|
1.INTRODUCTIONQuantum key distribution (QKD)1–3 is aimed at developing protocols for sharing a random secret key between legitimate users. The key can then be used the key for the classical encryption of the confidential communication, using, e.g., one-time pad cryptosystem, which is information-theoretically secure.4 Started with the discrete-variable protocols based on direct detection of single-photon states (and their emulation using weak coherent pulses or entangled photon pairs5), QKD was later extended to the realm of continuous variables (CV)6 based on efficient and low-noise homodyne detection of multiphoton coherent or squeezed states of light. One of the important applications of QKD is in the extra-terrestrial channels, which potentially allow extremely long-distance secure communication enabled by QKD over a satellite.7, 8 While discrete-variable protocols were recently successfully tested over the satellite links,9–12 the applicability of satellite-based CV QKD remains less studied. Indeed, it was considered in the asymptotic regime of the infinitely many quantum states,13 which however is never the case in practice. Moreover, CV QKD may have an important practical advantage in freespace applications and particularly in the satellite-based channels because a homodyne detector, in which the signal is coupled to a narrow-band local oscillator (bright coherent beam used as a phase reference), intrinsically filters out the background radiation at unmatched wavelengths.14 Thus CV QKD can operate in conditions of strong stray light and potentially at daytime, which, in the case of discrete-variable protocols, would require additional filtering, increasing attenuation and complexity of the set-up. Recently, the feasibility of coherent-state CV QKD over satellite links was discussed in.15 In the current work we analyze applicability of CV QKD over satellite-based channels considering also squeezed signal states. As the feasible squeezing up 10 dB, achievable with current technology,16 is known to improve robustness of CV QKD to noise,17–19 we confirm its usefulness in the satellite-based links as well. We build the channel model on the assumption of normal fluctuation of deflected signal beam center around the receiving aperture center, and study applicability of CV QKD, taking into account the finite data ensemble size. We show that in this regime the protocols appear to be extremely sensitive to strong channel attenuation and large amounts of data are required for successful realization of CV QKD over satellites, which contradicts relatively short passage times. Possible solutions to circumvent the problem can be i) use of squeezed states, that reduce requirements on the data ensemble size and can tolerate stronger attenuation and channel noise; ii) relaxation of security assumptions considering individual attacks or passive eavesdropping, introducing no excess noise; iii) increase of the link transmittance using larger telescopes in the downlink regime; iv) increase of the repetition rate of the system in order to accumulate larger statistics. Our results reveal substantial challenges for implementing CV QKD over satellites, but shows no fundamental limits for such realizations. Already under the strict assumption of collective eavesdropping attacks and untrusted channel noise, CV QKD protocols using feasible squeezing should be applicable with low-orbit satellites, while in the assumption of passive eavesdropping squeezed-state CV QKD can tolerate up to 43 dB of channel attenuation, which paves the way towards realization over geostationary satellites. 2.SECURITY OF CV QKDWe address satellite-based implementation of Gaussian CV QKD protocols20 using quadrature modulation of coherent or squeezed states of light as shown in Figure 1 (a). The sender Alice prepares coherent or squeezed states using respectively a laser source or an optical parametric oscillator,16 and modulates the states by applying quadrature displacements, governed by independent zero-centered Gaussian distributions, by using quadrature modulators. We generally assume that pure squeezed states with a squeezed quadrature variance VS ≤ 1 are prepared by Alice, which implies anti-squeezing variance 1/VS in the complementary quadrature. Alice then applies known displacements taken from a Gaussian distribution with variance VM to perform modulation on the signal. The signal then travels through a generally noisy and lossy quantum channel, which can be optimally21, 22 represented as a Gaussian channel with transmittance η and quadrature excess noise ϵ. Trusted parties use a beacon laser for signal acquiring, tracing and pointing, as well as for timing synchronization.23 The receiving side Bob is performing homodyne detection on the incoming mode by measuring either of the quadratures of the incoming light (bases have to be randomly switched between in order to fully characterize channel loss and excess noise, otherwise a unidimensional protocol is implemented24 with simpler realization yet limited applicability). After accumulating a certain amount of data points N from state preparation and measurement, parties use N − n of these to estimate the channel parameters η and ϵ, from which the security of the protocol can be assessed as described below. The remaining n points are processed using error correction and privacy amplification algorithms5 in order to obtain the resulting provably secure key which can then be used for classical encryption. The ratio n/N can be optimized,25 here for simplicity we assume it to be 1/2 (which is close to optimal except for the low repetition rates) and resulting estimates to be perfectly accurate i.e. with infinitesimal confidence intervals (or already being pessimistic lower bounds complying with a given probability of failure of the channel estimation procedure). We assume that the remote trusted side (Bob) is the reference side for the error correction algorithms, thus using so-called reverse reconciliation, which was shown robust against any level of pure channel loss26 and is applicable in the strongly attenuating links with η ≪ 1. Security of CV QKD was established against two main types of attacks, namely individual, when an eavesdropper is able to interact optimal probe states with the signal states and then individually measure the probes, and collective, when the probes are assumed to be stored in a quantum memory after the interaction and then optimally collectively measured, which increases the amount of information, that can be potentially obtained by an eavesdropper.27 We study security of the above described protocol by evaluating the lower bound on secure key rate per channel use, which in the finite-size regime, reverse reconciliation scenario, and firstly assuming collective attacks, performed by an eavesdropper, reads where β ∈ [0, 1] is post-processing efficiency representing how close the trusted parties are able to reach the Shannon mutual information IAB using realistic error correction codes, χBE is the Holevo bound,28 giving the upper bound on an eavesdropper’s information on the measurement results at the remote receiving side, Bob, and is the correction parameter related to the finite-size effects,29 where is the smoothing parameter that contributes to the overall failure probability of the protocol, and is set further to 10–10. The mutual information between the trusted parties IAB = 1/2 log2 VB/VB|A for the Gaussian-distributed data can be expressed through variances and correlations between the measurement outcomes, i.e., through the variance of Bob’s measurement VB = ηV + (1 − η) + ϵ, where V ≡ VS + VM, and conditional variance is the variance of Alice’s data and is the correlation between modulation data and measurements on the Bob’s side. The resulting expression for the mutual information then reads and is essentially determined by the signal modulation variance VM, signal state variance VS, channel transmittance η, and channel noise ϵ related to the channel output. Evaluation of the Holevo bound on the other hand is more involved. It is based on the assumption that Eve holds purification of the noise added in the channel (due to losses and excess noise) and relies on the evaluation of von Neumann entropies of the state shared between Alice and Bob.30 This is performed in the equivalent entanglement-based representation, when state preparation is purified using two-mode entangled state. In the case of coherent-state protocol a symmetrical two-mode squeezed vacuum (TMSV)31 state with variance V = 1+VM is used for purification, such that Alice is measuring one of the modes using a heterodyne (balanced homodyne) detector.30 For a general state preparation in the squeezed-state protocol, assuming independent levels of signal squeezing and modulation variance (contrary to the standard symmetrically modulated protocol, where squeezing and modulation are essentially related as VM = 1/VS − VS32), we use the generalized entanglement-based scheme using an asymmetrical entangled state instead of TMSV and a homodyne detection on the local mode,19 as shown in Figure 1 (b). The preparation in this case is equivalent to the prepare-and-measure scheme provided the asymmetrical state is constructed of the oppositely squeezed states with variances in x-quadratures being while having the opposite variances (1/V1 and 1/V2 respectively) in the p-quadratures. In the purification-based scenario, the Holevo bound is evaluated as χBE = S(AB) − S(A|B), where S(·) denotes the von Neumann (quantum) entropy of a state, S(AB) is the quantum entropy of a (generally noisy) state shared between the trusted parties and S(A|B) = S(A|xB) is the von Neumann entropy of the state of the trusted parties, conditioned by Bob’s measurement results in x-quadrature. We obtain the relevant von Neumann entropies from bosonic entropic functions of symplectic eigenvalues of respective covariance matrices of the states, shared between Alice and Bob (see30 for details of security analysis techniques in CV QKD). In the case of individual attacks and reverse reconciliation scenario, the upper bound on the information leakage is reduced to the classical (Shannon) information between Bob and Eve, which, similarly to IAB (2) described above, reads IBE = (1/2)log2 (VB/VB|E). The evaluation of VB|E is done in the assumption that Eve is able to purify the channel noise. The optimal individual attack in this case is the entangling cloner attack,26 which is a TMSV state of variance VN = 1 + set so to emulate the channel loss η and noise ϵ. One of the modes of the cloner interacts with the signal with a linear coupling η, corresponding to the channel loss, and resulting in VB = ηV + (1 − η)VN (which gives exactly VB as described above and as expected by the trusted parties), while the other mode is measured by Eve in order to reduce her uncertainty on the quantum noise added in the channel. The mutual information between Bob and Eve then reads26 which gives the bounds on the secure key rate in the case of individual eavesdropping attacks, similarly to (1). 3.CV QKD OVER SATELLITE CHANNELSThe main challenge in the satellite-based communication, and particularly the quantum one, is the extremely strong attenuation levels, which are much higher than the typical loss in the terrestrial fiber and free-space links in which QKD was mostly tested. The total level of signal loss in a satellite link can widely vary and depends on the type of satellite and technical specifications of the channel realization. Indeed, in the recent experiment with measurement of the quantum-limited signal from a geostationary satellite using the homodyne detection, the total loss of 69 dB was observed33 with an aperture of 27 cm. The loss can be reduced to 55 dB once a bigger aperture of 1.5 m is used. Alternatively, the channel loss from a low Earth orbit (LEO) satellite can be substantially smaller and as low as 31 dB for an Alphasat-like satellite at a distance of 500 km. The loss can be reduced to about 20 dB by using larger receiving apertures.33 Therefore it is important to assess applicability of CV QKD in various scenarios, mainly resulting in different optical link attenuation levels. 3.1Quantum channel and protocol parametersThe protocols are essentially influenced by the excess noise on the channel output, ϼ, further fixed to 10–4 shot-noise units (SNU), which are the vacuum quadrature fluctuations. This complies with the experiment in the 100-km optical fiber with the total attenuation of -20 dB, where the noise on the channel input was estimated as 3% SNU34 and with the recent experiment in the 300 km long low-loss fiber with the total attenuation of -32 dB, where the noise at the channel input was estimated in the worst case as 3.8% SNU.35 Note that the excess noise is mainly concerned with imperfect parameter estimation from the homodyne data on the receiving side of the protocol (even if the channel noise is physically absent, the pessimistic assumption on the level of noise, related to noise estimation error, results in effectively non-zero level of channel noise in order to comply with the required probability of failure of channel estimation procedures25), which substantially depends on the stability of the set-up. It is essential that we fix the noise at the channel output contrary to the standard approach in CV QKD, when noise was fixed as relates to the channel input and then scaled by the channel attenuation, making the assessment of the channel noise in long-distance channels too optimistic. Alternatively and taking into account the fact that the excess noise atop of the calibrated electronic noise of the detector appears most likely due to the imperfect estimation of a noiseless quantum channel, one may assume passive eavesdropping such that no untrusted channel excess noise is present. In the case of satellite-based links, where line of sight between the sender and the receiver suggests the absence of equipment capable of active eavesdropping, this is a particularly sensible assumption and it was applied recently for feasibility study of DV QKD over satellite links.36 We also take this assumption into account in CV QKD by assuming the excess noise to be trusted (i.e., being out of control by an eavesdropper) and including it in the state purification using the scheme similar to the entangling cloner with a strongly unbalanced coupling to the signal prior to detection.30 For the data ensemble size, we rely on the typical passage time of 300 seconds observed for the Micius quantum satellite.10 Assuming repetition rate of a CV QKD system to be of order of GHz, which is challenging but feasible with the current technology,37 we may expect N = 1011 data points acquired during a satellite passage, half of which will then contribute to the key. Lastly, post-processing efficiency is taken β = 0.95, complying with the currently available algorithms.38 The maximum tolerable channel attenuation gives the idea of the protocols applicability independently of the aperture setting and random atmospheric disturbances, i.e. based only on the link optical budget. The results are summarized in Table 1 for given security assumptions and protocol parameters (signal states and clock rates). Table 1.Tolerable levels of channel attenuation (rounded) for various security assumptions and optimized CV QKD protocol settings. Excess noise on the channel output is fixed to ϵ = 10-4 SNU, and optimal squeezing is VS ≥ 0.1 SNU. During a passive attack the excess noise is presumed to be trusted.
Evidently, in the assumption of passive eavesdropping there is no substantial difference between collective and individual attacks. On the other hand, when the channel excess noise is assumed to be untrusted, relaxing the assumptions on the possible attacks from collective to individual ones can substantially extend the tolerable loss. Note that the use of squeezed states typically increases the tolerable channel attenuation by 4-6 dB depending on the attack assumption (the better improvement being observed upon more strict collective attacks). Furthermore, with the high repetition rate the squeezed-state protocol can tolerate from 30 to 44 dB of channel attenuation depending on the attack assumption, making it potentially feasible in the geostationary scenario. Performance of CV QKD over short-range (terrestrial) free-space links can be essentially limited by quantum channel transmittance fluctuations,39, 40 also referred to as fading, which are mainly caused by the atmospheric turbulence effects of beam wander,41 when a beam spot travels around the receiving aperture. The channel fading then results in increase of the channel noise, detected on the receiver.39 Even though this effect will be partially compensated for in the long-distance realization of CV QKD, where beam spot drastically expands during the propagation, which results in channel stabilization at the cost of increasing the overall loss42 as well as by active beam tracking and stabilization systems, it must be taken into account in the realistic CV QKD security analysis. However, as the residual transmittance fluctuations due to atmospheric effects are slow (of the order of KHz43) compared to high achievable repetition rates of CV QKD systems (enabled by GHz rates of homodyne detectors37), the fading can be further compensated for by properly grouping the data according to estimated relatively stable transmittance values,44 which we also apply in our study. 3.2Satellite-to-ground channel modelIn our study we consider downlink satellite channels, as the turbulence effects, being destructive for CV QKD,39 are less pronounced in this regime compared to the uplink scenario, where the signal is strongly affected by the atmosphere already in the beginning of the channel.45 Optical Gaussian beam in the satellite-to-ground link is influenced by analytically predictable systematic and statistical effects occurring during the communication window. Aside from losses within the receiver optical system ηdet, due to coupling and detection inefficiencies, systematic effects also include diffraction and refraction induced losses. The main source of loss is beam-spot broadening caused by diffraction. The broadening limits the maximal transmission efficiency η0 as finite receiving aperture of size a truncates and measures only a part of the incoming collimated beam with spot-size W. The latter is largely determined as W = θdL(ζ) by divergence of the beam θd and the channel length L(ζ). Line-of-sight distance, also referred to as slant range, between the observer and the satellite depends on the exact position of the latter. In following we assume a perfectly circular Low-Earth orbit within observers meridian plane, characterized by the altitude above the ground H, ranging from 200 km to 2000 km. The slant range is obtained as where R⊕ is Earth radius and ζ is zenith angle i.e. between the line pointing in opposite direction to the gravity from the observer and the slant range, see also Figure 2. Additionally, air density and optical refractive index change with the altitude causing the bending of the beam and making the overall traveling distance longer than the straight geometrical slant range. The refraction induced elongation also depends on the signal wavelength, geographical position and altitude of the receiver, as well as atmospheric conditions (relative humidity, temperature, wind, pressure). We assume the communication window is established up to the zenith angle ζmax = 70°, when the difference between actual and perceived slant ranges is small.46 While such limitation reduces the communication window and the size of data block, it also avoids contributions from the longest propagation distance overall and through the thickest air mass.47, 48 Duration of communication window, i.e. total time in view of the satellite t, determines the amount of accumulated data points N for given source repetition rate. The time in view is calculated from geometrical considerations and satellite orbital velocity, which for circular orbit in the observers meridian plane can be simplified as:? where G is the gravitational constant, and M⊕ is Earth mass. The volume of air mass is related to the atmospheric extinction ratio ηext, which is a measure of Rayleigh scattering, scattering due to aerosols, and molecular absorption experienced by the signal beam in terrestrial atmosphere. The value of extinction ratio ηext,ζ=0 depends on the the signal wavelength, air constituents, temperature and weather conditions, and its change with increase of the path length through the atmosphere (in terms of zenith angle) can be approximated (for angles up to ζmax where refraction effects are small) as:49 The ratio at zenith can be obtained based on MODTRAN atmospheric transmittance and radiance model,50 which for rural or urban sea-level Mid-latitude location with clear sky visibility yields ηext = 0.908. Aside from aforementioned effects, refraction and diffraction are also caused by wind shear and temperature fluctuations and consequently by spatial and temporal variations of refractive index in the channel. Such perturbations result in scintillation, deviation of beam-spot from the center of the receiving aperture, and deformation of the beam-spot. For satellite links, the beam-spot radius is always significantly larger than the aperture, i.e., W > a, which allows us to ignore the deformation of the Gaussian beam profile, hence making beam wandering the dominant effect governing the fluctuation statistic of the channel transmittance. The maximal transmission efficiency is reached when incoming signal is perfectly aligned with the receiving aperture (r = 0), and is defined by the ratio a/W of the aperture and beam spot sizes as follows Efficiency η ∈ [0, η0] decreases with the increase of deflection distance r, with approximate analytical solution41 being where λ and R are shape and scale parameters respectively: where In is n-th order Bessel function. The position of deflected beam center is assumed to be normally fluctuating around the aperture center,51 and described by random transverse vector r0: where beam-wandering variance is limited by tracking accuracy and beam stabilization σBW = θpL(ζ), and r = |r0|2. The analytical form of the probability distribution of atmospheric transmittance is the log-negative Weibull distribution:51 We simulate the values of η for each zenith angle ζ ∈ [−ζmax, ζmax] within the communication window with respect to the clock rate of the CV QKD protocol, and combine it with systematic receiver loss ηdet, and respective extinction ratio ηext (ζ) to obtain an overall mean transmittance 〈ηtot〉 (as well as of the satellite pass. Hence the transmittance statistics during an overall communication window consists of contributions from individual simulated free-space channels at every permitted zenith angle ζ. Both 〈ηtot〉 and govern the evolution of a covariance matrix of the state shared between Alice and Bob over the fluctuating channel.52 Note that we evaluate the mutual information between the trusted parties, IAB, from the overall covariance matrix, averaged over the whole transmittance distribution (similarly to evaluating the Holevo bound), which we observe to be lower than the average mutual information, hence being the pessimistic estimate. Following is the list of parameters used in the simulation: the receiver aperture radius a = 0.5 (m) (respective plots shown in green color) 0.75 (m) (shown in blue), and 1 (m) (red), wavelength λ = 1550(nm), detection efficiency ηdet = −3 dB,47 tracking and pointing accuracy θp = 1.2(μrad),23 and beam divergence θd = 10(μrad).10 The resulting mean transmittance for a single pass at altitude H is shown in Figure 3. 3.3Security evaluationWe first assess the security by considering the individual attacks in asymptotic regime (see Figure 4 left). In this regime, security can be established for every LEO satellite altitude and feasible squeezing VS ≥ 0.1 (SNU) provides a noticeable rate gain. Note that under the individual attacks, the higher levels of squeezing always translate into a higher secure key rate, which is not the case for collective attacks where the transmittance fluctuations limit the applicable values of squeezing53 and require active squeezing optimization based on the estimated atmospheric transmittance distribution. The optimization of the latter is a crucial step required for the establishing of secure key rate based on the data generated from a single pass of the satellite. The performance of the optimized CV QKD protocol under passive collective attacks with trusted noise ϵ = 10-4 is depicted in Figure 4 (right). The impact of finite-size effects reduces with an increase of the altitude H as the communication window gets longer and consequently the overall block size N gets larger. Low altitude satellite downlinks exhibit less mean attenuation, but such advantage is partially offset by larger confidence intervals of estimated channel parameters and shorter raw key. While optimization of estimation block-size N − n can lengthen the key to some extent, increasing the repetition rate of the system is necessary to greatly extend the raw key. Higher repetition rate is especially crucial for the coherent-state protocol that can be implemented at the altitudes above 500 km only with 10 GHz clock rates. Increasing the size of receiving aperture also leads to significant improvement of the secure key rate. Mean channel attenuation and fading noise, originating from transmittance fluctuations, diminish the tolerance to the channel excess noise, as shown in Figure 5. Evidently, both protocols are extremely sensitive to excess noise and no secure key can be generated at any orbit altitude if the noise at the output of the squeezed-state protocol is ϵ ≥ 2 · 10-3 SNU for a = 0.5, or if the noise ϵ ≥ 5 · 10-3 for a = 0.75, with orders of magnitude lower values needed for security of the coherent-state protocol (ϵ > 6 · 10-5 at a = 0.5, or ϵ ≥ 4 · 10-4 at a = 0.75). Note that with an increase of satellite orbit altitude the rate at which the protocol looses noise tolerance decreases. As the optical channel becomes longer it also becomes more stable,39, 42 i.e. both mean attenuation and fading (viewed as the variance of transmittance fluctuations are simultaneously reduced. While the effect at LEO altitudes is more apparent for the coherent-state protocol, the same dependency can be expected for the squeezed-state protocol at higher altitudes (MEO or GEO). Furthermore, channel stabilization will be more pronounced with less accurate beam-tracking θp which directly limits the beam-wandering and consequently channel fading. Clearly, in order to operate under collective attacks with untrusted channel noise, the noise has to be limited to very low values. This can be achieved by proper control of the set-up or precise parameter estimation, however one can as well reduce the amount of fading noise by dividing the overall single-pass data block into a subset of smaller blocks.39 Data clusterization with respect to channel attenuation allows to compensate the effect of channel transmittance fluctuations,44 however such post-processing can be demanding for satellite-based QKD and is not needed for slow systematic changes of transmittance during the satellite pass. In the current work we therefore adopt simpler albeit similar method by splitting the satellite tracked pass into a set of segments and generating the key for each one. This allows to achieve the following lower bound on the overall secure key rate as a weighed sum of the key rates from individual segments: where ni is the raw key length for a given segment i with number of data points Ni, so that ∑iNi = N, Ni − ni of data points is used for segment channel estimation, and the weight is determined by the relative size of the segment ni/N, with N being the overall block size for a given satellite pass. The segments are chosen in accordance with the zenith angle ζ, so that for i = 1, 2, 3 we obtain 3 segments each containing measurement results at respectively [−ζmax, −2/3ζmax) ∪ (2/3ζmax, ζmax], [−2/3ζmax, −1/3ζmax) ∪ (1/3ζmax, 2/3ζmax], and [−1/3ζmax, 1/3ζmax]. The finite-size effects are stronger within each segment and transmittance fluctuations are substantial, yet reduced. Three segments are already sufficient to attain an enhanced positive secure key rate and extend the range of secure altitudes, as shown in Figure 6. For systems with smaller apertures this implies an effective increase of no tracking zone ζmax, as the segment characterized by the longer slant ranges L(ζ) might not contribute to the overall key. 4.CONCLUSIONS AND DISCUSSIONWe studied applicability of CV QKD over satellite links considering coherent and squeezed-state protocols, taking into account realistic satellite passage, atmospheric effects, finite data ensemble size, system clock rate and data processing efficiency. We show that the protocols are very sensitive to channel noise at the respective loss levels so that either set-up stabilization resulting in drastic decrease of noise or relaxation of security assumptions to individual or passive collective attacks is required for implementation over the low Earth orbit satellites. Satellite pass segmentation provides another viable option to reduce channel fading thus improving the secure key rate and allowing to establish the secure link with satellites at higher altitudes. We show that the use of squeezing can make the protocols more applicable in the satellite links, allowing for higher attenuation and levels of noise at the given security assumptions, and has to be optimized in the collective attacks scenario. On the other hand, in the case of trusted noise assumption and at high repetition rates, squeezed-state CV QKD can tolerate attenuation levels up to 42 dB, which may open possibility of use over geostationary satellites. The obtained results are promising for satellite-based QKD potentially applicable in daylight conditions. ACKNOWLEDGMENTSAcknowledgments: Authors acknowledge support from the project LTC17086 of INTER-EXCELLENCE program of the Czech Ministry of Education, project 19-23739S of the Czech Science Foundation and EU H2020 Quantum Flagship initiative project No. 820466, CiViQ. REFERENCESDiamanti, E., Lo, H.-K., Qi, B., and Yuan, Z.,
“Practical challenges in quantum key distribution,”
npj Quantum Information, 2
(2016). Google Scholar
Xu, F., Ma, X., Zhang, Q., Lo, H.-K., and Pan, J.-W.,
“Secure quantum key distribution with realistic devices,”
Reviews of Modern Physics, 92 025002
(2020). https://doi.org/10.1103/RevModPhys.92.025002 Google Scholar
Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J. L., Razavi, M., Shaari, J. S., Tomamichel, M., Usenko, V. C., Vallone, G., Villoresi, P., and Wallden, P.,
“Advances in quantum cryptography,”
Advances in Optics and Photonics, 12 1012
(2020). https://doi.org/10.1364/AOP.361502 Google Scholar
Shannon, C. E.,
“Communication theory of secrecy systems,”
Bell System Technical Journal, 28 656
–715
(1949). https://doi.org/10.1002/bltj.1949.28.issue-4 Google Scholar
Gisin, N., Ribordy, G., Tittel, W., and Zbinden, H.,
“Quantum cryptography,”
Reviews of Modern Physics, 74 145
–195
(2002). https://doi.org/10.1103/RevModPhys.74.145 Google Scholar
Braunstein, S. L. and van Loock, P.,
“Quantum information with continuous variables,”
Reviews of Modern Physics, 77 513
–577
(2005). https://doi.org/10.1103/RevModPhys.77.513 Google Scholar
Sidhu, J. S., Joshi, S. K., Gündoğan, M., Brougham, T., Lowndes, D., Mazzarella, L., Krutzik, M., Mohapatra, S., Dequal, D., Vallone, G., Villoresi, P., Ling, A., Jennewein, T., Mohageg, M., Rarity, J. G., Fuentes, I., Pirandola, S., and Oi, D. K. L.,
“Advances in space quantum communications,”
IET Quantum Communication, 2 182
–217
(2021). https://doi.org/10.1049/qtc2.v2.4 Google Scholar
Belenchia, A., Carlesso, M., Ömer Bayraktar, Dequal, D., Derkach, I., Gasbarri, G., Herr, W., Li, Y. L., Rademacher, M., Sidhu, J., Oi, D. K., Seidel, S. T., Kaltenbaek, R., Marquardt, C., Ulbricht, H., Usenko, V. C., Worner, L., Xuereb, A., Paternostro, M., and Bassi, A.,
“Quantum physics in space,”
Physics Reports, 951 1
–70
(2022). https://doi.org/10.1016/j.physrep.2021.11.004 Google Scholar
Vallone, G., Bacco, D., Dequal, D., Gaiarin, S., Luceri, V., Bianco, G., and Villoresi, P.,
“Experimental satellite quantum communications,”
Physical Review Letters, 115 040502
(2015). https://doi.org/10.1103/PhysRevLett.115.040502 Google Scholar
Liao, S.-K., Cai, W.-Q., Handsteiner, J., Liu, B., Yin, J., Zhang, L., Rauch, D., Fink, M., Ren, J.-G., Liu, W.-Y., Li, Y., Shen, Q., Cao, Y., Li, F.-Z., Wang, J.-F., Huang, Y.-M., Deng, L., Xi, T., Ma, L., Hu, T., Li, L., Liu, N.-L., Koidl, F., Wang, P., Chen, Y.-A., Wang, X.-B., Steindorfer, M., Kirchner, G., Lu, C.-Y., Shu, R., Ursin, R., Scheidl, T., Peng, C.-Z., Wang, J.-Y., Zeilinger, A., and Pan, J.-W.,
“Satellite-relayed intercontinental quantum network,”
Physical Review Letters, 120 030501
(2018). https://doi.org/10.1103/PhysRevLett.120.030501 Google Scholar
Villar, A., Lohrmann, A., Bai, X., Vergoossen, T., Bedington, R., Perumangatt, C., Lim, H. Y., Islam, T., Reezwana, A., Tang, Z., Chandrasekara, R., Sachidananda, S., Durak, K., Wildfeuer, C. F., Griffin, D., Oi, D. K. L., and Ling, A.,
“Entanglement demonstration on board a nano-satellite,”
Optica, 7 734
(2020). https://doi.org/10.1364/OPTICA.387306 Google Scholar
Yin, J., Li, Y.-H., Liao, S.-K., Yang, M., Cao, Y., Zhang, L., Ren, J.-G., Cai, W.-Q., Liu, W.-Y., Li, S.-L., Shu, R., Huang, Y.-M., Deng, L., Li, L., Zhang, Q., Liu, N.-L., Chen, Y.-A., Lu, C.-Y., Wang, X.-B., Xu, F., Wang, J.-Y., Peng, C.-Z., Ekert, A. K., and Pan, J.-W.,
“Entanglement-based secure quantum cryptography over 1,120 kilometres,”
Nature, 582 501
–505
(2020). https://doi.org/10.1038/s41586-020-2401-y Google Scholar
Hosseinidehaj, N. and Malaney, R.,
“CV-QKD with gaussian and non-gaussian entangled states over satellite-based channels,”
in 2016 IEEE Global Communications Conference (GLOBECOM),
(2016). https://doi.org/10.1109/GLOCOM.2016.7841711 Google Scholar
Elser, D., Bartley, T., Heim, B., Wittmann, C., Sych, D., and Leuchs, G.,
“Feasibility of free space quantum key distribution with coherent polarization states,”
New Journal of Physics, 11 045014
(2009). https://doi.org/10.1088/1367-2630/11/4/045014 Google Scholar
Dequal, D., Vidarte, L. T., Rodriguez, V. R., Vallone, G., Villoresi, P., Leverrier, A., and Diamanti, E.,
“Feasibility of satellite-to-ground continuous-variable quantum key distribution,”
npj Quantum Information, 7
(2021). https://doi.org/10.1038/s41534-020-00336-4 Google Scholar
Andersen, U. L., Gehring, T., Marquardt, C., and Leuchs, G.,
“30 years of squeezed light generation,”
Physica Scripta, 91 053001
(2016). https://doi.org/10.1088/0031-8949/91/5/053001 Google Scholar
García-Patrón, R. and Cerf, N. J.,
“Continuous-variable quantum key distribution protocols over noisy channels,”
Physical Review Letters, 102 130501
(2009). https://doi.org/10.1103/PhysRevLett.102.130501 Google Scholar
Madsen, L. S., Usenko, V. C., Lassen, M., Filip, R., and Andersen, U. L.,
“Continuous variable quantum key distribution with modulated entangled states,”
Nature Communications, 3
(2012). https://doi.org/10.1038/ncomms2097 Google Scholar
Usenko, V. C. and Filip, R.,
“Squeezed-state quantum key distribution upon imperfect reconciliation,”
New Journal of Physics, 13 113007
(2011). https://doi.org/10.1088/1367-2630/13/11/113007 Google Scholar
Weedbrook, C., Pirandola, S., García-Patrón, R., Cerf, N. J., Ralph, T. C., Shapiro, J. H., and Lloyd, S.,
“Gaussian quantum information,”
Reviews of Modern Physics, 84 621
–669
(2012). https://doi.org/10.1103/RevModPhys.84.621 Google Scholar
Navascués, M., Grosshans, F., and Acín, A.,
“Optimality of gaussian attacks in continuous-variable quantum cryptography,”
Physical Review Letters, 97 190502
(2006). https://doi.org/10.1103/PhysRevLett.97.190502 Google Scholar
García-Patrón, R. and Cerf, N. J.,
“Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,”
Physical Review Letters, 97 190503
(2006). https://doi.org/10.1103/PhysRevLett.97.190503 Google Scholar
Liao, S.-K., Cai, W.-Q., Liu, W.-Y., Zhang, L., Li, Y., Ren, J.-G., Yin, J., Shen, Q., Cao, Y., Li, Z.-P., Li, F.-Z., Chen, X.-W., Sun, L.-H., Jia, J.-J., Wu, J.-C., Jiang, X.-J., Wang, J.-F., Huang, Y.-M., Wang, Q., Zhou, Y.-L., Deng, L., Xi, T., Ma, L., Hu, T., Zhang, Q., Chen, Y.-A., Liu, N.-L., Wang, X.-B., Zhu, Z.-C., Lu, C.-Y., Shu, R., Peng, C.-Z., Wang, J.-Y., and Pan, J.-W.,
“Satellite-to-ground quantum key distribution,”
Nature, 549 43
–47
(2017). https://doi.org/10.1038/nature23655 Google Scholar
Usenko, V. C.,
“Unidimensional continuous-variable quantum key distribution using squeezed states,”
Physical Review A, 98 032321
(2018). https://doi.org/10.1103/PhysRevA.98.032321 Google Scholar
Ruppert, L., Usenko, V. C., and Filip, R.,
“Long-distance continuous-variable quantum key distribution with efficient channel estimation,”
Physical Review A, 90 062310
(2014). https://doi.org/10.1103/PhysRevA.90.062310 Google Scholar
Grosshans, F., Assche, G. V., Wenger, J., Brouri, R., Cerf, N. J., and Grangier, P.,
“Quantum key distribution using gaussian-modulated coherent states,”
Nature, 421 238
–241
(2003). https://doi.org/10.1038/nature01289 Google Scholar
Diamanti, E. and Leverrier, A.,
“Distributing secret keys with quantum continuous variables: Principle, security and implementations,”
Entropy, 17 6072
–6092
(2015). https://doi.org/10.3390/e17096072 Google Scholar
Holevo, A. and Werner, R.,
“Evaluating capacities of bosonic gaussian channels,”
Physical Review A, 63 032312
(2001). https://doi.org/10.1103/PhysRevA.63.032312 Google Scholar
Leverrier, A., Grosshans, F., and Grangier, P.,
“Finite-size analysis of a continuous-variable quantum key distribution,”
Physical Review A, 81 062343
(2010). https://doi.org/10.1103/PhysRevA.81.062343 Google Scholar
Usenko, V. and Filip, R.,
“Trusted noise in continuous-variable quantum key distribution: A threat and a defense,”
Entropy, 18
(20),
(2016). Google Scholar
Ou, Z. Y., Pereira, S. F., and Kimble, H. J.,
“Realization of the einstein-podolsky-rosen paradox for continuous variables in nondegenerate parametric amplification,”
Applied Physics B Photophysics and Laser Chemistry, 55 265
–278
(1992). https://doi.org/10.1007/BF00325015 Google Scholar
Cerf, N. J., Lévy, M., and Assche, G. V.,
“Quantum distribution of gaussian keys using squeezed states,”
Physical Review A, 63 052311
(2001). https://doi.org/10.1103/PhysRevA.63.052311 Google Scholar
Günthner, K., Khan, I., Elser, D., Stiller, B., Ömer Bayraktar, Müller, C. R., Saucke, K., Tröndle, D., Heine, F., Seel, S., Greulich, P., Zech, H., Gütlich, B., Philipp-May, S., Marquardt, C., and Leuchs, G.,
“Quantum-limited measurements of optical signals from a geostationary satellite,”
Optica, 4 611
(2017). https://doi.org/10.1364/OPTICA.4.000611 Google Scholar
Huang, D., Huang, P., Lin, D., and Zeng, G.,
“Long-distance continuous-variable quantum key distribution by controlling excess noise,”
Scientific Reports, 6
(2016). Google Scholar
Zhang, Y., Chen, Z., Pirandola, S., Wang, X., Zhou, C., Chu, B., Zhao, Y., Xu, B., Yu, S., and Guo, H.,
“Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,”
Physical Review Letters, 125 010502
(2020). https://doi.org/10.1103/PhysRevLett.125.010502 Google Scholar
Vergoossen, T., Bedington, R., Grieve, J. A., and Ling, A.,
“Satellite quantum communications when man-in-the-middle attacks are excluded,”
Entropy, 21 387
(2019). https://doi.org/10.3390/e21040387 Google Scholar
Zhang, X., Zhang, Y., Li, Z., Yu, S., and Guo, H.,
“1.2-GHz balanced homodyne detector for continuous-variable quantum information technology,”
IEEE Photonics Journal, 10 1
–10
(2018). https://doi.org/10.1109/JPHOT.2018.2883994 Google Scholar
Milicevic, M., Feng, C., Zhang, L. M., and Gulak, P. G.,
“Quasi-cyclic multi-edge LDPC codes for longdistance quantum cryptography,”
npj Quantum Information, 4
(2018). Google Scholar
Usenko, V. C., Heim, B., Peuntinger, C., Wittmann, C., Marquardt, C., Leuchs, G., and Filip, R.,
“Entanglement of gaussian states and the applicability to quantum key distribution over fading channels,”
New Journal of Physics, 14 093048
(2012). https://doi.org/10.1088/1367-2630/14/9/093048 Google Scholar
Pirandola, S.,
“Limits and security of free-space quantum communications,”
Physical Review Research, 3 013279
(2021). https://doi.org/10.1103/PhysRevResearch.3.013279 Google Scholar
Vasylyev, D. Y., Semenov, A. A., and Vogel, W.,
“Toward global quantum communication: Beam wandering preserves nonclassicality,”
Physical Review Letters, 108 220501
(2012). https://doi.org/10.1103/PhysRevLett.108.220501 Google Scholar
Usenko, V. C., Peuntinger, C., Heim, B., Günthner, K., Derkach, I., Elser, D., Marquardt, C., Filip, R., and Leuchs, G.,
“Stabilization of transmittance fluctuations caused by beam wandering in continuous-variable quantum communication over free-space atmospheric channels,”
Optics Express, 26 31106
(2018). https://doi.org/10.1364/OE.26.031106 Google Scholar
Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., Blauensteiner, B., Jennewein, T., Perdigues, J., Trojek, P., Ömer, B., Fürst, M., Meyenburg, M., Rarity, J., Sodnik, Z., Barbieri, C., Weinfurter, H., and Zeilinger, A.,
“Entanglement-based quantum communication over 144 km,”
Nature Physics, 3 481
–486
(2007). https://doi.org/10.1038/nphys629 Google Scholar
Ruppert, L., Peuntinger, C., Heim, B., Günthner, K., Usenko, V. C., Elser, D., Leuchs, G., Filip, R., and Marquardt, C.,
“Fading channel estimation for free-space continuous-variable secure quantum communication,”
New Journal of Physics, 21 123036
(2019). https://doi.org/10.1088/1367-2630/ab5dd3 Google Scholar
Bourgoin, J.-P., Meyer-Scott, E., Higgins, B. L., Helou, B., Erven, C., Hübel, H., Kumar, B., Hudson, D., D’Souza, I., Girard, R., Laflamme, R., and Jennewein, T.,
“A comprehensive design and performance analysis of low earth orbit satellite quantum communication,”
New Journal of Physics, 15 023006
(2013). https://doi.org/10.1088/1367-2630/15/2/023006 Google Scholar
Vasylyev, D., Vogel, W., and Moll, F.,
“Satellite-mediated quantum atmospheric links,”
Physical Review A, 99 053830
(2019). https://doi.org/10.1103/PhysRevA.99.053830 Google Scholar
Bedington, R., Arrazola, J. M., and Ling, A.,
“Progress in satellite quantum key distribution,”
npj Quantum Information, 3
(2017). https://doi.org/10.1038/s41534-017-0031-5 Google Scholar
Lee, O. and Vergoossen, T.,
“An updated analysis of satellite quantum-key distribution missions,”
(2019). Google Scholar
Tomasi, C. and Petkov, B. H.,
“Calculations of relative optical air masses for various aerosol types and minor gases in arctic and antarctic atmospheres,”
Journal of Geophysical Research: Atmospheres, 119 1363
–1385
(2014). https://doi.org/10.1002/2013JD020600 Google Scholar
Berk, A., Conforti, P., Kennett, R., Perkins, T., Hawes, F., and van den Bosch, J.,
“MODTRAN® 6: A major upgrade of the MODTRAN® radiative transfer code,”
in 2014 6th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS),
(2014). https://doi.org/10.1109/WHISPERS.2014.8077573 Google Scholar
Vasylyev, D., Vogel, W., and Semenov, A. A.,
“Theory of atmospheric quantum channels based on the law of total probability,”
Physical Review A, 97 063852
(2018). https://doi.org/10.1103/PhysRevA.97.063852 Google Scholar
Dong, R., Lassen, M., Heersink, J., Marquardt, C., Filip, R., Leuchs, G., and Andersen, U. L.,
“Continuous-variable entanglement distillation of non-gaussian mixed states,”
Physical Review A, 82 012312
(2010). https://doi.org/10.1103/PhysRevA.82.012312 Google Scholar
Derkach, I., Usenko, V. C., and Filip, R.,
“Squeezing-enhanced quantum key distribution over atmospheric channels,”
New Journal of Physics, 22 053006
(2020). https://doi.org/10.1088/1367-2630/ab7f8f Google Scholar
|