Skip to main content

A Review on Continuous-Variable Quantum Key Distribution Security

  • Conference paper
  • First Online:
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (UCAmI 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 594))

  • 1019 Accesses

Abstract

Regarding the security concerns arising from the threat that quantum computing algorithms pose on some today’s most efficient and widely implemented public-key cryptographic systems, it has become necessary to find alternative cryptographic techniques to support private (or symmetric) key cryptographic schemes by means of key distribution. In this article we survey the emerging technology of quantum key distribution (QKD), which enables two separate parties to distill a random secret key only known by them and whose security relies on the principles of quantum physics, with the advantage of also enabling the detection of potential eavesdroppers. Among the different existing approaches to QKD, a distinction is made between discrete and continuous variable protocols. We focus here on continuous variable (CV-QKD) protocols, which consist of encoding information in optical coherent states that can be transmitted by fiber by means of off-the-shelf devices widely used in today’s telecommunications industry. An important advantage is that these components have a significantly lower cost in comparison to those used in other QKD protocols. The present study highlights some information-theoretic aspects of CV-QKD while putting special efforts into the security analysis of these protocols (such as parameter estimation or error correction techniques) derived from the practical implementation, as well as the challenges this technology faces in its still ongoing development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    There are two variants of protocols for the preparation, transmission and measurement of states, PM (Prepare-and-Measure) and E-B (Entanglement-Based). Both are indistinguishable from the point of view of Bob and Eve, and equivalent concerning the security analysis. The second one, however, is more difficult to implement while the analysis of the first is more cumbersome, which therefore makes it convenient to benefit from their equivalences to simplify both the implementation and the analysis; the protocol is implemented in the PM version while the security analysis is performed considering a virtualization of the equivalent E-B protocol.

  2. 2.

    It should be noted that, in the practical implementation, the protocol is initialized assuming typical experimental values -i.e. reasonable guesses- of T and \(\xi \) and the chosen value for the variance will be that which maximizes the a priori expected secret key rate. The real values will be estimated after transmission during the PE phase and the bounds on the secret key rate adjusted.

  3. 3.

    Classes of attacks will be highlighted in the following section.

  4. 4.

    Since standard telecommunications systems widely implement discrete constellations with 64, 128 and 256 states.

  5. 5.

    As a result of the quantum nature of the exchanged states.

  6. 6.

    For the reader unfamiliar with this notation, in the quantum formalism the Greek letter \(\rho \) is used to denote the density matrix -or density operator- that represents all the possibly available information about the state of a quantum object.

  7. 7.

    \(\frac{\partial S(B;E)}{\partial t } < 0 \) y \(\frac{\partial S(B;E)}{\partial \sigma ^2 } > 0\).

  8. 8.

    Explicit expressions for the three eigenvalues are known and can be found in [7].

  9. 9.

    A typical value for the true excess noise can be \(\varDelta _{\textrm{m}} \xi = 1/100\). Similarly, it is often chosen \(\epsilon = \epsilon _{\textrm{PE}} = 10^{-10}\) and therefore \(z_{\epsilon _{\textrm{PE}}/2} \approx 6.5\).

  10. 10.

    For example, the amount m of samples required to transmit a secret key rate over 100 km would be of the order of \(10^{10}\) [7].

References

  1. Bennett, C.H., Brassard, G.: An update on quantum cyptography. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 475–480. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_39

    Chapter  Google Scholar 

  2. Brunner, H.H. et al.: A low-complexity heterodyne CV-QKD architecture. In: 2017 19th International Conference on Transparent Optical Networks (ICTON), pp. 1–4 (2017). https://doi.org/10.1109/ICTON.2017.8025030, ISSN: 2161-2064

  3. Denys, A., Brown, P., Leverrier, A.: Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation. Quantum 5, 540 (2021). https://doi.org/10.22331/q-2021-09-13-540. https://quantum-journal.org/papers/q-2021-09-13-540/, publisher: Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften

  4. Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88, 057902 (2002). https://doi.org/10.1103/PhysRevLett.88.057902

    Article  Google Scholar 

  5. Huang, D., Huang, P., Lin, D., Wang, C., Zeng, G.: High-speed continuous-variable quantum key distribution without sending a local oscillator. Opt. Lett. 40(16), 3695–3698 (2015) https://doi.org/10.1364/OL.40.003695. https://opg.optica.org/ol/abstract.cfm?uri=ol-40-16-3695, publisher: Optica Publishing Group

  6. Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, P., Diamanti, E.: Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 7(5), 378–381 (2013). https://doi.org/10.1038/nphoton.2013.63. https://www.nature.com/articles/nphoton.2013.63, number: 5 Publisher: Nature Publishing Group

  7. Leverrier, A.: Theoretical study of continuous-variable quantum key distribution. phdthesis, Télécom ParisTech (2009). https://pastel.archives-ouvertes.fr/tel-00451021

  8. Leverrier, A., García-Patrón, R., Renner, R., Cerf, N.J.: Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 110(3), (2013). https://doi.org/10.1103/PhysRevLett.110.030502, publisher: American Physical Society

  9. Leverrier, A., Grangier, P.: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 102(18),(2009). https://doi.org/10.1103/PhysRevLett.102.180504, publisher: American Physical Society

  10. Pan, Y., et al.: Experimental demonstration of high-rate discrete-modulated continuous-variable quantum key distribution system. Opt. Lett. 47(13), 3307–3310 (2022) https://doi.org/10.1364/OL.456978. https://opg.optica.org/ol/abstract.cfm?uri=ol-47-13-3307, publisher: Optica Publishing Group

  11. Ren, S., Yang, S., Wonfor, A., White, I., Penty, R.: Demonstration of high-speed and low-complexity continuous variable quantum key distribution system with local local oscillator. Sci. Rep. 11(1), 9454 (2021) https://doi.org/10.1038/s41598-021-88468-1. https://www.nature.com/articles/s41598-021-88468-1, number: 1 Publisher: Nature Publishing Group

  12. Renner, R.: Security of quantum key distribution. phdthesis, ETH Zurich (2006). arXiv:quant-ph/0512258

  13. Silberhorn, C., Ralph, T.C., Lütkenhaus, N., Leuchs, G.: Continuous variable quantum cryptography: beating the 3 DB loss limit. Phys. Rev. Lett. 89(16), (2002). https://doi.org/10.1103/PhysRevLett.89.167901, publisher: American Physical Society

  14. Weedbrook, C., Lance, A.M., Bowen, W.P., Symul, T., Ralph, T.C., Lam, P.K.: Quantum cryptography without switching. Phys. Rev. Lett. 93(17),(2004). https://doi.org/10.1103/PhysRevLett.93.170504, publisher: American Physical Society

  15. Zhang, Y., et al.: Continuous-variable QKD over 50 km commercial fiber. Quant. Sci. Technol. 4(3), (2019). https://doi.org/10.1088/2058-9565/ab19d1, publisher: IOP Publishing

Download references

Acknowledgements

This work had the support of Grant PID2020-118178RB-C22 funded by AEI/10.13039/501100011033, and by the Community of Madrid (Spain) under the CYNAMON project (P2018/TCS-4566), co-financed with European Social Fund and EU FEDER funds. We also acknowledge the support of the Spanish National Research Council (CSIC), project 202050E232, and CSIC’s Interdisciplinary Thematic Platform (PTI+) on Quantum Technologies (PTI-QTEP+). This study was supported by CSIC’s program for the Spanish Recovery, Transformation and Resilience Plan funded by the Recovery and Resilience Facility of the European Union, established by the Regulation (EU) 2020/2094; and MCIN with funding from European Union NextGenerationEU (PRTR-C17.I1).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andres Ruiz-Chamorro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Garcia-Callejo, A., Ruiz-Chamorro, A., Cano, D., Fernandez, V. (2023). A Review on Continuous-Variable Quantum Key Distribution Security. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_107

Download citation

Publish with us

Policies and ethics