Welcome to visit Communications in Theoretical Physics,
Quantum Physics and Quantum Information

Photon subtraction-based continuous-variable measurement-device-independent quantum key distribution with discrete modulation over a fiber-to-water channel

  • Chao Yu 1 ,
  • Yin Li 2 ,
  • Jianzhi Ding 1 ,
  • Yun Mao , 2, ,
  • Ying Guo , 2, 3,
Expand
  • 1School of Computer Science and Engineering, Central South University, Changsha 410083, China
  • 2School of Automation, Central South University, Changsha 410075, China
  • 3School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China

Authors to whom any correspondence should be addressed.

Received date: 2021-10-27

  Revised date: 2022-01-22

  Accepted date: 2022-02-09

  Online published: 2022-03-22

Copyright

© 2022 Institute of Theoretical Physics CAS, Chinese Physical Society and IOP Publishing

Abstract

We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel. Different from optical fibers, the underwater channel has more severe optical attenuation because of optical absorption and scattering, which reduces the maximum communication distance. To enhance the performance of the protocol, the photon subtraction operation is implemented at the modulator side. We carry out a performance simulation in two different kinds of seawater channel, and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.

Cite this article

Chao Yu , Yin Li , Jianzhi Ding , Yun Mao , Ying Guo . Photon subtraction-based continuous-variable measurement-device-independent quantum key distribution with discrete modulation over a fiber-to-water channel[J]. Communications in Theoretical Physics, 2022 , 74(3) : 035104 . DOI: 10.1088/1572-9494/ac5320

1. Introduction

Quantum key distribution (QKD) [1, 2] is one of the most important applications and rapidly developing technologies of quantum encryption. Whilst it is distinct from classic communication, the safety of QKD is built on the physical properties of photons and it can achieve unconditional security [35]. Generally, there are two types of QKD, discrete-variable QKD (DVQKD) and continuous-variable QKD (CVQKD) [6, 7]. Thanks to its simplicity in experiments and higher performance over short distances, CVQKD has become a research hotspot in recent years. In the Gaussian-modulated CVQKD (GM-CVQKD), the information follows Gaussian distribution so that it is more susceptible to noise than binary data, which limits the maximum communication distance [8, 9]. To solve this problem, discrete-modulated CVQKD (DM-CVQKD) was proposed [10]. In the DM-CVQKD, secret key data is binary, and it is modulated on two orthogonal components of the optical field [11], which shows better robustness to noise and better performance at long distances compared with GM-CVQKD.
In the one-way CVQKD scheme, there is an assumption that the hardware of QKD such as the detector is ideal, and most studies rely on this assumption. However, such a perfect device is difficult to achieve in reality, and this has led to numerous attacks on vulnerabilities caused by device imperfections, which include LO fluctuation attacks, wavelength attacks, detector saturation attack [1214], etc. To solve the security loopholes caused by the imperfection of the measurement device, the continuous variable measurement-device-independent (MDI) quantum key distribution (CV-MDI-QKD) has been proposed [1518]. In the CV-MDI-QKD protocol, there are three parties involved in the key distribution including the legitimate communication parties Alice, Bob and an additional untrusted third party, Charlie. Unlike traditional one-way QKD with only one sender, there are two signal senders, Alice and Bob in CV-MDI-QKD. In this protocol, Alice and Bob both send signals to Charlie, and Charlie performs Bell-State Measurement on the quantum signals that passed through the quantum channels [19]. Bob manipulates his quantum state according to the measurement result of Charlie, and then Alice and Bob receive a string of correlated data.
However, what is unfortunate is that the CV-MDI-QKD protocol has a shorter secure transmission distance compared with the traditional one-way CVQKD protocol [20]. Photon subtraction (PS) is one of the non Gaussian operations that have been proven to enhance the entanglement degree of quantum state and thereby improve the security distance [2023]. This operation can be implemented with prior art and it has been applied in the experiment [24]. In order to extend the maximum communication distance, we apply the PS operation after signal modulation at Alice’s side.
In the existing research, optical fiber is the primary channel of a CVQKD scheme. Nevertheless, underwater CVQKD has been widely concerned in recent years for its extensive application prospect, especially in the military field [25]. However, due to the attenuation and absorption of light, the maximum safe distance of quantum signal transmission in seawater is much shorter than that in optical fiber. Fortunately, underwater CVQKD still has important application scenarios. We consider that in some cases, a CV-MDI-QKD scheme may work in different channels. Optical fibers have much less impact on quantum signals than atmospheres. However, for one-way CVQKD, it is difficult to inject the quantum signal in the optical fiber directly into water, so we chose to use the MDI scheme to make Charlie a mediator to connect fiber and water channels. In this paper, we analyze the different channel medium of Alice and Bob to Charlie in a CV-MDI-QKD scheme. We also assessed the factors of seawater that affect the maximum distance and applied the PS operation to enhance the performance of the underwater CVQKD scheme.
This paper is structured as follows: In section 2, we discuss the CV-MDI-QKD scheme with PS. In section 3, we analyze the influence factors of seawater channel. In section 4, we show the performance of the proposed scheme with simulation. Finally, we draw the conclusion in section 5.

2. DM CV-MDI-QKD with photon subtraction

In this section, we first introduce the discrete modulation CV-MID-QKD protocol, including the prepare-and-measurement (PM) scheme and the entanglement-based (EB) scheme which is equivalent to the PM version in security. Afterwards we interpret the PS operation and its application in the discrete modulation CV-MDI-QKD.

2.1. Discrete modulation CV-MDI-QKD

The PM scheme of the discrete modulation CV-MDI-QKD is illustrated in figure 1. In the PM scheme, Alice and Bob prepare two coherent states A and B independently and send them to an untrusted third party named Charlie. Then Charlie measures the two states and the results are C and D. Afterwards, Charlie makes public the results and Bob manipulates his coherent state according to the published results to make it associated with Alice. Finally, Alice and Bob perform the post-processing steps to get the security key. The EB of our scheme is shown in figure 2. Here, we suppose that the channel between Alice and Charlie is called CAC, and is called CBC between Bob and Charlie. The length of channel CAC and CBC is represented by LAC and LBC respectively, and the transmittance of CAC and CBC is TA and TB respectively. To simplify the proof of security, we concentrate on the EB scheme and describe its process in detail.
i

(i)Alice and Bob prepare the two-mode squeezed state $| {\psi }_{4}^{a}{\rangle }_{{A}_{1}{A}_{2}}$ and $| {\psi }_{4}^{b}{\rangle }_{{B}_{1}{B}_{2}}$ in four-state modulation (or $| {\psi }_{8}^{a}{\rangle }_{{A}_{1}{A}_{2}}$ and $| {\psi }_{8}^{b}{\rangle }_{{B}_{1}{B}_{2}}$ in eight-state modulation) respectively.

ii

(ii)The mode A2 passes through the PS module, and then we obtain the mode ${A}_{2}^{{\prime} }$. Alice and Bob send modes ${A}_{2}^{{\prime} }$ and B2 to the untrusted third party Charlie through two quantum channels respectively.

iii

(iii)The modes ${A}_{2}^{{\prime} }$ and B2 interfere with the beamsplitter (BS), and the modes output from the BS are C and D. Charlie then measures the x quadrature of mode C and the p quadrature of D, which are marked as {XC, PD} by homodyne detection.

iv

(iv)Charlie announces the measurement result {XC, PD} through the classic channel.

v

(v)Bob modifies the mode B1 on the basis of {XC, PD} by a displacement operation D(β), specifically,

$\begin{eqnarray}{\rho }_{{B}_{1}^{\prime} }=D(\beta ){\rho }_{{B}_{1}}{D}^{\dagger }(\beta ),\end{eqnarray}$
where ${\rho }_{{B}_{1}}$ represents the density matrix of mode B1 and β = g(XC + iPD) where g is the gain of the displacement operation [26]. After the displacement operation, mode A1 and ${B}_{1}^{\prime} $ are entangled, and the secret key data of Alice and Bob are interrelated.

vi

(vi)Alice and Bob perform the post-processing steps to share the secret key, which include data reconciliation, parameter estimation and privacy amplification.

Figure 1. The PM scheme of discrete modulation CV-MDI-QKD. DM is the discrete modulation; Hom is the homodyne detection; BS is beamsplitter.
Figure 2. The EB scheme of PS-based discrete modulation CV-MDI-QKD. PNRD is the photon number resolving detector; D(β) is the displacement operation; Het is the heterodyne detection; Hom is the homodyne detection.
After the above steps, Alice and Bob complete a key distribution process. However, due to the characteristics of the MDI protocol, the security transmission distance of key distribution is generally shorter than that of a one-way CVQKD protocol [27, 28]. So in the following section, we use PS to increase the security transmission distance.

2.2. PS-based discrete modulation CV-MDI-QKD

As shown in figure 2, the PS operation is modeled by a beamsplitter (BS) with transmittance μ and a photon number resolving detector(PNRD). The mode A2 of the two mode squeezed state prepared by Alice intersects with vacuum state C0 at the BS, and then they are split into two modes ${A}_{2}^{{\prime} }$ and C1, where C1 contains m subtracted photons. The PNRD could be applied to measure mode C1 by using the positive operator-valued measurement(POVM) $\{\hat{{{\rm{\Pi }}}_{0}},\hat{{{\rm{\Pi }}}_{1}}\}$ [29]. The subtracted photon number m depends on $\hat{{{\rm{\Pi }}}_{1}}=| m\rangle \langle m| $. Only when the POVM element $\hat{{{\rm{\Pi }}}_{1}}$ clicks the PS operation succeeds, which means that Alice could keep state A1 [30]. The PS operation can be expressed as
$\begin{eqnarray}{\rho }_{{A}_{1}{C}_{1}{A}_{2}^{{\prime} }}={U}_{\mathrm{BS}}[| \psi {\rangle }_{{A}_{1}{A}_{2}}\langle \psi {| }_{{A}_{1}{A}_{2}}\otimes | 0\rangle \langle 0| ]{U}_{\mathrm{BS}}^{\dagger }.\end{eqnarray}$
After the PS, we obtain the triparite state ${\rho }_{{A}_{1}{A}_{2}^{{\prime} }}^{\hat{{{\rm{\Pi }}}_{1}}}$ that can be written as
$\begin{eqnarray}{\rho }_{{A}_{1}{A}_{2}^{{\prime} }}^{{\hat{{\rm{\Pi }}}}_{1}}=\displaystyle \frac{{\mathrm{tr}}_{{C}_{1}}({\hat{{\rm{\Pi }}}}_{1}{\rho }_{{A}_{1}{C}_{1}{A}_{2}^{{\prime} }})}{{P}_{(m)}^{{\hat{{\rm{\Pi }}}}_{1}}},\end{eqnarray}$
where the ${\mathrm{tr}}_{X}(Y)$ is the partial trace of multi-mode state and ${P}_{(m)}^{{\hat{{\rm{\Pi }}}}_{1}}$ is the success rate of subtracting m photons which can be calculated by
$\begin{eqnarray}\begin{array}{rcl}{P}_{(m)}^{{\hat{{\rm{\Pi }}}}_{1}} & = & {\mathrm{tr}}_{{A}_{1}{C}_{1}{A}_{2}^{{\prime} }}({\hat{{\rm{\Pi }}}}_{1}{\rho }_{{A}_{1}{C}_{1}{A}_{2}^{{\prime} }})\\ & = & (1-{\xi }^{2})\sum _{n=m}^{\infty }{C}_{n}^{m}{\xi }^{2n}{\left(1-\mu \right)}^{m}{\mu }^{n-m}\\ & = & (1-{\xi }^{2}){\left(\displaystyle \frac{1-\mu }{\mu }\right)}^{m}\sum _{n=m}^{\infty }{C}_{n}^{m}{\left({\xi }^{2}\mu \right)}^{n}\\ & = & (1-{\xi }^{2}){\xi }^{2m}\displaystyle \frac{{\left(1-\mu \right)}^{m}}{{\left(1-{\xi }^{2}\mu \right)}^{m+1}},\end{array}\end{eqnarray}$
where Cmn is the combination number (nm) and $\xi =\tfrac{{V}_{A}-1}{{V}_{A}+1}$. The covariance matrix of photon-subtracted state ${\rho }_{{A}_{1}{A}_{2}^{{\prime} }}^{\mathrm{ps}}$ can be expressed as
$\begin{eqnarray}{{\rm{\Gamma }}}_{{A}_{1}{A}_{2}^{{\prime} }}^{\mathrm{ps}}=\left(\begin{array}{cc}X{\mathbb{I}} & {Z}_{d}{\sigma }_{z}\\ {Z}_{d}{\sigma }_{z} & Y{\mathbb{I}}\end{array}\right),\end{eqnarray}$
where
$\begin{eqnarray}X=\displaystyle \frac{\mu {\zeta }^{2}+2m+1}{1-\mu {\zeta }^{2}},\end{eqnarray}$
$\begin{eqnarray}Y=\displaystyle \frac{\mu {\zeta }^{2}(2m+1)+1}{1-\mu {\zeta }^{2}},\end{eqnarray}$
$\begin{eqnarray}{Z}_{d}=\displaystyle \frac{\sqrt{\mu }\zeta (m+1)}{1-\mu {\zeta }^{2}},\end{eqnarray}$
and the detailed calculation is shown in [31]. The asymptotical secret key rate of PS-based scheme against collective attacks is expressed as
$\begin{eqnarray}{K}_{\mathrm{asym}}={P}_{(m)}^{{\hat{{\rm{\Pi }}}}_{1}}[\kappa I(A:B)-S(E:B)],\end{eqnarray}$
where κ is the reconciliation efficiency; I(A: B) is the Shannon mutual information between Alice and Bob and S(E: B) is the Holevo bound between Eve and Bob. We assume the excess noise of CAC and CBC is ϵA and ϵB and the normalized parameter $T=\tfrac{{T}_{A}{g}^{2}}{2}$ [32]. The total channel-added noise can be expressed as ${\chi }_{\mathrm{line}}=\tfrac{1-T}{T}+{\varepsilon }^{\mathrm{th}}$. The variable ϵth is the equivalent excess noise of equivalent one-way protocol, which is given by
$\begin{eqnarray}\begin{array}{rcl}{\varepsilon }^{\mathrm{th}} & = & 1+{\chi }_{A}+\displaystyle \frac{{T}_{A}}{{T}_{B}}\left({\chi }_{B}-1\right)\\ & & +\ \displaystyle \frac{{T}_{B}}{{T}_{A}}{\left(\sqrt{\tfrac{2}{{T}_{B}{g}^{2}}}\sqrt{{V}_{M}-1}-\sqrt{{V}_{M}+1}\right)}^{2},\end{array}\end{eqnarray}$
where χA = 1/TA − 1 + ϵA and χB = 1/TB − 1 + ϵB. To minimize the excess noise ϵth, we set the value of g to
$\begin{eqnarray}g=\sqrt{\tfrac{2({V}_{M}-1)}{{T}_{B}({V}_{M}+1)}},\end{eqnarray}$
and then ϵth can be expressed as
$\begin{eqnarray}{\varepsilon }^{\mathrm{th}}=\displaystyle \frac{{T}_{B}}{{T}_{A}}\left({\varepsilon }_{B}-2\right)+{\varepsilon }_{A}+\displaystyle \frac{2}{{T}_{A}}.\end{eqnarray}$
Details for the calculation of the secret key rate can be found in appendix A. After the PS operation, mode ${A}_{2}^{{\prime} }$ instead of A2 will be sent to Charlie through the quantum channel, and the follow-up progress is the same as the original discrete modulation CV-MDI-QKD.

3. Underwater channel

In the most studies on QKD, researchers analyze the CV-QKD system in the fiber quantum channel. To explore the performance of our protocol, we first need to analyze the underwater channel.
Now we examine the influence of the seawater channel on the transmitted signal pulses. Due to the presence of water molecules, dissolved and suspended impurities (such as dissolved organic matter and chlorophyll molecules) in seawater [33], the transmission of light in the seawater channels is very difficult, resulting in the transmission distance being several orders of magnitude lower than the former. At the same time, the characteristics of seawater channels are also influenced by temperature and salinity. In figure 3, we show the light intensity distribution after transmitting in seawater [3436], where the transmission distance is 2 meters and the power of the source is 10 mW. We have determined that after passing through the seawater channel, the light intensity is weakened and relatively serious scattering occurs. Since the transmission distance is short, we suppose that the channel is in the identical composition of seawater and hence it becomes a linear channel [25, 3739]. Therefore, the transmittance of seawater channel can be expressed as
$\begin{eqnarray}{T}_{\mathrm{sea}}={{\rm{e}}}^{-c(\lambda ){\mathbb{D}}},\end{eqnarray}$
where ${\mathbb{D}}$ is the depth, λ is the wavelength of light and c is the total attenuation coefficient. There are two main factors that affect the light transmission in seawater: absorption and scattering. Absorption refers to the energy loss of light caused by the interaction between photons and particles in seawater, which leads to the reduction of light intensity. Scattering means the change of movement direction of photons when they interact with other particles. Consequently, the total attenuation coefficient can be written as [38]:
$\begin{eqnarray}c(\lambda )=a(\lambda )+b(\lambda ),\end{eqnarray}$
where a(λ) denotes the absorption coefficient and b(λ) denotes the scattering coefficient. The influence of temperature, salinity and chlorophyll concentration on the attenuation coefficient is shown in appendix A.
Figure 3. The light intensity distribution after transmitting in (a) pure sea water and (b) clean ocean water. The transmission distance is 2 meters and the power of source is 10 mW.
However, in practical terms, the model becomes more complex and even difficult to estimate, considering the effect of solutes, suspended solids, background light and others on the attenuation coefficient. Fortunately, some researchers have come up with valid parameters through underwater experiments, and we can use these data directly, which also makes our results more practical. Because the attenuation of light at different wavelengths is various, we choose the least attenuated blue-green light (520 nm) for communication purposes. The attenuation coefficient and corresponding sea water types are shown in table 1 [40].
Table 1. Attenuation coefficient of seawater at 520 nm wavelength.
Water Types a(m−1) b(m−1) c(m−1)
Pure sea water 0.0405 0.0025 0.043
Clean ocean water 0.114 0.037 0.151

4. Performance analysis

In this section, we discuss the performance of the proposed scheme in the asymptotic cases. Generally, four-state and eight-state modulation protocols are most often used in discrete modulation CVQKD. To simplify the analysis, for the PS operation we only consider its implementation in the four-state modulation scheme in the following.
The modulation variance VM has a significant impact on performance. In figure 4, we show the relation between VM and the secret key rate. The solid lines represent the eight-state protocol and the dash lines represent the four-state protocol. The black, red and blue lines represent LAC = 0 m, LAC = 10 m and LAC = 20 m in figure 4(a) and LAC = 0 m, LAC = 5 m and LAC = 10 m in figure 4(b) respectively. In order to make the security analysis method in Gauss-modulated CVQKD still applicable, the variance needs to be set in a small range (Vm ≤ 0.5) [10]. At the same time, to facilitate the comparison with the original discrete modulation CV-MDI-QKD scheme, we set the constant variance with it in the following simulation.
Figure 4. The secret key rate as a function of modulation variance VM in (a) pure sea water and (b) clean ocean water. The solid lines represent the eight-state protocol and the dash lines represent the four-state protocol. The parameters are as follows: ϵA = ϵB = 0.001 and LBC = 0 m.
The asymptotic secret key rate as a function of LAC in different seawater channel is illustrated in figure 5. Compared with the original discrete modulation CV-MDI-QKD scheme, the one-photon subtracted (1-PS) scheme has higher secret key rate in the long distance when LBC = 0 m, 10 m and 20 m, although its performance is lower when the communication distance is short due to the low success rate of PS. Besides, the success rate of PS operation decreases with the rise of subtracted photon number m [21], resulting in that the secret key rate of m-PS (m > 1) scheme always lower than one-photon subtraction scheme. Therefore, we only discuss the one-photon subtraction scheme in the following.
Figure 5. The secret key rate as a function of LAC in (a) pure sea water and (b) clean ocean water. The solid lines represent the PS-based four-state CV-MDI-QKD protocol, the dash lines represent eight-state CV-MDI-QKD protocol and the dot lines represent the original four-state protocol. The color of lines black, red and blue represents LBC = 0 m, LBC = 10 m and LBC = 20 m respectively.
According to [41], the impact of underwater turbulence on CVQKD system can be reflected in the transmittance. When the communication distance is long, in other words, when T is low, the PS-based scheme has a higher performance than the original scheme. That is, even in the presence of underwater turbulence, our PS-based CV-MDI-QKD scheme is still helpful for performance. However, we find from figure 6 that although the PS-based scheme has a longer secure transmission distance when the LBC was short, the performance of PS-based scheme would be lower than the original four-state scheme when LBC is greater than a certain value. The reason for this phenomenon may be that the total channel noise increases with the increase of LBC, and the variance of the quantum state may decrease after PS.
Figure 6. The secret key rate as a function of LAC and LBC in (a) pure sea water and (b) clean ocean water. The respectively. The smooth surfaces and the grid surfaces represent the original four-state CV-MDI-QKD and the corresponding PS-based scheme respectively.

5. Conclusion

We have suggested a method to enhance the performance of a fiber-to-water discrete modulation CV-MDI-QKD scheme by utilizing a PS operation and simulating it in two different fiber-to-water channels, and the PS operation was described in detail. We assessed the factors that affect the underwater light transmission and used the optimal parameters in the simulation. The influence of modulation variance is also considered, and for comparison we chose the same variance, which is VM = 0.5, in the original and proposed protocol. The simulation results show that the proposed scheme has a longer transmission distance when LBC is short, but lower performance than the original protocol in the long LBC case. The transmission distance of the underwater channel is several orders of magnitude shorter than that of the optical fiber channel. However, it is still of great value in the construction of underwater communication networks.

Appendix A. Calculation of asymptotic secret key rate

In this section, we discuss the properties of the quantum states transmitted in the PS-based discrete modulation CV-MDI-QKD scheme and the calculation method of the secret key rate in the asymptotic scenario. We suppose that Alice employs heterodyne detection while Bob employs heterodyne detection, and the postprocessing uses reverse reconciliation. The EPR state ∣ψ⟩ prepared by Alice and Bob in the traditional DM-CVQKD can be written as
$\begin{eqnarray}\begin{array}{rcl}| \psi \rangle & = & \sum _{k=0}^{d-1}\sqrt{{\lambda }_{k}}| {\phi }_{k}\rangle | {\phi }_{k}\rangle \\ & = & \displaystyle \frac{1}{2}\sum _{k=0}^{d-1}| {\psi }_{k}\rangle | {\alpha }_{k}^{d}\rangle ,\end{array}\end{eqnarray}$
where d = 4 for four-state protocol and d = 8 for eight-state protocol. Here,
$\begin{eqnarray}| {\psi }_{k}\rangle =\displaystyle \frac{1}{2}\sum _{r=0}^{d-1}{{\rm{e}}}^{{\rm{i}}(1+\displaystyle \frac{d}{2}k)r\pi /8}| {\phi }_{r}\rangle ,\end{eqnarray}$
and
$\begin{eqnarray}| {\phi }_{r}\rangle =\displaystyle \frac{{{\rm{e}}}^{-{\alpha }^{2}/2}}{{\lambda }_{r}}\sum _{n=0}^{\infty }{\left(-1\right)}^{n}\displaystyle \frac{{\alpha }^{{dn}+r}}{\sqrt{({dn}+r)!}}| {dn}+r\rangle ,\end{eqnarray}$
where r = 0, 1, …, d − 1. For four-state protocol, λr is given as
$\begin{eqnarray}{\lambda }_{\mathrm{0,2}}=\displaystyle \frac{1}{2}{{\rm{e}}}^{-{\alpha }^{2}}\left[\cosh ({\alpha }^{2})\pm \cos ({\alpha }^{2})\right],\end{eqnarray}$
$\begin{eqnarray}{\lambda }_{\mathrm{1,3}}=\displaystyle \frac{1}{2}{{\rm{e}}}^{-{\alpha }^{2}}\left[\sinh ({\alpha }^{2})\pm \sin ({\alpha }^{2})\right],\end{eqnarray}$
and for eight-state protocol, λr is given as
$\begin{eqnarray}\begin{array}{rcl}{\lambda }_{\mathrm{0,4}} & = & \displaystyle \frac{1}{4}{{\rm{e}}}^{-{\alpha }^{2}}\left[\cosh ({\alpha }^{2})+\cos ({\alpha }^{2})\right.\\ & & \left.\pm \ 2\cos \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\cosh \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\right],\end{array}\end{eqnarray}$
$\begin{eqnarray}\begin{array}{rcl}{\lambda }_{\mathrm{1,5}} & = & \displaystyle \frac{1}{4}{{\rm{e}}}^{-{\alpha }^{2}}\left[\sinh ({\alpha }^{2})+\sin ({\alpha }^{2})\right.\\ & & \pm \sqrt{2}\cos \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\sinh \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\\ & & \left.\pm \ \sqrt{2}\sin \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\cosh \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\right],\end{array}\end{eqnarray}$
$\begin{eqnarray}\begin{array}{rcl}{\lambda }_{\mathrm{2,6}} & = & \displaystyle \frac{1}{4}{{\rm{e}}}^{-{\alpha }^{2}}\left[\sinh ({\alpha }^{2})-\sin ({\alpha }^{2})\right.\\ & & \left.\pm \ 2\sin \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\sinh \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\right],\end{array}\end{eqnarray}$
$\begin{eqnarray}\begin{array}{rcl}{\lambda }_{\mathrm{3,7}} & = & \displaystyle \frac{1}{4}{{\rm{e}}}^{-{\alpha }^{2}}\left[\sinh ({\alpha }^{2})-\sin ({\alpha }^{2})\right.\\ & & \mp \ \sqrt{2}\cos \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\sinh \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\\ & & \left.\pm \ \sqrt{2}\sin \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\cosh \left(\displaystyle \frac{{\alpha }^{2}}{\sqrt{2}}\right)\right].\end{array}\end{eqnarray}$
After the transmission of quantum channel and the detection of Charlie, the co-variance matrix of state ${\rho }_{{A}_{1}{B}_{1}^{\prime} }^{\mathrm{ps}}$ can be represented as
$\begin{eqnarray}\begin{array}{rcl}{{\rm{\Gamma }}}_{{A}_{1}{B}_{1}^{\prime} }^{\mathrm{ps}} & = & \left(\begin{array}{cc}a{\mathbb{I}} & c{\sigma }_{z}\\ c{\sigma }_{z} & b{\mathbb{I}}\end{array}\right)\\ & = & \left(\begin{array}{cc}X{\mathbb{I}} & \sqrt{T}{Z}_{d}{\sigma }_{z}\\ \sqrt{T}{Z}_{d}{\sigma }_{z} & T(Y+{\chi }_{\mathrm{line}}){\mathbb{I}}\end{array}\right),\end{array}\end{eqnarray}$
where X, Y and Zd are given in equation (6)–(8). The Shannon mutual information between Bob and Alice is calculated by
$\begin{eqnarray}I(A:B)={\mathrm{log}}_{2}\displaystyle \frac{a+1}{a+1-{c}^{2}/(b+1)},\end{eqnarray}$
and the Holevo bound S(E: B) is
$\begin{eqnarray}\begin{array}{l}S(E:B)=S(E)-S(E| B)\\ =S({AB})-S(A| B)\\ =G[({\gamma }_{1}-1)/2]+G[({\gamma }_{2}-1)/2]\\ -G[({\gamma }_{3}-1)/2],\end{array}\end{eqnarray}$
where $G(x)=(x+1){\mathrm{log}}_{2}(x+1)-x{\mathrm{log}}_{2}x$, which denotes the Von Neumann entropy. Here, γ1,2,3 are the symplectic eigenvalues derived from covariance matrix and they are calculated by
$\begin{eqnarray}{\gamma }_{\mathrm{1,2}}=\displaystyle \frac{1}{2}(A\pm \sqrt{{A}^{2}-4{B}^{2}}),\end{eqnarray}$
$\begin{eqnarray}{\gamma }_{3}=\sqrt{{a}^{2}-\displaystyle \frac{{{ac}}^{2}}{b}},\end{eqnarray}$
where A = a2 + b2 − 2c2 and B = abc2. Then, we can calculate the secret key rate by equation (9).

Appendix B. Description of partial influencing factors of seawater channel

In this section we describe the effects of temperature, salinity and chlorophyll concentration on the marine channel. Assuming that the current channel is pure seawater, considering the influence of temperature and salinity, the absorption coefficient can be calculated as [42]:
$\begin{eqnarray}a(\lambda ,{\rm{\Theta }},S)=a(\lambda ,{{\rm{\Theta }}}_{r},0)+{{\rm{\Psi }}}_{{\rm{\Theta }}}({\rm{\Theta }}-{{\rm{\Theta }}}_{r})+{{\rm{\Psi }}}_{S}S,\end{eqnarray}$
where Θ is the temperature, Θr is a reference temperature, S is salinity and $\Psi$Θ, $\Psi$S is the linear temperature slope and salinity slope respectively (See [42] for detailed calculation). According to [43], the scattering coefficient can be further expressed as
$\begin{eqnarray}b(\lambda ,{\rm{\Theta }},S)={b}_{d}(\lambda ,{\rm{\Theta }},S)+{b}_{c}(\lambda ,{\rm{\Theta }},S).\end{eqnarray}$
Here, bd(λ, Θ, S) and bc(λ, Θ, S) can be calculated by
$\begin{eqnarray}{b}_{d}(\lambda ,{\rm{\Theta }},S)=\displaystyle \frac{8{\pi }^{3}}{{\lambda }^{4}}{\left(\rho \displaystyle \frac{\partial {n}^{2}}{\partial \rho }\right)}_{{\rm{\Theta }}}^{2}k{\rm{\Theta }}{\beta }_{{\rm{\Theta }}}h(\delta ),\end{eqnarray}$
$\begin{eqnarray}\begin{array}{l}{b}_{c}(\lambda ,{\rm{\Theta }},S)=\displaystyle \frac{8{\pi }^{3}}{{\lambda }^{4}{N}_{A}}{\left(\displaystyle \frac{\partial {n}^{2}}{\partial S}\right)}^{2}\\ \times \displaystyle \frac{{M}_{w}}{\rho }\displaystyle \frac{S}{-\partial \mathrm{ln}{a}_{w}/\partial S}h(\delta ),\end{array}\end{eqnarray}$
where k is the Boltzmann constant, NA is the Avogadro number, ρ is the density, n is the refractive index in vacuum, βΘ is the isothermal compressibility, δ is the depolarization ratio of the solution, and aw and Mw are the activity and molecular weight of water in the solution respectively, which are detailed in [43].
The effect of chlorophyll on attenuation coefficient can be expressed as [37]:
$\begin{eqnarray}\begin{array}{l}a(\lambda )=\left[{a}_{w}(\lambda )+0.06{a}_{c}(\lambda ){C}^{0.65}\right]\\ \left[\times ,[,1+0.2{{\rm{e}}}^{-0.014(\lambda -440)}\right],\end{array}\end{eqnarray}$
$\begin{eqnarray}b(\lambda )=0.3\displaystyle \frac{550}{\lambda }{C}^{0.62},\end{eqnarray}$
where aw(λ) is the absorption coefficient of pure water, ac(λ) is a nondimensional, statistically derived chlorophyll-specific absorption coefficient.
1
Grosshans F Van Assche G Wenger J Brouri R Cerf N J Grangier P 2003 Nature 421 238 241

DOI

2
Scarani V Bechmann-Pasquinucci H Cerf N J Dušek M Lütkenhaus N Peev M 2009 Rev. Mod. Phys. 81 1301

DOI

3
Lo H K Chau H F 1999 Science 283 2050 2056

DOI

4
Lo H K Curty M Tamaki K 2014 Nat. Photonics 8 595

DOI

5
Li X H Deng F G Zhou H Y 2008 Phys. Rev. A 78 022321

DOI

6
Liao Q Guo Y Xie C Huang D Huang P Zeng G 2018 Quantum Inf. Process. 17 113

DOI

7
Zhao W Liao Q Huang D Guo Y 2019 Quantum Inf. Process. 18 39

DOI

8
Leverrier A Grangier P 2009 Phys. Rev. Lett. 102 180504

DOI

9
Huang P Fang J Zeng G 2014 Phys. Rev. A 89 042330

DOI

10
Leverrier A Grangier P 2010 arXiv:1002.4083

11
Jouguet P Kunz-Jacques S Diamanti E 2013 Phys. Rev. A 87 062313

DOI

12
Wang T Huang P Zhou Y Liu W Ma H Wang S Zeng G 2018 Opt. Express 26 2794 2806

DOI

13
Ma X C Sun S H Jiang M S Liang L M 2013 Phys. Rev. A 88 022339

DOI

14
Ma X C Sun S H Jiang M S Liang L M 2013 Phys. Rev. A 87 052309

DOI

15
Ma X C Sun S H Jiang M S Gui M Liang L M 2014 Phys. Rev. A 89 042335

DOI

16
Zhang Y C Li Z Yu S Gu W Peng X Guo H 2014 Phys. Rev. A 90 052325

DOI

17
Pirandola S Ottaviani C Spedalieri G Weedbrook C Braunstein S L Lloyd S Gehring T Jacobsen C S Andersen U L 2015 Nat. Photonics 9 397 402

DOI

18
Wu Y Zhou J Gong X Guo Y Zhang Z M He G 2016 Phys. Rev. A 93 022325

DOI

19
Ma H X Huang P Bai D Y Wang T Wang S Y Bao W S Zeng G H 2019 Phys. Rev. A 99 022322

DOI

20
Ma H X Huang P Bai D Y Wang S Y Bao W S Zeng G H 2018 Physical Review A 97 042329

DOI

21
Guo Y Liao Q Wang Y Huang D Huang P Zeng G 2017 Phys. Rev. A 95 032304

DOI

22
Liao Q Guo Y Huang D Huang P Zeng G 2018 New J. Phys. 20 023015

DOI

23
Yu C Zou S Mao Y Guo Y 2020 Applied Sciences 10 4175

DOI

24
Huang P He G Fang J Zeng G 2013 Phys. Rev. A 87 012317

DOI

25
Peng Q Chen G Li X Liao Q Guo Y 2019 Entropy 21 1011

DOI

26
Li Z Zhang Y C Xu F Peng X Guo H 2014 Phys. Rev. A 89 052301

DOI

27
Wu X Wang Y Li S Zhang W Huang D Guo Y 2019 Quantum Inf. Process. 18 1 16

DOI

28
Wu X D Wang Y J Huang D Guo Y 2020 Frontiers of Physics 15 1 12

DOI

29
Li F Wang Y Liao Q Guo Y 2018 Int. J. Theor. Phys. 57 2755 2766

DOI

30
Zhong H Wang Y Wang X Liao Q Wu X Guo Y 2018 Entropy 20 578

DOI

31
Li Z Zhang Y Wang X Xu B Peng X Guo H 2016 Phys. Rev. A 93 012310

DOI

32
Ye W Guo Y Zhang H Zhong H Mao Y Hu L 2021 J. Phys. B: At. Mol. Opt. Phys. 54 045501

DOI

33
Prieur L Sathyendranath S 1981 Limnol. Oceanogr. 26 671 689

DOI

34
Cochenour B M Mullen L J Laux A E 2008 IEEE J. Oceanic Eng. 33 513 521

DOI

35
Zeng Z 2015 A survey of underwater wireless optical communication PhD Thesis University of British Columbia (https://doi.org/10.14288/1.0220823)

36
Saxena P Bhatnagar M R 2019 IEEE Access 7 105298 105298 105313

DOI

37
Xie C L Guo Y Wang Y J Huang D Zhang L 2018 Chin. Phys. Lett. 35 090302

DOI

38
Ruan X Zhang H Zhao W Wang X Li X Guo Y 2019 Applied Sciences 9 4956

DOI

39
Li Z Zhang H Liao Q Mao Y Guo Y 2021 Phys. Lett. A 419 127694

DOI

40
Kong M Wang J Chen Y Ali T Sarwar R Qiu Y Wang S Han J Xu J 2017 Opt. Express 25 21509 21518

DOI

41
Zuo Z Wang Y Mao Y Ruan X Guo Y 2021 Phys. Rev. A 104 052613

DOI

42
Pegau W S Gray D Zaneveld J R V 1997 Appl. Opt. 36 6035 6046

DOI

43
Zhang X Hu L 2010 Effects of temperature and salinity on light scattering by water Proc. SPIE 7678 76780L

DOI

Outlines

/