This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

thanks: [email protected]thanks: [email protected]

Realizing downstream access network using continuous-variable quantum key distribution

Yundi Huang1    Tao Shen1    Xiangyu Wang1    Ziyang Chen2    Bingjie Xu3    Song Yu1    Hong Guo2 1State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China 2State Key Laboratory of Advanced Optical Communication Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China 3Science and Technology on Communication Security Laboratory, Institute of Southwestern Communication, Chengdu 610041, China
Abstract

Quantum key distribution (QKD) which enables the secure distribution of symmetric keys between two legitimate parties is of great importance in future network security. Access network that connects multiple end-users with one network backbone can be combined with QKD to build security for end-users in a scalable and cost-effective way. Though previous QKD access networks are all implemented in the upstream direction, in this paper, we prove that downstream access network can also be constructed by using continuous-variable (CV) QKD. The security of the CV-QKD downstream access network is analyzed in detail, where we show the security analysis is secure against other parties in the network. The security analysis we proved corresponds to the downstream access network where only passive beamsplitter is sufficient to distribute the quantum signals and no other active controls are demanded. Moreover, standard CV-QKD systems can be directly fitted in the downstream access network, which makes it more applicable for practical implementations. Numerous simulation results are provided to demonstrate the performance of the CV-QKD downstream access network, where up to 64 end-users are shown to be feasible to access the network. Our work provides the security analysis framework for realizing QKD in the downstream access network which will boost the diversity for constructing practical QKD networks.

pacs:
03.67.Dd, 03.67.Hk

I Introduction

Quantum key distribution (QKD) which is designed for addressing the vulnerability of the classical data encryption schemes against malicious quantum computers may provide an ultimate solution for future network security [1, 2, 3]. Continuous-variable (CV) QKD as a branch of QKD protocols can be implemented with only the cost-effective and off-the-shelf components [4, 5, 6, 7]. The coherent state and homodyne detection CV-QKD protocol that reveals great simplicity and availability has thus attracted much efforts in its experimental realization [8, 9, 10, 11, 12, 13]. Recently, the long-distance of CV-QKD experimental implementation has achieved a transmission distance of over 202 km in ultralow loss fiber [14], and the practical field test has shown the feasibility of CV-QKD in the metropolitan distance [15]. Theoretical analysis has also proved the upper bounds of the secret key rate of the CV-QKD protocols [16, 17]. The rapid developments in both the theoretical analysis and the experimental implementations have led to more attentions in extending the standard point-to-point QKD to the more practical environment where QKD is performed in networks [18, 19, 20, 21]. In reality, diverse network structures are demanded in order to build a globally quantum internet [22, 23, 24, 25].

Access network that connects multiple subscribers with one network backbone is a modern network necessity. More importantly, it enables that the end-users are able to access to the network in a cost-effective and scalable way. In a typical access network, the end-users are called the optical network units (ONUs), and the network node which located at the network backbone is the optical line terminal (OLT). The intermediate node that connects the ONUs and the OLT are called the optical distribution network (ODN). The ODN can combine signals from the ONUs or distribute signals from the OLT, according to the direction of signal transmissions. For upstream signals that are sent from the ONUs, the passive beamsplitter (BS) and the wavelength-division multiplexing device are usually adopted in the ODN to combine signals in the time-division multiplexing scheme. And for downstream signals, signals are generated from the OLT, and then distributed to every ONU in the network. The passive BS are mostly utilized as the passive optical network (PON) in the ODN.

For the purpose of achieving QKD between the OLT and the ONU, intuitively, both upstream transmission scheme and downstream transmission scheme seems to be possible, since signals are transmitted between the OLT and the ONUs. Early considerations have investigated the possibility of applying QKD into the access network [26, 27], and the first quantum access network is experimentally demonstrated for discrete-variable (DV) QKD [28]. Later on, quantum access networks of DV-QKD with different implementations such as plug-and-play scheme or measurement-device-independent scheme are also proposed [29, 30]. Nevertheless, all of the previous reported demonstrations have implemented an upstream access network structure where the receiver end is placed at the network backbone OLT.

The downstream access network on the other hand may offer extra advantages. For upstream access network, signals are generally applied the time-division multiplexing scheme where signals are demanded to be precisely allocated to the corresponding time slots. The time slot allocation is critical especially when more ONUs are connecting to the network, or when the network traffic is high, in which cases the preserved time slots would inevitably be narrowed down. Crosstalk may also arise under such circumstances which can result in the deterioration of the quantum signals. Such limitations have very less impact on the downstream access network, since no multiplexing technique is demanded for the downstream access network. It also means no active controls are required for the ODN. What is more, the downstream access network in the classical networks normally deploys a higher physical layer line rate than the upstream access network (downstream/ upstream: 2.488 Gbps/ 1.244 Gbps) [31], which suggests that the downstream access network can take much larger signal flows in the network. It is thus of great importance to apply QKD in the downstream access network structure.

For the task of establishing symmetric keys in the downstream direction, the keys should be private with only the OLT and the ONU, such secrecy should be against all other parties in the network. While, in the downstream access network, the quantum signals are broadcasted to all ONUs in the network. Thus, in order to adopt QKD in the downstream access network, it is critical to demonstrate that even with quantum signals distributed to all ONUs, the final key is secure against other parties in the network. In this paper, we prove the security of the downstream access network using CV-QKD. The security analysis of using CV-QKD in the downstream access network is studied in detail, where we show secret key rate against other parties in the network can be extracted. We further simplify the security analysis so that it can be conducted only by the OLT and the corresponding ONU without the complicated channel parameters calibrations and the assistance of any other parties in the network. The corresponding practical implementation can directly utilize standard CV-QKD systems which suggests the great availability of the CV-QKD downstream access network. Numerous simulations are provided to demonstrate the performance of the downstream CV-QKD access network.

Refer to caption

Figure 1: (Color online) Introductory map of the downstream access network. The optical line terminal (OLT) continuously send signals to the optical distribution network (ODN), who passively separates the signals into multiple copies, and forwarded the signals to the optical network units (ONUs). Classically, data packets that to be delivered to each ONU is encrypted with keys between the OLT and the specified ONU. Although all ONUs can receive the copies of the data packets, only those packets that belongs to them can be further decrypted. However, for the purpose of achieving QKD, it is meaningless to encrypt the key signals which is used to further construct keys. Thus, the key signals are broadcasted to each ONU, and the signals are directly accessible for all ONUs in the QKD scenario.

The rest of the paper is organized as follows. In section II, we quickly review the principle of classical downstream access network, then describe the CV-QKD downstream access network. Detailed security analysis is provided in section III, and the performance of the CV-QKD downstream access network are presented in section IV. Conclusions are finally made in section V.

II CV-QKD in downstream access network

In this section, we briefly review the working principle of the downstream access network, discuss the possible implementations, and then describe the CV-QKD downstream access network.

In the classical downstream access network, the OLT continuously sent signals or data packets to the ODN. The BS which is applied at the ODN passively separate the signals, the separated signals are then transmitted to each ONU in the network through the individual fibers. Since the BS works passively at the ODN, no active selection of particular data packets is conducted, which means the data packets that are sent from the OLT are broadcasted to every ONU in the network. After receiving the signals, ONUs themselves apply the frame filter which will help them select the data packets that belongs to them, and discard other signal packets that they do not need. Secrecy is a critical concern under such a transmission scheme, since every ONU in the network receives a copy of the data packets, it is crucial that only the specified ONU is able to know the information of that data packet, while other ONUs in the network should gain no information on the data packets that do not belong to them. In classical networks, the secrecy is achieved by combining the data encryption technique, where the OLT encrypts the data packet before sending them to the network, as is depicted in Fig. 1. The key used in the data encryption should be private with only the OLT and the corresponding ONU so that only the corresponding ONU can decrypt the data packet and obtain the data, this maintains the secrecy since no other ONUs can decrypt the data packet without knowing the key.

Intuitively, using DV-QKD in the downstream access network may not very applicable. The single-photon detectors which are used in the DV-QKD are more expensive for the end-users to stand. Moreover, for the downstream access network where passive BS is mostly applied in the ODN, it is impossible for the ODN to deterministically distribute particular signals to a specified ONU [28]. Such problems on the other hand are less of difficulties for CV-QKD, the homodyne detector are much cheaper and also more robust. The quantum source used in CV-QKD like coherent states and squeezed state can deterministically distributed to the ONU. Thus, it seems that CV-QKD is a strong candidate for realizing downstream access network.

Yet, there are other concerns that need to be addressed in order to implement CV-QKD in the downstream access network. The goal of QKD is to build symmetric secret keys only between the two legitimate parties. In the access network scenario, the key should only be accessible between the OLT and the specific ONU. While for the downstream access network, signals are broadcasted. And for QKD, it means the quantum signals transmitted in the downstream access network have no privacy, since every ONU gets a copy of them. To show CV-QKD is available for the downstream access network, it is important to demonstrate that the final key is private against other ONUs in the network.

Next, we describe the CV-QKD downstream access network. The practical implementation of the CV-QKD downstream access network is constructed by adopting the prepare-and-measure (PM) model. The downstream access network for CV-QKD is essentially the same as it is for classical networks, where only passive BS is placed at the ODN, and no active optical switches or wavelength selective switches are needed. The coherent state and homodyne detection scheme which is the most applied in the experimental demonstrations of CV-QKD is taken as an example. In the PM scheme, Alice generates Gaussian modulated coherent states as she does in the standard CV-QKD protocols, then she sends the modulated states (quantum signals) to the network. The quantum signals are transmitted through a single fiber until they arrived at the ODN, where the BS-PON passively splits the quantum signals into n{n} paths. Then the n{n} paths signals are transmitted to each ONU through individual fibers. ONUs can detect the received signals with the standard CV-QKD receivers. What is being different in the downstream access network is that the standard classical post-processing is conducted with one specific ONU at a time, which means that the final key is only obtained for OLT and one specific ONU.

III Security analysis

In this section, we provide detailed security analysis on the CV-QKD downstream access network which is described in Section II. The security analysis is conducted against the collective attack which is not only the most applied security analysis in practical implementations [10, 11, 15] but also shown to be optimal under the asymptotic regime [32, 33, 34]. The limitations of the standard security analysis in the downstream access network are discussed, then we prove the security analysis which is applicable to the downstream access network.

In the following, we consider a 4-ONU downstream access network scenario for instance. While in practice, more ONUs can be deployed, and the security analysis can also be directly extended. While the practical implementations are constructed based on the PM model, its corresponding security analysis is usually conducted by using the entanglement-based (EB) model. However, the standard EB model of CV-QKD protocol is not available in the downstream access network scenario. The standard CV-QKD is designed to realize the secure distribution between two parties, while the access network will inevitably involve more parties. Also, the ODN which is located in the middle of the channel separates the entire channel into different segments. Thus, the EB model should be modified as in Fig. 2 (a), where mode B1{{B_{1}}} represents the loss introduced at the ODN, and C1{{C_{1}}} to C4{{C_{4}}} are the modes received by each ONUs.

Refer to caption

Figure 2: (Color online) The EB model of the downstream access network where 4 ONUs are considered as an example. The model is based on the coherent state and homodyne detection scheme. Alice which is located in the OLT generates Einstein-Podolsky-Rosen (EPR) states. She then heterodyne measures one of the mode A{A} of the EPR state which projects the other mode B0{B_{0}} into a coherent state. The state is then sent to the ODN, and the modes received by the ONUs are C1{C_{1}} to C4{C_{4}}. (a) Extension from the standard point-to-point EB model to the downstream access network scenario. (b) The further modified EB model which is applicable for the security analysis, where only the OLT and the specified ONU are highlighted.

The security analysis that decides the achievable secret key rate is able to subsequently be conducted based on the EB model. Suppose CV-QKD is performed with the OLT and the ONU with incoming signal mode C1{C_{1}}, originally, the secret key rate is calculated as [35] in the reverse reconciliation (RR) regime [36]:

K=βIAC1χEC1,K=\beta{I_{A{C_{1}}}}-{\chi_{E{C_{1}}}}, (1)

where β{\beta} is the reconciliation efficiency, IAC1{{I_{A{C_{1}}}}} is the mutual information of mode A{A} and mode C1{C_{1}}. χEC1{{\chi_{E{C_{1}}}}} represents the amount of information that Eve can obtain, which can be calculated as:

χEC1=S(E)S(E|C1),{\chi_{E{C_{1}}}}=S(E)-S(E|{C_{1}}), (2)

where S(){S(\cdot)} stands for the Von Neumann entropy, S(E){S(E)} and S(E|C1){S(E|{C_{1}})} are the entropy of Eve, and the entropy of Eve given the measurement results of mode C1{C_{1}} respectively. Standard security analysis considers Eve can purify the entire system, so that the upper bound of information that Eve can obtain can then be estimated [37, 38, 39, 40], more specifically, S(E){S(E)} and S(E|C1){S(E|{C_{1}})} should be calculated as:

S(E)=S(AB1C1C2C3C4),S(E|C1)=S(AB1C2C3C4|C1).\begin{array}[]{l}S(E)=S(A{B_{1}}{C_{1}}{C_{2}}{C_{3}}{C_{4}}),\\ S(E|{C_{1}})=S(A{B_{1}}{C_{2}}{C_{3}}{C_{4}}|{C_{1}}).\end{array} (3)

Thus, all modes in the right hand side of the equations need to be identified in order to decide the information that Eve can obtain, and it implies that the co-variance matrix γAB1C1C2C3C4{{\gamma_{A{B_{1}}{C_{1}}{C_{2}}{C_{3}}{C_{4}}}}} needs to be fulfilled. This is obviously not applicable to practical realizations, because it will take too much effort to calibrate them in pracitcal systems. It should also be noted that the security analysis should be able to be proceed without the collaboration from other ONUs in the network, since in practical the ONUs are more likely to be located in separated locations and unknown with each other.

Moreover, the security of the downstream access network should be analyzed more than the standard point-to-point CV-QKD scenario where the security is only against the eavesdropper Eve. The secrecy of the final key should also against other ONUs in the network. Therefore, the security analysis should also subtract the amount of information that is related to other ONUs:

K=KχC1C2χC1C3χC1C4,K^{\prime}=K-{\chi_{{C_{1}}{C_{2}}}}-{\chi_{{C_{1}}{C_{3}}}}-{\chi_{{C_{1}}{C_{4}}}}, (4)

where χC1C2{{\chi_{{C_{1}}{C_{2}}}}}, χC1C3{{\chi_{{C_{1}}{C_{3}}}}}, and χC1C4{{\chi_{{C_{1}}{C_{4}}}}} are the amount of correlations of other ONUs with respect to mode C1{C_{1}}. These terms should all be calculated to complete the security analysis. However, these terms are difficult to be determined in practical because of the complicated calibrations demanded on other ONUs in the network. Even the EB model in Fig. 2 (a) is modified to fit in the downstream access network scenario, it is still inappropriate for the security analysis.

Given the above considerations, the security analysis should be decided in a more efficient way, also, the calculated secret key rate should be secure against other ONUs in the network. The solution is to consider other ONUs in the downstream access network as being controlled by one stronger Eve. Subsequently, the EB model is further modified as in Fig. 2 (b). In this case, the OLT Alice still holds one mode of the EPR state, though all ONUs in the network receive the quantum signals, only the ONU which is engaged to the current round of QKD is activated, as is highlighted in Fig. 2 (b). All other network nodes are silenced which implies these nodes are considered to be part of the untrusted environment or Eve.

It should be noted that Eve in the security analysis is defined as owing infinite computational power or having no restrictions on her manipulation techniques on the quantum signal [3], which suggests that Eve is herself very strong. In practice, though ONUs correspond to end-users, for the security analysis that are conducted between the OLT and the activated ONU, other ONUs are treated as part of Eve. In this sense, Eve is said to be “stronger”. Such a model can help build up security agasint the vicious network nodes. In the case of some ONUs are indeed malicious, the key information that they can obtain is still restricted by the Holevo bound, which is estimated as the upper bound of information that Eve can obtain in the standard security analysis.

The information that regards the potential malicious parties can obtain, can then be carried out by estimating the upper bound information of an strengthened Eve E{E^{\prime}}. Thus, S(E){S(E)} and S(E|C1){S(E|{C_{1}})} in eq. (3) can be rewritten as S(E){S(E^{\prime})} and S(E|C1){S(E^{\prime}|{C_{1}})}:

S(E)=S(EB1C2C3C4)=S(AC1),S(E|C1)=S(EB1C2C3C4|C1)=S(A|C1),\begin{array}[]{l}S(E^{\prime})=S(E{B_{1}}{C_{2}}{C_{3}}{C_{4}})=S(A{C_{1}}),\\ S(E^{\prime}|{C_{1}})=S(E{B_{1}}{C_{2}}{C_{3}}{C_{4}}|{C_{1}})=S(A|{C_{1}}),\end{array} (5)

since Eve E{E^{\prime}} now is also considered to be able to control other modes B1C2C3{{B_{1}}{C_{2}}{C_{3}}} and C4{{C_{4}}} in the network. It can be viewed as these modes together purify the rest of modes in the system. And, for this model, only the co-variance matrix γAC1{{\gamma_{A{C_{1}}}}} would be sufficient to calculate S(E){S(E^{\prime})} and S(E|C1){S(E^{\prime}|{C_{1}})}.

The ONUs in the network are not the only problem in the security analysis, the ODN which is located between the ONUs and the OLT is also worth of analysis. In order to fully characterize the co-variance matrix γAC1{{\gamma_{A{C_{1}}}}}, the channel parameters, namely the transmittance and the excess noise are needed to be decided. However, since the ODN separates the entire channel into different segments, the calibration for the channel parameters should be carried out for each segment: the transmittance from the OLT to the ODN TOLTODN{{T_{OLT-ODN}}}, the transmittance from the ODN to the activated ONU C1{C_{1}} TODNC1{{T_{ODN-C_{1}}}}, the excess noise from the channel between the OLT to the ODN εOLTODN{{\varepsilon_{OLT-ODN}}} and the excess noise from the channel of the ODN to the activated ONU C1{C_{1}} εODNC1{{\varepsilon_{ODN-{C_{1}}}}}. The ODN itself will inevitably introduce certain losses depending on split ratio of the passive BS ηODN{{\eta_{ODN}}}, and some possible excess noise εODN{{\varepsilon_{ODN}}}. All the above parameters should be calibrated so that the elements of in co-variance matrix can be filled in. And this makes the calibration process very complicated. The solution to that is again to calibrate a total transmittance and a total excess noise since the transmittance is multiplicative and the excess noise is additive. Thus, the total transmittance and the total excess noise can be write as:

Ttot=TOLTODNTODNC1ηODN,εtot=εOLTODN+εODNC1+εODN.\begin{array}[]{l}{T_{tot}}={T_{OLT-ODN}}*{T_{ODN-{C_{1}}}}*{\eta_{ODN}},\hfill\\ {\varepsilon_{tot}}={\varepsilon_{OLT-ODN}}+{\varepsilon_{ODN-{C_{1}}}}+{\varepsilon_{ODN}}.\hfill\\ \end{array} (6)

In the corresponding PM model, the total transmittance and excess noise can be directly calculated from the data between the OLT and the activated ONU during the parameter estimation. It is more efficient if the channel parameters can be decided only depends on the data of the OLT and the activated ONU.

Together the upper bound information that the strengthened Eve E{E^{\prime}} can obtain in the RR regime can then be calculated as:

χEC1=S(E)S(E|C1).{\chi_{E^{\prime}{C_{1}}}}=S(E^{\prime})-S(E^{\prime}|{C_{1}}). (7)

Subsequently, the secret key rate can be determined by inserting χEC1{{\chi_{E^{\prime}{C_{1}}}}} into eq. (1). Since Eve is strengthened by controlling other modes in the system, χEC1{{\chi_{E^{\prime}{C_{1}}}}} is inevitably increased compared to that of χEC1{\chi_{E{C_{1}}}}, which leads to the decrease in the obtained secret key rate compared to the standard CV-QKD. However, the security is now against all the ONUs in the network. The principle behind this is that since the standard security analysis proves the security against Eve, if Eve also includes other ONUs, the modified security analysis is secure against not only Eve, but also other ONUs in the network. It should also be noted that the security analysis only needs to determine mode A{A} and mode C1{C_{1}} in the system, which is exactly the two parties of the OLT and the specified ONU in the QKD, and no further calibrations are demanded. This is as well of importance in the practical implementations since the security analysis of CV-QKD between the OLT and the activated ONU should not involve other ONUs in the network.

IV Performance analysis

In this section, we show the performance of the downstream access network by applying the security analysis that we proved in Section III. The one-time-calibration model [41, 42] is applied in the secret key rate calculation, since it can model the practical imperfections of the homodyne detector and is more applicable in practical implementations, detailed secret key rate calculation is provided in the Appendix.

Refer to caption

Figure 3: (Color online) Achievable secret key rates against the number of ONUs access in the network and transmission distance. The secret key rates are represented by the pseudo-colors. Simulation parameters: variance of the EPR state V=5{V=5}, channel excess noise ε=0.05{\varepsilon^{\prime}=0.05} (SNU), channel loss coefficient α=0.2{\alpha=0.2} dB/km, detection efficiency ηd=0.6{{\eta_{d}}=0.6}, electronic noise ηe=0.99{{\eta_{e}}=0.99}, and reconciliation efficiency β=0.956{\beta=0.956} [44, 45].

The achievable secret key rate which is very relevant to the number of the ONUs in the network is firstly evaluated. The transmission distance is limited at 30 km which is longer than the 20 km ITU defined maximum physical reach [43]. And the number of ONUs in the access network is ranged from 2 to 64 ONUs. The simulation results of achievable secret key rate as a function of the number of ONUs and the transmission distance are shown in Fig. 3. As can be seen from Fig. 3 (a), high secret key rates can only be achieved when the number of ONUs are less than 5, when more ONUs are connecting to the network, the secret key rate drastically drops compared to the cases with less ONUs. This is because the security is achieved not only against Eve, but also other ONUs in the network, so when more ONUs are connected to the network, the secret key rate is inevitably to be reduced. To make the simulation clearer, secret key rate against the transmission distance alone, and against different number of ONUs alone are depicted in Fig. 3 (b) and (c). It can be seen that when more ONUs access to the network, secret key rates drops more rapidly than the increment in the total fiber distance. Still, we observe that a positive secret key rate can be obtained even with 64 ONUs access to the network, and with transmission distance of 30 km.

The performance of the maximum tolerable excess noise after the normalization of shot-noise unit (SNU) is shown in Fig. 4, where the tolerable excess noise against different number of ONUs and the transmission distance are drawn in Fig. 4 (a). Fig. 4 (b) and Fig. 4 (c) are depicted to provide a more distinct observation on how the transmission distance and the different number of ONUs individually affect the tolerable excess noise. It can be seen when the ONUs in the network are less than 5, the tolerable excess noise levels are significantly outperformance than other cases. Both the number of ONUs in the network and the transmission distance tend to deteriorate the maximum tolerable excess noise. And, even with 64 ONUs simultaneous access to the network, the maximum tolerable excess noise is still above zero, which reveals the feasibility for practical CV-QKD to be implemented in the downstream access network.

Refer to caption

Figure 4: (Color online) Tolerable excess noise (SNU) with different number of ONUs in the network and different transmission distance. The pseudo-colors are used to represent the tolerable excess noise (SNU). The simulation parameters are: variance of the EPR state V=5{V=5}, channel loss coefficient α=0.2{\alpha=0.2} dB/km, detection efficiency ηd=0.6{{\eta_{d}}=0.6}, electronic noise ηe=0.99{{\eta_{e}}=0.99}, and reconciliation efficiency β=0.956{\beta=0.956} [44, 45].

In the following, the secret key rates comparison between the point-to-point CV-QKD protocol and the downstream access network protocol are demonstrated in Fig. 5. We show comparisons with different number of ONUs in the network, and with different levels of channel losses. The percentages of the secret key rate of the downstream access network compared to the standard point-to-point protocol are also shown. It can be seen that the individual secret key rates of the downstream access network can never exceed the point-to-point scenario. Also, compare with different total fiber losses, the percentages of secret key rate ratios at low channel losses are not strictly outperformance than those at higher losses, it means that even with higher losses, the percentages of secret key rates compare to the point-to-point protocol are essentially maintained as they are in the low loss cases.

Refer to caption

Figure 5: (Color online) Achievable secret key rates comparisons between the downstream access network scenario and the standard point-to-point protocol. Different number of ONUs are considered in simulations. The brown bars are the secret key rates of the downstream access network, and the blue bars represent the secret key rate of the standard point-to-point scenario. The percentages of the secret key rate of the downstream access network over the secret key rate of standard point-to-point protocol are also shown in the light violet curves. Simulations are conducted for different channel losses: (a) 4 dB, (b) 8 dB, (c) 10 dB and (d) 12 dB. The simulation parameters are: variance of the EPR state V=5{V=5}, channel excess noise ε=0.05{\varepsilon^{\prime}=0.05} (SNU), detection efficiency ηd=0.6{{\eta_{d}}=0.6}, electronic noise ηe=0.99{{\eta_{e}}=0.99}, and reconciliation efficiency β=0.956{\beta=0.956} [44, 45].

For a practical downstream access network, the OLT end can choose the optimal modulation variance for the state modulation, this flexibility may provide an improvement on the secret key rates with ONUs in the network. Subsequently, we show the optimal modulation variance with different number of ONUs and different transmission distance in Fig. 6. It can be seen from the result, only when very limited number of ONUs accesses to the network, the optimal modulation variance drastically varies with transmission distance and the number of ONUs. When more ONUs are connecting to the network, the optimal modulation variance is rather fixed at around 4.2 (SNU), which means that the optimal modulation variance maybe picked that can help improve the secret key rates with different ONUs in the network.

Refer to caption

Figure 6: (Color online) The optimal modulation variance as a function of the number of ONUs in the network, and the transmission distance. The simulation parameters are: channel excess noise ε=0.05{\varepsilon^{\prime}=0.05} (SNU), channel loss coefficient α=0.2{\alpha=0.2} dB/km, detection efficiency ηd=0.6{{\eta_{d}}=0.6}, electronic noise ηe=0.99{{\eta_{e}}=0.99}, and reconciliation efficiency β=0.956{\beta=0.956} [44, 45].

Numerous simulation results are provided in this section. Although the secret key rate and the tolerable excess noise levels are inevitably decreased when more ONUs are connecting to the network, we still show the feasibility that up to 64 ONUs can simultaneously access to the network at the transmission distance of 30 km, which is longer than the maximum physical reach of a practical access network. Comparisons of secret key rates between the downstream access network and the standard point-to-point scenario are also demonstrated with different channel losses. Surprisingly, it occurs to us that the percentages of secret key rates of the downstream access network compare to the point-to-point protocol are essentially maintained regardless of channel loss, it means that the secret key rate performance is quite robust even against higher loss conditions. Lastly, we show the optimal modulation variance with the number of ONUs in the network as well as the transmission distance. The simulation result reveals that the optimal modulation variance may be more easily achieved when more ONUs are connecting to the network.

V Conclusion

In this paper, we prove that quantum key distribution can be implemented in the downstream access network by using continuous-variable quantum key distribution. The realization of the downstream continuous-variable quantum key distribution access network with our proposed security analysis can maximally maintain the implementation from the standard CV-QKD set-up. More specifically, both the optical line terminal Alice and the optical network units Bob can all directly inherit from the standard continuous-variable quantum key distribution implementation without much modifications. The optical distribution network only employs passive beamsplitters, and no other active control modules are needed which also greatly simplifies the control complexity. The security analysis is shown to be secure against other optical network units in the downstream access network even though the quantum signals are broadcasted to every optical network unit. Moreover, the security analysis is able to be conducted in a more effective way, since only data from the optical line terminal and the activated optical network unit would be sufficient to conduct the security analysis without the participation of other parties in the network. Numerous simulation results are demonstrated to evaluate the performance of continuous-variable quantum key distribution in the downstream access network. Although the secret key rate is inevitably decreased with the increasing number of optical network units accessing to the network, the results have provided a strong feasibility of up to 64 users can be simultaneously access to the downstream access network.

For further works, the security analysis that we shown for the downstream access network can be viewed as a framework, any other protocols that are suitable for such a scenario can then be adopted into the framework. Also, in our proposal, classical post-processing is conducted with only one activated optical network unit, meaning only one pair of symmetric secret keys are generated at a time. It is an open question of whether other optical network units in the network can use the correlation obtained from the optical line terminal to finally generate secure keys. Lastly, other possible solutions for dealing with the security in a multiparty network scenario is considering device-independent [46] or one-sided device-independent protocols [47, 48, 49]. These protocols generally imply that less parties are involved in the security analysis, which may become a great relaxation in the access network scenario.

Our work provides a security analysis framework for realizing quantum key distribution in the downstream access network which will help enrich the network structures for building large-scale practical quantum key distribution networks.

Acknowledgements.
This work was supported by the Key Program of National Natural Science Foundation of China under Grant No. 61531003, National Natural Science Foundation of China under Grant No. 62001041, China Postdoctoral Science Foundation under Grant No. 2020TQ0016, Sichuan Science and Technology Program under Grant No. 2020YFG0289 and the Fund of State Key Laboratory of Information Photonics and Optical Communications.

Appendix A Appendix: Secret key rate calculation

The secret key rate is calculated by following the proposed security analysis for the downstream access network in Section III, and the one-time calibration model [41, 42] which is designed for modelling the imperfections of practical homodyne detector. Again, the coherent state and homodyne detection scheme is taken as an example in the calculation.

The security analysis of the downstream access network does not demand the participation of any other parties in the network, other than the OLT and the activated ONU. Thus, only the OLT and the activated ONU are highlighted in the EB model. The EB model in Fig. 2 (b) of the main text is an idealized model, where in practice, the homodyne detector which is deployed at the ONU suffers from imperfections. And such imperfections namely the electronic noise and the limited detection efficiency will affect the performance, thus are considered in the secret key rate calculation..

Refer to caption

Figure 7: (Color online) The complete EB model of the downstream access network with one-time calibration model. The coherent state and homodyne detection scheme is still applied in this model. Alice heterodyne measures one of the mode of the EPR state, and sends the other mode into the channel. When the mode arrives at the ONU, it firstly passes through the BS that imitates the electronic noise, then passes through the BS that represents the detection efficiency before being homodyne detected by the ideal homodyne detector.

The complete EB model is shown in Fig. 7, where both the electronic noise and the limited detection efficiency are imitated by BSs. The incoming signals at the ONU first pass through the BS whose transmissivity is ηe{{\eta_{e}}}, then pass through the second BS with transmissivity of ηd{{\eta_{d}}} before being detected by the ideal homodyne detector. Yet, for this model, only the limited detection efficiency is treated as a trusted loss, while leaving the electronic noise as part of the channel, since such a modelling can help further ease the calibration of the practical operation.

In order to calculate the secret key rate, the corresponding co-variance matrix needs to be determined. For the purpose of further obtaining the secrecy against other parties in the network, all other modes in the EB model are considered not trusted, except for the modes which are inside the OLT and the activated ONU. Furthermore, to reduce the calibration complexity of the channel parameters, the channel parameters of different channel segments as well as the ODN are estimated as a whole, as is described in Section III. Overall, the co-variance matrix of modes A,B2{A,{{B^{\prime}}_{2}}} and C1{C_{1}} need to be determined to perform the security analysis. Suppose the channel transmissivity from the OLT to the ODN and from ODN and ONU of incoming mode C1{C_{1}} are TOLTODN{{T_{OLT-ODN}}} and TODNC1{{T_{ODN-{C_{1}}}}} respectively, and the excess noise in each channel segments are εOLTODN{{\varepsilon_{OLT-ODN}}} and εODNC1{{\varepsilon_{ODN-{C_{1}}}}}. The loss and excess noise introduced during the passive splitting are TODN{{T_{ODN}}} and εODN{{\varepsilon_{ODN}}}. Instead of calibrating each parameter in the practical PM model, now we directly obtain the total channel loss including the electronic noise Ttot=TOLTODNTODNTODNC1ηe{{T_{tot}}={T_{OLT-ODN}}*{T_{ODN}}*{T_{ODN-{C_{1}}}}*{\eta_{e}}} and total excess noise εtot=εOLTODN+εODN+εODN+C1{{\varepsilon_{tot}}={\varepsilon_{OLT-ODN}}+{\varepsilon_{ODN}}+{\varepsilon_{ODN+{C_{1}}}}}. Thus, the co-variance for modes A{A} and B2{{{B^{\prime}}_{2}}} can be written as:

γAB2=(V𝕀Ttot(V21)σzTtot(V21)σz[Ttot(V1+εtot)+1]𝕀),{\gamma_{A{{B^{\prime}}_{2}}}}=\left({\begin{array}[]{*{20}{c}}{V\mathbb{I}}&{\sqrt{{T_{tot}}({V^{2}}-1)}{\sigma_{z}}}\\ {\sqrt{{T_{tot}}({V^{2}}-1)}{\sigma_{z}}}&{[{T_{tot}}(V-1+{\varepsilon_{tot}})+1]\mathbb{I}}\end{array}}\right), (8)

where V{V} is the variance of the generated EPR state, 𝕀{{\mathbb{I}}} is 2*2 identity matrix and σz{{{\sigma_{z}}}} is the Pauli-z matrix. Mode B2{{{B^{\prime}}_{2}}} then passes through the second BS with transmissivity of ηd{{\eta_{d}}}, so that the co-variance matrix should be obtained as γAC1D2{{\gamma_{A{C_{1}}{D_{2}}}}}. Such a transformation can be described as:

γAC1D2=(𝕀Yηd)(γAB2𝕀)(𝕀Yηd)T,{\gamma_{A{C_{1}}{D_{2}}}}=(\mathbb{I}\otimes{Y_{{\eta_{d}}}})*({\gamma_{A{{B^{\prime}}_{2}}}}\otimes\mathbb{I})*{(\mathbb{I}\otimes{Y_{{\eta_{d}}}})^{T}}, (9)

where Yηd{{Y_{{\eta_{d}}}}} represents the transformation of the BS operation: Yηd=(ηd𝕀1ηd𝕀1ηd𝕀ηd𝕀).{{Y_{{\eta_{d}}}}=\left({\begin{array}[]{*{20}{c}}{\sqrt{{\eta_{d}}}\mathbb{I}}&{\sqrt{1-{\eta_{d}}}\mathbb{I}}\\ {-\sqrt{1-{\eta_{d}}}\mathbb{I}}&{\sqrt{{\eta_{d}}}\mathbb{I}}\end{array}}\right).}

The co-variance matrix of γAC1D2{{\gamma_{A{C_{1}}{D_{2}}}}} after the derivation should be rewritten as:

γAC1D2=(V𝕀Ttotηd(V21)σzTtot(1ηd)(V21)σzTtotηd(V21)σz[Ttotηd(V1+εtot)+1]𝕀(1ηd)ηd[Ttot(V1+εtot)]𝕀Ttot(1ηd)(V21)σz(1ηd)ηd[Ttot(V1+εtot)]𝕀[Ttot(1ηd)(V1+εtot)+1]𝕀).{\gamma_{A{C_{1}}{D_{2}}}}=\left({\begin{array}[]{*{20}{c}}{V\mathbb{I}}&{\sqrt{{T_{tot}}{\eta_{d}}({V^{2}}-1)}{\sigma_{z}}}&{-\sqrt{{T_{tot}}(1-{\eta_{d}})({V^{2}}-1)}{\sigma_{z}}}\\ {\sqrt{{T_{tot}}{\eta_{d}}({V^{2}}-1)}{\sigma_{z}}}&{[{T_{tot}}{\eta_{d}}(V-1+{\varepsilon_{tot}})+1]\mathbb{I}}&{-\sqrt{(1-{\eta_{d}}){\eta_{d}}}[{T_{tot}}(V-1+{\varepsilon_{tot}})]\mathbb{I}}\\ {\sqrt{{T_{tot}}(1-{\eta_{d}})({V^{2}}-1)}{\sigma_{z}}}&{-\sqrt{(1-{\eta_{d}}){\eta_{d}}}[{T_{tot}}(V-1+{\varepsilon_{tot}})]\mathbb{I}}&{[{T_{tot}}(1-{\eta_{d}})(V-1+{\varepsilon_{tot}})+1]\mathbb{I}}\end{array}}\right). (10)

After the rearrangement, the final co-variance matrix γAD2C1{{\gamma_{A{D_{2}}{C_{1}}}}} can be figured out. The final secret key rate of the security analysis is calculated as:

K=βIAC1χEC1,K=\beta{I_{A{C_{1}}}}-{\chi_{E^{\prime}{C_{1}}}}, (11)

where β{\beta} is the reconciliation efficiency and IAC{{I_{AC}}} and χEC1{{\chi_{E^{\prime}{C_{1}}}}} are the mutual information between the OLT Alice and the specified ONU, and the information that Eve can obtain during the reverse reconciliation, and each terms can then be determined from the corresponding co-variance matrix γAD2C1{{\gamma_{A{D_{2}}{C_{1}}}}}. The first term of eq. (9) IAC1{{I_{A{C_{1}}}}} is calculated as:

IAC1=12logVA+1VA|C1+1,{I_{A{C_{1}}}}=\frac{1}{2}\log\frac{{{V_{A}}+1}}{{{V_{A|{C_{1}}}}+1}}, (12)

where VA{V_{A}} is the variance of mode A{A}. VA|C1{{{V_{A|{C_{1}}}}}} is the conditional variance of mode A{A} given the measurement result of mode C1{C_{1}}, which can be calculated as: VA|C1=VA<AC1>VC1{{V_{A|{C_{1}}}}={V_{A}}-\frac{{<A{C_{1}}>}}{{{V_{{C_{1}}}}}}}, where <AC1>{{<A{C_{1}}>}} is the co-variance of mode A{A} and mode C1{C_{1}} and VC1{{{V_{{C_{1}}}}}} is the variance of mode C1{C_{1}}, they can all be determined from the co-variance matrix γAD2C1{{\gamma_{A{D_{2}}{C_{1}}}}}. χEC{{\chi_{EC}}} is composed of two parts:

χEC1=S(E)S(E|xC1M).{\chi_{E^{\prime}{C_{1}}}}=S(E^{\prime})-S(E^{\prime}|x_{{C_{1}}}^{M}). (13)

The first part S(E){S(E^{\prime})} equals to S(AD2C1){S(A{D_{2}}{C_{1}})} as is described in Section  III of the main text. S(E|xC1M){S(E^{\prime}|x_{{C_{1}}}^{M})} represents the Von Neumann entropy that after the mode C1{C_{1}} is being homodyne detected. Again, Eve can purify the rest of the mode in the system as S(E|xC1M){S(E^{\prime}|x_{{C_{1}}}^{M})} equals to S(AD2|xC1M){S(A{D_{2}}|x_{{C_{1}}}^{M})}, which can be determined from the co-variance matrix γAD2mC1{\gamma_{A{D_{2}}}^{{m_{{C_{1}}}}}}. The transformation can be described as:

γAD2mC1=γAD2σAD2(XγC1X)MPσAD2T,\gamma_{A{D_{2}}}^{{m_{{C_{1}}}}}={\gamma_{A{D_{2}}}}-{\sigma_{A{D_{2}}}}{(X{\gamma_{{C_{1}}}}X)^{MP}}\sigma_{A{D_{2}}}^{T}, (14)

where X=diag(1, 0, 0, 0){X=diag(1,\;0,\;0,\;0)} and MP{MP} stands for the inverse on the range. γAD2{{\gamma_{A{D_{2}}}}}, σAD2{{{\sigma_{A{D_{2}}}}}} and γC1{{{\gamma_{{C_{1}}}}}} can all be find out in the co-variance matrix γAD2C1=(γAD2σAD2σAD2TγC1){{\gamma_{A{D_{2}}{C_{1}}}}=\left({\begin{array}[]{*{20}{c}}{{\gamma_{A{D_{2}}}}}&{{\sigma_{A{D_{2}}}}}\\ {\sigma_{A{D_{2}}}^{T}}&{{\gamma_{{C_{1}}}}}\end{array}}\right)}. By inserting these terms back to eq. (13), the secret key rate can be calculated.

References

  • [1] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Quantum cryptography, Rev. Mod. Phys. 74, 145 (2002).
  • [2] S. Pirandola, et al., Advances in quantum cryptography, Adv. in Opt. and Photon. 12, 1012 (2020).
  • [3] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dusek, N. Lütkenhaus, and M. Peev, The security of practical quantum key distribution, Rev. Mod. Phys. 81, 1301 (2009).
  • [4] F. Grosshans, and P. Grangier, Continuous variable quantum cryptography using coherent states, Phys. Rev. Lett. 88, 057902 (2002).
  • [5] C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, Gaussian quantum information, Rev. Mod. Phys. 84, 621 (2012).
  • [6] E. Diamanti, and A. Leverrier, Distributing secret keys with quantum continuous variables: principle, security and implementations, Entropy 17, 6072 (2015).
  • [7] F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, Secure quantum key distribution with realistic devices, Rev. Mod. Phys. 92, 025002 (2020).
  • [8] J. Lodewyck, et al., Quantum key distribution over 25km25\phantom{\rule{3.00003pt}{0.0pt}}\mathrm{km} with an all-fiber, Phys. Rev. A 76, 042305 (2007).
  • [9] B. Qi, L.-L. Huang, L. Qian, and H.-K. Lo, Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers, Phys. Rev. A 76, 052323 (2007).
  • [10] P. Jouguet, S. Kunz-Jacques, A. Leverrier, F. Grangier, and E. Diamanti, Experimental demonstration of long-distance continuous-variable quantum key distribution, Nat. Photon. 7, 378 (2013).
  • [11] D. Huang, P. Huang, D. Lin, and G. Zeng, Long-distance continuous-variable quantum key distribution by controlling excess noise, Sci. Rep. 6, 1 (2016).
  • [12] N. Wang, S. Du, W. Liu, X. Wang, Y. Li, and K. Peng, Long-distance continuous-variable quantum key distribution with entangled states, Phys. Rev. Appl. 10, 064028 (2018).
  • [13] H. Guo, Z. Li, S. Yu, and Y. Zhang, Toward practical quantum key distribution using telecom components, Fund. Res. 1, 96 (2021).
  • [14] Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, and H. Guo, Long-distance continuous-variable quantum key distribution over 202.81 km of fiber, Phys. Rev. Lett. 125, 010502 (2020).
  • [15] Y. Zhang, et al., Continuous-variable QKD over 50 km commercial fiber, Quantum Sci. Technol. 4, 035006 (2019).
  • [16] S. Pirandola, R. Laurenza, C. Ottaviani, L. Banchi, Fundamental limits of repeaterless quantum communications, Nat. Commun. 8, 15043 (2017)
  • [17] S. Pirandola, et al. Theory of channel simulation and bounds for private communication, Quantum Sci. Technol. 3, 035009 (2018)
  • [18] L. Salvail, M. Peev, E. Diamanti, R. Alléaume, N. Lütkenhaus, and T. Länger, Security of trusted repeater quantum key distribution networks, J. Comp. Sec. 18, 61 (2010).
  • [19] M. Peev, et al., The SECOQC quantum key distribution network in Vienna, New J. Phys. 11, 075001 (2009).
  • [20] D. Huang, P. Huang, H. Li, T. Wang, Y. Zhou, and G. Zeng, Field demonstration of a continuous-variable quantum key distribution network, Opt. Lett. 41, 3511 (2016).
  • [21] Y.-A. Chen et al., An integrated space-to-ground quantum communication network over 4,600 kilometres, Nature 41, 214 (2021).
  • [22] S. Lloyd, J. H. Shapiro, F. N. C. Wong, P. Kumar, S. M. Shahriar, and H. P. Yuen, Infrastructure for the quantum Internet, ACM SIGCOMM Comput. Commun. Rev. 34, 9 (2004).
  • [23] H. J. Kimble, The quantum internet, Nature 453, 1023 (2008).
  • [24] S. Pirandola, and S. L. Braunstein, Physics: Unite to build a quantum Internet, Nature 532, 169 (2016).
  • [25] S. Wehner, D. Elkouss, and R. Hanson, Quantum internet: A vision for the road ahead, Science 362 (2018).
  • [26] M. Razavi, Multiple-access quantum key distribution networks, IEEE Trans. Commun. 60, 3071 (2012).
  • [27] S. Aleksic, D. Winkler, G. Franzl, A. Poppe, B. Schrenk, and F. Hipp, Quantum key distribution over optical access networks, In Proc. IEEE 18th Eur. Conf. Netw. Opt. Commun. 11 (2013).
  • [28] B. Fröhlich, J. F. Dynes, M. Lucamarini, A. W. Sharpe, Z. Yuan, and A. J. Shields, A quantum access network, Nature 501, 69 (2013).
  • [29] B. K. Park, M. K. Woo, Y.-S. Kim, Y.-W. Cho, S. Moon, and S.-W. Han, User-independent optical path length compensation scheme with sub-nanosecond timing resolution for a 1*N quantum key distribution network system, Photon. Res. 8, 296 (2020).
  • [30] Wei, K. et al., High-speed measurement-device-independent quantum key distribution with integrated silicon photonics, Phys. Rev. X 10, 031030 (2020).
  • [31] ITU-T 2019 G.984.2: Gigabit-capable passive optical networks (gpon): Physical Media Dependent (PMD) layer specification
  • [32] A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, Security of continuous-variable quantum key distribution against general attacks, Phys. Rev. Lett. 110, 030502 (2013).
  • [33] A. Leverrier, Composable security proof for continuous-variable quantum key distribution with coherent states, Phys. Rev. Lett. 114, 070501 (2015).
  • [34] A. Leverrier, Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction, Phys. Rev. Lett. 118, 200501 (2017).
  • [35] I. Devetak, and A. Winter, Distillation of secret key and entanglement from quantum states, Proc. R. Soc. London A: Math., Phys. Eng. Sci. 461, 2053 (2005).
  • [36] F. Grosshans, G. V. Assche, J.Wenger, R. Brouri, N. J. Cerf, and P. Grangier, Quantum key distribution using Gaussian modulated coherent states, Nature 421, 238 (2003).
  • [37] R. García-Patrón, and N. J. Cerf, Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution, Phys. Rev. Lett. 97, 190503 (2006).
  • [38] M. Navascués, F. Grosshans, A. Acín, Optimality of Gaussian attacks in continuous-variable quantum cryptography, Phys. Rev. Lett. 97, 190502 (2006).
  • [39] A. Leverrier, and P. Grangier, Simple proof that gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a gaussian modulation, Phys. Rev. A 81, 062314 (2010).
  • [40] M. M. Wolf, G. Giedke, and I. Cirac, Extremality of Gaussian quantum states, Phys. Rev. Lett. 96, 080502 (2006).
  • [41] Y. Zhang, Y. Huang, Z. Chen, Z. Li, S. Yu, and H. Guo, One-time shot-noise unit calibration method for continuous-variable quantum key distribution, Phys. Rev. Appl. 13, 024058 (2020).
  • [42] Y. Huang, Y. Zhang, B. Xu, L, Huang, and S. Yu, A modified practical homodyne detector model for continuous-variable quantum key distribution: detailed security analysis and improvement by the phase-sensitive amplifier, J. Phys. B: At. Mol. Opt. Phys. 54, 015503 (2020).
  • [43] ITU. G.984.1: Gigabit-capable passive optical networks (gpon): General characteristics. ITU-T (2008).
  • [44] C. Zhou, X. Wang, Y. Zhang, Z. Zhang, S. Yu, and H. Guo, Continuous-variable quantum key distribution with rateless reconciliation protocol, Phys. Rev. Appl. 12, 054013 (2019).
  • [45] X. Wang, Y. Zhang, Z. Zhang, S. Yu, and H. Guo, High speed error correction for continuous-variable quantum key distribution with multi-edge type LDPC code, Sci. Rep. 8, 10543 (2018).
  • [46] U. Vazirani, and T. Vidick, Fully device-independent quantum key distribution, Phys. Rev. Lett. 113, 140501 (2014).
  • [47] M. Pawłowski, and N. Brunner, Semi-device-independent security of one-way quantum key distribution, Phys. Rev. A 84, 010302 (2011).
  • [48] T. Gehring, V. Händchen, J. Duhme, F. Furrer, T. Franz, C. Pacher, R. F. Werner, and R. Schnabel, Implementation of continuous-variable quantum key distribution with composable and one-sided-deviceindependent security against coherent attacks, Nat. Commun. 6, 8795 (2015).
  • [49] N. Walk, et al., Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution, Optica 3, 634 (2016).