Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Rigorous calibration of homodyne detection efficiency for continuous-variable quantum key distribution

Open Access Open Access

Abstract

We propose a rigorous calibration method for homodyne detection efficiency, which combines all the factors that affect detection efficiency to calibrate together through the actual homodyne detection. With this method, the transmittance converted from electronic noise in the one-time calibration method of the shot noise can be attributed to the detection inefficiency. Thus, a trusted detection noise-free model for continuous-variable quantum key distribution (CV-QKD) can be established, which simplifies the calibration of shot noise while having the same performance as the trusted detection noise model. We demonstrate this calibration method with a balanced detector based on a transimpedance amplifier. Experimental results show that detection efficiency will be overestimated if the integration factor of the detector is overlooked. The overestimation of the detection efficiency leads to an underestimation of modulation variance and excess noise when the modulation variance is monitored by the balanced detector, which opens security loopholes. Our method may prove a necessary method in the calibration of detection efficiency for CV-QKD.

© 2022 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

As a family of quantum key distribution (QKD) protocols, continuous-variable (CV) QKD has its unique advantages in allowing two communication parties to share secure keys [1]. The similarities between CV-QKD and coherent optical communication enable the former to be realized with commercial optical communication components. Due to the highly effective filtering of the local oscillator (LO) used in the coherent detection, CV-QKD can tolerate more incoherent channel noise than discrete-variable QKD. Thus, it has good compatibility with conventional optical fiber networks [2,3]. The Gaussian-modulated coherent state (GMCS) protocol [4,5] is the most widely studied protocol in CV-QKD. Theoretically, its security against collective attacks has already been proven [68], while its composable security against general attacks has also been well established [9,10]. Experimentally, the GMCS protocol has been demonstrated over long transmission distances [1113], with high repetition rate systems [1416], and in field fiber [1721].

Although CV-QKD has made remarkable achievements in both theory and experiment, there are still crucial steps to be taken to reduce the gap between theory and practice implementation. This gap opens security loopholes to an eavesdropper, who may launch various attacks [2228]. For a practical CV-QKD system, the detection imperfections such as detection inefficiency and electronic noise of the detector should be considered. In actual homodyne detection, detection efficiency is affected by various factors [29]. It is inconvenient to calibrate these factors one by one, which requires exploring all the factors that affect detection efficiency. The detection efficiency will be overestimated if any factors are overlooked.

In this paper, we propose a method to calibrate the detection efficiency, which combines all the factors to calibrate together. All known or unknown factors are included in the calibrated detection efficiency to achieve rigorous calibration of detection efficiency. When the shot noise is calibrated using the one-time calibration method [30], the transmittance converted from electronic noise can be included in the detection efficiency and calibrated together with other factors. Thus, a trusted detection noise-free model can be established. A balanced detector based on a transimpedance amplifier is used in actual homodyne detection to demonstrate this method. The experimental results show that the detection efficiency of this type of detector will be affected by the integration factor, which represents the incomplete integration of the optical pulse by the detector. The detection efficiency will be overestimated if the integration factor of the detector is overlooked. Hence the calibration method we propose here should be used in CV-QKD to close the security loopholes caused by overestimating detection efficiency.

The rest of the paper is organized as follows. In Section 2, the rigorous calibration method of detection efficiency is given and combined with the one-time calibration method of shot noise, thereby establishing a trusted detection noise-free model in Section 3. In Section 4, the calibration method is demonstrated experimentally. Based on the experimental results, we analyze the practical security of CV-QKD with overestimated detection efficiency in Section 5, and draw the conclusions in Section 6.

2. Rigorous calibration of detection efficiency

Figure 1 depicts the homodyne detection implementation. An optical signal pulse with a certain pulse width is used to prepare the desired coherent state. When homodyne detection is performed, it interferes with the LO. The interference result is converted into an electric pulse by a balanced detector and then sampled by an ADC. For fiber-based homodyne detection, the detection efficiency can be written as [29]

$$\eta=\eta_m^2 \eta_t \eta_d,$$
where $\eta _m$ is the interferometer mode-matching efficiency, $\eta _t$ is the transmittance of a fiber coupler, $\eta _d$ is the quantum efficiency of the photodiodes. Here, three factors need to be calibrated, though more factors should be considered in some cases. For the balanced detector based on a transimpedance amplifier, if the pulse width of the optical signal pulse is much larger than the response time of the photodiodes used in detector, multiple sampling points should be collected and integrated since the quadrature of the coherent state is proportional to the area under the electric pulse [31]. To simplify data collection, the prepared optical pulse should be narrow enough to be completely integrated by the detector. Then the quadrature is proportional to the peak value of the electric pulse, which can taken as the measurement result [3234]. However, the optical pulse width prepared in CV-QKD is usually on the order of nanoseconds [14,35,36], which should not be assumed to be completely integrated by the detector. In such a situation, the integration factor representing the completeness of the integration should be calibrated. Otherwise, the detection efficiency will be overestimated.

In order to avoid overestimating the detection efficiency, we propose a method to calibrate the detection efficiency $\eta$ rigorously. First, it is required to prepare $m$ coherent states with the same amplitude and four different phases, $\left \{| {\alpha _\mathrm {A} e^{i(\theta +\varphi _k)}}\right \rangle \}_{k=1 \ldots m}$. Here, $\theta$ is the initial phase of each coherent state, and $\varphi _k\in \lbrace 0, \mathrm{\pi} /2, \mathrm{\pi}, 3\mathrm{\pi} /2\rbrace$ is the phase that modulates on the coherent state. The number of coherent states modulating the four phases is the same. These coherent states directly enter Bob’s detection device without passing through the quantum channel. Bob performs homodyne detection on these coherent states. Due to the homodyne detection inefficiency, the relation between the measurement voltage-output result of the quadrature $q_{U,k}$ and the coherent state $| {\alpha _\mathrm {A} e^{i(\theta +\varphi _k)}} \rangle$ prepared can be written as

$$\frac{q_{U,k}}{\sqrt{N_0}}=2\sqrt{\eta}\alpha_\mathrm{A} \cos(\theta+\varphi_k)+\delta_k.$$

Here, $N_0$ is the shot noise, $N_0=\tilde {N}_0-V_\text {el}$, which can be calibrated in two steps in the conventional method. The first step is to obtain the total detection noise $\tilde {N}_0$, which can be measured as the output-voltage variance of the detector with only LO light input. The second step is to obtain electronic noise $V_\text {el}$, which can be measured as the output-voltage variance of the detector without signal and LO light input. The measurement noise $\delta _k$ follows a normal distribution with a mean of zero and a variance of $\sigma _0^2=1+v_\text {el}$, where $v_\text {el}=\left. V_\text {el}\right /N_0$. Here, the estimator of $\eta$ is given by

$$\hat{\eta}=\frac{\sum_{k=1}^{m} q_{U,k}^2}{2m N_0\alpha_\mathrm{A}^2}-\frac{\tilde{N}_0}{2 N_0\alpha_\mathrm{A}^2},$$
since $\frac {\sum _{k=1}^{m}\delta _k^2}{2m\alpha _\mathrm {A}^2}=\frac {\tilde {N}_0}{2N_0\alpha _\mathrm {A}^2}$. It is worth noting that the coherent states prepared in the calibration process and the coherent states required in the QKD process are different, so the arbitrary modulation variance will not affect the security of CV-QKD under the condition that the detector works in the linear region. However, it is preferred to prepare the coherent states with a large modulation variance since the influence of measurement noise can be ignored by preparing the coherent state with $\alpha _\mathrm {A}^2>1000$, that is, $\frac {\tilde {N}_0}{2N_0\alpha _\mathrm {A}^2}<0.001$. As a result, the approximate estimator of $\eta$ is given by
$$\hat{\eta}\approx \frac{\sum_{k=1}^{m} q_{U,k}^2}{2m N_0\alpha_\mathrm{A}^2 }.$$

 figure: Fig. 1.

Fig. 1. Implementation of homodyne detection. Sig: signal pulse; LO: local oscillator; BS: beam splitter; BD: balanced detector; ADC: analog-to-digital converter.

Download Full Size | PDF

In Ref. [30], a one-time calibration method of shot noise is proposed, where only $\tilde {N}_0$ is obtained. Then $\left.q_{U,k}\right /\sqrt {\tilde {N}_0}=\sqrt {\eta _e}\left. q_{U,k}\right /\sqrt {N_0}$, where $\eta _e=\left. N_0\right /\tilde {N}_0=1-\left. V_\text {el}\right /\tilde {N}_0$. Here, $V_\text {el}$ is converted to $\eta _e$, which is not calibrated and attributed to the channel loss in Ref. [30]. By using the calibration method we proposed, $\eta _e$ can be attributed to the detection inefficiency. In this way, the homodyne detection efficiency should be replaced by

$$\eta'=\eta \eta_e,$$
with the estimator of $\eta '$ written as
$$\hat{\eta}'=\frac{\sum_{k=1}^{m} q_{U,k}^2}{2m\tilde{N}_0\alpha_\mathrm{A}^2}-\frac{1}{2 \alpha_\mathrm{A}^2}.$$

Similarly, the approximate estimator of $\eta '$ can be written as

$$\hat{\eta}'\approx \frac{\sum_{k=1}^{m} q_{U,k}^2}{2m\tilde{N}_0\alpha_\mathrm{A}^2},$$
for the coherent state with $\alpha _\mathrm {A}^2>1000$.

3. Trusted detection noise-free model

In the prepare-and-measure (PM) scheme of the GMCS protocol based on homodyne detection, Alice prepares a coherent state $| {\frac {q_\mathrm {A}+\mathrm {i} p_\mathrm {A}}{2}} \rangle $ and transmits it to Bob through the quantum channel. The two independent and identically distributed (i.i.d.) random numbers $(q_\mathrm {A}, p_\mathrm {A})$ are drawn from a zero-mean bi-dimensional Gaussian distribution with a variance of $V_\mathrm {A}$. Bob performs practical homodyne detection to randomly measure either the quadrature $Q$ or quadrature $P$, and the measurement result is $y=q_{\mathrm {B}_2}$ or $y=p_{\mathrm {B}_2}$.

The entanglement-based (EB) scheme of GMCS protocol based on homodyne detection is shown in Fig. 2, which is equivalent to the PM scheme [37] . Alice prepares the two-mode squeezed vacuum (EPR) state $\rho _\mathrm {A'A}$. She keeps mode $\mathrm {A'}$ of each EPR state and sends mode $\mathrm {A}$ to Bob through the quantum channel, which is characterized by transmittance $T$, and total channel added noise $\chi =1/T-1+\xi$. Here, $\xi$ is the excess noise, and all noises are expressed in shot-noise units. The quantum state $\rho _\mathrm {A'A}$ becomes $\rho _\mathrm {A'B_1}$, which can be described by the covariance matrix (CM),

$$\mathbf{V}_\mathrm{A'B_1} =\\ \begin{pmatrix} V \mathbf{I} & \sqrt{T}Z_\mathrm{A} \boldsymbol{\sigma}_\mathbf{z} \\ \sqrt{T}Z_\mathrm{A} \boldsymbol{\sigma}_\mathbf{z} & T\left( V+\chi \right) \mathbf{I} \\ \end{pmatrix},$$
where $\mathbf {I}= \begin {pmatrix} 1 & 0 \\ 0 & 1 \end {pmatrix}$, $\boldsymbol {\sigma }_\mathbf {z}= \begin {pmatrix} 1 & 0 \\ 0 & -1 \end {pmatrix}$, $Z_\mathrm {A}=\sqrt {V^2-1}$, $V=V_\mathrm {A}+1$, and $V_\mathrm {A}$ is the modulation variance.

 figure: Fig. 2.

Fig. 2. Entanglement-based scheme of GMCS protocol with a trusted detection noise model. Alice prepares the EPR states. Mode $\mathrm {A'}$ of each EPR state is kept for heterodyne detection, while mode $\mathrm {A}$ is transmitted to Bob through the quantum channel controlled by Eve. Bob performs homodyne detection with a practical detector whose detection efficiency and electronic noise have been calibrated.

Download Full Size | PDF

In actual homodyne detection, detection efficiency $\eta$ and electronic noise $V_\text {el}$ should be calibrated accurately. In the trusted detection noise model [37], as shown in Fig. 2, a beam splitter with transmittance $\eta$ is used to model the detector efficiency. An EPR state of variance $v=1+\left.v_\text {el}\right /(1-\eta )$ is used to model the electronic noise. When the one-time calibration method of shot noise and the rigorous calibration method of detection efficiency are used, the electronic noise is converted to the detection inefficiency rather than the channel loss in the Ref. [30], which is calibrated together with detection efficiency. In this way, a trusted detection noise-free model can be established, in which the detection efficiency is modeled by a beam splitter with transmittance $\eta '=\eta \eta _e$, as shown in Fig. 3.

 figure: Fig. 3.

Fig. 3. Entanglement-based scheme of GMCS protocol with a trusted detection noise-free model. The electronic noise is converted to detection inefficiency. The detection efficiency is modeled by a beam splitter with transmittance $\eta \eta _e$.

Download Full Size | PDF

We follow the derivation process in the Refs. [30,37] to obtain the asymptotic secret key rate of this model under collective attacks, which can be expressed as

$$K = \beta I_\mathrm{AB} - \chi_\mathrm{BE},$$
where $\beta$ is the reconciliation efficiency, $I_\mathrm {AB}$ is the mutual information between Alice and Bob,
$$I_\mathrm{AB}=\frac{1}{2}\log_2 \frac{V+\chi_t}{1+\chi_t},$$
where $\chi _t=\chi +\frac {1-\eta '}{T\eta '}=\frac {1}{T\eta '}-1+\xi$. The Holevo bound can be written as
$$\chi_\mathrm{BE} = S(\rho_\mathrm{E})-\int \mathrm{d} m_\mathrm{B_3}p(m_\mathrm{B_3}) S(\rho_\mathrm{E}^{m_\mathrm{B_3}}).$$

Here, $m_\mathrm {B_3}$ represents the measurement result of Bob, $p(m_\mathrm {B_3})$ is the probability density of the measurement result. The system $\mathrm {E}$ of Eve purifies $\mathrm {A'B_1}$, so that $S(\rho _\mathrm {E})=S(\rho _\mathrm {A'B_1})= g(\lambda _1)+ g(\lambda _2)$, where $g(\lambda )=\left (\frac {\lambda +1}{2}\right ) \log _2\left (\frac {\lambda +1}{2}\right )-\left (\frac {\lambda -1}{2}\right ) \log _2\left (\frac {\lambda -1}{2}\right )$, $\lambda _1$ and $\lambda _2$ are the symplectic eigenvalues of $\mathbf {V}_{\mathrm {A'B_1}}$, given by

$$\begin{aligned} \lambda_{1,2}^2 & =\frac{1}{2}\left[A \pm \sqrt{A^2-4B}\right], \\ A & = V^2(1-2T)+2T+T^2(V+\chi)^2, \\ B & = T^2(V\chi+1)^2. \end{aligned}$$

Bob’s measurement purifies the system $\mathrm {A'EH}$, thus $S(\rho _\mathrm {E}^{m_\mathrm {B_3}})=S(\rho _\mathrm {A'H}^{m_\mathrm {B_3}})= g(\lambda _3)+ g(\lambda _4)$, where $\lambda _{3,4}$ are the symplectic eigenvalues of $\mathbf {V}_\mathrm {A'H|B_3}$. The CM $\mathbf {V}_\mathrm {A'H|B_3}$ is obtained by performing homodyne detection on mode $\mathrm {B_3}$ of $\mathbf {V}_\mathrm {A'HB_3}$, which can be expressed as

$$\mathbf{V}_\mathrm{A'HB_3} =\\ \begin{pmatrix} V \mathbf{I} & \sqrt{T (1-\eta')}Z_\mathrm{A} \boldsymbol{\sigma}_\mathbf{z} & \sqrt{T\eta'}Z_\mathrm{A} \boldsymbol{\sigma}_\mathbf{z}\\ \sqrt{T(1-\eta')} Z_\mathrm{A}\boldsymbol{\sigma}_\mathbf{z} & \left[T(1-\eta') (V+\chi)+\eta' \right] \mathbf{I} & \sqrt{\eta'(1-\eta')}T\left(V_\mathrm{A}+\xi\right) \mathbf{I}\\ \sqrt{T\eta'}Z_\mathrm{A} \boldsymbol{\sigma}_\mathbf{z} & \sqrt{\eta'(1-\eta')}T\left(V_\mathrm{A}+\xi\right) \mathbf{I} & T\eta'\left( V+\chi_t \right) \mathbf{I} \end{pmatrix}.$$

The symplectic eigenvalues $\lambda _{3,4}$ are given by

$$\begin{aligned} \lambda_{3,4}^2 & =\frac{1}{2}\left[C \pm \sqrt{C^2-4D}\right], \\ C & =\frac{A(1-\eta')+V\eta'\sqrt{B}+T\eta'(V+\chi)}{T\eta'(V+\chi_t)}, \\ D & =\frac{\sqrt{B}[V\eta'+\sqrt{B}(1-\eta')]}{T\eta'(V+\chi_t)}. \end{aligned}$$

Compared with the trusted detection noise model, this model replaces $\eta$ with $\eta \eta _e$ and sets $v_\text {el}=0$. Although the final key rate of this model remains the same as that of the trusted detection noise model, the calibration procedure of shot noise is simplified.

4. Experimental demonstration

As shown in Fig. 4, we present the experimental setup to calibrate homodyne detection efficiency. A narrow-linewidth $ {1550}\,\textrm{nm }$ fiber laser is used to generate continuous-wave coherent light, which passes through a variable optical attenuator (VOA). Then, it is divided into signal light and LO light by a beam splitter (BS). The purpose of placing a VOA here is to adjust the LO light to a suitable intensity and prevent the detector from being saturated. Another VOA is used to adjust the intensity of the signal light to the required value, i.e., $ {-53.87}\,\textrm{dBm}$ after passing through a Sagnac loop (SL) and a phase modulator (PM). Before the SL, a circulator (CIR) blocks light from reflection. The SL converts the continuous wave into signal pulses with a pulse width of $w= {5}\,\textrm{ns }$ and a repetition rate of $ {20}\,\textrm{MHz }$. It can be achieved by loading a $ {10}\,\textrm{MHz }$ square wave signal on the PM. The optical fiber delay difference on both sides of the PM in the SL is $ {5}\,\textrm{ns }$. It should be noted that two adjacent signal pulses generated in this way will have an additional $\mathrm{\pi}$ phase difference. These signal pulses then are phase modulated by a PM, with the modulated phases being $0$, $0$, $0$, $\mathrm{\pi} /2$, $\mathrm{\pi} /2$, $\mathrm{\pi} /2$, $\mathrm{\pi} /2$, and $0$ in turn. Thus, the total phases of the signal pulses modulated by the SL and the PM are $0$, $\mathrm{\pi}$, $0$, $3\mathrm{\pi} /2$, $\mathrm{\pi} /2$, $3\mathrm{\pi} /2$, $\mathrm{\pi} /2$, and $\mathrm{\pi}$, respectively. In this way, a series of coherent states with four phases and an average photon number of 1600 are prepared.

In order to perform homodyne detection well, two VOAs and a variable optical delay line (VODL) are used to control the insertion loss and delay between the BS and the balanced detector (BD) with $ {200}\,\textrm{MHz }$ bandwidth. When signal light pulses enter the input port of BS, the polarization controller (PC) is adjusted to minimize the indication value of the power sensor (PS) so that the polarization of the signal light and the LO light are as consistent as possible. An isolator (ISO) is inserted here to block the LO light reflected from the detector. In the experiment, the balanced detector used is based on a transimpedance amplifier and the peak value of the electric pulse is taken as the measurement result.

The experimental results are given in Table 1. The detection efficiency $\hat {\eta }_R=0.263$ and $\hat {\eta }'_R=0.247$ are obtained through rigorous calibration. The reduced detection efficiency of $\hat {\eta }'_R$ compared to $\hat {\eta }_R$ corresponds to the $\eta _e$. By using the conventional calibration method, $\hat {\eta }_C \approx \eta _t \eta _d=0.557$ is also obtained. Clearly, $\hat {\eta }_C$ and $\hat {\eta }_R$ are quite different. It can be inferred that the prepared optical pulse is too wide to be completely integrated by the detector, resulting in a smaller measured quadrature than expected. This conclusion can be further verified by preparing the signal pulses with the same average photon number and wider pulse width. The wider the prepared optical pulse, the more incomplete the integration of the detector will be. When the pulse width increases from $ {5}\,\textrm{ns }$ to $ {10}\,\textrm{ns }$, the detection efficiency $\hat {\eta }_R$ is approximately reduced by half. As the pulse width increases, the detection efficiency $\hat {\eta }_R$ is further reduced. Indeed, the integration factor will affect the detection efficiency of this type of detector.

 figure: Fig. 4.

Fig. 4. Experimental setup to calibrate homodyne detection efficiency. CW: continuous-wave laser; VOA: variable optical attenuator; BS: beam splitter; CIR: circulator; PM: phase modulator; SL: Sagnac loop; PC: polarization controller; ISO: isolator; PBS: polarization beam splitter; PS: power sensor; VODL: variable optical delay line; BD: balanced detector; ADC: analog-to-digital converter.

Download Full Size | PDF

Tables Icon

Table 1. Experimental results. The data block size is $m=2\times 10^8$.

The detection efficiency will be overestimated if the integration factor is overlooked. Therefore, the rigorous calibration method should be adopted to prevent overestimating the detection efficiency. For the balanced detector based on a transimpedance amplifier, if ultrafast pulses cannot be prepared, taking the peak value as the measurement result decreases the burden of data processing at the price of reducing the detection efficiency. In order to pursue high detection efficiency, the balanced detector based on a charge amplifier is more suitable for homodyne detection of nanosecond optical pulses [38].

5. Practical security analysis

After $N$ rounds of quantum transmission, Bob announces which quadrature he measured for each received coherent state, and Alice reserves the corresponding $x=q_\mathrm {A}$ or $x=p_\mathrm {A}$. Alice and Bob obtain a set of correlated raw keys $(x_i,y_i)_{i=1 \ldots N}$. Then, they reveal a portion of raw keys to perform parameter estimation. If only the homodyne detection efficiency is overestimated, $\hat {\eta }>\eta$, and the modulation variance $V_\mathrm {A}$ is correctly obtained, the estimated values and the actual values of the channel parameters are linked through

$$\begin{aligned} \left \langle x^2\right \rangle & = \hat{V}_\mathrm{A}=V_\mathrm{A}, \\ \left \langle xy\right \rangle & = \sqrt{\hat{\eta}\hat{T}} \hat{V}_\mathrm{A}= \sqrt{\eta T} V_\mathrm{A}, \\ \left \langle y^2\right \rangle & = \hat{\eta}\hat{T}\left(\hat{V}_\mathrm{A}+\hat{\xi}\right)+1+v_\text{el}=\eta T\left(V_\mathrm{A}+\xi \right)+1+v_\text{el}, \end{aligned}$$
which can be reduced to $\hat {V}_\mathrm {A}=V_\mathrm {A}$, $\hat {T}=\frac {\eta }{\hat {\eta }}T$, and $\hat {\xi }=\xi$. Here the channel transmittance $T$ is underestimated. As a result, the key rate will be underestimated, but there will be no security issues. In fact, if the attenuation of the channel is measured in advance, it is easy to find that the channel transmittance is underestimated.

In practice, however, it is convenient to use a calibrated homodyne detector to determine $V_\mathrm {A}$. In Ref. [28], $V_\mathrm {A}$ is monitored by the homodyne detector to prevent the reduced optical attenuation attack. In such a situation, Eq. (15) should be replaced by

$$\begin{aligned} \left \langle x^2\right \rangle & =V_M-1-v_\text{el}=\hat{\eta} \hat{V}_\mathrm{A}=\eta V_\mathrm{A}, \\ \left \langle xy\right \rangle & = \hat{\eta} \sqrt{\hat{T}} \hat{V}_\mathrm{A}= \eta \sqrt{T} V_\mathrm{A}, \\ \left \langle y^2\right \rangle & = \hat{\eta}\hat{T}\left(\hat{V}_\mathrm{A}+\hat{\xi}\right)+1+v_\text{el}=\eta T\left(V_\mathrm{A}+\xi \right)+1+v_\text{el}, \end{aligned}$$
where $V_M$ is the directly measured variance expressed in shot-noise units of the coherent state. Equation (16) can be reduced to $\hat {V}_\mathrm {A}=\frac {\eta }{\hat {\eta }} V_\mathrm {A}$, $\hat {T}=T$, and $\hat {\xi }=\frac {\eta }{\hat {\eta }}\xi$. The modulation variance $V_\mathrm {A}$ and the excess noise $\xi$ are underestimated. As a result, the key rate will be overestimated. Based on the experimental results in Section 4, we simulate the secret key rate of CV-QKD using the two calibration methods. We present the secret key rate versus transmission distance in Fig. 5. The excess noise in Fig. 5 (a) and (b) are 0.005 and 0.05, respectively. The red curves are the key rate curves with detection efficiency $\hat {\eta }_C$, in which excess noise is underestimated, and the actual modulation variance is larger than the optimized modulation variance. The magenta curves are the corresponding secure key rate curves with actual modulation variance and excess noise. There is a large gap between the red curves and the magenta curves. When the finite-size effects are considered [29,39], the farthest secure transmission distance difference is nearly $ {20}\,\textrm{km }$. If the excess noise is increased from 0.005 to 0.05, the difference in the farthest secure transmission distance surpasses $ {20}\,\textrm{km }$. As a result, the more excess noise, the more significant gap. When the rigorously calibrated detection efficiency $\hat {\eta }_R$ and $\hat {\eta }'_R$ are adopted, the key rate curves of the trusted detection noise model and the trusted detection noise-free model are coincident in the asymptotic and the finite-size regimes.

 figure: Fig. 5.

Fig. 5. Secret key rate versus transmission distance. Simulation parameters are as follows: reconciliation efficiency $\beta =0.95$, fiber attenuation $\gamma = {0.2}\,\textrm{dB/km}$, data block size $N=2\times 10^8$, detection efficiency $\hat {\eta }_R=0.263$, $\hat {\eta }'_R=0.247$, $\hat {\eta }_C=0.557$, electronic noise $v_\text {el}=0.067$, excess noise $\xi =0.005$ in (a), $\xi =0.05$ in (b). The modulation variances for different calibration methods are optimized in the range 1 to 1000 at each distance to achieve the maximum key rate. The data block size used for parameter estimation is $N/2$. The blue and black solid curves represent the key rates when the detection efficiency is estimated with $\hat {\eta }_R$ in the asymptotic and the finite-size regimes, respectively. The cyan and green dashed curves represent the key rates when the detection efficiency is estimated with $\hat {\eta }'_R$ in the asymptotic and the finite-size regimes, respectively. The red curves represent the key rates when the detection efficiency is overestimated with $\hat {\eta }_C$, while the magenta curves represent the corresponding secure key rates. The solid and dashed curves represent the key rates in the asymptotic and the finite-size regime, respectively.

Download Full Size | PDF

6. Conclusion

In conclusion, we have proposed a rigorous method to calibrate the homodyne detection efficiency, preventing overestimating the detection efficiency due to overlooking some unknown factors that affect detection efficiency. We have established a trusted detection noise-free model by combining this method with the one-time calibration method of shot noise. While this model simplifies the calibration of shot noise, it still has the same performance as the trusted detection noise model. We have experimentally demonstrated this method and found that for the balanced detector based on a transimpedance amplifier, the influence of the integration factor on the detection efficiency should be considered. Otherwise, the detection efficiency will be overestimated. If the modulation variance is monitored by the homodyne detector, the overestimation of detection efficiency will leads to an underestimation of the modulation variance and excess noise, thus opening security loopholes of CV-QKD. Therefore, applying our calibration method to the practical CV-QKD implementation is necessary.

Funding

China State Railway Group Co., Ltd Scientific and Technological Research Project (K2019G062); National Natural Science Foundation of China (61875182); Anhui Initiative in Quantum Information Technologies and Fundamental Research Funds for the Central Universities (WK2340000083).

Acknowledgments

M. Z. thanks Hao Qin for fruitful discussion and Prof. Yongmin Li for construction advice.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81(3), 1301–1350 (2009). [CrossRef]  

2. B. Qi, W. Zhu, L. Qian, and H.-K. Lo, “Feasibility of quantum key distribution through a dense wavelength division multiplexing network,” New J. Phys. 12(10), 103042 (2010). [CrossRef]  

3. R. Kumar, H. Qin, and R. Alléaume, “Coexistence of continuous variable qkd with intense dwdm classical channels,” New J. Phys. 17(4), 043027 (2015). [CrossRef]  

4. F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88(5), 057902 (2002). [CrossRef]  

5. F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003). [CrossRef]  

6. R. García-Patrón and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97(19), 190503 (2006). [CrossRef]  

7. M. Navascués, F. Grosshans, and A. Acín, “Optimality of gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97(19), 190502 (2006). [CrossRef]  

8. A. Leverrier and P. Grangier, “Simple proof that gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a gaussian modulation,” Phys. Rev. A 81(6), 062314 (2010). [CrossRef]  

9. A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett. 114(7), 070501 (2015). [CrossRef]  

10. A. Leverrier, “Security of continuous-variable quantum key distribution via a gaussian de finetti reduction,” Phys. Rev. Lett. 118(20), 200501 (2017). [CrossRef]  

11. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013). [CrossRef]  

12. D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016). [CrossRef]  

13. Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, and H. Guo, “Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,” Phys. Rev. Lett. 125(1), 010502 (2020). [CrossRef]  

14. D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015). [CrossRef]  

15. H. Wang, Y. Pi, W. Huang, Y. Li, Y. Shao, J. Yang, J. Liu, C. Zhang, Y. Zhang, and B. Xu, “High-speed gaussian-modulated continuous-variable quantum key distribution with a local local oscillator based on pilot-tone-assisted phase compensation,” Opt. Express 28(22), 32882–32893 (2020). [CrossRef]  

16. S. Ren, S. Yang, A. Wonfor, I. White, and R. Penty, “Demonstration of high-speed and low-complexity continuous variable quantum key distribution system with local local oscillator,” Sci. Rep. 11(1), 9454 (2021). [CrossRef]  

17. S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New J. Phys. 11(4), 045023 (2009). [CrossRef]  

18. P. Jouguet, S. Kunz-Jacques, T. Debuisschert, S. Fossier, E. Diamanti, R. Alléaume, R. Tualle-Brouri, P. Grangier, A. Leverrier, P. Pache, and P. Painchault, “Field test of classical symmetric encryption with continuous variables quantum key distribution,” Opt. Express 20(13), 14030–14041 (2012). [CrossRef]  

19. D. Huang, P. Huang, H. Li, T. Wang, Y. Zhou, and G. Zeng, “Field demonstration of a continuous-variable quantum key distribution network,” Opt. Lett. 41(15), 3511–3514 (2016). [CrossRef]  

20. A. Aguado, V. Lopez, D. Lopez, M. Peev, A. Poppe, A. Pastor, J. Folgueira, and V. Martin, “The engineering of software-defined quantum key distribution networks,” IEEE Commun. Mag. 57(7), 20–26 (2019). [CrossRef]  

21. Y. Zhang, Z. Li, Z. Chen, C. Weedbrook, Y. Zhao, X. Wang, Y. Huang, C. Xu, X. Zhang, Z. Wang, M. Li, X. Zhang, Z. Zheng, B. Chu, X. Gao, N. Meng, W. Cai, Z. Wang, G. Wang, S. Yu, and H. Guo, “Continuous-variable QKD over 50 km commercial fiber,” Quantum Sci. Technol. 4(3), 035006 (2019). [CrossRef]  

22. J.-Z. Huang, C. Weedbrook, Z.-Q. Yin, S. Wang, H.-W. Li, W. Chen, G.-C. Guo, and Z.-F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013). [CrossRef]  

23. X.-C. Ma, S.-H. Sun, M.-S. Jiang, and L.-M. Liang, “Local oscillator fluctuation opens a loophole for eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013). [CrossRef]  

24. P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87(6), 062313 (2013). [CrossRef]  

25. J.-Z. Huang, S. Kunz-Jacques, P. Jouguet, C. Weedbrook, Z.-Q. Yin, S. Wang, W. Chen, G.-C. Guo, and Z.-F. Han, “Quantum hacking on quantum key distribution using homodyne detection,” Phys. Rev. A 89(3), 032304 (2014). [CrossRef]  

26. H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A 94(1), 012325 (2016). [CrossRef]  

27. H. Qin, R. Kumar, V. Makarov, and R. Alléaume, “Homodyne-detector-blinding attack in continuous-variable quantum key distribution,” Phys. Rev. A 98(1), 012312 (2018). [CrossRef]  

28. Y. Zheng, P. Huang, A. Huang, J. Peng, and G. Zeng, “Practical security of continuous-variable quantum key distribution with reduced optical attenuation,” Phys. Rev. A 100(1), 012313 (2019). [CrossRef]  

29. P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfections in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012). [CrossRef]  

30. Y. Zhang, Y. Huang, Z. Chen, Z. Li, S. Yu, and H. Guo, “One-time shot-noise unit calibration method for continuous-variable quantum key distribution,” Phys. Rev. Appl. 13(2), 024058 (2020). [CrossRef]  

31. Y.-M. Chi, B. Qi, W. Zhu, L. Qian, H.-K. Lo, S.-H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011). [CrossRef]  

32. H. Hansen, T. Aichele, C. Hettich, P. Lodahl, A. I. Lvovsky, J. Mlynek, and S. Schiller, “Ultrasensitive pulsed, balanced homodyne detector: application to time-domain quantum measurements,” Opt. Lett. 26(21), 1714–1716 (2001). [CrossRef]  

33. C. Wang, P. Huang, D. Huang, D. Lin, and G. Zeng, “Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects,” Phys. Rev. A 93(2), 022315 (2016). [CrossRef]  

34. H. Li, C. Wang, P. Huang, D. Huang, T. Wang, and G. Zeng, “Practical continuous-variable quantum key distribution without finite sampling bandwidth effects,” Opt. Express 24(18), 20481–20493 (2016). [CrossRef]  

35. D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015). [CrossRef]  

36. T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018). [CrossRef]  

37. J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 202.81 km with an all-fiber continuous-variable system,” Phys. Rev. A 76(4), 042305 (2007). [CrossRef]  

38. S. Du, Z. Li, W. Liu, X. Wang, and Y. Li, “High-speed time-domain balanced homodyne detector for nanosecond optical field applications,” J. Opt. Soc. Am. B 35(2), 481–486 (2018). [CrossRef]  

39. A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1.
Fig. 1. Implementation of homodyne detection. Sig: signal pulse; LO: local oscillator; BS: beam splitter; BD: balanced detector; ADC: analog-to-digital converter.
Fig. 2.
Fig. 2. Entanglement-based scheme of GMCS protocol with a trusted detection noise model. Alice prepares the EPR states. Mode $\mathrm {A'}$ of each EPR state is kept for heterodyne detection, while mode $\mathrm {A}$ is transmitted to Bob through the quantum channel controlled by Eve. Bob performs homodyne detection with a practical detector whose detection efficiency and electronic noise have been calibrated.
Fig. 3.
Fig. 3. Entanglement-based scheme of GMCS protocol with a trusted detection noise-free model. The electronic noise is converted to detection inefficiency. The detection efficiency is modeled by a beam splitter with transmittance $\eta \eta _e$.
Fig. 4.
Fig. 4. Experimental setup to calibrate homodyne detection efficiency. CW: continuous-wave laser; VOA: variable optical attenuator; BS: beam splitter; CIR: circulator; PM: phase modulator; SL: Sagnac loop; PC: polarization controller; ISO: isolator; PBS: polarization beam splitter; PS: power sensor; VODL: variable optical delay line; BD: balanced detector; ADC: analog-to-digital converter.
Fig. 5.
Fig. 5. Secret key rate versus transmission distance. Simulation parameters are as follows: reconciliation efficiency $\beta =0.95$, fiber attenuation $\gamma = {0.2}\,\textrm{dB/km}$, data block size $N=2\times 10^8$, detection efficiency $\hat {\eta }_R=0.263$, $\hat {\eta }'_R=0.247$, $\hat {\eta }_C=0.557$, electronic noise $v_\text {el}=0.067$, excess noise $\xi =0.005$ in (a), $\xi =0.05$ in (b). The modulation variances for different calibration methods are optimized in the range 1 to 1000 at each distance to achieve the maximum key rate. The data block size used for parameter estimation is $N/2$. The blue and black solid curves represent the key rates when the detection efficiency is estimated with $\hat {\eta }_R$ in the asymptotic and the finite-size regimes, respectively. The cyan and green dashed curves represent the key rates when the detection efficiency is estimated with $\hat {\eta }'_R$ in the asymptotic and the finite-size regimes, respectively. The red curves represent the key rates when the detection efficiency is overestimated with $\hat {\eta }_C$, while the magenta curves represent the corresponding secure key rates. The solid and dashed curves represent the key rates in the asymptotic and the finite-size regime, respectively.

Tables (1)

Tables Icon

Table 1. Experimental results. The data block size is m = 2 × 10 8 .

Equations (16)

Equations on this page are rendered with MathJax. Learn more.

η = η m 2 η t η d ,
q U , k N 0 = 2 η α A cos ( θ + φ k ) + δ k .
η ^ = k = 1 m q U , k 2 2 m N 0 α A 2 N ~ 0 2 N 0 α A 2 ,
η ^ k = 1 m q U , k 2 2 m N 0 α A 2 .
η = η η e ,
η ^ = k = 1 m q U , k 2 2 m N ~ 0 α A 2 1 2 α A 2 .
η ^ k = 1 m q U , k 2 2 m N ~ 0 α A 2 ,
V A B 1 = ( V I T Z A σ z T Z A σ z T ( V + χ ) I ) ,
K = β I A B χ B E ,
I A B = 1 2 log 2 V + χ t 1 + χ t ,
χ B E = S ( ρ E ) d m B 3 p ( m B 3 ) S ( ρ E m B 3 ) .
λ 1 , 2 2 = 1 2 [ A ± A 2 4 B ] , A = V 2 ( 1 2 T ) + 2 T + T 2 ( V + χ ) 2 , B = T 2 ( V χ + 1 ) 2 .
V A H B 3 = ( V I T ( 1 η ) Z A σ z T η Z A σ z T ( 1 η ) Z A σ z [ T ( 1 η ) ( V + χ ) + η ] I η ( 1 η ) T ( V A + ξ ) I T η Z A σ z η ( 1 η ) T ( V A + ξ ) I T η ( V + χ t ) I ) .
λ 3 , 4 2 = 1 2 [ C ± C 2 4 D ] , C = A ( 1 η ) + V η B + T η ( V + χ ) T η ( V + χ t ) , D = B [ V η + B ( 1 η ) ] T η ( V + χ t ) .
x 2 = V ^ A = V A , x y = η ^ T ^ V ^ A = η T V A , y 2 = η ^ T ^ ( V ^ A + ξ ^ ) + 1 + v el = η T ( V A + ξ ) + 1 + v el ,
x 2 = V M 1 v el = η ^ V ^ A = η V A , x y = η ^ T ^ V ^ A = η T V A , y 2 = η ^ T ^ ( V ^ A + ξ ^ ) + 1 + v el = η T ( V A + ξ ) + 1 + v el ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.