Shaped Constellation Continuous Variable Quantum Key Distribution: Concepts, Methods and Experimental Validation

Résumé

Quantum key distribution (QKD) enables the establishment of secret keys between users connected via a channel vulnerable to eavesdropping, with information-theoretic security, that is, independently of the power of a malevolent party (Scarani et al., 2009). QKD systems based on the encoding of the key information on continuous variables (CV), such as the values of the quadrature components of coherent states (Weedbrook et al., 2012), (Diamanti and Leverrier, 2015), present the major advantage that they only require standard telecommunication technology. However, the most general security proofs for CV-QKD required until now the use of Gaussian modulation by the transmitter, complicating practical implementations (Jouguet et al., 2013), (Zhang et al., 2020), (Jain et al., 2022). Here, we experimentally implement a protocol that allows for arbitrary, Gaussian-like, discrete modulations, whose security is based on a theoretical proof that applies generally to such situations (Denys et al., 2021). These modulation formats are compatible with the use of powerful tools of coherent optical telecommunication, allowing our system to reach an estimated performance of tens of megabit per second secret key rates over 25 km.

Type
Publication
Shaped Constellation Continuous Variable Quantum Key Distribution: Concepts, Methods and Experimental Validation

Quantum key distribution (QKD) enables the establishment of secret keys between users connected via a channel vulnerable to eavesdropping, with information-theoretic security, that is, independently of the power of a malevolent party (Scarani et al., 2009). QKD systems based on the encoding of the key information on continuous variables (CV), such as the values of the quadrature components of coherent states (Weedbrook et al., 2012), (Diamanti and Leverrier, 2015), present the major advantage that they only require standard telecommunication technology. However, the most general security proofs for CV-QKD required until now the use of Gaussian modulation by the transmitter, complicating practical implementations (Jouguet et al., 2013), (Zhang et al., 2020), (Jain et al., 2022). Here, we experimentally implement a protocol that allows for arbitrary, Gaussian-like, discrete modulations, whose security is based on a theoretical proof that applies generally to such situations (Denys et al., 2021). These modulation formats are compatible with the use of powerful tools of coherent optical telecommunication, allowing our system to reach an estimated performance of tens of megabit per second secret key rates over 25 km.