Volume 2, Issue 3 e50
ORIGINAL PAPER
Full Access

Feasibility assessment for practical continuous variable quantum key distribution over the satellite-to-Earth channel

Sebastian P. Kish

Corresponding Author

Sebastian P. Kish

School of Electrical Engineering and Telecommunication, University of New South Wales, Sydney, New South Wales, Australia

Correspondence

Sebastian Kish, School of Electrical Engineering and Telecommunication, University of New South Wales, Sydney, NSW 2052, Australia.

Email: [email protected]

Search for more papers by this author
Eduardo Villaseñor

Eduardo Villaseñor

School of Electrical Engineering and Telecommunication, University of New South Wales, Sydney, New South Wales, Australia

Search for more papers by this author
Robert Malaney

Robert Malaney

School of Electrical Engineering and Telecommunication, University of New South Wales, Sydney, New South Wales, Australia

Search for more papers by this author
Kerry A. Mudge

Kerry A. Mudge

Cyber and Electronic Warfare Division, Defence Science and Technology Group, Edinburgh, South Australia, Australia

Search for more papers by this author
Kenneth J. Grant

Kenneth J. Grant

Cyber and Electronic Warfare Division, Defence Science and Technology Group, Edinburgh, South Australia, Australia

Search for more papers by this author
First published: 20 July 2020
Citations: 37

Funding information: Defence Science and Technology Group

Summary

Currently, quantum key distribution (QKD) using continuous variable (CV) technology has only been demonstrated over short-range terrestrial links. Here, we attempt to answer whether CV-QKD over the much longer satellite-to-Earth channel is feasible. To this end, we first review the concepts and technologies that will enable CV-QKD over the satellite-to-Earth channels. We then consider, in the infinite key limit, the simplest-to-deploy QKD protocols, the coherent state (CS) QKD protocol with homodyne detection and the CS-QKD protocol with heterodyne detection. We then focus on the CS-QKD protocol with heterodyne detection in the pragmatic setting of finite keys, where complete security against general attacks is known. We pay particular attention to the relevant noise terms in the satellite-to-Earth channel and their impact on the secret key rates. In system set-ups where diffraction dominates losses, we find that the main components of the total excess noise are the intensity fluctuations due to scintillation, and the time-of-arrival fluctuations between signal and local oscillator. We conclude that for a wide range of pragmatic system models, CS-QKD with information-theoretic security in the satellite-to-Earth channel is feasible.

1 INTRODUCTION

Quantum key distribution (QKD) provides information-theoretic secure key distribution between two parties. Local data sent by a sender, Alice, is encrypted using a key that is guaranteed by quantum mechanics to be securely shared only with the receiving party, Bob. QKD is mainly implemented using optical technology, making it ideal for secure key distribution over a high bandwidth free-space optical (FSO) link.

In discrete variable (DV) QKD applied over fiber the quantum information is usually encoded in a DV of a single photon (eg, time-bin qubit), with a secure range of order 400 km.1 However, recently, DV-based QKD using polarization as the DV was demonstrated in a free-space satellite-to-ground channel up to a distance of 1200 km.2 In Reference 2, a quantum link was established from the low-Earth-orbit (LEO) Micius satellite to the Xinglong ground station. This exciting development is a major step towards realizing global scale secure quantum communications using low-orbit satellites. Indeed, quantum communication through satellite channels is anticipated to be one of the core technologies enabling the so-called quantum internet.3

However, it is uncertain whether DV or continuous variable (CV) multiphoton technologies (or a combination of CV-DV) will prevail in FSO quantum communication. CV protocols have the advantage of high-rate, efficient, and cost-effective detection (using homodyne and heterodyne detectors) in comparison to the sophisticated and expensive single-photon detectors used for DV protocols. CV-QKD is also perhaps more compatible with current classical wireless communications technologies. Initially, CV-QKD was proposed with discrete and Gaussian encoding of squeezed states.4-7 Thereafter, Gaussian-modulated CV-QKD with coherent states was soon developed.8-10

The simplest-to-deploy CV-QKD protocols are the GG02 protocol introduced in 2002 by Grosshans and Grangier using a homodyne detector,9, 10 and its heterodyne variant (“the no-switching” protocol).11 These both involve preparation of a coherent state (CS) using Gaussian modulation.7, 8 More specifically, the quadratures X and P of the CS are randomly modulated according to a Gaussian distribution.8 In this article, we refer to GG02 and the no-switching protocol as the CS-Hom protocol and CS-Het protocol, respectively. We state them as the CS-QKD protocols when we refer to them collectively. The CS-QKD protocols have been successfully deployed in fiber with nonzero quantum keys distributed over distances of order 100 km.8, 12, 13

The question we address in this work is whether the simplest-to-deploy CV-QKD protocols, namely the CS-QKD protocols, will be viable in a real-world LEO satellite-to-Earth channel. Although extensive theoretical work on CV-QKD through terrestrial FSO channels has been done in recent years, for example, References 14-21, the only real-world FSO deployment of any CV-QKD protocol has been over the short distance of 460 m.22 The larger losses due to diffraction over the much longer satellite-to-Earth channel (as well as disparate turbulence effects),23 render any extrapolation of the results in Reference 22 far from obvious. This is compounded by the fact that Reference 22 deployed a different form of CV-QKD, namely, a CS unidimensional CV-QKD protocol.

Our contributions in this work can be summarized as follows. We identify the most important factors contributing to the total excess noise of the CS-QKD protocols in the satellite-to-Earth channel. We pay particular attention to the noise contributions arising from scintillation and contributions arising from time-of-arrival fluctuations between the transmitted local oscillator (LO) and the quantum signal. Using our determination of the total excess noise we then consider a lower bound on the secure key rates anticipated for the CS-QKD protocols deployed over the satellite-to-Earth channel. We will consider secure rates in the asymptotic signaling limit for both of the CS-QKD protocols, and in the finite key limit for the CS-Het protocol.

The rest of this work is as follows. In Section 2, we review the security models required for calculating the secret key rate of the CS-QKD protocols in a lossy channel. In Section 3, we introduce the system model of the CS-QKD protocols in the satellite-to-Earth channel, and review well-known contributions to the total excess noise from the channel and detectors. In Section 4, we simulate the relative intensity fluctuations and time-of-arrival fluctuations. In Section 5, we investigate the impact on the secret key rate of each noise term. In Section 6, we discuss the security of the CS-QKD protocols in the satellite-to-Earth channel and discuss alternative protocols. In Section 7, we discuss our work in the context of other CV-QKD protocols. Finally, we conclude and summarize our findings in Section 8.

2 SECURITY ANALYSIS OF CS-QKD IN A LOSSY CHANNEL

In our security model of the CS-QKD protocols in the satellite-to-Earth channel, we assume the eavesdropper Eve has full access to the quantum channel and performs the most general (coherent) attack. The general attack is when Eve prepares an optimal global ancilla state, which may not necessarily be separable. Eve can prepare any ancillary states to interact with the signal states and make measurements. In particular, Eve can have access to a quantum memory, which can store the signal states until she learns information during the classical postprocessing. In our security model, we perform the analysis in the entanglement based version of the CS-QKD protocols, even though in deployment we will assume the equivalent prepare and measure schemes.24, 25 In deployment, it is straightforward to convert measurements from one scheme to the other.24

Information-theoretic security against the general attack for the CS-QKD protocols was proven in the asymptotic limit where an infinite key was assumed.26 The general attack was proven to reduce to the collective attack using the de Finetti representation theorem for infinite dimensions.27 However, in practice, we need to consider the secret key rate in the finite limit which can only be urn:x-wiley:que2:media:que250:que250-math-0001-secure, where urn:x-wiley:que2:media:que250:que250-math-0002 is the probability of failure. Information-theoretic security of the CS-Hom protocol in the finite regime is still an open question. However, by exploiting a new Gaussian de Finetti reduction method, a composable security proof against general attacks for the CS-Het protocol was recently proven.28

2.1 Asymptotic limit

In this section, we review the well-known secret key rates under general attacks in the asymptotic limit (which always provides key rates higher than those obtained under general attacks in the finite limit). We will follow the formalism provided in Reference 29 and references therein. The covariance matrix describing the Gaussian modulated CS sent from Alice (A) to Bob (B) has the form,
urn:x-wiley:que2:media:que250:que250-math-0003()
where urn:x-wiley:que2:media:que250:que250-math-0004 is the unity matrix and urn:x-wiley:que2:media:que250:que250-math-0005 is the Pauli matrix. For the Gaussian modulated CS-QKD protocols, the coefficients of the covariance matrix are
urn:x-wiley:que2:media:que250:que250-math-0006()
where VA is Alice's modulation variance of the quadrature operators, VB is Bob's measured quadrature variance, 0 ≤ T ≤ 1 is the transmissivity of the channel, and urn:x-wiley:que2:media:que250:que250-math-0007 is the detector quantum efficiency.The CS-Hom and CS-Het protocols correspond to urn:x-wiley:que2:media:que250:que250-math-0009 and urn:x-wiley:que2:media:que250:que250-math-0010, respectively. The term urn:x-wiley:que2:media:que250:que250-math-0011 is defined as all noise terms other than vacuum noise, expressed in vacuum units. In the literature it is common to distinguish between noise, urn:x-wiley:que2:media:que250:que250-math-0012, arising from the detector and noise, urn:x-wiley:que2:media:que250:que250-math-0013, arising from the channel transmission where,29
urn:x-wiley:que2:media:que250:que250-math-0014()
and where urn:x-wiley:que2:media:que250:que250-math-0015 is given by
urn:x-wiley:que2:media:que250:que250-math-0016()
Here, urn:x-wiley:que2:media:que250:que250-math-0017 is the channel excess noise from various sources and (1 − T)/T is due to channel loss. urn:x-wiley:que2:media:que250:que250-math-0018 is given by
urn:x-wiley:que2:media:que250:que250-math-0019()
where urn:x-wiley:que2:media:que250:que250-math-0020 is the detector excess noise and urn:x-wiley:que2:media:que250:que250-math-0021 is noise due to detector losses.
The secret key rateagainst general attacks (in bits/pulse) under reverse reconciliation in the asymptotic limit (infinite key length) is given by References 29-31
urn:x-wiley:que2:media:que250:que250-math-0022()
where IAB is the mutual information between Alice and Bob, urn:x-wiley:que2:media:que250:que250-math-0023 is the reconciliation efficiency, and SBE is the upper bound to the Holevo information between Eve and Bob. In this work we will only consider reverse reconciliation where Bob sends correction information to Alice who corrects the bit values in the key (derived from her quadrature measurement).32 The mutual information IAB for the CS-QKD protocol is given by
urn:x-wiley:que2:media:que250:que250-math-0024()
Note that from this point forward, we simplify the nomenclature with urn:x-wiley:que2:media:que250:que250-math-0025, urn:x-wiley:que2:media:que250:que250-math-0026 and urn:x-wiley:que2:media:que250:que250-math-0027. Note also, the mutual information becomes
urn:x-wiley:que2:media:que250:que250-math-0028()
and in the limit T → 0urn:x-wiley:que2:media:que250:que250-math-0029, as expected.
We use the trusted model throughout the article, where Eve can only have access to the channel excess noise urn:x-wiley:que2:media:que250:que250-math-0030. Consequently, in the Holevo information shared between Eve and Bob in (9), we only consider urn:x-wiley:que2:media:que250:que250-math-0031. Eve's information after Bob's measurement is the upper bound on the Holevo information,
urn:x-wiley:que2:media:que250:que250-math-0032()
where S(E) is the von Neumann entropy of Eve's state before the measurement on mode B (Bob's mode) and S(E|B) is conditioned on Bob's measurement outcome. Eve is assumed to purify the transmitted state AB resulting in a pure Gaussian state. It was shown that for a given covariance matrix describing a Gaussian state, Gaussian attacks are the most optimal attacks that minimize the key rates.33 Therefore, Eve's entropy is
urn:x-wiley:que2:media:que250:que250-math-0033()
where urn:x-wiley:que2:media:que250:que250-math-0034 and urn:x-wiley:que2:media:que250:que250-math-0035 are the symplectic eigenvalues of the covariance matrix urn:x-wiley:que2:media:que250:que250-math-0036. For CS-QKD protocols, these are given by Reference 29
urn:x-wiley:que2:media:que250:que250-math-0037()
and the entropy S(E|B) is
urn:x-wiley:que2:media:que250:que250-math-0038()
where urn:x-wiley:que2:media:que250:que250-math-0039 are the symplectic eigenvalues of the conditional covariance matrix characterizing the state after Bob's measurement. The eigenvalues urn:x-wiley:que2:media:que250:que250-math-0040 are given by,
urn:x-wiley:que2:media:que250:que250-math-0041()
where for the CS-Hom protocol C′ and D′ are given by
urn:x-wiley:que2:media:que250:que250-math-0042()
respectively, and for the CS-Het protocol C′ and D′ are given by
urn:x-wiley:que2:media:que250:que250-math-0043()
respectively. Note, urn:x-wiley:que2:media:que250:que250-math-0044 for both protocols. Using (6) and (10) to (15), it is then straightforward to calculate the secret key rate in the asymptotic limit.

2.2 Finite key size effects

We now consider the practical security of the CS-QKD protocols using finite-size analysis. We will assume the small finite processing errors associated with the Gaussian modulation of the CSs can be ignored. We do note, however, that an information-theoretic validation of this assumption does not yet exist.34 In the security analysis, we consider the Gaussian collective attacks with urn:x-wiley:que2:media:que250:que250-math-0045-security that was first introduced in References 35, 36 and extended to general attacks in References 28, 37-39. In the infinite limit, the knowledge of the relevant parameters are exact, but in the finite limit, the parameters are estimated with a finite precision. This precision is related to the probability urn:x-wiley:que2:media:que250:que250-math-0046 the true values are not inside the confidence interval calculated from the parameter estimation procedure.35, 36 In the finite limit, the secret key rate in bits/pulse is given by References 37,38
urn:x-wiley:que2:media:que250:que250-math-0047()
where urn:x-wiley:que2:media:que250:que250-math-0048 is the total failure probability of the protocol, urn:x-wiley:que2:media:que250:que250-math-0049 is the upper bound of the Holevo information taking into consideration the finite precision of the parameter estimation, N is the total number of symbols sent, and n = N − ne, where ne is the number of symbols used for parameter estimation. urn:x-wiley:que2:media:que250:que250-math-0050 is given by References 37, 38
urn:x-wiley:que2:media:que250:que250-math-0051()
where d is the discretization parameterand urn:x-wiley:que2:media:que250:que250-math-0052 is a smoothing parameter corresponding to the speed of convergence of the smooth min-entropy. In the finite-size regime, one is limited to urn:x-wiley:que2:media:que250:que250-math-0053-security where urn:x-wiley:que2:media:que250:que250-math-0054, where urn:x-wiley:que2:media:que250:que250-math-0055 is the failure probability of the privacy amplification procedure, and urn:x-wiley:que2:media:que250:que250-math-0056 is the failure probability of the error correction. The parameters urn:x-wiley:que2:media:que250:que250-math-0057 and urn:x-wiley:que2:media:que250:que250-math-0058 can be optimized computationally.35
To account for the finite statistics and obtain the value of urn:x-wiley:que2:media:que250:que250-math-0059, the previous covariance matrix (2) for Alice and Bob becomes,35, 36
urn:x-wiley:que2:media:que250:que250-math-0060()
where Tmin and urn:x-wiley:que2:media:que250:que250-math-0061 are the minimum and maximum values of T and urn:x-wiley:que2:media:que250:que250-math-0062, respectively.
The confidence intervals for T and urn:x-wiley:que2:media:que250:que250-math-0063 can be calculated from known distributions of the estimatorsurn:x-wiley:que2:media:que250:que250-math-0065 and urn:x-wiley:que2:media:que250:que250-math-0066 to obtain the lower value of the T interval given by References 35, 36,
urn:x-wiley:que2:media:que250:que250-math-0067()
and the higher value of the urn:x-wiley:que2:media:que250:que250-math-0068 interval given by,
urn:x-wiley:que2:media:que250:que250-math-0069()
where urn:x-wiley:que2:media:que250:que250-math-0070 satisfies urn:x-wiley:que2:media:que250:que250-math-0071 and erf(x) is the error function defined as urn:x-wiley:que2:media:que250:que250-math-0072. From a theoretical perspective and what we do in this work, we can set the expectation values of the estimators to
urn:x-wiley:que2:media:que250:que250-math-0073()

Using these values, we can compute Tmin and urn:x-wiley:que2:media:que250:que250-math-0074. To determine urn:x-wiley:que2:media:que250:que250-math-0075 in (16) for the CS-Het protocol, we use these values in Equations (9)-(13) and (15) (ie, setting T = Tmin and urn:x-wiley:que2:media:que250:que250-math-0076 in Equations (3)-(5)). The mutual information IAB in (16) is calculated as done before in (7) using T and urn:x-wiley:que2:media:que250:que250-math-0077. Putting all this together, to calculate the secret key rate with finite size effects in (16), we make use of the aforementioned quantities urn:x-wiley:que2:media:que250:que250-math-0078, IAB, and urn:x-wiley:que2:media:que250:que250-math-0079 in (17).

In going from optimal Gaussian collective attacks to general attacks, only the CS-Het protocol is urn:x-wiley:que2:media:que250:que250-math-0080-secure against general attacks with urn:x-wiley:que2:media:que250:que250-math-0081, where28
urn:x-wiley:que2:media:que250:que250-math-0082()
where dA and dB are the average photon numbers of Alice and Bob's modes, respectively, and k is the number of modes.28 However, urn:x-wiley:que2:media:que250:que250-math-0083 and thus urn:x-wiley:que2:media:que250:que250-math-0084. We choose urn:x-wiley:que2:media:que250:que250-math-0085 and number of symbols used for parameter estimation ne = n = 1012 which can be obtained in minutes for a source pulse rate of 100 MHz. To obtain the secret key rate under general attacks, it is enough to analyze the security against Gaussian collective attacks with urn:x-wiley:que2:media:que250:que250-math-0086 and urn:x-wiley:que2:media:que250:que250-math-0087.28

3 SATELLITE-TO-EARTH CS-QKD

We present our system model in Figure 1. Essentially, a Gaussian modulated CS is prepared on the satellite (Alice) and measured at the ground station (Bob) using homodyne or heterodyne detection. At Alice's location in a LEO satellite at altitude H, a strong laser source generates a CS which is divided by an asymmetrical beamsplitter into the LO and the signal path. The laser source generates pulses at central frequency urn:x-wiley:que2:media:que250:que250-math-0088 of width urn:x-wiley:que2:media:que250:que250-math-0089 and a repetition rate frep. The laser beam is collimated by a transmitter aperture of diameter DT. The amplitude and phase corresponding to X and P quadratures in the signal path are Gaussian modulated with the Gaussian distribution centered at X⟩ = ⟨P⟩ = 0 with variance VA.

Details are in the caption following the image
The PM CS-QKD protocols in the satellite-to-Earth channel. A LO is sent with the signal by Alice which passes through a lossy channel of transmissivity T and channel excess noise urn:x-wiley:que2:media:que250:que250-math-0090. Bob receives the signal and the LO which he uses to perform the homodyne or heterodyne detection. The former is represented by a XB quadrature measurement (blue), and the latter by two balanced beamsplitters (purple) and two quadrature measurements (blue XB and purple PB). The heterodyne/homodyne detector efficiency is urn:x-wiley:que2:media:que250:que250-math-0091 and the detector excess noise urn:x-wiley:que2:media:que250:que250-math-0092. An entirely equivalent EB scheme is available. EB, entanglement based; PM, prepare and measure. CS, coherent state; EB, entanglement based; LO, local oscillator; PM, prepare and measure; QKD, quantum key distribution

The LO is then multiplexed with the signal (in a different polarization mode) and sent to Bob. Both the LO and signal are received by an aperture of diameter DR. Using the LO, Bob monitors the transmissivity T which has a probability density function PDF PAB(T) of the channel. The PDF is integrated up to a maximum possible value of T = Tmax. In general, the form of this PDF is a function of many atmospheric parameters, the transceiver apertures, and the distance between the transceivers. In the uplink (Earth-to-satellite) deep fades in the transmissivity can be anticipated, largely due to beam wander and beam deformation.40 In this work, we adopt settings where the losses in the satellite-to-Earth channel are dominated by diffraction effects alone. That is, we assume the transmissivity is a constant. As we discuss later, reasonable receiver/transmitter apertures render such an assumption reasonable in the downlink channel.However, it is worth noting here that additional support for a constant transmissivity in the downlink comes from the phase-screen simulations of Reference 41, which show highly peaked transmissivity PDFs.

In the CS-Hom protocol, Bob randomly chooses to either measure the quadratures X or P with the homodyne detector and later announces to Alice which quadrature he measured. In the CS-Het protocol, Bob measures both X and P using two detectors at the output of a balanced beamsplitter.

3.1 Noise components

As shown in (3), we separated the noise due to the channel urn:x-wiley:que2:media:que250:que250-math-0093 and the detector urn:x-wiley:que2:media:que250:que250-math-0094. Bob's variance VB of the quadrature operator in (2) using the definitions in (4) and (5) is
urn:x-wiley:que2:media:que250:que250-math-0096()
where we define the total excess noise as
urn:x-wiley:que2:media:que250:que250-math-0097()
The channel excess noiseis References 24, 42, 43
urn:x-wiley:que2:media:que250:que250-math-0099()
where the contributions above are the time-of-arrival fluctuations urn:x-wiley:que2:media:que250:que250-math-0100, relative intensity noise (RIN) due to the atmosphere urn:x-wiley:que2:media:que250:que250-math-0101, background noise urn:x-wiley:que2:media:que250:que250-math-0102, modulation noise urn:x-wiley:que2:media:que250:que250-math-0103, RIN of the LO urn:x-wiley:que2:media:que250:que250-math-0104, and RIN of the signal urn:x-wiley:que2:media:que250:que250-math-0105. We refer the reader to Table 1 for a description of these noise components. We note that the time-of-arrival fluctuations urn:x-wiley:que2:media:que250:que250-math-0106 and RIN due to the atmosphere, urn:x-wiley:que2:media:que250:que250-math-0107, have not been determined in the satellite-to-Earth channel. An analysis of these two excess noise components is discussed in the following section.
TABLE 1. Noise components of the total excess noise urn:x-wiley:que2:media:que250:que250-math-0108 of CS-QKD the satellite-to-Earth channel
urn:x-wiley:que2:media:que250:que250-math-0109 Channel excess noise component Description
urn:x-wiley:que2:media:que250:que250-math-0110 Time-of-arrival fluctuations urn:x-wiley:que2:media:que250:que250-math-0111 is the noise component due to the differential modifications between signal and LO pulses in the satellite-to-Earth channel. Predictions for this noise component in a terrestrial free-space channel were made in Reference 51, but not for the satellite-to-Earth channel. We will quantify this noise component in the following section.
urn:x-wiley:que2:media:que250:que250-math-0112 RIN of LO due to atmosphere urn:x-wiley:que2:media:que250:que250-math-0113 is the noise component due to the scintillation caused by atmospheric fluctuations. We will quantify this noise in the following section.
urn:x-wiley:que2:media:que250:que250-math-0114 RIN of the LO The noise term urn:x-wiley:que2:media:que250:que250-math-0115 is due to the power fluctuations of the laser before modulation. This noise component is an intrinsic noise that depends on the parameters of the laser.24
urn:x-wiley:que2:media:que250:que250-math-0116 Modulation noise The noise term urn:x-wiley:que2:media:que250:que250-math-0117 is due to the voltage fluctuations in the modulation of the coherent state at Alice.42 The signal generator translates bit information to a voltage which is amplified to drive the modulator.24 The phase of the quadrature is proportional to the applied voltage. Subsequently, the voltage deviation introduced by the signal generator introduces modulation noise.
urn:x-wiley:que2:media:que250:que250-math-0118 Background noise Part of the channel excess noise for the satellite-to-Earth channel is photon leakage from the background urn:x-wiley:que2:media:que250:que250-math-0119 to the quantum signal and LO.43
urn:x-wiley:que2:media:que250:que250-math-0120 RIN of the signal Excess noise due to power fluctuations of the laser translates to the RIN of the signal urn:x-wiley:que2:media:que250:que250-math-0121. This noise component is proportional to the absolute power variance for a given optical bandwidth of the signal laser.24 In comparison to the RIN of the LO due to the laser, the RIN of the signal is considerably smaller.24
urn:x-wiley:que2:media:que250:que250-math-0122 Detector excess noise component
vel Electronic noise The term vel is electronic noise that is due to other noise sources of the detector including thermal noise and clock jitter affecting the detector. Shot-noise-limited homodyne measurement requires sufficient LO power to reduce the effect of the electronic noise by increasing the signal-to-noise ratio.24, 46
urn:x-wiley:que2:media:que250:que250-math-0123 Analogue-digital converter (ADC) quantization noise urn:x-wiley:que2:media:que250:que250-math-0124 is due to digitizing the output voltage, required by all CV-QKD systems.24, 44, 45 This noise term can be suppressed by increasing the number of bits.
urn:x-wiley:que2:media:que250:que250-math-0125 Pulse overlap The finite response time of the balanced homodyne/heterodyne detector causes an electrical pulse overlap urn:x-wiley:que2:media:que250:que250-math-0126.47 Large peak powers for shorter pulses can saturate the diodes, causing a nonlinear response. This can be suppressed by ensuring urn:x-wiley:que2:media:que250:que250-math-0127, where urn:x-wiley:que2:media:que250:que250-math-0128 is the pulse width.
urn:x-wiley:que2:media:que250:que250-math-0129 LO fluctuations during subtraction The incomplete subtraction of the output signals by the homodyne/heterodyne detector introduces the noise component urn:x-wiley:que2:media:que250:que250-math-0130.24, 47
urn:x-wiley:que2:media:que250:que250-math-0131 Leakage noise Part of the total excess noise is the photon leakage from the LO to the signal when the signal is multiplexed with the LO.46, 47 This term largely depends on the system design. However, in the polarization-frequency-multiplexing scheme, this is, assumed negligible.48
  • Abbreviations: CS, coherent state; CV, continuous variable; LO, local oscillator; QKD, quantum key distribution; RIN, relative intensity noise.
Similarly, the detector excess noiseis References 24, 44-48
urn:x-wiley:que2:media:que250:que250-math-0133()
where the noise contributions listed are the electronic noise vel, analogue-digital converter noise urn:x-wiley:que2:media:que250:que250-math-0134, detector overlap urn:x-wiley:que2:media:que250:que250-math-0135, LO subtraction noise urn:x-wiley:que2:media:que250:que250-math-0136, and LO-to-signal leakage urn:x-wiley:que2:media:que250:que250-math-0137. We refer the reader to Table 1 for a fuller description of these noise components.

4 NOISE SIMULATIONS

In the following section, we use the atmospheric channel to determine the channel excess noise contributions from the intensity fluctuations of the LO and the time-of-arrival fluctuations between the LO and signal. Typical values from the literature of each noise contribution (as well as our calculations) are summarized in Table 2.

TABLE 2. Excess noise break-down affecting satellite-to-Earth CS-QKD during daylight
Parameter Reference
urn:x-wiley:que2:media:que250:que250-math-0138 Channel excess noise 0.0186;0.0126
urn:x-wiley:que2:media:que250:que250-math-0139 Time-of-arrival fluctuations 0.006 This article
urn:x-wiley:que2:media:que250:que250-math-0140 RIN of LO due to atmosphere 0.01;0.004 This article
urn:x-wiley:que2:media:que250:que250-math-0141 Relative intensity noise of LO 0.0018 24
urn:x-wiley:que2:media:que250:que250-math-0142 Modulation noise 0.0005 42
urn:x-wiley:que2:media:que250:que250-math-0143 Background noise 0.0002 43
urn:x-wiley:que2:media:que250:que250-math-0144 Relative intensity noise of signal <0.0001 24
urn:x-wiley:que2:media:que250:que250-math-0145 Detector noise 0.0133
vel Electronic noise 0.013 46, 47
urn:x-wiley:que2:media:que250:que250-math-0146 Analogue-digital converter noise 0.0002 44, 45
urn:x-wiley:que2:media:que250:que250-math-0147 Detector overlap <0.0001 47
urn:x-wiley:que2:media:que250:que250-math-0148 LO subtraction noise <0.0001 24, 47
urn:x-wiley:que2:media:que250:que250-math-0149 LO to signal leakage <0.0001 46-48
  • Abbreviations: ADC, analogue-digital converter; CS, coherent state; LO, local oscillator; QKD, quantum key distribution; RIN, relative intensity noise.

4.1 Relative intensity—LO

We follow the procedure presented in Reference 24 to derive the contribution to the channel excess noise from the variations in the intensity of the LO, in the context of the satellite-to-Earth channel. At Bob, the signal and LO are mixed on a balanced beamsplitter. Photo-detectors at the outputs measure the intensity and are subtracted to obtain the quadrature measurement. The difference in the number operator describes this measurement
urn:x-wiley:que2:media:que250:que250-math-0150()
where urn:x-wiley:que2:media:que250:que250-math-0151 is the coherent amplitude and urn:x-wiley:que2:media:que250:que250-math-0152 is the phase of the quadrature measurement. It is clear that oscillations in the amplitude urn:x-wiley:que2:media:que250:que250-math-0153 of the LO will introduce an additional excess noise to the protocol. Assuming for simplicity we intend to measure the urn:x-wiley:que2:media:que250:que250-math-0154 quadrature (urn:x-wiley:que2:media:que250:que250-math-0155). Then the difference in number operator is reduced to urn:x-wiley:que2:media:que250:que250-math-0156. Since the fluctuations in intensity and the quadratures are independent random variables, then the variance of the difference in number operator is proportional to the variance of both LO and quadrature operator,
urn:x-wiley:que2:media:que250:que250-math-0157()
urn:x-wiley:que2:media:que250:que250-math-0158()
since urn:x-wiley:que2:media:que250:que250-math-0159 and urn:x-wiley:que2:media:que250:que250-math-0160 is determined by the intensity fluctuations of the LO and VA denotes the variance of the quadrature without considering the effects of the variation of intensity in the LO (ie, Alice's modulation variance). To derive the variance in the measurement of the urn:x-wiley:que2:media:que250:que250-math-0161 quadrature considering all the effects, we rewrite urn:x-wiley:que2:media:que250:que250-math-0162 assuming a constant intensity LO with amplitude urn:x-wiley:que2:media:que250:que250-math-0163, and that the RIN in the quadrature measurement is characterized by the variance urn:x-wiley:que2:media:que250:que250-math-0164.
urn:x-wiley:que2:media:que250:que250-math-0165()
where urn:x-wiley:que2:media:que250:que250-math-0166 is the total variance including VA and the variance of the quadrature operator due to the RIN of the LO. Comparing both (29) and (30) we get
urn:x-wiley:que2:media:que250:que250-math-0167()
Finally, the resulting noise component is
urn:x-wiley:que2:media:que250:que250-math-0168()

We identify two main sources in the fluctuations of the intensity of the LO. One is the fluctuations inherent to the laser when it is generated and the second is the fluctuations caused by the atmospheric fading channel. Since these two random effects are independent, then the noise component due to intensity fluctuations of the LO becomes the sum of the two contributions urn:x-wiley:que2:media:que250:que250-math-0169. In Reference 24 the noise termdue to the fluctuations of the laser is derived and given for a realistic setup with commonly available lasers. The contribution to the total excess noise is urn:x-wiley:que2:media:que250:que250-math-0171. In Table 2, urn:x-wiley:que2:media:que250:que250-math-0172 is shown for a modulation variance of VA = 5.

Analyzing urn:x-wiley:que2:media:que250:que250-math-0173, we note that the intensity of the LO is measured over the aperture used by the receiver. That is, we consider the total power P over the aperture surface urn:x-wiley:que2:media:que250:que250-math-0174,
urn:x-wiley:que2:media:que250:que250-math-0175()
where I(x,y) is the irradiance of the LO expressed in Cartesian coordinates with the aperture centered at (x,y) = (0,0). In (32), the term urn:x-wiley:que2:media:que250:que250-math-0176 is the normalized intensity variance known as the scintillation index urn:x-wiley:que2:media:que250:que250-math-0177. We can quantify the scintillation index averaged over the aperture surface urn:x-wiley:que2:media:que250:que250-math-0178 with diameter DR
urn:x-wiley:que2:media:que250:que250-math-0179()
Then the urn:x-wiley:que2:media:que250:que250-math-0180 noise component can be rewritten as
urn:x-wiley:que2:media:que250:que250-math-0181()
The value of urn:x-wiley:que2:media:que250:que250-math-0182 can be obtained for weak atmospheric turbulence by using the atmospheric models presented in the Appendix, and calculating the first- and second-order statistical moments of the irradiance.49 The result is
urn:x-wiley:que2:media:que250:que250-math-0183()
where urn:x-wiley:que2:media:que250:que250-math-0184 is the wavenumber of the laser frequency urn:x-wiley:que2:media:que250:que250-math-0185 (c is the speed of light), urn:x-wiley:que2:media:que250:que250-math-0186 is the zenith angle, H is the altitude of the satellite at zenith angle urn:x-wiley:que2:media:que250:que250-math-0187, h0 = 0 km is the altitude of the receiver ground station, and urn:x-wiley:que2:media:que250:que250-math-0188 is the refractive index structure of the atmosphere (see Appendix). In Figure 2, we present the values of urn:x-wiley:que2:media:que250:que250-math-0189 for different receiver aperture diameters and zenith angles. We see the importance of using a large aperture in the receiver, since not only is it essential for increasing the transmissivity of the channel but also to reduce the fluctuations on intensity which translates to excess noise. The values of urn:x-wiley:que2:media:que250:que250-math-0190 are calculated for the receiver aperture diameter DR = 1 m and DR = 3 m at urn:x-wiley:que2:media:que250:que250-math-0191 and altitude H = 500 km are given in Table 2. These are urn:x-wiley:que2:media:que250:que250-math-0192 and 0.004, respectively. For the rest of this article, unless otherwise specified, we use the former value for DR = 1 m.
Details are in the caption following the image
Aperture averaged scintillation index for different receiver aperture diameters and zenith angles

4.2 Time-of-arrival fluctuations

Now we derive the pulse deformations due to transmission through the satellite-to-Earth channel, used in the calculation of the time-of-arrival fluctuations of our Table 2. In Reference 50 an analysis based on the mutual coherence function (MCF) is made, where the two-frequency MCF is defined by the average of all ensemble of pulses (see Equations (11)-(28) in Reference 50). The MCF represents the product of the FSO fields and the turbulence factor based on the first and second-order Rytov approximation. Since LEO satellites are positioned at a high enough altitude we can treat the propagation of the wave as in the far-field regime. In this regime the wave as seen by the receiver corresponds to a plane wave.

In the far-field regime corresponding to the Fresnel parameter urn:x-wiley:que2:media:que250:que250-math-0193 where W0 is the beam-waist, L is the total distance travelled by the pulse, and c is the speed of light. The beam-waist is determined by the transmitter aperture diameter which is a fundamental system parameter, as it dominates over many of the effects occurring during optical propagation. The temporal mean intensity in the far-field regime is obtained by averaging over the bandwidth of the MCF at the same radial position and time. From Reference 50, the result is
urn:x-wiley:que2:media:que250:que250-math-0194
where t′ is the time, r the radial coordinate over the wavefront of the pulse, urn:x-wiley:que2:media:que250:que250-math-0195 is the initial pulse width, and the broadened pulse width urn:x-wiley:que2:media:que250:que250-math-0196 is
urn:x-wiley:que2:media:que250:que250-math-0197()
and where urn:x-wiley:que2:media:que250:que250-math-0198 is the following integral (which we evaluate numerically),
urn:x-wiley:que2:media:que250:que250-math-0199()

Here, urn:x-wiley:que2:media:que250:que250-math-0200 where L0 and l0 denote the outer and inner scales, respectively. The inner and outer scales are introduced alongside the atmospheric model described in the Appendix. Any optical pulse sent thought through the atmosphere, will incur deformations due to variations of the refractive index of atmospheric turbulence. To fully analyse the pulse deformations we consider two effects; the broadening of the pulse, and the changes on the time-of-arrival of the pulse. Both of these effects are characterized by the value of urn:x-wiley:que2:media:que250:que250-math-0201. First, the broadening of the pulse will cause an attenuation of the average light intensity of the received signal by a factor of urn:x-wiley:que2:media:que250:que250-math-0202.51 In Figure 3, we show the ratio urn:x-wiley:que2:media:que250:que250-math-0203 as a function of urn:x-wiley:que2:media:que250:que250-math-0204 for the satellite-to-Earth channel with the parameters specified above. We see that the pulse broadening becomes considerable only for pulse widths urn:x-wiley:que2:media:que250:que250-math-0205. However, for a pulse width urn:x-wiley:que2:media:que250:que250-math-0206 ps commonly used in CV-QKD systems consistent with a 100 MHz repetition rate,46 the pulse broadening effect is negligible.

Details are in the caption following the image
Ratio of pulse broadening as a function of initial pulse width and for different zenith angles
The second and more relevant effect is the variation of the time-of-arrival ta at the detector between the signal and the LO pulses. As shown in Reference 52, the statistical properties of the time-of-arrival are obtained from the temporal statistical moments of the complex envelope describing the pulse. The analysis shows that the time-of-arrival mean and variance equal ta⟩ = L/c and urn:x-wiley:que2:media:que250:que250-math-0207, respectively. In satellite-to-Earth CS-QKD, the fluctuations of the time-of-arrival caused by the atmospheric channel contribute to the total excess noise as an additional amount51
urn:x-wiley:que2:media:que250:que250-math-0208()
where urn:x-wiley:que2:media:que250:que250-math-0209 is the timing correlation coefficient between LO and the signal. We set the correlation coefficient between signal and LO to urn:x-wiley:que2:media:que250:que250-math-0210 as in Reference 51. The noise component due to time-of-arrival fluctuations (39) increases with the pulse width urn:x-wiley:que2:media:que250:que250-math-0211. In Table 2, we determine the value for this noise component to be urn:x-wiley:que2:media:que250:que250-math-0212 for a pulse width of urn:x-wiley:que2:media:que250:que250-math-0213 ps and central frequency urn:x-wiley:que2:media:que250:que250-math-0214 THz (corresponding to a wavelength of 1550 nm).

The LO generated by Alice must have sufficient intensity at Bob such that he can perform a heterodyne/homodyne measurement. Typically, 108 photons per pulse are required at Bob's side. With a 100 MHz pulse repetition rate and pulse width of 130 ps, the required LO average power for a 20 dB channel loss (a typical loss considered here) at Alice's side is 130 mW (at 1550 nm). We have chosen the repetition rate to coincide with current detector technology.46 There are readily available coherent laser sources with these specifications. We assume the ground station has a state-of-the-art homodyne detector as in Reference 47.

In Figure 4, we compare the noise components contribution for daylight operation. As T gets smaller, the term urn:x-wiley:que2:media:que250:que250-math-0215 in (24) would dominate, but for the purpose of this figure, we compare each noise component on equal footing by setting T = 1 and urn:x-wiley:que2:media:que250:que250-math-0216. In this figure, we adopt the following values for the noise components. The electronic noise vel = 0.013 is the dominant noise component. The next dominant noise component is the RIN due to the atmosphere. For the purpose of the noise analysis, we assume the realistic scenario, where the satellite zenith angle is urn:x-wiley:que2:media:que250:que250-math-0217 (which is sufficient for a 2 − 3 minutes flyby2), a transmitter aperture diameter of DT = 0.3 m and a receiver aperture diameter of DR = 1 m with an altitude H = 500 km, implying a RIN of urn:x-wiley:que2:media:que250:que250-math-0218.

Details are in the caption following the image
Pie chart of noise contributions to urn:x-wiley:que2:media:que250:que250-math-0219 for CS-Hom protocol (urn:x-wiley:que2:media:que250:que250-math-0220) in the satellite-to-Earth channel for daylight operation. We have used values from Table 2 with laser pulse width urn:x-wiley:que2:media:que250:que250-math-0221 ps and state-of-the-art homodyne detector specifications with NLO = 108. The dominant noise term is the electronic noise at 40%, followed by RIN due to the atmosphere at 31%, the time-of-arrival fluctuations at 19% and the RIN of the LO at 6%. CS, coherent state; LO, local oscillator; RIN, relative intensity noise

The next dominant noise component is the time-of-arrival fluctuations. We set the correlation coefficient between signal and LO to urn:x-wiley:que2:media:que250:que250-math-0222 as in Reference 51. Figure 3 suggests that for pulse widths urn:x-wiley:que2:media:que250:que250-math-0223 ps, the pulse broadening due to weak turbulence is negligible and urn:x-wiley:que2:media:que250:que250-math-0224. Thus, the excess noise due to time-of-arrival fluctuations is urn:x-wiley:que2:media:que250:que250-math-0225. As expected, this noise component doesn't depend on the receiver aperture diameter.

Furthermore, urn:x-wiley:que2:media:que250:que250-math-0226 is 6% of the total excess noise. ADC noise is negligible (1%) as part of the detector noise component. All other noises urn:x-wiley:que2:media:que250:que250-math-0227, urn:x-wiley:que2:media:que250:que250-math-0228, and urn:x-wiley:que2:media:que250:que250-math-0229 are less than 1% of the total excess noise with the exception of the modulation noise which is 2%.24 Therefore, the predicted channel excess noise is urn:x-wiley:que2:media:que250:que250-math-0230 and the detector excess noise urn:x-wiley:que2:media:que250:que250-math-0231.

5 SECRET KEY RATES OF SATELLITE-TO-EARTH CS-QKD

In Figure 5, we calculate the secret key rate in the asymptotic limit against the transmissivity T for both CS-Hom and CS-Het protocols using the parameters in Table 3. Unless otherwise specified, for the rest of the article, we use the parameters in Table 3. The transmissivity on the x-axis is converted to units of dB using the formula urn:x-wiley:que2:media:que250:que250-math-0233. We compare the channel excess noises of urn:x-wiley:que2:media:que250:que250-math-0234 and that of our specified satellite-to-Earth channel. For the chosen parameter values, corresponding to a realistic experimental scenario, the difference in the secret key rate between CS-Hom and CS-Het is only evident at low loss in which the CS-Het protocol performs marginally better. The modulation variance VA is an adjustable parameter that can be optimized to maximize the secret key rate with the total excess noise and transmissivity.24 However, in atmospheric channels the transmissivity can fluctuate (although here we assume not) and the optimal value of VA at one time may not be the optimal value at another time. Unless the goal is to maximize the secret key rate each run, additional resources to optimize VA are not necessary. In our system, we choose a value of VA = 5 which is in the range of optimality for the values of transmissivity in the satellite-to-Earth channel.

Details are in the caption following the image
Secret key rate in the asymptotic limit plotted against transmissivity for CS-Hom (red) vs CS-Het (blue) for different channel excess noises urn:x-wiley:que2:media:que250:que250-math-0232 (solid) and our chosen satellite-to-Earth channel (dashed). CS, coherent state
TABLE 3. System parameters
DR H urn:x-wiley:que2:media:que250:que250-math-0235 urn:x-wiley:que2:media:que250:que250-math-0236 urn:x-wiley:que2:media:que250:que250-math-0237 VA urn:x-wiley:que2:media:que250:que250-math-0238 urn:x-wiley:que2:media:que250:que250-math-0239 urn:x-wiley:que2:media:que250:que250-math-0240 urn:x-wiley:que2:media:que250:que250-math-0241
1 m 500 km 60o 0.95 0.95 5 130 ps 1550 nm 0.0186 0.0133

In Figure 6, we calculate the secret key rate in the finite case against the transmissivity T. As seen in Figure 6 for the CS-Het protocol, the loss that can be tolerated (compared with the asymptotic limit) is less in the finite-size regime for n = 1010 and n = 1012. In this same figure, we compare the key rates for collective and general attacks using the failure probability urn:x-wiley:que2:media:que250:que250-math-0242 and urn:x-wiley:que2:media:que250:que250-math-0243 (urn:x-wiley:que2:media:que250:que250-math-0244), respectively. It is evident that the general attack does not tolerate as much loss. Note it is straightforward to convert all key rate into units of bits/s by multiplying by the laser pulse repetition frequency.

Details are in the caption following the image
Secret key rate in the finite limit for the CS-Het protocol for collective and general attacks plotted against transmissivity for different n = 1010 (dotted line), n = 1012 (solid line), and the asymptotic limit (dashed line). CS, coherent state

In Table 4, the individual impact of each noise term on the secret key rate under collective Gaussian attacks is shown in the finite-size regime with n = 1012. The background noise during daylight is approximately 1% of the total excess noise for 1550 nm light (0.0002).43 In DV-QKD, background noise from daylight can be mitigated using small spatial filtering coupled with advanced adaptive optics.54 It was noted in Reference 3 that optical systems used in CV-QKD could also use small spectral bandwidth. Consequently, the background noise can be filtered, allowing for daylight operation. Daylight CV technology was demonstrated in Reference 55, but there are no corresponding studies for CV-QKD.

TABLE 4. Individual impact of each noise term on secret key rate under collective Gaussian attacks relative to ideal case of no noise with K in the finite-size regime (ie, the ratio urn:x-wiley:que2:media:que250:que250-math-0245 for no impact and urn:x-wiley:que2:media:que250:que250-math-0246 for maximum impact)
Parameter Description Value urn:x-wiley:que2:media:que250:que250-math-0247 @ 10 dB urn:x-wiley:que2:media:que250:que250-math-0248 @ 20 dB urn:x-wiley:que2:media:que250:que250-math-0249 @ 30 dB
urn:x-wiley:que2:media:que250:que250-math-0250 Channel excess noise 0.0186 0.75 0.63 0.00
urn:x-wiley:que2:media:que250:que250-math-0251 Time-of-arrival fluctuations 0.006 0.91 0.87 0.00
urn:x-wiley:que2:media:que250:que250-math-0252 Relative intensity noise due to atmosphere 0.01 0.85 0.79 0.00
urn:x-wiley:que2:media:que250:que250-math-0253 Background noise 0.0002 1.00 1.00 0.93
urn:x-wiley:que2:media:que250:que250-math-0254 Detector efficiency 0.95 0.95 0.95 0.95
vel Electronic noise 0.013 0.99 0.99 0.81
  • Note: Other parameter values: n = 1012, urn:x-wiley:que2:media:que250:que250-math-0255, modulation variance VA = 5 and reconciliation efficiency urn:x-wiley:que2:media:que250:que250-math-0256.
  • Abbreviation: RIN, relative intensity noise.

We find that the background noise component during daylight in CS-QKD in the satellite-to-Earth channel has a negligible impact on the secret key rate, in agreement with Reference 43. For night-time operation, the secret key rate would be unchanged with urn:x-wiley:que2:media:que250:que250-math-0257. Thus, the secret key rate in Figure 6 is a lower bound, and night-time operation would improve the key rates, but is not essential.

We consider how increasing the size of the receiver aperture improves the secret key rates under general attacks. For a larger receiver aperture of DR = 3 m, we obtain a smaller channel excess noise of urn:x-wiley:que2:media:que250:que250-math-0258 and detector excess noise of urn:x-wiley:que2:media:que250:que250-math-0259. At the transmissivity T = 15 dB, a secret key rate of 2.6 × 10−3 bits/pulse is attained under general attacks for this larger receiver aperture. T = 15 dB is readily achievable in the satellite-to-Earth channel using this larger receiver aperture. For example, for the transmitter aperture of DT = 0.3 m at transceiver separation 1200 km the beam width at the ground is 12 m (and a diffraction-limited divergence of 10 urn:x-wiley:que2:media:que250:que250-math-0260rad), giving a diffraction loss of 22 dB for receiver aperture DR = 1 m (see discussion below for Micius). Extrapolating from these parameters, the receiver aperture diameter of DR = 2.3 m gives a diffraction loss of 15 dB. For this receiver aperture of DR = 2.3 m, the channel excess noise is urn:x-wiley:que2:media:que250:que250-math-0261 and a secret key rate of 2.4 × 10−3 bits/pulse is attained under general attacks.

We consider how the secret key rate changes with the system parameters in Table 3. For example, doubling the pulse period to urn:x-wiley:que2:media:que250:que250-math-0262 ps, will give a channel excess noise of urn:x-wiley:que2:media:que250:que250-math-0263. However, the secret key rate is barely changed (ie, 1.0 × 10−3 bits/pulse). We also find that from VA = 2 to VA = 8, the result doesn't significantly change. Hence, this main result is not sensitive to the parameters we have chosen for the figures.

As we grew close to the completion of our study, two other works appeared; one39 that can be made applicable to satellite-to-Earth channels and one56 directly applicable to these channels. Different from our study, these latter works had a focus on the large-scale fading effects on the QKD key rates, and different excess noise contributions. They, therefore, apply to different system models than the diffraction-only loss models we explored here. However, collectively the works of References 39, 56 and ours illustrate clearly that CV-QKD in the satellite-to-Earth channel is feasible.

Although our focus has been to demonstrate the viability of the CS-QKD protocols in satellite-to-Earth channel, it is perhaps interesting to compare our results directly with Micius. In our calculations of the secret key rates, we have assumed that transmissivity is constant.That is, transmissivity fluctuations due to atmospheric turbulence and beam-wandering are assumed small in comparison to diffraction losses.57 As just mentioned above, in the Micius satellite QKD experiment, the satellite-to-Earth channel loss due to diffraction was 22 dB at a maximum distance of 1200 km with a transmitter aperture of DT = 0.3 m, a far-field divergence of 10 urn:x-wiley:que2:media:que250:que250-math-0266 and receiver aperture of DR = 1 m.2 Additional loss occurred via atmospheric absorption and turbulence (3 to 8 dB), and loss due to pointing error (<3 dB). This gave an average total loss of 30 ± 3 dB. In calculations of the Micius QKD key rate, the failure probability was set to urn:x-wiley:que2:media:que250:que250-math-0267 which gave a key rate of 1.38 × 10−5 bits/pulse. In comparison, for our CS-Het protocol at the same security setting and same losses we find zero key rate under general attacks. It is only for losses less than 25 dB that we find nonzero rates under general attacks. We do caution, however, that direct comparisons of these two very different technologies (DV vs CV) are limited in value because the security assumptions are different. We also point out the Micius security analysis disregards information leakage due to side-channel imperfections.2 Other assumptions underpinning the Micius key rate are discussed in Reference 58. However, to be fair, we have also overlooked some assumptions that underpin our CV-QKD analysis. The most important of these are in regard to the LO—an issue we discuss next.

6 LO HACKING

6.1 Attacks

An underlying assumption implicit in key rates we have determined for the CS-QKD protocols is that the transmission of the LO through the satellite-to-Earth channel is secure and not interfered with. However, clearly this assumption is suspect as an eavesdropper can in principle obtain access to the LO, modify the channel, and subsequently obtain information on the quantum key. Here, we briefly discuss this important caveat. We mention some specific attacks and some countermeasures.

6.1.1 Equal-amplitude attack

In this attack, Eve intercepts both the LO and quantum signal and performs homodyne detections on both.59 Eve produces two squeezed states with the same intensity level. Bob cannot discover the attack because the expected noise is less than the shot noise level. When Bob compares the difference in his measurement with Alice's prepared state to the threshold from theoretical security proofs, he mistakenly confirms the channel is secure.32, 60 Eve has therefore compromised the channel. However, this security loophole can be solved if Bob can monitor the fluctuations in the intensity of the LO.61

6.1.2 Wavelength attack

In this attack, Eve modifies the intensity transmission of Bob's beamsplitter by changing the wavelength of the light from Alice. This wavelength attack deems the final keys insecure. However, it was shown in Reference 62, that adding a simple wavelength filter randomly before measuring the intensity of the LO can prevent this attack.

6.1.3 Calibration attack

The device calibration routine of the LO is susceptible to an intercept-resend attack. In this attack, Eve manipulates the LO pulses to change the clock pulses used for detection.63 More specifically, Eve changes the shape of the LO pulse which consequently induces a delay in the clock trigger. The homodyne detection will measure a lower intensity. Therefore, there will be a decrease in the response slope between the variance of the homodyne detection and the LO power. As a result, the shot noise will be overestimated and the excess noise underestimated.64 Countermeasures to this attack involves monitoring the shot noise in real time.

6.2 Local local oscillators

Motivated by these security loopholes, there has recently been a focus on using true local oscillators or local local oscillators (LLO). In such systems, two lasers are used, one at Alice for generating the quantum signal and another at Bob for the LLO. Reference pulses are sent with the signals which are used to calibrate the phase offset in the LLO.44, 65-67 However, the phase offset derived from the reference pulses is limited by quantum uncertainty, and the two lasers necessarily introduce some phase drift. In comparison to optical fiber, no phase compensation method exists for the LLO in FSO channels where additional phase noise due to atmospheric turbulence is expected,68 but these are not insurmountable issues. Despite their intuitive appeal over LO schemes, attack strategies against LLO schemes do exist. In one such attack recently proposed,69 Eve intercepts the reference pulse and estimates the phase drift using Bayesian algorithms. Consequently, the excess noise is biased to mask an intercept-resend attack and a beam-splitter attack.

In general, any pilot symbol scheme (eg, reference pulses) is always subject to manipulation by an adversary, and therefore susceptible to attacks outside the scope of current security proofs.31 Formal security analyses that account for the optimal general attack on both quantum signals and pilot symbols are needed to close this security gap. An alternative approach would be the use of a system that avoids the use of any reference signals at all for the phase referencing. Only by this means do the assumptions underpinning formal security proofs for the CV-QKD protocols we have discussed here remain intact. Recent work along these lines is given in Reference 70 where publicly announced raw key values are invoked to determine the phase offsets to be applied to the LLO. However, currently even this type of phase determinations for the LLO are not formally proven secure—an issue that hopefully will be addressed in forthcoming works.

7 DISCUSSION

In our work, we have deliberately focused on the feasibility of the simplest-to-deploy CS-QKD protocols over the satellite-to-Earth channel for which composable security is known. The reason for choosing the simplest-to-deploy CS-QKD protocols was twofold. First, early CV-based satellites will certainly deploy one of these protocols, if not both. Second, if the easiest-to-deploy protocols were shown to lead to close-to-zero key rates then more sophisticated protocols (with likely lower key rates) would likely be not interesting.

Our work largely focused on the on CS-Het protocol for which composable security in the finite key limit (ie, a deployable scenario) is known. However, it is worth mentioning that other CV-QKD protocols exist for which composable security in the finite limit is also known, such as two-mode squeezed state CV-QKD protocol.71 These other protocols in the finite-key setting are generally either more difficult to deploy or have lower expected key rates, relative to CS-Het.

An approach to preventing side-channel attacks against detectors is available via CV measurement device-independent (CV MDI-QKD) protocols. These types of CV-QKD protocols allow for untrusted devices that act as relays. Interestingly, formal proofs of security in the finite regime are known for CV MDI-QKD.38, 72, 73 An improvement to this protocol, the coherent-state-based “Twin-Field” (TF)-QKD protocol (an extension of Reference 74), has been recently proposed, for example, References 75, 76 and proof-of-principle experiments carried out in optical fiber.77 Information-theoretic security in the finite regime for CS TF-QKD has also been proposed.78 However, we do note that in scenarios where the untrusted relay is a satellite being served in the uplink, both MDI-QKD and TF-QKD will suffer losses substantially larger than the downlink losses. Phase referencing between the uplink signals sent from Alice and Bob (and authentication of each pulse so referenced—at the cost of key consumption), and phase compensation of the signals traversing the different FSO uplink channels, must also be included. All these issues will reduce the final key rate.

8 CONCLUSION

In this work, we investigated the feasibility of the simplest-to-deploy CV-QKD protocols, the CS-QKD protocols, over the satellite-to-Earth channel. We reviewed the security of these two protocols, as well as the components of the total excess noise most relevant to the satellite-to-Earth channel. Through new calculations we then determined that the most important sources of noise in our protocols over the satellite-to-Earth channel was the RIN due to the atmosphere, and the time-of-arrival fluctuations between the signal and LO. We next focused on the CS-QKD protocol with heterodyne detection in the deployable setting of a finite key regime. Given reasonable transceiver aperture sizes, and assuming diffraction as the only source of loss, we found that reasonable QKD key rates under general attacks can be anticipated. We, therefore, concluded that CV-QKD with information-theoretic security in the satellite-to-Earth channel is entirely feasible. In closing, we noted our information-theoretic security assumes that the LO is secured from manipulation by an adversary. Future useful work in this area could include formal security proofs of finite-limit CS-QKD with homodyne detection, and formal proofs of security under LO (or reference pulse) attacks.

ACKNOWLEDGEMENTS

This research was a collaboration between the Commonwealth of Australia (represented by the Defence Science and Technology Group) and the University of New South Wales through a Defence Science Partnerships agreement.

    Appendix A: Atmospheric models

    Turbulence in the Earth's atmosphere is caused by random variation in temperature and pressure. These variations alter the air's refractive index both spatially and temporally, distorting any optical waves propagating through the atmosphere. Distortions of the pulses transmitted such as beam deformation and beam wandering are one of the main sources of photon loss in the channel. To model the effects of the turbulent atmosphere on the optical signals we use Kolmogorov's theory of turbulent flow.79 The strength of the turbulence is characterized by the refractive index structure parameter, urn:x-wiley:que2:media:que250:que250-math-0268. Kolmogorov's theory is based upon the insight that turbulence is induced by eddies in the atmosphere. The scale of the turbulence can be characterized by an inner-scale l0, and an outer-scale L0.49 Eddies with a size lower than the inner-scale cannot exist since the turbulence at such scales is dissipated into the atmosphere as heat. The outer-scale denotes the upper-bound to the eddy size and is the scale at which energy is injected into the turbulence.

    To model the atmospheres vertical profile of the refractive index structure parameter, we use the widely used Hufnagel-Valley model,80
    urn:x-wiley:que2:media:que250:que250-math-0269()
    with h the altitude in meters, v = 21 the RMS wind-speed (m/s), and A = 1.7 × 10−14 the nominal value of urn:x-wiley:que2:media:que250:que250-math-0270 at the ground. In addition, measurements made of the scintillation suggest the outer scale L0 changes with the altitude according to the empirical Coulman-Vernin profile81
    urn:x-wiley:que2:media:que250:que250-math-0271()

    Finally, the inner scale is assumed to directly proportional to the outer scale urn:x-wiley:que2:media:que250:que250-math-0272, with urn:x-wiley:que2:media:que250:que250-math-0273.50

    To describe the fluctuations of the refractive index we use a spectral density function82
    urn:x-wiley:que2:media:que250:que250-math-0274()
    with urn:x-wiley:que2:media:que250:que250-math-0275 the radial spatial frequency on a plane orthogonal to the propagation direction, urn:x-wiley:que2:media:que250:que250-math-0276, urn:x-wiley:que2:media:que250:que250-math-0277, and r0 the Fried parameter for a vertical propagation length49
    urn:x-wiley:que2:media:que250:que250-math-0278()
    where h0 and H correspond to the lower and upper altitudes of the propagation path.

    • 1 Currently, a formal proof of security in the finite limit for the CS-Hom protocol is unavailable.
    • 2 We implicitly assume in all calculations that the vacuum noise is normalized to 1 by setting urn:x-wiley:que2:media:que250:que250-math-0008.
    • 3 When we refer to “secret key rate” in this article, we actually mean a lower bound on the rate.
    • 4 d is the bits of precision encoded by the symbol. In this work, we set d = 5 as in Reference 38.
    • 5 In a real-world deployment the maximum-likelihood estimators can be computed from the measurement data to determine Tmin and urn:x-wiley:que2:media:que250:que250-math-0064.35, 36
    • 6 In the rest of the article, unless stated otherwise, we choose ne = n = 1012, implying n/N = 0.5.
    • 7 Even in cases where nonconstant transmissivity is present, channel postselection using the LO can render a subset of the channels to lie within an effective constant transmissivity window. QKD rates can then be approximated via summation of rates arising from these subsets.
    • 8 Note the QKD key rates of Reference 41 are based on the use of an LO generated directly at the receiver (not one transmitted with the signal), and therefore cannot be directly compared with the key rates reported here.
    • 9 In the limit of T → 0, Bob's variance of the quadrature operator reduces to urn:x-wiley:que2:media:que250:que250-math-0095 as expected.
    • 10 The channel excess noise is defined with respect to the input, and is thus multiplied by the transmissivity T and urn:x-wiley:que2:media:que250:que250-math-0098 in the covariance matrix.
    • 11 The detector excess noise is defined with respect to the output and hence T and urn:x-wiley:que2:media:que250:que250-math-0132 cancel out in the covariance matrix.
    • 12 urn:x-wiley:que2:media:que250:que250-math-0170 where RINLO = 1.4 × 10−7Hz−1 is the RIN and BLO = 10 KHz is the optical bandwidth of the LO.24
    • 13 In real-world cryptography it is the key rate in bits/s that is ultimately of interest. However, conversion from bits/pulse to bit/s must consider the time to decode the finite, but very large, block lengths (multiplying by the pulse repetition rate is only formally valid when the reconciliation time is zero). Optimization of the bit/s key rate can be nontrivial in some circumstances.53
    • 14 Note in our calculations we have assumed that the transmissivity remains constant over the block length. Receiving a block length of 1012 from a 100 MHz source would require minutes of transmission time. For block lengths larger than 1010 it is likely that the impact of satellite motion on transmissivity would need to be considered within the calculations unless a corresponding higher-rate source was utilized.
    • 15 The statistical nature of the turbulence only manifests itself in our calculations through the excess noise contributions. In particular, this is through the impact of scintillation on urn:x-wiley:que2:media:que250:que250-math-0264 and on the random refractive index perturbations on urn:x-wiley:que2:media:que250:que250-math-0265. Under the assumption of diffraction-only losses, the constant transmissivity T of the channel is determined via the system parameters, DT, DR, and L. Of course, these parameters must be set so that the diffraction-only loss assumption is a reasonable one.

    The full text of this article hosted at iucr.org is unavailable due to technical difficulties.