Phase-Matching MDI-QKD Pei Zeng QCrypt 2018 Ma, Zeng and Zhou, - - PowerPoint PPT Presentation

β–Ά
phase matching mdi qkd
SMART_READER_LITE
LIVE PREVIEW

Phase-Matching MDI-QKD Pei Zeng QCrypt 2018 Ma, Zeng and Zhou, - - PowerPoint PPT Presentation

Phase-Matching MDI-QKD Pei Zeng QCrypt 2018 Ma, Zeng and Zhou, PRX.8.031043,(2018) Outline Motivation & background Protocol & security Practical issues & simulation Summary & outlook Motivation & Background


slide-1
SLIDE 1

Phase-Matching MDI-QKD

Pei Zeng QCrypt 2018

Ma, Zeng and Zhou, PRX.8.031043,(2018)

slide-2
SLIDE 2

Outline

  • Motivation & background
  • Protocol & security
  • Practical issues & simulation
  • Summary & outlook
slide-3
SLIDE 3

Motivation & Background

slide-4
SLIDE 4

πœƒ 𝑆

?

Alice Bob

πœƒ

slide-5
SLIDE 5

𝑆

Alice Bob

πœƒ

±𝛽 , ±𝑗𝛽

Huttner, Imoto, Gisin and Mor, PRA 51(3):1863 (1995) Lo and Preskill, QIC, 7, 431-458 (2007)

=

𝑃(πœƒ2)

slide-6
SLIDE 6

𝑆

Alice Bob

πœƒ

±𝛽 , ±𝑗𝛽

=

𝑃(πœƒ2) 𝑃(πœƒ)

Decoy state method

Lo, Ma and Chen, PRL 94, 230504 (2005)

slide-7
SLIDE 7

𝑆 = 𝑃(πœƒ)

  • Secret key capacity (SKC) bound
  • For all point-to-point QKD models

𝑆 ≀ βˆ’ log2(1 βˆ’ πœƒ)

  • Protocols beyond SKC model?
  • Alice and Bob

both are sources/detectors

Takeoka, Guha and Wilde, Nat. Comm. 5, 5235 (2014) Pirandola, Laurenza, Ottaviani, and Banchi, Nat. Comm. 8, 15043 (2017)

slide-8
SLIDE 8

𝑆 = 𝑃(πœƒ)?

Eve Bob

πœƒ

Alice

πœƒ

E.g. BBM92 protocol

Bennett, Brassard, and Mermin, PRL 68, 557 (1992)

00 + 11 Coincident detection β‡’ 𝑆 = 𝑃 πœƒ

2

= 𝑃(πœƒ)

slide-9
SLIDE 9

𝑆 = 𝑃(πœƒ)?

Eve Bob

πœƒ

Alice

πœƒ

E.g. Polarization encoding MDI-QKD protocol

0 , 1 , |±⟩ 0 , 1 , |±⟩ Coincident detection β‡’ 𝑆 = 𝑃 πœƒ

2

= 𝑃(πœƒ)

Lo, Curty and Qi, PRL 108, 130503 (2012)

slide-10
SLIDE 10

E.g. β€œMDI-B92” protocol; Phase-matching type protocol

  • Unambiguous State Discrimination attack
  • 𝑄

𝑑𝑣𝑑 ∼ 𝑃(𝜈)

  • 𝜈 ≀ 𝑃( πœƒ), 𝑆 = 𝑃

πœƒ

2

= 𝑃(πœƒ)

Ferenczi, Ph.D Thesis, Lutkenhaus’ group (2013)

𝜈 , βˆ’ 𝜈 𝜈 , βˆ’ 𝜈

𝑆 = 𝑃(πœƒ)?

slide-11
SLIDE 11

Twin-field QKD

  • Point out the potential of 𝑆 > 𝑃(πœƒ)
  • BB84 type encoding, ±𝛽 , ±𝑗𝛽
  • Introduce the decoy state method

𝑆 > 𝑃(πœƒ)!

Lucamarini, Yuan, Dynes and Shields, Nature. 2018, 557(7705):400-403

slide-12
SLIDE 12

Protocol & security

slide-13
SLIDE 13

Phase-matching (MDI-)QKD

πœˆπ‘“π‘— πœšπ‘+πœŒπœ†π‘

𝐡

πœˆπ‘“π‘— πœšπ‘+πœŒπœ†π‘

𝐢

  • Extension of β€œMDI-B92” protocol
  • Phase-reference should be matched
  • Detection matches the phases: Eve’s detection create a correlation between πœ†π‘, πœ†π‘
slide-14
SLIDE 14

Random phase PM protocol: Entanglement-based view

  • Consider the post-selected signals with the same phase 𝜚
  • 𝐿 = 1 βˆ’ 𝐼 𝐹𝜈

π‘Ž βˆ’ 𝐼 𝐹𝜈 π‘Œ

  • Key point: estimate the phase error 𝐹𝜈

π‘Œ

Lo and Chau, Science 283, 2050 (1999) Shor and Preskill, PRL 85, 441 (2000)

slide-15
SLIDE 15

Ancillary protocol, decoy state

  • For 𝑙 photon number input:
  • 𝑓𝑙

π‘Ž = 𝑓𝑙 π‘Œ

if 𝑙 is odd

  • 𝑓𝑙

π‘Ž = 1 βˆ’ 𝑓𝑙 π‘Œ

if 𝑙 is even

  • Decoy state to estimate 𝑓𝑙

π‘Ž, 𝑍 𝑙 π‘Ž

  • Estimate the overall phase error rate

𝐹𝜈

π‘Œ = ෍ 𝑙

π‘Ÿπ‘™π‘“π‘™

π‘Œ

slide-16
SLIDE 16

Key rate and parameter estimation

  • 𝐿 = π‘…πœˆ 1 βˆ’ 𝐼 𝐹𝜈

π‘Ž βˆ’ 𝐼 𝐹𝜈 π‘Œ

  • π‘…πœˆ = 𝑃( πœƒ)
  • 𝐹𝜈

π‘Œ ≀ π‘Ÿ0𝑓0 + π‘Ÿ1𝑓1 π‘Ž + π‘Ÿ3𝑓3 π‘Ž + (1 βˆ’ π‘Ÿ0 βˆ’ π‘Ÿ1 βˆ’ π‘Ÿ3)

  • 𝐹𝜈

π‘Œ -- overall phase error rate;

  • Phase announcement is critical, not commute with photon number measurement
  • Photon number channel model invalid: collective BS attack
  • Core observation: overall phase error rate is the same
  • π‘…πœˆ = σ𝑙 π‘žπ‘™π‘

𝑙

  • 𝐹𝜈

π‘Ž = σ𝑙 π‘Ÿπ‘™π‘“π‘™ π‘Ž

  • 𝐹𝜈

π‘Œ = σ𝑙 π‘Ÿπ‘™π‘“π‘™ π‘Œ

slide-17
SLIDE 17

Practical issues & simulation

slide-18
SLIDE 18

Practical issues

  • Infinitesimal post-selection condition
  • Introduce phase slices
  • No effect on the security, just introduce intrinsic errors
  • Continuous phase randomization: hard
  • Discrete phase randomization is enough
  • Phase locking requirement
  • Alice and Bob can estimate the phase reference deviation of each round
  • Post-selection(Sifting) based on estimated phase difference; no feedback
  • Only requirement: the phase cannot fluctuate too quickly
slide-19
SLIDE 19

Performance of PM protocol

  • Consider all the practical factor:
  • Dark count: 8 βˆ— 10βˆ’8
  • Detection efficiency: 14.5%
  • Sifting factor: 1/8
  • Misalignment: ~1.5%
  • Error correction efficiency: 1.15
  • 𝐿 =

2 𝑁 π‘…πœˆ 1 βˆ’ 𝑔𝐼 𝐹𝜈 π‘Ž βˆ’ 𝐼 𝐹𝜈 π‘Œ

  • Break the linear bound!

Ma, Zeng and Zhou, PRX.8.031043,(2018)

slide-20
SLIDE 20

Summary & outlook

slide-21
SLIDE 21

Summary 𝑆 = 𝑃( πœƒ)

slide-22
SLIDE 22

Outlook 𝑆 = 𝑃 πœƒ ?

slide-23
SLIDE 23

Thanks!

  • Xiongfeng Ma: xma@tsinghua.edu.cn
  • Pei Zeng: qubitpei@gmail.com
  • Hongyi Zhou: zhouhy14@mails.tsinghua.edu.cn

Xiongfeng Group, Center for Quantum Information, Tsinghua University