$$D\textrm{=}{{\eta }^{2}}{{\left( V{{\chi }_{\textrm{line}}}+1 \right)}^{2}},$$
$$\Delta ={{V}^{2}}{{\left( 1-\eta \right)}^{2}}+V\left( 2{{\chi }_{\textrm{line}}}{{\eta }^{2}} \right)+\left( {{\eta }^{2}}\chi _{\textrm{line}}^{2}+2\eta \right).$$
The analytical formula for the symplectic eigenvalues ${{\lambda }_{3,4,5}}$ of the covariance matrix $\gamma _{{{\textrm {A}}_{\textrm {0}}}\textrm {RG}}^{{{X}_{\textrm {B}}}}$ are reduced to
$${{\lambda }_{3,4,5}}=\sqrt{\frac{1}{2}\left( A\pm \sqrt{{{A}^{2}}-4B} \right)}, {{\lambda }_{5}}=1,$$
where for homodyne protocol we have
$${{A}^{\hom }}=\frac{\Delta {{\chi }_{\hom }}+V\sqrt{D}+\eta \left( V+{{\chi }_{\textrm{line}}} \right)}{\eta \left( V+{{\chi }_{\textrm{tot}}} \right)},$$
$${{B}^{\hom }}=\sqrt{D}\frac{\left( \eta {{\chi }_{\textrm{line}}}V+\eta \right)\chi _{\hom }^{2}+\left[ \sqrt{D}\eta \left( V+{{\chi }_{\textrm{line}}} \right)+V \right]{{\chi }_{\hom }}+\eta V\left( V+{{\chi }_{\textrm{line}}} \right)}{{{\left[ \eta \left( V+{{\chi }_{\textrm{tot}}} \right) \right]}^{2}}}.$$
Finally, the Holevo bound can be expressed as
$${{\chi }_{\textrm{BE}}}=G\left( {{\lambda }_{1}} \right)+G\left( {{\lambda }_{2}} \right)-G\left( {{\lambda }_{3}} \right)-G\left( {{\lambda }_{4}} \right).$$
In the following section, the performance of the QKD is analyzed in detail for the unbiased and biased EPR protocols in this section.

3. Secret key rate and secure distance for biased and unbiased EPR protocols

Tables Icon

Table 1. The parameters used to calculate the secure distance of Fig. 3. ${{V}_{\textrm {1,2}}}$: the variance of two squeezed states; $\beta$: reconciliation efficiency; $\varepsilon$: excess noise; $\alpha$: loss coefficient of a standard single-mode fiber; ${{\eta }_{\textrm {A}}}$: detection efficiency of Alice; ${{\eta }_{\textrm {B}}}$: detection efficiency of Bob; ${{\nu }_{\textrm {elB}}}$: electronic noise of Bob. ${{l}_{\textrm {a}}}$ and ${{l}_{\textrm {b}}}$: the trusted optical losses in the preparation part; $T$: beam splitting ratio; $V\left ( {{{{{X}}}}_{\textrm {a}}}+{{{{{X}}}}_{\textrm {b}}} \right )$: the amplitude correlation variance of the entangled states; $V\left ( {{{{{Y}}}}_{\textrm {a}}}-{{{{{Y}}}}_{\textrm {b}}} \right )$: the phase correlation variance of the entangled states; Note: ${{l}_{\textrm {a}}}\textrm {=}0.01$, ${{l}_{\textrm {b}}}\textrm {=}0.05$, and ${{\eta }_{\textrm {A}}}=0.99$. The bias variances are calculated with equations (32) and (39) by introducing an unbalanced BS. The unbiased entangled state $V\left ( {{{{{X}}}}_{\textrm {a}}}+{{{{{X}}}}_{\textrm {b}}} \right )=V\left ( {{{{{Y}}}}_{\textrm {a}}}-{{{{{Y}}}}_{\textrm {b}}} \right )=-10.1$ dB is deduced with $T=0.5$, and the biased entangled state $V\left ( {{{{{Y}}}}_{\textrm {a}}}-{{{{{Y}}}}_{\textrm {b}}} \right )=-9.5$ dB and $V\left ( {{{{{X}}}}_{\textrm {a}}}+{{{{{X}}}}_{\textrm {b}}} \right )=-10.5$ dB is deduced with $T=0.49$.

Combining the theoretical models in section 2 and appendixes, we calculate the secure key rate and secure distance of the CV-QKD based on a fiber channel. Firstly, without considering the modulation schema and side-channel effect, the maximum secure distance is compared between the biased and unbiased EPR protocols. Here the maximum distance is stipulated as the key rate decreased to ${{10}^{-8}}$ bits/pulse. Taking the actual situation for states preparation into account, the initial system parameters for biased and unbiased protocols are given as, originating from Ref. [24]. With the precondition of ${{V}_{\textrm {1}}}(X)={{V}_{\textrm {2}}}(X)$, for $T=0.49$, a biased entanglement is obtained, and unbiased correlations are established for $T=0.5$, and more details can be found in our previous work [24]. Then, the differences of the secure distance between the biased and unbiased entanglement protocols ${{L}_{\textrm {unbias}}}-{{L}_{\textrm {bias}}}$ are demonstrated in Fig. 3, , and the parameters for the demonstration of the six sub-graphs are listed in Table 1. With ${{V}_{\textrm {1}}}(X)={{V}_{\textrm {2}}}(X)$ in Fig. 3(a), the secure distance for unbiased protocol is enhanced with the increasing of the squeezing level. The secure distance starts to surpass the coherent state protocol as the squeezing level increased above 5 dB, and the biased protocol appears to be lower than the unbiased one. Meanwhile, the difference of the maximum secure distance between the two EPR states becomes larger, especially higher than 10 dB (the dotted box in Fig. 3(a)), where the bias begins to quickly weaken the secure distance compared with the unbiased protocol. In the precondition of ${{V}_{1}}\left ( X \right )={{V}_{2}}\left ( X \right )=-12$ dB, the reconciliation efficiency $\beta$, excess noise $\varepsilon$, the channel loss coefficient $\alpha$, efficiency ${{\eta }_{\textrm {B}}}$, and detection electronic noise ${{\nu }_{\textrm {elB}}}$ of Bob are considered as the influence factors to the biased protocol. The magnitude of the reconciliation efficiency $\beta$ amends the difference between the biased and unbiased entanglement protocols. As showing in Fig. 3(b), ${{L}_{\textrm {unbias}}}$ is more superior to ${{L}_{\textrm {bias}}}$ as $\beta$ approaching the unit. And this conclusion is also suitable for a noiseless or lossless quantum channel, i.e., in Fig. 3(c) and (d), less excess noise or channel loss is more favorable to the unbiased protocol for secure distance enhancement. Moreover, in Fig. 3(e) and (f), the detection efficiency ${{\eta }_{\textrm {B}}}$ and electronic noise ${{\nu }_{\textrm {elB}}}$ in $\textrm {Bob's}$ station have no impact on ${{L}_{\textrm {unbias}}}-{{L}_{\textrm {bias}}}$, which act as linear noise injection for the two protocols. From the above argument, we can see that unbiased entanglement proves to be more preferable for long-distance communication, especially for a squeezing level above 10 dB. The results are also supported by Ref. [23].

 figure: Fig. 3.

Fig. 3. Secure distances comparison with and without bias effect for different squeezing degree, reconciliation efficiency $\beta$, excess noise $\varepsilon$, loss coefficient of the optical fiber $\alpha$, the efficiency ${{\eta }_{\textrm {B}}}$ and electronic noise ${{\nu }_{\textrm {elB}}}$ of Bob. ${{L}_{\textrm {unbias}}}$ and ${{L}_{\textrm {bias}}}$ are the secure distances of unbiased and biased EPR protocols. SNU: shot noise units; BHD: balanced homodyne detector.

Download Full Size | PDF

Before secret key rate calculation, we provide a channel estimation [36] analysis based on current experimental conditions for EPR protocol. A standard single-mode fiber (a loss coefficient $\alpha =0.2$ dB/km) serves as the transmission channel of the entangled states from Alice to Bob. Assuming one of the EPR modes in Alice station is prepared with a detection efficiency ${{\eta }_{\textrm {A}}}$>99$\%$ (an optical propagation efficiency is better than 0.2$\%$, an interference visibility of 99.8$\%$, a quantum efficiency inferred by the measured squeezing level is about 99.5$\%$) [35]. In $\textrm {Bob's}$ station, we suppose the transmitted states from the channel are coupled by fiber devices, and injected into space homodyne detection, which efficiency is given as ${{\eta }_{\textrm {B}}}=0.843$ (the optical propagation efficiency based on the fiber devices is 85.5$\%$, $\textrm {homodyne detector's}$ visibility is 99.8$\%$, the quantum efficiency of the photodiodes is also better than 99$\%$) [3,4,18,29,37]. Then, the key distribution is simulated with the schema in Ref. [4], and all the above parameters are used to estimate the channel. Incorporating Ref. [36,38] (models of channel estimation) and the noise variances of -10 dB, the excess noise of the protocol is estimated to be better than 0.1. In our theoretical analysis, excess noise is chosen as 0.1 to meet the realistic situation. Imperfections at $\textrm {Alice's}$ and $\textrm {Bob's}$ stations introduce the side-channel effects, that make the protocol more sensitive to the channel noise and can even break the security for purely attenuating channel. With the above parameters and the theoretical results for two-mode squeezing in Ref. [39,40], the side-channel limits the maximum tolerable channel noise to be approximately 0.72 SNU at Alice’s station and 0.65 SNU at Bob’s station. It demonstrated that the EPR protocol was more tolerant to the prepared and detected noises, hence we omit the side-channel effects.

In the key rate calculation, the reconciliation efficiency $\beta \textrm {=}0.99$ is considered as the highest level in practical protocols [18]. Assumed an infinite number of measured samples is used to extract the key rate. For all protocols, imperfect reconciliation efficiency $\beta <1$ limits the modulated variances to a finite value [33]. As a consequence, there is an optimal ${{V}_{\textrm {M}}}$ to guarantee the best performance of the QKD. Inferred from equations (32) and (39), the biased EPR can be transformed to an unbiased one by changing the variances of the squeezed states ${{V}_{1,2}}\left ( X \right )$, the trusted optical losses ${{l}_{\textrm {a,b}}}$ in the preparation part or balance of the BS (1-$T$):$T$ [24]. The details for the production of unbiased entangled states were investigated in a recent paper [24]. However, in CV-QKD, channel loss is uncontrollable. To maintain the maximum entanglement level and secure distance, the balance of the BS is favorable compared with the other two parameters. Figure 4(a) shows the calculated secret key rate and maximum secure distance, and the parameters for the calculation are listed in Table 2. The results demonstrated that the unbiased EPR protocol (curves 6 and 7) is superior to the other two protocols (biased EPR and coherent protocols) in the maximum secure distance, and still can be improved by a finite modulation (${{V}_{\textrm {M2}}}=4.7$, the secure distance is increased from 251 km to 263 km). The biased EPR protocol (curves 2 and 3) is more robust compared with the coherent one (curve 1), but is less robust than the unbiased EPR one. The unbiased EPR of curves 4 and 5 in Fig. 4(a) is obtained by substituting $T=0.49$ into $T=0.5$ (column number 2 and number 4 in Table 2). From curves 2-5, it can be found that the weakness of the biased EPR protocol is able to compensate by transforming the biased EPR into an unbiased one. The results also show that the QKD protocols presented here are unable to beat the PLOB bound (curve 8 in Fig. 4(a)). Figure 4(b) shows a relation between the secure distance and bias effect. It also can be seen that the bias effects weaken the secure distance, and the unbiased EPR represents the optimum choice for entangled states CV-QKD, which will greatly enhance the secret key rate and secure distance compared with the biased EPR protocols.

 figure: Fig. 4.

Fig. 4. (a) Key rate versus distance for coherent state, biased and unbiased entangled states protocols. The solid line represents no modulation protocol, and the dotted line is that with modulation. (b) Maximum secure distances versus the bias correlations $\Delta V\textrm {=}V\left ( {{Y}_{\textrm {a}}}-{{Y}_{\textrm {b}}} \right )-V\left ( {{X}_{\textrm {a}}}+{{X}_{\textrm {b}}} \right )$ of the entanglement. (1) coherent state with ${{V}_{\textrm {M2}}}=10.8$; (2) biased entangled state with the noise variances of -10.5 dB and -9.5 dB for the amplitude and phase quadratures without modulation; (3) biased entangled state with the noise variances of -10.5 dB and -9.5 dB for the amplitude and phase quadratures with ${{V}_{\textrm {M2}}}=4.4$; (4) -9.3 dB unbiased entangled state without modulation; (5) -9.3 dB unbiased entangled state with ${{V}_{\textrm {M2}}}=6.7$; (6) -10.1 dB unbiased entangled state without modulation; (7) -10.1 dB unbiased entangled state with ${{V}_{\textrm {M2}}}=4.7$; (8) PLOB bound.

Download Full Size | PDF

Tables Icon

Table 2. The parameters used to calculate the secure distance of Fig. 4. ${{V}_{\textrm {1,2}}}$: the variance of two squeezed states; ${{l}_{\textrm {a}}}$ and ${{l}_{\textrm {b}}}$: the trusted optical losses in the preparation part; $T$: beam splitting ratio; $V\left ( {{{{{Y}}}}_{\textrm {a}}}-{{{{{Y}}}}_{\textrm {b}}} \right )$: the phase correlation variance of the entangled states; $V\left ( {{{{{X}}}}_{\textrm {a}}}+{{{{{X}}}}_{\textrm {b}}} \right )$: the amplitude correlation variance of the entangled states; ${{V}_{\textrm {M2}}}$: optimum modulation variance; $\beta$: reconciliation efficiency; $\varepsilon$: excess noise; $\alpha$: loss coefficient of a standard single-mode fiber; ${{\eta }_{\textrm {A}}}$: detection efficiency of Alice; ${{\eta }_{\textrm {B}}}$: detection efficiency of Bob; ${{\nu }_{\textrm {elB}}}$: electronic noise of Bob.

For a hundred-kilometer standard optical fiber channel, the visibility of the homodyne detection remains the same compared with free space, but introduces a differential phase fluctuation and excess noise between the two quantum channels. It forms the main challenge in implementing the EPR based CV-QKD, because an entangled state is more sensitive to the phase and excess noise. Although a stable controlling of the phase fluctuation is available in local EPR sources [20,35,4143], more effort should be done to meet the long-distance optical fiber communication. Although a rigorous experiment proof for hundred-kilometer standard optical fiber distribution is beyond the scope of this paper, this result with a bias effect analysis constitutes a fundamental advance in EPR based CV-QKD.

4. Conclusion

We compare the secret key rate and secure distance of CV-QKD in three distribution protocols: coherent state, biased entangled states, and unbiased entangled states. The theoretical results show that the weakness of the biased EPR protocol in long-distance communication can be lowered by transforming it into an unbiased one, and the unbiased EPR protocol is superior to other protocols for long-distance distribution, especially the noise reduction goes beyond 10 dB. And the QKD protocols presented here are unable to beat the PLOB bound. By considering the practical imperfections (original squeezing variance, trusted optical loss, and non-ideal BS) in the preparation, transmission, and detection processes of entangled states, we provide a feasible proposal for constructing unbiased entangled states protocol. With the improvement of the phase control technique, an unbiased entanglement source [24] will be expected to apply to a practical available CV-QKD protocol and further boost the secret key rate and distance.

Appendixes: theoretical models of the biased entanglement

The entangled states are prepared by coupling two equivalent squeezed states ${{{S}}_{1}}$ and ${{{S}}_{2}}$ on a beam splitter (BS) with transmittance $T$. Considering the phase difference $\varphi$ between the two squeezing beams, the output operators of the BS are

$${a}=\sqrt{1-T}{{{S}}_{1}}+\sqrt{T}{{{S}}_{2}}{{e}^{i\varphi }},$$
$${b}=\sqrt{T}{{{S}}_{1}}-\sqrt{1-T}{{{S}}_{2}}{{e}^{i\varphi }}.$$
The amplitude quadrature operators for Alice and Bob are
$${{{X}'}_{\textrm{a}}}={a}+{{{a}}^{+}}\textrm{=}\sqrt{1-T}\left( {{{{S}}}_{1}}\textrm{+}{{{{S}}}_{1}}^{+} \right)+\sqrt{T}\left( {{{{S}}}_{2}}{{e}^{i\varphi }}+{{{{S}}}_{2}}^{+}{{e}^{{-}i\varphi }} \right),$$
$${{{X}'}_{\textrm{b}}}={b}+{{{b}}^{+}}\textrm{=}\sqrt{T}\left( {{{{S}}}_{1}}\textrm{+}{{{{S}}}_{1}}^{\textrm{+}} \right)-\sqrt{1-T}\left( {{{{S}}}_{2}}{{e}^{i\varphi }}\textrm{+}{{{{S}}}_{2}}^{\textrm{+}}{{e}^{{-}i\varphi }} \right).$$
Subsequently, introducing the trusted optical losses ${{l}_{\textrm {a}}}$ and ${{l}_{\textrm {b}}}$ in the preparation part, the amplitude quadratures for Alice and Bob becomes
$${{{{X}}}_{\textrm{a}}}=\sqrt{1-{{l}_{\textrm{a}}}}{{{X}'}_{\textrm{a}}}+\sqrt{{{l}_{\textrm{a}}}},$$
$${{{{X}}}_{\textrm{b}}}=\sqrt{1-{{l}_{\textrm{b}}}}{{{X}'}_{\textrm{b}}}+\sqrt{{{l}_{\textrm{b}}}}.$$
The variances of amplitude quadrature for Alice and Bob can be expressed as
$${{V}_{\textrm{a}}}\left( X \right)\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-T \right){{V}_{\textrm{1}}}\left( X \right)+\left( 1-{{l}_{\textrm{a}}} \right)T\left( {{V}_{2}}(X){{\cos }^{2}}\varphi +{{V}_{2}}(Y){{\sin }^{2}}\varphi \right)+{{l}_{\textrm{a}}},$$
$${{V}_{\textrm{b}}}\left( X \right)\textrm{=}\left( 1-{{l}_{\textrm{b}}} \right)T{{V}_{\textrm{1}}}\left( X \right)+\left( 1-{{l}_{\textrm{b}}} \right)\left( 1-T \right)\left( {{V}_{2}}(X){{\cos }^{2}}\varphi +{{V}_{2}}(Y){{\sin }^{2}}\varphi \right)+{{l}_{\textrm{b}}}.$$
Furthermore, the sum of the amplitude quadrature operator readouts from the detection process can be deduced as
$$\begin{aligned} {{{{{X}}}}_{\textrm{a}}}\textrm{+}{{{{{X}}}}_{\textrm{b}}}&=\sqrt{1-{{l}_{\textrm{a}}}}{{{{X}}}_{\textrm{a}}}+\sqrt{{{l}_{\textrm{a}}}}\textrm{+}\sqrt{1-{{l}_{\textrm{b}}}}{{{{X}}}_{\textrm{b}}}+\sqrt{{{l}_{\textrm{b}}}} \\ & \textrm{ =}\left( \sqrt{1-{{l}_{\textrm{a}}}}\sqrt{1-T}\textrm{+}\sqrt{1-{{l}_{\textrm{b}}}}\sqrt{T} \right){{{{X}}}_{1}} \\ &+\left( \sqrt{1-{{l}_{\textrm{a}}}}\sqrt{T}-\sqrt{1-{{l}_{\textrm{b}}}}\sqrt{1-T} \right)\left( {{{{S}}}_{2}}{{e}^{i\varphi }}+{{{{S}}}_{2}}^{+}{{e}^{{-}i\varphi }} \right)+\sqrt{{{l}_{\textrm{a}}}}+\sqrt{{{l}_{\textrm{b}}}}. \end{aligned}$$
(34) Finally, the amplitude correlation variance of the entangled states can be obtained as:
$$\begin{aligned}V\left( {{X}_{\textrm{a}}}\textrm{+}{{X}_{\textrm{b}}} \right) &\textrm{=}\left( \left( 1-{{l}_{\textrm{a}}} \right)\left( 1-T \right)\textrm{+}\left( 1-{{l}_{\textrm{b}}} \right)T\textrm{+}2\sqrt{1-{{l}_{\textrm{a}}}}\sqrt{1-{{l}_{\textrm{b}}}}\sqrt{T}\sqrt{1-T} \right)\left\langle {{\delta }^{2}}{{{{X}}}_{1}} \right\rangle \\ & \textrm{ }+\left( \left( 1-{{l}_{\textrm{a}}} \right)T\textrm{+}\left( 1-{{l}_{\textrm{b}}} \right)\left( 1-T \right)-2\sqrt{1-{{l}_{\textrm{a}}}}\sqrt{1-{{l}_{\textrm{b}}}}\sqrt{T}\sqrt{1-T} \right) \\ &\left( {{\cos }^{2}}\varphi \left\langle {{\delta }^{2}}{{{{X}}}_{2}} \right\rangle +{{\sin }^{2}}\varphi \left\langle {{\delta }^{2}}{{{{Y}}}_{2}} \right\rangle \right)+{{l}_{\textrm{a}}}+{{l}_{\textrm{b}}} \\ & \textrm{ =}{{\alpha }_{1}}{{V}_{1}}(X)+{{\beta }_{1}}\left( {{V}_{2}}(X){{\cos }^{2}}\varphi +{{V}_{2}}(Y){{\sin }^{2}}\varphi \right)\textrm{+}{{l}_{\textrm{a}}}\textrm{+}{{l}_{\textrm{b}}}, \end{aligned}$$
where $V\left ( {{X}_{\textrm {a}}}\textrm {+}{{X}_{\textrm {b}}} \right )\textrm {=}{{V}_{\textrm {a}}}\left ( X \right )\textrm {+}{{V}_{\textrm {b}}}\left ( X \right )\textrm {+}2{{C}_{\textrm {ab}}}\left ( X \right )$, ${{{X}}_{\textrm {1}}}\textrm {=}{{{S}}_{1}}\textrm {+}{S}_{1}^{\textrm {+}}$, ${{{X}}_{\textrm {2}}}\textrm {=}{{{S}}_{2}}\textrm {+}{S}_{2}^{\textrm {+}}$, ${{{Y}}_{\textrm {2}}}\textrm {=}{1}/{i}\;\left ( {{{{S}}}_{2}}-{S}_{2}^{\textrm {+}} \right )$ are the amplitude and phase operators of the two squeezed states. ${{\alpha }_{\textrm {1}}}$ and ${{\beta }_{\textrm {1}}}$ are the coefficients related to losses (${{l}_{\textrm {a}}}$ and ${{l}_{\textrm {b}}}$) and beam splitting ratio $T$, which can be expressed as
$${{\alpha }_{1}}\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-T \right)+\left( 1-{{l}_{\textrm{b}}} \right)T+2\sqrt{\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-{{l}_{\textrm{b}}} \right)}\sqrt{T}\sqrt{1-T},$$
$${{\beta }_{1}}\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)T+\left( 1-{{l}_{\textrm{b}}} \right)\left( 1-T \right)-2\sqrt{\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-{{l}_{\textrm{b}}} \right)}\sqrt{T}\sqrt{1-T}.$$
The correlation coefficient of amplitude quadrature is
$${{C}_{\textrm{ab}}}\left( X \right)\textrm{=}\sqrt{\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-{{l}_{\textrm{b}}} \right)}\sqrt{T}\sqrt{1-T}\left( {{V}_{\textrm{1}}}(X)-{{V}_{2}}(X){{\cos }^{2}}\varphi -{{V}_{2}}(Y){{\sin }^{2}}\varphi \right).$$
With the same method, the variance of phase quadrature for Alice and Bob can be expressed as
$${{V}_{\textrm{a}}}\left( Y \right)\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-T \right){{V}_{\textrm{1}}}\left( Y \right)+\left( 1-{{l}_{\textrm{a}}} \right)T\left( {{V}_{2}}(Y){{\cos }^{2}}\varphi +{{V}_{2}}(X){{\sin }^{2}}\varphi \right)+{{l}_{\textrm{a}}},$$
$${{V}_{\textrm{b}}}\left( Y \right)\textrm{=}\left( 1-{{l}_{\textrm{b}}} \right)T{{V}_{\textrm{1}}}\left( Y \right)+\left( 1-{{l}_{\textrm{b}}} \right)\left( 1-T \right)\left( {{V}_{2}}(Y){{\cos }^{2}}\varphi +{{V}_{2}}(X){{\sin }^{2}}\varphi \right)+{{l}_{\textrm{b}}}.$$
The correlation coefficient of phase quadrature is
$${{C}_{\textrm{ab}}}\left( Y \right)\textrm{=}\sqrt{\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-{{l}_{\textrm{b}}} \right)}\sqrt{T}\sqrt{1-T}\left( {{V}_{\textrm{1}}}(Y)-{{V}_{2}}(Y){{\cos }^{2}}\varphi -{{V}_{2}}(X){{\sin }^{2}}\varphi \right).$$
The phase correlations can be deduced as
$$V\left( {{{{{Y}}}}_{\textrm{a}}}-{{{{{Y}}}}_{\textrm{b}}} \right)={{\alpha }_{2}}{{V}_{1}}(Y)+{{\beta }_{2}}\left( {{V}_{2}}(Y){{\cos }^{2}}\varphi +{{V}_{2}}(X){{\sin }^{2}}\varphi \right)\textrm{+}{{l}_{\textrm{a}}}\textrm{+}{{l}_{\textrm{b}}},$$
where
$${{\alpha }_{2}}\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-T \right)+\left( 1-{{l}_{\textrm{b}}} \right)T-2\sqrt{\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-{{l}_{\textrm{b}}} \right)}\sqrt{T}\sqrt{1-T},$$
$${{\beta }_{2}}\textrm{=}\left( 1-{{l}_{\textrm{a}}} \right)T+\left( 1-{{l}_{\textrm{b}}} \right)\left( 1-T \right)+2\sqrt{\left( 1-{{l}_{\textrm{a}}} \right)\left( 1-{{l}_{\textrm{b}}} \right)}\sqrt{T}\sqrt{1-T},$$
$$V\left( {{Y}_{\textrm{a}}}-{{Y}_{\textrm{b}}} \right)\textrm{=}{{V}_{\textrm{a}}}\left( Y \right)\textrm{+}{{V}_{\textrm{b}}}\left( Y \right)-2{{C}_{\textrm{ab}}}\left( Y \right).$$
The bias correlations for the two quadrature correlations is defined as
$$\Delta V\textrm{=}V\left( {{Y}_{\textrm{a}}}-{{Y}_{\textrm{b}}} \right)-V\left( {{X}_{\textrm{a}}}+{{X}_{\textrm{b}}} \right).$$

Funding

National Natural Science Foundation of China (11654002, 11804206, 11804207, 11874250, 62027821, 62035015); National Key Research and Development Program of China (2020YFC2200402); Key Research and Development Projects of Shanxi Province (201903D111001); Program for Sanjin Scholar of Shanxi Province; Program for Outstanding Innovative Teams of Higher Learning Institutions of Shanxi; Fund for Shanxi “1331 Project” Key Subjects Construction.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. T. C. Ralph and P. K. Lam, “A bright future for quantum communications,” Nat. Photonics 3(12), 671–673 (2009). [CrossRef]  

2. C. Weedbrook, “Continuous-variable quantum key distribution with entanglement in the middle,” Phys. Rev. A 87(2), 022308 (2013). [CrossRef]  

3. L. S. Madsen, V. C. Usenko, M. Lassen, R. Filip, and U. L. Andersen, “Continuous variable quantum key distribution with modulated entangled states,” Nat. Commun. 3(1), 1083 (2012). [CrossRef]  

4. N. Wang, S. N. Du, W. Y. Liu, X. Y. Wang, Y. M. Li, and K. C. Peng, “Long-distance continuous-variable quantum key distribution with entangled states,” Phys. Rev. Appl. 10(6), 064028 (2018). [CrossRef]  

5. N. Wang, S. N. Du, W. Y. Liu, X. Y. Wang, and Y. M. Li, “Generation of Gaussian-modulated entangled states for continuous variable quantum communication,” Opt. Lett. 44(15), 3613–3616 (2019). [CrossRef]  

6. J. F. D. M. Lucamarini, Z. L. Yuan, and A. J. Shields, “Overcoming the rate–distance limit of quantum key distribution without quantum repeaters,” Nature 557(7705), 400–403 (2018). [CrossRef]  

7. C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, (IEEE, 1984), p. 175–179.

8. S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. S. Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, “Advances in quantum cryptography,” Adv. Opt. Photonics 12(4), 1012–1236 (2020). [CrossRef]  

9. F. Grosshans, G. V. Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003). [CrossRef]  

10. A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light,” Phys. Rev. Lett. 95(18), 180503 (2005). [CrossRef]  

11. A. Leverrier and P. Grangier, “Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation,” Phys. Rev. Lett. 102(18), 180504 (2009). [CrossRef]  

12. R. Namiki and T. Hirano, “Security of quantum cryptography using balanced homodyne detection,” Phys. Rev. A 67(2), 022308 (2003). [CrossRef]  

13. F. Grosshans and P. Grangier, “Continuous Variable Quantum Cryptography Using Coherent States,” Phys. Rev. Lett. 88(5), 057902 (2002). [CrossRef]  

14. N. J. Cerf, M. Lévy, and G. V. Assche, “Quantum distribution of Gaussian keys using squeezed states,” Phys. Rev. A 63(5), 052311 (2001). [CrossRef]  

15. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013). [CrossRef]  

16. H. Ko, B. S. Choi, J. S. Choe, K. J. Kim, J. H. Kim, and C. J. Youn, “High-speed and high-performance polarization-based quantum key distribution system without side channel effects caused by multiple lasers,” Photonics Res. 6(3), 214–219 (2018). [CrossRef]  

17. Y. C. Zhang, Z. Y. Chen, S. Pirandola, X. Y. Wang, C. Zhou, B. J. Chu, Y. J. Zhao, B. J. Xu, S. Yu, and H. Guo, “Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,” Phys. Rev. Lett. 125(1), 010502 (2020). [CrossRef]  

18. M. Milicevic, C. Feng, L. M. Zhang, and P. G. Gulak, “Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography,” npj Quantum Inf. 4(1), 21 (2018). [CrossRef]  

19. V. C. Usenko and R. Filip, “Squeezed-state quantum key distribution upon imperfect reconciliation,” New J. Phys. 13(11), 113007 (2011). [CrossRef]  

20. T. Eberle, V. Händchen, and R. Schnabel, “Stable control of 10 dB two-mode squeezed vacuum states of light,” Opt. Express 21(9), 11546–11553 (2013). [CrossRef]  

21. S. Steinlechner, J. Bauchrowitz, T. Eberle, and R. Schnabel, “Strong Einstein-Podolsky-Rosen steering with unconditional entangled states,” Phys. Rev. A 87(2), 022104 (2013). [CrossRef]  

22. W. P. Bowen, P. K. Lam, and T. C. Ralph, “Biased EPR entanglement and its application to teleportation,” J. Mod. Opt. 50(5), 801–813 (2003). [CrossRef]  

23. T. Eberle, V. Händchen, J. Duhme, T. Franz, F. Furrer, R. Schnabel, and R. F. Werner, “Gaussian entanglement for quantum key distribution from a single-mode squeezing source,” New J. Phys. 15(5), 053049 (2013). [CrossRef]  

24. Y. J. Wang, W. H. Zhang, R. X. Li, L. Tian, and Y. H. Zheng, “Generation of -10.7 dB unbiased entangled states of light,” Appl. Phys. Lett. 118(13), 134001 (2021). [CrossRef]  

25. K. Wagner, J. Janousek, S. Armstrong, J. F. Morizur, P. K. Lam, and H. A. Bachor, “Asymmetric EPR entanglement in continuous variable systems,” J. Phys. B: At., Mol. Opt. Phys. 47(22), 225502 (2014). [CrossRef]  

26. S. Pirandola, “Limits and security of free-space quantum communications,” Phys. Rev. Res. 3(1), 013279 (2021). [CrossRef]  

27. A. Becir and M. R. B. Wahiddin, “Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement,” Quantum Inf. Process. 12(2), 1155–1171 (2013). [CrossRef]  

28. S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, “Fundamental limits of repeaterless quantum communications,” Nat. Commun. 8(1), 15043 (2017). [CrossRef]  

29. J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76(4), 042305 (2007). [CrossRef]  

30. D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016). [CrossRef]  

31. C. Weedbrook, S. Pirandola, S. Lloyd, and T. C. Ralph, “Quantum cryptography approaching the classical limit,” Phys. Rev. Lett. 105(11), 110501 (2010). [CrossRef]  

32. V. C. Usenko and R. Filip, “Feasibility of continuous-variable quantum key distribution with noisy coherent states,” Phys. Rev. A 81(2), 022318 (2010). [CrossRef]  

33. X. Y. Wang, S. Y. Guo, P. Wang, W. Y. Liu, and Y. M. Li, “Realistic rate–distance limit of continuous-variable quantum key distribution,” Opt. Express 27(9), 13372–13386 (2019). [CrossRef]  

34. V. C. Usenko and R. Filip, “Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense,” Entropy 18(1), 20 (2016). [CrossRef]  

35. W. H. Zhang, J. R. Wang, Y. H. Zheng, Y. J. Wang, and K. C. Peng, “Optimization of the squeezing factor by temperature-dependent phase shift compensation in a doubly resonant optical parametric oscillator,” Appl. Phys. Lett. 115(17), 171103 (2019). [CrossRef]  

36. L. Ruppert, V. C. Usenko, and R. Filip, “Long-distance continuous-variable quantum key distribution with efficient channel estimation,” Phys. Rev. A 90(6), 062310 (2014). [CrossRef]  

37. J. Mizuno, K. Wakui, A. Furusawa, and M. Sasaki, “Experimental demonstration of entanglement-assisted coding using a two-mode squeezed vacuum state,” Phys. Rev. A 71(1), 012304 (2005). [CrossRef]  

38. W. Y. Liu, X. Y. Wang, N. Wang, S. N. Du, and Y. M. Li, “Imperfect state preparation in continuous-variable quantum key distribution,” Phys. Rev. A 96(4), 042312 (2017). [CrossRef]  

39. I. Derkach, V. C. Usenko, and R. Filip, “Preventing side-channel effects in continuous-variable quantum key distribution,” Phys. Rev. A 93(3), 032309 (2016). [CrossRef]  

40. I. Derkach, V. C. Usenko, and R. Filip, “Continuous-variable quantum key distribution with a leakage from state preparation,” Phys. Rev. A 96(6), 062309 (2017). [CrossRef]  

41. W. H. Yang, S. P. Shi, Y. J. Wang, W. G. Ma, Y. H. Zheng, and K. C. Peng, “Detection of stably bright squeezed light with the quantum noise reduction of 12.6 dB by mutually compensating the phase fluctuations,” Opt. Lett. 42(21), 4553–4556 (2017). [CrossRef]  

42. S. Shi, L. Tian, Y. Wang, Y. Zheng, C. Xie, and K. Peng, “Demonstration of channel multiplexing quantum communication exploiting entangled sideband modes,” Phys. Rev. Lett. 125(7), 070502 (2020). [CrossRef]  

43. J. R. Wang, W. H. Zhang, L. Tian, Y. Wang, R. C. Yang, J. Su, and Y. H. Zheng, “Balanced Homodyne Detector with Independent Phase Control and Noise Detection Branches,” IEEE Access 7, 57054–57059 (2019). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1.
Fig. 1. Schematic diagram of the CV-QKD protocol with modulated entangled states. Alice prepares a Gaussian entangled state with variances ${{V}_{\textrm {a}}}$ and ${{V}_{\textrm {b}}}$, which is modulated with a variance ${{V}_{\textrm {M}}}$ controlled by Alice. One of the modulated entangled states mode ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}$ transmits through an untrusted quantum channel with a channel transmittance $\eta$ and excess noise $\varepsilon$, which can be fully eavesdropped by the third part-Eve. Then, the resulting state with variance ${{V}_{\textrm {B}}}$ is homodyne detected by Bob. The other entanglement mode ${{V}_{{{\textrm {A}}_{\textrm {0}}}}}$ is also homodyne detected by Alice with a variance ${{V}_{\textrm {A}}}$. ${{\eta }_{\textrm {A}}}$: detection efficiency of Alice; ${{\nu }_{\textrm {elA}}}$: electronic noise of Alice; ${{\eta }_{\textrm {B}}}$: detection efficiency of Bob; ${{\nu }_{\textrm {elB}}}$: electronic noise of Bob.
Fig. 2.
Fig. 2. Conceptual illustration of the modulated thermal states protocol. ${{V}_{\textrm {1}}}$ and ${{V}_{\textrm {2}}}$: the variance of two squeezed states; ${{V}_{\textrm {a}}}$ and ${{V}_{\textrm {b}}}$: the variances of the two EPR modes; ${{l}_{\textrm {a}}}$ and ${{l}_{\textrm {b}}}$: the trusted optical losses in the preparation part; ${{V}_{{{\textrm {A}}_{\textrm {0}}}}}$ and ${{V}_{{{\textrm {B}}_{\textrm {0}}}}}$: the variances of the two modulated EPR modes.
Fig. 3.
Fig. 3. Secure distances comparison with and without bias effect for different squeezing degree, reconciliation efficiency $\beta$, excess noise $\varepsilon$, loss coefficient of the optical fiber $\alpha$, the efficiency ${{\eta }_{\textrm {B}}}$ and electronic noise ${{\nu }_{\textrm {elB}}}$ of Bob. ${{L}_{\textrm {unbias}}}$ and ${{L}_{\textrm {bias}}}$ are the secure distances of unbiased and biased EPR protocols. SNU: shot noise units; BHD: balanced homodyne detector.
Fig. 4.
Fig. 4. (a) Key rate versus distance for coherent state, biased and unbiased entangled states protocols. The solid line represents no modulation protocol, and the dotted line is that with modulation. (b) Maximum secure distances versus the bias correlations $\Delta V\textrm {=}V\left ( {{Y}_{\textrm {a}}}-{{Y}_{\textrm {b}}} \right )-V\left ( {{X}_{\textrm {a}}}+{{X}_{\textrm {b}}} \right )$ of the entanglement. (1) coherent state with ${{V}_{\textrm {M2}}}=10.8$; (2) biased entangled state with the noise variances of -10.5 dB and -9.5 dB for the amplitude and phase quadratures without modulation; (3) biased entangled state with the noise variances of -10.5 dB and -9.5 dB for the amplitude and phase quadratures with ${{V}_{\textrm {M2}}}=4.4$; (4) -9.3 dB unbiased entangled state without modulation; (5) -9.3 dB unbiased entangled state with ${{V}_{\textrm {M2}}}=6.7$; (6) -10.1 dB unbiased entangled state without modulation; (7) -10.1 dB unbiased entangled state with ${{V}_{\textrm {M2}}}=4.7$; (8) PLOB bound.

Tables (2)

Tables Icon

Table 1. The parameters used to calculate the secure distance of Fig. 3. V 1,2 : the variance of two squeezed states; β : reconciliation efficiency; ε : excess noise; α : loss coefficient of a standard single-mode fiber; η A : detection efficiency of Alice; η B : detection efficiency of Bob; ν elB : electronic noise of Bob. l a and l b : the trusted optical losses in the preparation part; T : beam splitting ratio; V ( X a + X b ) : the amplitude correlation variance of the entangled states; V ( Y a Y b ) : the phase correlation variance of the entangled states; Note: l a = 0.01 , l b = 0.05 , and η A = 0.99 . The bias variances are calculated with equations (32) and (39) by introducing an unbalanced BS. The unbiased entangled state V ( X a + X b ) = V ( Y a Y b ) = 10.1 dB is deduced with T = 0.5 , and the biased entangled state V ( Y a Y b ) = 9.5 dB and V ( X a + X b ) = 10.5 dB is deduced with T = 0.49 .

Tables Icon

Table 2. The parameters used to calculate the secure distance of Fig. 4. V 1,2 : the variance of two squeezed states; l a and l b : the trusted optical losses in the preparation part; T : beam splitting ratio; V ( Y a Y b ) : the phase correlation variance of the entangled states; V ( X a + X b ) : the amplitude correlation variance of the entangled states; V M2 : optimum modulation variance; β : reconciliation efficiency; ε : excess noise; α : loss coefficient of a standard single-mode fiber; η A : detection efficiency of Alice; η B : detection efficiency of Bob; ν elB : electronic noise of Bob.

Equations (43)

Equations on this page are rendered with MathJax. Learn more.

Δ I = β I AB χ BE .
I AB = 1 2 log 2 V A V A/B = 1 2 log 2 V A V A C AB 2 / V B ,
χ BE = S ( ρ E ) S ( ρ E X B ) = i = 1 2 G ( λ i 1 2 ) j = 3 5 G ( λ j 1 2 ) ,
χ BE = S ( ρ A 0 B 1 ) S ( ρ A 0 RG X B ) .
V a ( X ) = ( 1 l a ) ( 1 T ) V 1 ( X ) + ( 1 l a ) T V 2 ( Y ) + l a ,
V a ( Y ) = ( 1 l a ) ( 1 T ) V 1 ( Y ) + ( 1 l a ) T V 2 ( X ) + l a ,
V b ( X ) = ( 1 l b ) T V 1 ( X ) + ( 1 l b ) ( 1 T ) V 2 ( Y ) + l b ,
V b ( Y ) = ( 1 l b ) T V 1 ( Y ) + ( 1 l b ) ( 1 T ) V 2 ( X ) + l b .
γ A 0 B 1 = ( γ A 0 C A 0 B 1 C A 0 B 1 γ B 1 ) = ( V A 0 ( X ) 0 C A 0 B 1 ( X ) 0 0 V A 0 ( Y ) 0 C A 0 B 1 ( Y ) C A 0 B 1 ( X ) 0 V B 1 ( X ) 0 0 C A 0 B 1 ( Y ) 0 V B 1 ( Y ) ) .
V A = η A V A 0 + 1 η A + ν elA ,
V B = η η B ( V B 0 + χ tot ) ,
χ tot = χ line + χ hom / η ,
χ line = 1 / η 1 + ε ,
χ hom = ( 1 + ν elB ) / η B 1.
C AB = η η A η B ( C ab + V M1 / 2 + V M2 ) .
λ 1 , 2 = 1 2 ( Δ ± Δ 2 4 D ) ,
D = η 2 ( V χ line + 1 ) 2 ,
Δ = V 2 ( 1 η ) 2 + V ( 2 χ line η 2 ) + ( η 2 χ line 2 + 2 η ) .
λ 3 , 4 , 5 = 1 2 ( A ± A 2 4 B ) , λ 5 = 1 ,
A hom = Δ χ hom + V D + η ( V + χ line ) η ( V + χ tot ) ,
B hom = D ( η χ line V + η ) χ hom 2 + [ D η ( V + χ line ) + V ] χ hom + η V ( V + χ line ) [ η ( V + χ tot ) ] 2 .
χ BE = G ( λ 1 ) + G ( λ 2 ) G ( λ 3 ) G ( λ 4 ) .
a = 1 T S 1 + T S 2 e i φ ,
b = T S 1 1 T S 2 e i φ .
X a = a + a + = 1 T ( S 1 + S 1 + ) + T ( S 2 e i φ + S 2 + e i φ ) ,
X b = b + b + = T ( S 1 + S 1 + ) 1 T ( S 2 e i φ + S 2 + e i φ ) .
X a = 1 l a X a + l a ,
X b = 1 l b X b + l b .
V a ( X ) = ( 1 l a ) ( 1 T ) V 1 ( X ) + ( 1 l a ) T ( V 2 ( X ) cos 2 φ + V 2 ( Y ) sin 2 φ ) + l a ,
V b ( X ) = ( 1 l b ) T V 1 ( X ) + ( 1 l b ) ( 1 T ) ( V 2 ( X ) cos 2 φ + V 2 ( Y ) sin 2 φ ) + l b .
X a + X b = 1 l a X a + l a + 1 l b X b + l b  = ( 1 l a 1 T + 1 l b T ) X 1 + ( 1 l a T 1 l b 1 T ) ( S 2 e i φ + S 2 + e i φ ) + l a + l b .
V ( X a + X b ) = ( ( 1 l a ) ( 1 T ) + ( 1 l b ) T + 2 1 l a 1 l b T 1 T ) δ 2 X 1   + ( ( 1 l a ) T + ( 1 l b ) ( 1 T ) 2 1 l a 1 l b T 1 T ) ( cos 2 φ δ 2 X 2 + sin 2 φ δ 2 Y 2 ) + l a + l b  = α 1 V 1 ( X ) + β 1 ( V 2 ( X ) cos 2 φ + V 2 ( Y ) sin 2 φ ) + l a + l b ,
α 1 = ( 1 l a ) ( 1 T ) + ( 1 l b ) T + 2 ( 1 l a ) ( 1 l b ) T 1 T ,
β 1 = ( 1 l a ) T + ( 1 l b ) ( 1 T ) 2 ( 1 l a ) ( 1 l b ) T 1 T .
C ab ( X ) = ( 1 l a ) ( 1 l b ) T 1 T ( V 1 ( X ) V 2 ( X ) cos 2 φ V 2 ( Y ) sin 2 φ ) .
V a ( Y ) = ( 1 l a ) ( 1 T ) V 1 ( Y ) + ( 1 l a ) T ( V 2 ( Y ) cos 2 φ + V 2 ( X ) sin 2 φ ) + l a ,
V b ( Y ) = ( 1 l b ) T V 1 ( Y ) + ( 1 l b ) ( 1 T ) ( V 2 ( Y ) cos 2 φ + V 2 ( X ) sin 2 φ ) + l b .
C ab ( Y ) = ( 1 l a ) ( 1 l b ) T 1 T ( V 1 ( Y ) V 2 ( Y ) cos 2 φ V 2 ( X ) sin 2 φ ) .
V ( Y a Y b ) = α 2 V 1 ( Y ) + β 2 ( V 2 ( Y ) cos 2 φ + V 2 ( X ) sin 2 φ ) + l a + l b ,
α 2 = ( 1 l a ) ( 1 T ) + ( 1 l b ) T 2 ( 1 l a ) ( 1 l b ) T 1 T ,
β 2 = ( 1 l a ) T + ( 1 l b ) ( 1 T ) + 2 ( 1 l a ) ( 1 l b ) T 1 T ,
V ( Y a Y b ) = V a ( Y ) + V b ( Y ) 2 C ab ( Y ) .
Δ V = V ( Y a Y b ) V ( X a + X b ) .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.