Refined finite-size analysis of binary-modulation continuous-variable quantum key distribution

Takaya Matsuura,Shinichiro Yamano,Yui Kuramochi,Toshihiko Sasaki,Masato Koashi
DOI: https://doi.org/10.22331/q-2023-08-29-1095
2023-08-25
Abstract:Recent studies showed the finite-size security of binary-modulation CV-QKD protocols against general attacks. However, they gave poor key-rate scaling against transmission distance. Here, we extend the security proof based on complementarity, which is used in the discrete-variable QKD, to the previously developed binary-modulation CV-QKD protocols with the reverse reconciliation under the finite-size regime and obtain large improvements in the key rates. Notably, the key rate in the asymptotic limit scales linearly against the attenuation rate, which is known to be optimal scaling but is not achieved in previous finite-size analyses. This refined security approach may offer full-fledged security proofs for other discrete-modulation CV-QKD protocols.
Quantum Physics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the security proof of the Continuous - Variable Quantum Key Distribution (CV - QKD) protocol in the finite - size scenario, especially the security analysis for the binary - modulation protocol. Although previous studies have demonstrated the finite - size security of the binary - modulation CV - QKD protocol under general attacks, the key rate given by these studies decays very slowly as the transmission distance increases, which limits its practicality. Specifically, the goal of the paper is to improve the key rate of the binary - modulation CV - QKD protocol under finite - size conditions by extending the security proof method based on complementarity. The authors pay particular attention to the security of the protocol under reverse reconciliation conditions and hope to achieve the following: 1. **Improve the key rate**: In the asymptotic limit, the key rate can be linearly proportional to the channel attenuation rate, which is the best - known scaling performance but has not been achieved in previous finite - size analyses. 2. **Provide a more general security proof framework**: The proposed method is not only applicable to the binary - modulation CV - QKD protocol but may also provide a complete security proof for other discrete - modulation CV - QKD protocols. 3. **Solve the limitations of existing methods**: The existing security proof method based on entanglement distillation is too strict, resulting in a low key rate. The authors hope to overcome this problem by introducing a new method based on complementarity. Through the above improvements, the paper aims to provide a more reliable and efficient theoretical basis for the practical application of CV - QKD.