Professional Documents
Culture Documents
Experimental Demonstration of Long-Distance Continuous-Variable Quantum Key Distribution
Experimental Demonstration of Long-Distance Continuous-Variable Quantum Key Distribution
Paul Jouguet,1, 2 Sébastien Kunz-Jacques,2 Anthony Leverrier,3 Philippe Grangier,4 and Eleni Diamanti1
1
LTCI, CNRS - Telecom ParisTech, 46 rue Barrault, 75013 Paris, France
2
SeQureNet, 23 avenue d’Italie, 75013 Paris, France
3
Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland
4
Laboratoire Charles Fabry de l’Institut d’Optique - CNRS - Univ. Paris-Sud 11,
2 avenue Augustin Fresnel, Campus Polytechnique, 91127 Palaiseau, France
Distributing secret keys with information- photon-counting technology can be replaced by homo-
theoretic security is arguably one of the most dyne detection techniques that are widely used in clas-
important achievements of the field of quantum sical optical communications. Furthermore, recent re-
arXiv:1210.6216v1 [quant-ph] 23 Oct 2012
information processing and communications [1]. sults suggest that these systems will be compatible with
The rapid progress in this field has enabled quan- standard wavelength division multiplexed telecommuni-
tum key distribution (QKD) in real-world con- cation networks [20]. Despite these attractive features,
ditions [2, 3] and commercial devices are now CVQKD schemes require complex post-processing pro-
readily available. QKD systems based on con- cedures, mostly related to error correction. These have
tinuous variables [4] present the major advantage hindered their operation over more than 25 km of opti-
that they only require standard telecommunica- cal fibre [5–7], a communication span that may be in-
tion technology, and in particular, that they do sufficient for network cryptographic applications. Fur-
not use photon counters. However, these systems thermore, implementations so far were based on security
were considered up till now unsuitable for long- proofs valid in the asymptotic limit of infinitely large
distance communication [5–7]. Here, we over- data blocks, while the finite size of real data must be
come all previous limitations and demonstrate for taken into account according to more complete security
the first time continuous-variable quantum key proofs [21–23].
distribution over 80 km of optical fibre. The Here we demonstrate the distribution of secret keys
demonstration includes all aspects of a practi- over a distance of 80 km, using continuous variables and
cal scenario, with real-time generation of secret security proofs compatible with the use of data blocks of
keys, stable operation in a regular environment, finite size for the generation of the secret key. This re-
and use of finite-size data blocks for secret in- markable range improvement was made possible by a sys-
formation computation and key distillation. Our tem operation in a regime of signal-to-noise ratios (SNR)
results correspond to an implementation guaran- between one and two orders of magnitude lower than in
teeing the strongest level of security for QKD re- earlier implementations. In fact, it was previously over-
ported to date for such long distances and pave looked that techniques developed for error correction of
the way to practical applications of secure quan- Gaussian signals [24] can perform very close to the opti-
tum communications. mal bounds for very low SNR. Implementing such error-
Long-distance experiments in quantum information correction codes at high speed and in an optical envi-
science, and in particular for quantum key distribution ronment featuring excellent stability hence enabling the
(QKD), are of utmost importance for future technologi- acquisition of large data blocks, allowed us to reach pa-
cal applications. Such experiments will allow the integra- rameter regions that were previously inaccessible. This
tion of quantum devices in current secure infrastructures was a key element for the present experiments.
and in future networks based on quantum repeaters [8]. In the experimental setup, shown in Figure 1, we im-
The quest for long-distance QKD in the last years has plement the standard GG02 coherent-state continuous-
led to several successful demonstrations [9–13], however variable QKD protocol described in [25]. The sender,
improving security guarantees and performance in practi- Alice, prepares coherent states with a Gaussian modula-
cal conditions in these implementations remains an issue. tion and sends them to the receiver, Bob, who measures
These experiments use discrete-variable or distributed- either one of the quadratures with a homodyne detec-
phase-reference protocols [1], where the key information tion system. A reverse reconciliation scheme, in which
is encoded on properties of single photons. Alternatively, Alice and Bob use Bob’s data to establish the secret key
in the so-called continuous-variable (CV) QKD proto- [14], is used. In practice, coherent light pulses with a
cols [4], light carries continuous information such as the duration of 100 ns and a repetition rate of 1 MHz are
value of the quadrature of a coherent state. Such pro- generated by a 1550 nm laser diode and split into a weak
tocols have been implemented in a great variety of situ- signal and a strong local oscillator (LO), which provides
ations [5–7, 14–19]. Their key feature is that dedicated the required phase reference. The signal pulses are then
2
Figure 1: Optical layout of the long-distance CVQKD prototype. Alice sends to Bob 100 ns coherent light pulses generated
by a 1550 nm telecom laser diode pulsed with a frequency of 1 MHz. These pulses are split into a weak signal and a strong
local oscillator (LO) with an unbalanced coupler. The signal pulse is modulated with a centered Gaussian distribution using an
amplitude and a phase modulator. The variance is controlled using a coarse variable attenuator and the amplitude modulator.
The signal pulse is 200 ns delayed with respect to the LO pulse using a 20 m delay line and a Faraday mirror. Both pulses are
multiplexed with orthogonal polarization using a polarizing beamsplitter (PBS). The time and polarization multiplexed pulses
are then sent through the channel. They are demultiplexed on Bob’s side with another PBS combined with active polarization
control. A second delay line on Bob’s side allows for time superposition of signal and LO pulses. After demultiplexing, the
signal and LO interfere on a shot-noise limited balanced pulsed homodyne detector. A phase modulator on the LO path allows
for random choice of the measured signal quadrature.
randomly modulated in both quadratures using an am- mal, thanks, for instance, to an infinite-dimensional ver-
plitude and a phase modulator, and transmitted together sion of de Finetti’s theorem [29], or to an adaptation of
with the LO pulses in a single fibre using time and po- the so-called postselection technique [30] to continuous-
larization multiplexing techniques. At the receiver’s side, variable protocols [31]. Security proofs combining arbi-
the pulses interfere on a homodyne detector, whose out- trary attacks and finite-size effects are presently actively
put is proportional to the signal quadrature selected by studied [31, 32]. Here, we consider the security proofs
a phase modulator placed at Bob’s local oscillator path. pertaining to collective attacks [22], taking also into ac-
Due to a highly improved design with respect to previ- count finite-size effects. The Gaussian modulation used
ous implementations, the setup presents an excellent sta- in the implemented protocol maximizes the mutual infor-
bility, ensured by several feedback controls. Polarization mation between Alice and Bob, thus offering an optimal
drifts occurring in the quantum channel are compensated theoretical key rate against such attacks. However, it is
using a dynamic polarization controller. The beamsplit- hard to reconcile correlated Gaussian variables, especially
ter placed at the entrance of Bob’s apparatus aims at at low signal-to-noise ratios, which are inherent in exper-
generating from the LO pulse a clock signal that is inde- iments over long distances. Indeed, the secure distance
pendent of the polarization state. Then, the homodyne of previous demonstrations of fiber-based CVQKD [5, 7]
detection statistics and an appropriate algorithm allow was limited to about 25 km because no efficient error-
us to maintain an optimal polarization state at the out- correction procedure was available at low SNR. Here, we
put of the channel. The photodiode on Alice’s signal use the multidimensional reconciliation protocol of [24],
path is used for amplitude modulator feedback to cor- which transforms a Gaussian channel into a virtual bi-
rect alterations of the required voltage settings induced nary modulation channel, with a capacity loss that is
by temperature variations, while the homodyne detection very low at low SNR. This enables the use of error-
output provides the feedback for the phase modulators. correction codes designed for the Binary Input Additive
White Gaussian Noise Channel (BIAWGNC) whose typ-
The security of the implemented protocol is well estab- ical efficiencies for arbitrarily low SNR are of 0.95 ex-
lished against collective attacks, both in the asymptotic tracted bit per theoretically available bit [33]. This leads
[26–28] and in the finite-size regime [22, 23]. Moreover, to a significant extension of the secure distance.
collective attacks are shown to be asymptotically opti-
3
Let us now look at the parameters that are relevant for Asymptotic theoretical key rate
the extraction of the secret key. Due to the Gaussian op- 100000
Finite-size (109 ) theoretical key rate
Finite-size (108 ) theoretical key rate
timality theorem, Alice and Bob’s two-mode state at the Asymptotic experimental points
output of the quantum channel is fully characterized by Finite-size (109 ) experimental points
Finite-size (108 ) experimental points
Alice’s modulation variance VA , the channel transmission
Both VA and ξ are expressed in shot noise units. These Ref [6]
0.01 correction techniques using GPUs can deal with raw key
Excess noise and worst-case estimator (108 )
Worst-case excess noise estimator (106 )
rates of up to 10 Mbits/s, and even better rates are possi-
0.008
Null key rate threshold ble using multiple devices. However, a key rate limitation
Excess noise (shot noise units)
Security conditions: The implemented protocol re- by random Toeplitz matrices aggregated corrected key
quires an exact Gaussian modulation, which is impossi- blocks. This can be done very efficiently with input
ble to achieve [23]. In practice, this is approximated by a blocks of size 109 : a throughput above 40 Mb/s is ob-
truncated discretized modulation with parameters com- tained with one core of a Core i7-920 processor for a rate
patible with a security proof against collective attacks. of 10−3 secret key bit per raw key bit.
This is done with almost optimal randomness consump- Hardware stability: Hardware stability over a long
tion using source coding techniques. period of time is necessary to extract secret keys from
The efficiency and the variance of the electronic noise blocks of size greater than 109 , as is required to take into
of the homodyne detection are assumed to be calibrated account finite-size effects for distances above 50 km [23].
in a secure laboratory. We evaluate confidence intervals A limitation to the long-term hardware stability in [5, 7]
for these values and we compute the eavesdropper’s cor- was the clock reliability on the receiver’s side, because
responding information taking calibrated values uncer- of its dependence on the polarization control. We use a
tainties into account [23]. splitter and a dedicated electronic circuit and obtain a
Multidimensional reconciliation: The error- considerably less noisy and hence more reliable clock.
correction step is divided into two parts. First, Bob di-
vides his data into vectors y of size 8 and for each, draws
a binary vector u of the same size at random; u is the ACKNOWLEDGMENTS
reference for the key after the error correction. Then Bob
computes r = y · u (where the vectors are interpreted as This research was supported by the French Na-
octonions, see [24] for details) and sends it to Alice who tional Research Agency, through the FREQUENCY
obtains v = x−1 · r = x−1 · y · u, that is a noisy version of (ANR-09-BLAN-0410) and HIPERCOM (2011-CHRI-
Bob’s binary modulated vector u, with a noise close to a 006) projects, and by the European Union through the
Gaussian noise. Interestingly, it can be shown that the project Q-CERT (FP7-PEOPLE-2009-IAPP). P.J. ac-
classical data r, available to Eve, does not leak any infor- knowledges support from the ANRT (Agence Nationale
mation about the binary vector u [24]. The second step de la Recherche et de la Technologie). A.L. was sup-
of the error-correction protocol consists in forming vec- ported by the SNF through the National Centre of Com-
tors of size 220 on Alice’s and Bob’s sides (corresponding petence in Research “Quantum Science and Technology”.
to 217 pairs of such vectors u, v) and to use multi-edge
LDPC codes to correct all the errors [33]. The amount of
data revealed during this step is subtracted from the se-
cret information previously computed. We use Graphics
[1] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf,
Processing Unit (GPU) decoding [34] to obtain a decod-
M. Dušek, N. Lütkenhaus, and M. Peev, Rev. Mod. Phys.
ing speed compatible with real-time data-processing. 81, 1301 (2009).
Post-processing performance: The error- [2] M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda,
correction is performed using low-SNR multi-edge W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati,
Low Density Parity Check (LDPC) codes [33]. High J. F. Dynes, et al., New J. Phys. 11, 075001 (2009).
efficiencies are obtained when operating very close to [3] M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus,
the maximum amount of noise a code can correct. K. Wakui, M. Takeoka, A. Tanaka, K. Yoshino,
Y. Nambu, S. Takahashi, et al., Opt. Express 19, 10387
We achieve speeds up to several Mbits/s [34] using an
(2011).
OpenCL implementation of Belief Propagation with [4] C. Weedbrook, S. Pirandola, R. Garcı́a-Patrón, N. J.
flooding schedule on an AMD Tahiti Graphics Proces- Cerf, T. Ralph, J. Shapiro, and S. Lloyd, Rev. Mod.
sor. The huge parallelism provided by GPUs allows Phys. 84, 621 (2012).
to overcome the computational complexity of CVQKD [5] S. Fossier, E. Diamanti, T. Debuisschert, A. Villing,
pointed out in [38]. R. Tualle-Brouri, and P. Grangier, New J. Phys. 11,
Puncturing and shortening of LDPC codes allow to 045023 (2009).
[6] Q. Dinh Xuan, Z. Zhang, and P. Voss, Opt. Express 17,
modify the rate of a code while maintaining a high effi- 24244 (2009).
ciency over a SNR range. We use a technique proposed in [7] P. Jouguet, S. Kunz-Jacques, T. Debuisschert, S. Fossier,
[39] that consists in adapting the code rate with the sum E. Diamanti, R. Alléaume, R. Tualle-Brouri, P. Grangier,
of punctured and shortened bits equal to a constant value A. Leverrier, P. Pache, et al., Opt. Express 20, 14030
determined as the maximum number of punctured bits (2012).
one can use with a given code without any significant [8] H.-J. Briegel, W. Dr, J. I. Cirac, and P. Zoller, Phys.
efficiency loss (approximately 10% of the code length). Rev. Lett. 81, 5932 (1998).
[9] H. Takesue, S.-W. Nam, Q. Zhang, R. H. Hadfield,
This is particularly convenient since the input size of the T. Honjo, K. Tamaki, and Y. Yamamoto, Nature Photon.
error correction is constant; only the output size of the 1, 343 (2007).
corrected key depends on the number of shortened bits. [10] D. Rosenberg, C. G. Peterson, J. W. Harrington, P. R.
Privacy amplification is performed by multiplying Rice, N. Dallmann, K. T. Tyagi, K. P. McCabe, S. Nam,
6
B. Baek, R. H. Hadfield, et al., New J. Phys. 11, 045009 P. Grangier, Phys. Rev. A 77, 042325 (2008).
(2009). [25] F. Grosshans and P. Grangier, Phys. Rev. Lett. 88,
[11] D. Stucki, N. Walenta, F. Vannel, R. T. Thew, N. Gisin, 057902 (2002).
H. Zbinden, S. Gray, C. R. Towery, and S. Ten, New J. [26] R. Garcı́a-Patrón and N. J. Cerf, Phys. Rev. Lett. 97,
Phys. 11, 075003 (2009). 190503 (2006).
[12] A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and [27] M. Navascués, F. Grosshans, and A. Acı́n, Phys. Rev.
A. J. Shields, Appl. Phys. Lett. 96, 161102 (2010). Lett. 97, 190502 (2006).
[13] S. Wang, W. Chen, J.-F. Guo, Z.-Q. Yin, H.-W. Li, [28] S. Pirandola, S. Braunstein, and S. Lloyd, Phys. Rev.
Z. Zhou, G.-C. Guo, and Z.-F. Han, Opt. Lett. 37, 1008 Lett. 101, 200504 (2008).
(2012). [29] R. Renner and J. I. Cirac, Phys. Rev. Lett. 102, 110504
[14] F. Grosshans, G. V. Assche, J. Wenger, R. Brouri, N. J. (2009).
Cerf, and P. Grangier, Nature 421, 238 (2003). [30] M. Christandl, R. König, and R. Renner, Phys. Rev.
[15] S. Lorenz, J. Rigas, M. Heid, U. L. Andersen, N. Lütken- Lett. 102, 020504 (2009).
haus, and G. Leuchs, Phys. Rev. A 74, 042326 (2006). [31] A. Leverrier, R. Garcı́a-Patrón, R. Renner, and N. J.
[16] B. Qi, L.-L. Huang, L. Qian, and H.-K. Lo, Phys. Rev. Cerf, Arxiv preprint arXiv:1208.4920 (2012).
A 76, 052323 (2007). [32] F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz,
[17] J. Lodewyck, M. Bloch, R. Garcı́a-Patrón, S. Fossier, M. Tomamichel, and R. F. Werner, Phys. Rev. Lett. 109,
E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, 100502 (2012).
R. Tualle-Brouri, S. W. McLaughlin, et al., Phys. Rev. [33] P. Jouguet, S. Kunz-Jacques, and A. Leverrier, Phys.
A 76, 042305 (2007). Rev. A 84, 062317 (2011).
[18] T. Symul, D. J. Alton, S. M. Assad, A. M. Lance, [34] P. Jouguet and S. Kunz-Jacques, Arxiv preprint
C. Weedbrook, T. C. Ralph, and P.-K. Lam, Phys. Rev. arXiv:1204.5882 (2012).
A 76, 030303 (2007). [35] R. Blandino, A. Leverrier, M. Barbieri, J. Etesse,
[19] Y. Shen, H. Zou, L. Tian, P. Chen, and J. Yuan, Phys. P. Grangier, and R. Tualle-Brouri, Phys. Rev. A 86,
Rev. A 82, 022317 (2010). 012327 (2012).
[20] B. Qi, W. Zhu, L. Qian, and H.-K. Lo, New J. Phys. 12, [36] J. Fiurasek and N. J. Cerf, Arxiv preprint
103042 (2010). arXiv:1205.6933 (2012).
[21] V. Scarani and R. Renner, Phys. Rev. Lett. 100, 200501 [37] N. Walk, T. Symul, P.-K. Lam, and T. C. Ralph, Arxiv
(2008). preprint arXiv:1206.0936 (2012).
[22] A. Leverrier, F. Grosshans, and P. Grangier, Phys. Rev. [38] Y.-B. Zhao, Y.-Z. Gui, J.-J. Chen, Z.-F. Han, and G.-C.
A 81, 062343 (2010). Guo, IEEE Trans. Inf. Theor. 54, 2803 (2008).
[23] P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Lev- [39] J. Martinez-Mateo, D. Elkouss, and V. Martin, Quantum
errier, Phys. Rev. A 86, 032309 (2012). Information and Computation 12, 791 (2012).
[24] A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and