This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Secret key distillation over realistic satellite-to-satellite free-space channel:
exclusion zone analysis

Ziwen Pan and Ivan B. Djordjevic
Abstract

Quantum cryptography studies the unconditional information security against an all-powerful eavesdropper in secret key distillation. However the assumption of an omnipotent eavesdropper is too strict for some realistic implementations. In this paper we study the realistic application model of secret key distillation over satellite-to-satellite free space channel in which we impose a reasonable restriction on the eavesdropper by setting an exclusion zone around the legitimate receiver as a defense strategy. We first study the case where the eavesdropper’s aperture size is unlimited so her power is only restricted by the exclusion zone. Then we limit Eve’s aperture to a finite size and study the straightforward case when her aperture is in the same plane of Bob, investigating how an exclusion zone can help improve security. Correspondingly, we determine the secret key rate lower bounds as well as upper bounds. Further more, we also apply our results on specific discrete variable (DV) and continuous variable (CV) protocols for comparison. We show that by putting reasonable restrictions on the eavesdropper through the realistic assumptions of an inaccessible exclusion zone, we can increase the key rate in comparison to those without and do so with relatively lower transmission frequency. We conclude that this model is suitable for extended analysis in many light gathering scenarios and for different carrier wavelengths.

I Introduction

Theoretically, quantum cryptography promises unconditional informational security. In 1984, Charles Bennett and Gilles Brassard developed a quantum key distribution (QKD) scheme, BB84 [1], with its security guaranteed by the no-cloning theorem and one-time pad encryption. This was the the first discrete variable QKD (DV-QKD) protocol, which uses single photons in transmission. This has put forward rigorous conditions for realistic implementations.

Nowadays as the need for security in communication has vastly grown, realistic implementations of QKD in applicable scenarios have been more and more important. Thus, thanks to its advantages in experimental implementation, continuous variable QKD (CV-QKD) has become an attractive field, e.g., protocols based on coherent laser light and heterodyne detection [2, 3]. However, most research around the security of QKD has assumed that the eavesdropper (Eve) has access to any operation that is allowed by physics law, which is not going to be very common in the near future. We have shown the security analysis of realistic secret key distillation with achievable rate calculation in [4, 5]. Certain restrictions to Eve’s collecting ability were considered such as an exclusion zone around the legitimate receiver or a limited aperture size of Eve’s receiver in a wireless channel.

In recent years, the capacity and security of communication between satellites have become relevant with the fast development of satellite-based free-space communications. Since the work on satellite-to-ground quantum key distribution (QKD) in 2017 [6], interests have been rising surrounding free-space secret key distillation for satellites. In this paper we look into the typical scenario where eavesdropper’s (Eve’s) collecting ability is limited by an exclusion zone around the legitimate receiver. In Sec. II we introduce and analyze the so-called ”exclusion zone” scenario where Eve cannot eavesdrop without alerting the communicating parties in certain region near Bob. We start with presenting the input power dependency with respect to different reconciliation efficiencies and then optimize the input power to show secure key rate lower bounds and upper bounds as functions of both transmission distance and center frequency. We also incorporate these results with specific continuous-variable and discrete-variable protocols for comparison. Then in Sec. III we look into the scenario where Eve’s collecting ability is limited by the size of her aperture and study how an exclusion zone can increase security as a defense strategy by presenting lower bounds and upper bounds with respect to different radius of the exclusion zone. We show that an exclusion zone can increase the secure key rate lower bounds and act as a valuable defense strategy, especially when the eavesdropper’s aperture size is limited. We demonstrate that for certain well-chosen parameters we can achieve significantly higher SKR lower bounds compared to traditional unrestricted Eve scenario.

II Exclusion zone scenario

In this section we will evaluate the exclusion zone scenario as is illustrated in Fig. 1, which is called here the ”exclusion zone” meaning that Eve cannot collect photons in this zone without being noticed by Alice and Bob. In satellite based secure communication, setting an ”exclusion zone” is one of the most straightforward methods to improve security as this effectively decreases Eve’s collecting ability. Here we assume that Eve can collect all photons outside of the exclusion zone.

Refer to caption
Figure 1: Geometric setup of exclusion zone scenario. AaA_{a} is the transmitting aperture (Alice) area and AbA_{b} is the receiving aperture (Bob) area. LL is the transmission distance between Alice and Bob. The exclusion zone area is denoted as AexA_{ex} which is a circular area centered at Bob’s aperture.

As illustrated in Fig. 1, we assume the area of transmitter aperture is AaA_{a} (Alice) and the area of receiver aperture is AbA_{b} (Bob) with the area of so-called ”exclusion zone” (dashed line) denoted as AexA_{ex}. Once more, we define the ”exclusion zone” as the area/space in which Eve is not able to collect photons that end in this zone without alerting both communication parties. According to some similar analysis in [7, 8], if the frequency used ω\omega is restriced to 0ωω0=2πcL/AaAb0\leq\omega\ll\omega_{0}=2\pi cL/\sqrt{A_{a}A_{b}}, then the Alice-to-Bob transmissivity η\eta at frequency ω\omega is denoted as η(ω)=(ω/ω0)21\eta(\omega)=(\omega/\omega_{0})^{2}\ll 1.

Applying this to our analysis, we will have:

ω0\displaystyle\omega_{0} =2πcL/AaAb\displaystyle=2\pi cL/\sqrt{A_{a}A_{b}} (1)
η(ω)\displaystyle\eta(\omega) =(ω/ω0)2\displaystyle=(\omega/\omega_{0})^{2} (2)
ω0Ex\displaystyle\omega_{0Ex} =2πcL/AaAex\displaystyle=2\pi cL/\sqrt{A_{a}A_{ex}} (3)
ηAEx\displaystyle\eta_{AEx} =(ω/ω0Ex)2\displaystyle=(\omega/\omega_{0Ex})^{2} (4)
ηAE\displaystyle\eta_{AE} =1ηAEx=(1η(ω))κ(ω)\displaystyle=1-\eta_{AEx}=\left(1-\eta(\omega)\right)\kappa(\omega) (5)

Here κ\kappa is the restriction factor [4] on Eve denoting how much power she can collect from the part that isn’t collected by Bob. Thus the transmissivity of Alice to Eve (ηAE\eta_{AE}) can be denoted as (1η(ω))κ(ω)\left(1-\eta(\omega)\right)\kappa(\omega) in Eq. (5). Eq. (3) gives us ω0Ex\omega_{0Ex} which substitutes AbA_{b} with AexA_{ex} in Eq. (1). This gives us Alice-to-exclusion zone transmissivity (ηAEx\eta_{AEx}) assuming there is a virtual receiver covering the entire exclusion zone. Then assuming Eve has an infinite sized aperture, Alice-to-Eve transmissivity (ηAE\eta_{AE}) can be calculated by Eq.(5).

Also for noise frequency dependence we have the black body radiation equation:

ne=1ehfkT1,n_{e}=\frac{1}{e^{\frac{hf}{kT}}-1}, (6)

where nen_{e} is the mean photon number per mode for the thermal noise, h=6.6261034h=6.626*10^{-34}m2kg/s is the Planck constant, k=1.380648521023k=1.38064852*10^{-23}m2kg/(Ks2) is the Boltzmann constant, T=3T=3K is the space temperature and ff is the center frequency in Hz that we use in transmission.

Recall from [4] the lower bound for direct (KK_{\rightarrow}) and reverse (KK_{\leftarrow}) reconciliation respectively in a quantum thermal noise wiretap channel:

K\displaystyle K_{\rightarrow} βg(ne(1η)+ημ)ig(νiER12)\displaystyle\geq\beta g\left(n_{e}(1-\eta)+\eta\mu\right)-\sum_{i}g\left(\frac{\nu^{ER}_{i}-1}{2}\right)
βg(ne(1η))+g(ne(1ηκ)).\displaystyle-\beta g\left(n_{e}(1-\eta)\right)+g\left(n_{e}(1-\eta\kappa)\right). (7)
K\displaystyle K_{\leftarrow} βg(μ)ig(νiER12)\displaystyle\geq\beta g(\mu)-\sum_{i}g\left(\frac{\nu^{ER}_{i}-1}{2}\right)
βg(μημ(1+μ)1+neneη+ημ)+ig(νyiER12).\displaystyle-\beta g\left(\mu-\frac{\eta\mu(1+\mu)}{1+n_{e}-n_{e}\eta+\eta\mu}\right)+\sum_{i}g\left(\frac{\nu^{ER}_{y_{i}}-1}{2}\right). (8)
g(x)\displaystyle g(x) =(x+1)log2(x+1)xlog2(x).\displaystyle=(x+1)\log_{2}(x+1)-x\log_{2}(x). (9)

where μ\mu is the mean photon number per input mode from Alice to Bob, β(0,1]\beta\in(0,1] is the reconciliation efficiency. In Fig. 2 we plot direct (dashed curves) and reverse (solid curves) SKR lower bounds as functions of input power μ\mu with different radius rexr_{ex} of AexA_{ex}. Here we set transmission wavelength at 1550nm. We use blue curves to denote the case with no exclusion zone (rex=rbr_{ex}=r_{b}) whereas red curves denotes the case with an exclusion zone (rex>rbr_{ex}>r_{b}). The transmission distance is set as 100km and the reconciliation efficiency is set as β=1\beta=1.

Refer to caption
Figure 2: SKR lower bound vs. input power. The transmission distance is 100km. Radius of exclusion zone (rexr_{ex}) is used as a parameter. Reconciliation efficiency β\beta is set to 1. Wavelength λ\lambda is set to 1550nm.

Here in Fig. 2 we can see that although SKR lower bounds for both reconciliation schemes saturate as input power is sufficiently large when no exclusion zone is set (rex=rbr_{ex}=r_{b}), we can exceed this saturation threshold by setting an exclusion zone (such as the red curves here with rex=rb+5cmr_{ex}=r_{b}+5~{}\text{cm}) as this effectively diminishes Eve’s collecting ability so that higher input power would benefit Bob more than Eve. Also it’s worth noticing in Fig. 2 that an exclusion zone actually benefits direct reconciliation scheme more than reverse reconciliation. This is because setting an exclusion zone only diminishes Eve’s collecting ability (κ\kappa) with no impact on Bob’s receiving ability (η\eta) and from [4] we know that direct reconciliation exceeds reverse reconciliation when κ\kappa is small with fixed η\eta.

In Fig. 2 we can also see that here SKR lower bounds are non-decreasing with increasing input power, meaning that when reconciliation efficiency is perfect (β=1\beta=1), the optimal input power is infinity. Below in Fig. 3 we show that optimal input power is finite when reconciliation efficiency is imperfect (β=0.95\beta=0.95). By setting an exclusion zone (rex=rb+5cmr_{ex}=r_{b}+5\text{cm} in Fig. 3) we are able to achieve higher SKR exceeding this optimal input power.

Refer to caption
Figure 3: SKR lower bound vs. input power. The transmission distance is 100km. Radius of exclusion zone (rexr_{ex}) is used as a parameter. Reconciliation efficiency β\beta is set to 0.95. Wavelength λ\lambda is set to 1550nm.
Refer to caption
Figure 4: SKR lower bound vs. transmission distance. Radius of exclusion zone (rexr_{ex}) is used as a parameter. Wavelength λ\lambda is set to 1550nm. Reconciliation efficiency is perfect (β=1\beta=1) and the input power is set to infinity.

In Fig. 2 we can see that the optimal input power is infinity when β=1\beta=1. Here in Fig. 4 we plot the perfect reconciliation lower bounds as functions of transmission distance assuming equal aperture sizes for Alice and Bob with input power optimized (set to infinity). We also include upper bounds from [4] with dotted curves. We can see from Fig. 4 that increasing the exclusion zone area can increase both direct and reverse reconciliation lower bounds, especially when the transmission distance LL is not too large. In Fig. 5 we plot the upper bounds and lower bounds for both reconciliation schemes as functions of exclusion zone radius. It is clear that the SKR increment isn’t linear to the increment of exclusion zone radius: when exclusion zone is larger, increasing the exclusion zone can help increase the SKR more. Also it’s worth noticing that although direct reconciliation lower bound is lower than reverse reconciliation when no exclusion zone is set, it increases faster as the exclusion zone increases and eventually meets the upper bound.

Refer to caption
Figure 5: SKR lower bound vs. exclusion zone radius. Wavelength λ\lambda is set to 1550nm. Reconciliation efficiency is perfect (β=1\beta=1) and the input power is set to infinity.
Refer to caption
Figure 6: SKR lower bound vs. center frequency. Radius of exclusion zone and transmission distance is used as a parameter. Reconciliation efficiency is perfect (β=1\beta=1) and the input power is set to infinity.

In Fig. 6 we plot the SKR lower bound versus the transmission center frequency, wherein the transmission distance LL and exclusion zone radius rexr_{ex} are both used as parameters. Here solid curves and dash-dotted curves are with different transmission distances. It’s worth noticing that the lower bounds in Fig. 6 are attained by reverse reconciliation as direct reconciliation lower bound is zero under these parameters.

As we can see in Fig. 6, the SKR lower bounds increase with increasing frequency. Although choosing a higher frequency can always result in higher SKR, this can pose potential challenges to the system design as we need higher frequency for longer transmission distance. This downside can be mitigated by enlarging the exclusion zone as it effectively decreases Eve’s receiving ability, relaxing the need for higher frequency as is illustrated in Fig. 6 with red curves.

Next we analyze specific QKD protocols, Gaussian-modulated CVQKD protocol (with coherent states, heterodyne detection and reverse reconciliation) and Decoy State BB84 (DS-BB84) protocol and compare their performances under the exclusion zone scenario. We assume that Alice uses a weak coherent-state source and transmits signal-state pulses with on average μ\mu photons per pulse at RR states/s. For CVQKD SKR we use the CCQ (classical-classical-quantum) rate (solid curve) as in Eq. (69) from [4] and for DS-BB84 (dotted curves) we use Eq. (95) from [4] with reconciliation efficiency fLf_{L}. Here we also include lower bounds obtained with Eqs. (8) as CQQ (classical-quantum-quantum) rate (dashed curves) as it doesn’t assume a specific detection scheme for Bob.

Refer to caption
Figure 7: SKR lower bound vs. input power with perfect information reconciliation. The transmission distance is 100km. Radius of exclusion zone (rexr_{ex}) is used as a parameter. Wavelength λ\lambda is set to 1550nm. R=R=1Gbit/s.

In Fig. 7 we plotted CQQ and CCQ rates for CVQKD and achievable rate for DS-BB84 versus input power. We can see that since we assume heterodyne detection for Bob instead of unspecified detection scheme the CCQ rate is upper bounded by CQQ rate. Both rates are largely increased under the exclusion zone (rex=0.25mr_{ex}=0.25m) scenario.

Also here in Fig. 7 we can see that DS-BB84 is upper bounded by CCQ rate. Although it has an optimal input power when there is no exclusion zone, setting one can increase its rate exceeding this optimal input power, achieving higher rates. In Fig. 8 we include the same comparison case with imperfect information reconciliation (β=0.9,fL=1.2\beta=0.9,f_{L}=1.2). We can see that imperfect information reconciliation renders finite optimal input power for both CCQ rate and DS-BB84 rate with similar comparison results while an exclusion zone (rexr_{ex}) still largely increases both CCQ rate and CQQ rate exceeding this finite optimal input power.

Refer to caption
Figure 8: SKR lower bound vs. input power with imperfect information reconciliation. The transmission distance is 100km. Radius of exclusion zone (rexr_{ex}) is used as a parameter. Wavelength λ\lambda is set to 1550nm. R=R=1Gbit/s.

Below we plot the comparison for these three rates with optimized input power. Fig. 9 captured the comparison against transmission distance for different exclusion zone sizes with corresponding optimal input power provided in Fig. 10. We can see that the optimal input power decreases with increasing transmission distance.

Refer to caption
Figure 9: SKR lower bounds vs. input power with imperfect information reconciliation. The transmission distance is 100km. Radius of exclusion zone (rexr_{ex}) is used as a parameter. Wavelength λ\lambda is set to 1550nm.
Refer to caption
Figure 10: Corresponding optimal input power for CCQ rate and DS-BB84 with or without exclusion zone in Fig. 9.

III Limited aperture size combined with exclusion zone.

In this section we combine the exclusion zone scenario with the limited-sized aperture scenario where Eve’s aperture size is limited [9] and investigate how it can improve security as a defense strategy. First we introduce the problem setup as is illustrated in Fig. 11. Similar to Fig. 1, here AaA_{a}, AbA_{b}, AexA_{ex} respectively denote the area of transmitter aperture (Alice), receiver aperture (Bob) and the exclusion zone. Additionally we have a limited-sized eavesdropper aperture in the same plane of Bob, denoted as AeA_{e}. In this case, Eve’s optimal position is shown in Fig. 11 to be tangential to the exclusion zone.

Refer to caption
Figure 11: Geometric setup of limited-size aperture scenario. AaA_{a} is the transmitting aperture (Alice) area and AbA_{b} is the receiving aperture (Bob) area. LL is the transmission distance between Alice and Bob. AeA_{e} is the eavesdropper (Eve) aperture area which is placed in the same plane as Bob’s aperture. The exclusion zone area is denoted as AexA_{ex} which is a circular area centered at Bob’s aperture.

We assume Gaussian beam (transverse coordinates xx, yy) with beam waist radius W0=raW_{0}=r_{a} transmitted with propagation distance LL and intensity at the center of the beam waist I0I_{0}:

U(ρ,L)2\displaystyle\|U(\rho,L)\|^{2} =I0(W0W(L))2exp(2ρ2W2(L)),\displaystyle=I_{0}\left(\frac{W_{0}}{W(L)}\right)^{2}\exp\left({-\frac{2\rho^{2}}{W^{2}(L)}}\right), (10)
z0\displaystyle z_{0} =W02πλ,\displaystyle=W_{0}^{2}\frac{\pi}{\lambda}, (11)
W(L)\displaystyle W(L) =W01+(L/z0)2,\displaystyle=W_{0}\sqrt{1+(L/z_{0})^{2}}, (12)
ρ2\displaystyle\rho^{2} =x2+y2.\displaystyle=x^{2}+y^{2}. (13)

The total power in this Gaussian beam is:

Ptotal=I0πW022,P_{total}=I_{0}\frac{\pi W_{0}^{2}}{2}, (14)

Without loss of generality we can assume Eve’s aperture right above the exclusion zone as in Fig. 11 and derive Bob’s received power (PBobP_{Bob}) and Eve’s received power (PEveP_{Eve}) below.

PBob\displaystyle P_{Bob} =I0rbrbπ3/2W03e2π2W02y2Aerf(2πW0rb2y2A)2A𝑑y\displaystyle=I_{0}\int_{-r_{b}}^{r_{b}}\frac{\pi^{3/2}W_{0}^{3}e^{-\frac{2\pi^{2}W_{0}^{2}y^{2}}{A}}\text{erf}\left(\frac{\sqrt{2}\pi W_{0}\sqrt{r_{b}^{2}-y^{2}}}{\sqrt{A}}\right)}{\sqrt{2}\sqrt{A}}\,dy (15)
PEve\displaystyle P_{Eve} =\displaystyle=
I0rereπ3/2W03e2π2W02x2AE(2πW0CA,2πW0BA)22A𝑑x\displaystyle I_{0}\int_{-r_{e}}^{r_{e}}\frac{-\pi^{3/2}W_{0}^{3}e^{-\frac{2\pi^{2}W_{0}^{2}x^{2}}{A}}E\left(\frac{\sqrt{2}\pi W_{0}C}{\sqrt{A}},\frac{\sqrt{2}\pi W_{0}B}{\sqrt{A}}\right)}{2\sqrt{2}\sqrt{A}}\,dx (16)

with

A\displaystyle A =π2W04+λ2L2\displaystyle=\pi^{2}W_{0}^{4}+\lambda^{2}L^{2} (17)
B\displaystyle B =re2x2\displaystyle=\sqrt{r_{e}^{2}-x^{2}} (18)
C\displaystyle C =rex+re\displaystyle=r_{ex}+r_{e} (19)
E(x,y)\displaystyle E(x,y) =erf(xy)erf(x+y)\displaystyle=\text{erf}\left(x-y\right)-\text{erf}\left(x+y\right) (20)

With Eqs. (14) - (16), Alice-to-Bob transmissivity (η\eta) and Eve’s fraction of collected power (κ\kappa) can be expressed as below:

η\displaystyle\eta =PBobPtotal,\displaystyle=\frac{P_{Bob}}{P_{total}}, (21)
κ\displaystyle\kappa =PEve(1η)Ptotal,\displaystyle=\frac{P_{Eve}}{(1-\eta)P_{total}}, (22)

Also for noise frequency dependence we use the black body radiation equation Eq. (6).

With the above expressions, first we plot the input power dependency for different transmission distances. Below in Fig. 12 we plot the direct and reverse reconciliation achievable rate lower bounds as functions of input power for different exclusion zone radii. Here the radii of Alice’s, Bob’s and Eve’s aperture are all set to 5cm. The transmission is over 10km with reconciliation efficiency β=1\beta=1. Similar to Fig. 2 we can see that the optimal input power here is infinity. Not surprisingly, by setting an exclusion zone (rex=0.5r_{ex}=0.5m) we can increase the achievable rates for both reconciliation schemes. We can also see that direct reconciliation rate is higher than reverse reconciliation when transmission distance is small (η\eta is large). Since most power is focused at the center of the transmitted Gaussian beam, which is mostly received by Bob at line of sight, the corresponding κ\kappa is small. This explains why direct reconciliation scheme achieves higher rate than reverse reconciliation scheme.

Refer to caption
Figure 12: SKR lower bounds vs. input power. The transmission distance LL is 10km. Radius of exclusion zone (rexr_{ex}) is specified in the legend. Reconciliation efficiency β\beta is set to 1. Transmission center wavelength λ\lambda is set to 1550nm. Transmitted Gaussian beam waist radius is set to W0=5W_{0}=5cm. Bob, Alice and Eve aperture radius are set to rb=ra=rEve=5r_{b}=r_{a}=r_{Eve}=5cm.
Refer to caption
Figure 13: SKR lower bounds vs. input power. The transmission distance LL is 30km. Radius of exclusion zone (rexr_{ex}) is specified in the legend. Reconciliation efficiency β\beta is set to 1. Transmission center wavelength λ\lambda is set to 1550nm. Transmitted Gaussian beam waist radius is set to W0=5W_{0}=5cm. Bob, Alice and Eve aperture radius are set to rb=ra=rEve=5r_{b}=r_{a}=r_{Eve}=5cm.
Refer to caption
Figure 14: SKR lower bounds vs. input power. The transmission distance LL is 30km. Radius of exclusion zone (rexr_{ex}) is specified in the legend. Reconciliation efficiency β\beta is set to 1. Transmission center wavelength λ\lambda is set to 1550nm. Transmitted Gaussian beam waist radius is set to W0=5W_{0}=5cm. Bob, Alice and Eve aperture radius are set to rb=ra=rEve=5r_{b}=r_{a}=r_{Eve}=5cm.

However, when we increase the transmission distance, as is presented in Fig. 13 here with only the transmission distance increased to 30km, we can see that with no exclusion zone set (rex=5r_{ex}=5cm), direct reconciliation is more sensitive to the consequential channel loss increment and performs worse than the reverse reconciliation lower bound. Yet if an exclusion zone is set (rex=0.5r_{ex}=0.5m), compared to the reverse reconciliation, the direct reconciliation benefits more from this strategy specifically designed to decrease κ\kappa and we can see that in this case the direct reconciliation lower bound increases to be higher than the reverse reconciliation.

This is even more evident if we set the reconciliation efficiency to be imperfect, which is mostly the case in realistic implementation. In Fig. 14 we set reconciliation efficiency β\beta to 0.85. As a result when no exclusion zone is set (rex=0.5r_{ex}=0.5m), the optimal input power is shown to decrease from infinity to some finite values. Aside from that, we can see that an imperfect reconciliation process decreases the direct reconciliation rate much more than it does to the reverse reconciliation. However, when an exclusion zone is set (rex=0.5r_{ex}=0.5m), still the direct reconciliation rate is higher than the reverse reconciliation rate, exceeding the SKR results corresponding to the original optimal input power.

Refer to caption
Figure 15: SKR lower bounds vs. distance. Unrestricted Eve’s case [4] is also included for comparison.

Next we look into the perfect reconciliation case with optimized input power. In Fig. 15 we plotted the direct and reverse reconciliation lower bounds as functions of transmission distance for different exclusion zone radii. Here the unrestricted Eve’s case is also included for comparison. We can see that lower bounds exceeding the unrestricted Eve’s case can be achieved. Here the direct reconciliation lower bounds exceed the reverse reconciliation lower bounds when the transmission distance is not too large. When the transmission distance increases, the direct reconciliation lower bounds start to decrease in a similar manner to the unrestricted Eve’s case while the reverse reconciliation lower bounds converge to a constant rate as we saw in our previous work [9]. We can see that an exclusion zone mostly helps increase the achievable rate when the transmission distance is not too large. For example, when the exclusion zone radius is large (rex=0.5r_{ex}=0.5m) the achievable rate even goes to infinity when transmission distance is over 10km, exceeding the constant rate convergence at short transmission distance. We can also see that with a larger exclusion zone, the achievable rate at a larger transmission distance can be increased. Yet this doesn’t change the constant rate convergence as transmission distance goes to infinity since an exclusion zone, when its radius is comparable to the communicating parities’ aperture radii, doesn’t change the ratio of Eve’s collecting ability versus Bob’s collecting ability too much at large transmission distance.

Refer to caption
Figure 16: SKR lower bounds and upper bounds vs. distance.

In Fig. 16 we plot the lower bounds as the maximum of direct and reverse lower bounds versus the upper bounds as functions of the transmission distance. Here we still use the same parameters as in Fig. 15. We can see that when transmission distance is not too large, the upper bounds closely match the lower bounds, giving the capacity in this region.

Refer to caption
Figure 17: SKR lower bounds and upper bounds vs. frequency.

In Fig. 17 we plot the lower bounds versus upper bounds as functions of the transmission center frequency. We can see that an exclusion zone can help increase the achievable rate especially when the transmission frequency is high. When the exclusion zone radius increases, similarly to Fig. 6, this helps to achieve a higher achievable rate with low transmission center frequency. It’s worth noticing that when rex=0.5r_{ex}=0.5m, the achievable rate even goes to infinity instead of converging to a constant rate when the exclusion zone is large.

IV Summary

In this paper, we have analyzed SKR lower bounds and upper bounds for the realistic scenario in free-space satellite-to-satellite secure communication where an exclusion zone is set around the legitimate receiver and studied the performance with respect to relevant channel parameters. By enlarging the exclusion zone area we can relax the need for high frequency in long distance transmission and achieve a higher secure key rate. When Eve’s aperture size is limited, an exclusion zone can serve as a good defense strategy to increase the secure key rate.

Acknowledgement

This paper was supported in part by L3Harris, MURI ONR, NSF, and GD. The authors thankfully acknowledge helpful discussions with Saikat Guha, Kaushik Seshadreesan and John Gariano from the University of Arizona, Jeffrey Shapiro from Massachusetts Institute of Technology and William Clark, Mark R. Adcock from General Dynamics.

References

  • [1] C. H. Bennet and G. Brassard, “Proceedings of the ieee international conference on computers, systems and signal processing, bangalore, india, 1984,” 1984.
  • [2] F. Laudenbach, C. Pacher, C.-H. F. Fung, A. Poppe, M. Peev, B. Schrenk, M. Hentschel, P. Walther, and H. Hübel, “Continuous-variable quantum key distribution with gaussian modulation—the theory of practical implementations,” Advanced Quantum Technologies, vol. 1, no. 1, p. 1800011, 2018.
  • [3] E. Diamanti and A. Leverrier, “Distributing secret keys with quantum continuous variables: Principle, security and implementations,” Entropy, vol. 17, no. 9, pp. 6072–6092, 2015. [Online]. Available: http://www.mdpi.com/1099-4300/17/9/6072
  • [4] Z. Pan, K. P. Seshadreesan, W. Clark, M. R. Adcock, I. B. Djordjevic, J. H. Shapiro, and S. Guha, “Secret key distillation across a quantum wiretap channel under restricted eavesdropping,” arXiv preprint arXiv:1903.03136, 2019.
  • [5] Z. Pan, K. P. Seshadreesan, W. Clark, M. R. Adcock, I. B. Djordjevic, J. H. Shapiro, and S. Guha, “Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping,” in 2019 IEEE International Symposium on Information Theory (ISIT), July 2019, pp. 3032–3036.
  • [6] S.-K. Liao, W.-Q. Cai, W.-Y. Liu, L. Zhang, Y. Li, J.-G. Ren, J. Yin, Q. Shen, Y. Cao, and Z.-P. Li, “Satellite-to-ground quantum key distribution,” Nature, vol. 549, no. 7670, p. 43, 2017.
  • [7] J. Shapiro, S. Guha, and B. Erkmen, “Ultimate channel capacity of free-space optical communications,” Journal of Optical Networking, vol. 4, no. 8, pp. 501–516, 2005.
  • [8] V. Giovannetti, S. Guha, S. Lloyd, L. Maccone, J. H. Shapiro, B. J. Yen, and H. P. Yuen, “Classical capacity of free-space optical communication.” Quantum Information & Computation, vol. 4, no. 6, pp. 489–499, 2004.
  • [9] Z. Pan and I. B. Djordjevic, “Security of satellite-based cv-qkd under realistic assumptions,” in 2020 22nd International Conference on Transparent Optical Networks (ICTON).   IEEE, 2020, forthcoming.