Convergence of Density Operators and Security of Discrete Modulated CVQKD Protocols
Abstract
This communication deals with the problem of bounding the approximation error on weak convergence of mixed coherent state towards a Gaussian thermal state. In the context of CVQKD with discrete modulation, we develop expressions for two specific cases. The first one is the distance between the Gaussian equivalent bipartite state and a reference Gaussian modulated (GG02) and the second one is for the trace distance between the constellation and a thermal state with same photon number. Since, in the convex set of density operators, weak convergence implies convergence in the trace norm, knowing how fast the sequence gets close to the equivalent Gaussian state has implication on the security of QKD Protocols. Here we derive two bounds on the distance, one of them related with an energy test that can be used in the security proof.
I Preliminaries
In this section, we discuss the discrete modulated (DM) CVQKD protocol and the framework of our analysis. Consider a complex-valued random variable , with alphabet and . For simplicity and compatibility with usual digital communication systems, we assume that and whenever it is clear from the context, we drop the subscript and use only . We also use the notation and assume that is symmetric around the origin111This assumptions comes without loss of generality as the constellations approaching the AWGN channel capacity are usually symmetric., that is, . The -state DM-CVQKD prepare and measure protocol induced by works as follows.
-
1.
State Preparation - At each round, Alice draws from and prepares a coherent state . The modulation scheme is represented by the ensemble , , which is the mixture and the register stores Alice’s random experiment outcomes.
-
2.
Quantum Transmission and Measurement - The prepared state is sent through a one-mode quantum channel such that Bob observes the mixture and performs heterodyne detection, denoted by the operator . Measurement results are stored in .
-
3.
Sifting - After the conclusion of rounds, Alice and Bob agree on a small random subset of to form the test set to be used in parameter estimation. The values of and indexed by are publicly announced and then discarded. The remaining raw key values are indexed by and represented by and on Alice and Bob’s sides, respectively.
-
4.
Parameter estimation - Once the test set is defined, Alice and Bob use them to estimate the quantum channel parameters, mainly by estimating the data first and second moments. Based on the estimated values, they evaluate whether it is possible to distill a secret key and if it is not, they abort the protocol and go back to step (i).
-
5.
Data Estimation - Before information reconciliation, Bob performs an estimation procedure in order to retrieve a sequence , where is some estimation function. If has uniform distribution, i.e., , is a minimum distance estimator
(1) where (respec. ) denotes the -th element of (respec. ). In the case of nonuniform distribution, which will be the relevant case, is the maximum a posteriori (MAP) estimator,
(2) -
6.
Reconciliation and Privacy Amplification - Alice and Bob choose a suitable error correction protocol and privacy amplification, which must agree with the quantities evaluated during parameter estimation. They then apply error correction and privacy amplification to generate the secret key.
II On the Convergence of Constellations
Theorem 1 (Operator norm convergence [1]).
Let be a sequence of density operators in weakly converging to . Then converges in the norm to .
A direct consequence of Teorema 1 is that the density operators representing constellations of coherent states also converge in trace norm to the Gaussian mixture of coherent states, . However, it is of interest to know the convergence speed of the constellation. The next proposition provides an upper bound for the distance between and by considering a reduction in the relevant subspace dimension.
Proposition 2 (Approximation error of convergent sequences).
Let be a sequence of density operators weakly converging to and let . Then, .
Proof.
The limit provided by Proposição 2 is related to the results developed in [3], where the unconditional security of the Gaussian modulation protocol against arbitrary attacks is reduced to collective attacks by using an energy test that truncates the Fock space. The next proposition relates the convergence of the sequence of operators to the convergence of the eigenvalues and eigenvectors. To address this issue, we will use some results from the theory of perturbation of linear operators.
The following theorem provides an upper bound for the distance between the eigenvalues of linear operators, which will be useful in analyzing the convergence of the eigenvalues of the convergent sequence of density operators [4, Chapter V, Theorem 4.10].
Theorem 3 (Perturbation of eigenvalues).
Let be a self-adjoint operator, and symmetric. Then, is self-adjoint, and , where denotes the eigenvalue spectrum of the operator.
Proposition 4.
Consider the convergence and the spectral decompositions and . Then,
-
1.
For all , ,
-
2.
For all , .
Proof.
Take and so that . For the first part of the proposition, Teorema 3 results in , which can be made arbitrarily small with an increasing since the weak convergence of operators in coincides with the trace norm convergence. For the second part, take an eigenvalue of and a smooth closed curve in containing and no other eigenvalues of . Using the expression in (41),
(8) | ||||
(9) |
where is the projector corresponding to the eigenvalue of , and the remaining term is related to the perturbation . Expanding the sum, we have
(10) | ||||
(11) |
resulting in
(12) |
Then, the difference between the projectors is
(13) | ||||
(14) | ||||
(15) | ||||
(16) |
which can be made arbitrarily small since . ∎
Proposition 5.
Let and be a sequence of random variables converging in distribution to , and let be a purification of . Then , where is the purification of the constellation, and is the EPR state with .
Proof.
(17) | ||||
(18) | ||||
(19) | ||||
(20) | ||||
(21) |
where the convergence of eigenvalues and eigenvectors is according to LABEL:prop:spectrum-convergence. Taking and , we have and . Thus,
(22) |
Alternatively, consider arbitrary such that, without loss of generality, they can be decomposed as and . Then,
(23) | ||||
(24) | ||||
(25) | ||||
(26) |
so that converges weakly to and, consequently, converges in norm. ∎
Having dealt with the convergence of the purification of the bipartite state that purifies the constellation, the next step is to address the covariance matrix, specifically the lower bound for the covariance between different-mode quadratures. As discussed earlier, the amount of information available to the eavesdropper is inversely proportional to the magnitude of , and the results previously discussed show the secret key rate of QAM-like modulations close to the rates for continuous Gaussian modulation indicate that approaches .
Among the relevant terms, and depend only on the average energy of the modulation scheme, which is a protocol parameter and does not depend on the specific type of constellation shape. Therefore, the secret key rate, being a function of the covariance matrix, where they differ only in the off-diagonal term (from the perspective of a block matrix), leads to using the Hilbert-Schmidt inner product for matrices and the induced norm. The Hilbert-Schmidt distance between the matrices
will be {widetext}
(27) | |||
(28) | |||
(29) | |||
(30) | |||
(31) | |||
(32) | |||
(33) |
since depends on and, in the limit , ; similarly, due to the convergence of the bipartite state, .
III Unconditional security
The two techniques used to reduce the class of arbitrary attacks to collective attacks are effective in the context of QKD protocols with discrete variables, such as BB84, but they are not directly applicable in the analysis of protocols with continuous variables due to the dimension of the Hilbert space. One solution is to use an energy test before the protocol’s execution in conjunction with a projector in a finite-dimensional subspace . The idea is that if the states measured by Bob have an average energy lower than a pre-established parameter, the probability of the bipartite state shared by Alice and Bob ”residing” in a finite-dimensional subspace increases exponentially with ”.
In particular, the security proof against arbitrary attacks developed in [3] for the protocol222The analyzed protocol uses Gaussian modulation combined with heterodyne detection. uses an energy test and the projection in a -dimensional subspace, such that
(34) |
where , , , and . By employing the projector map in a finite-dimensional subspace, it was possible to use the results of the Postselection theorem to bound the first term on the right side of inequality (34), while the second term was upper-bounded by fixing the state of the diamond distance optimization to a product state, equivalent to the assumption of a collective attack, such that
(35) |
The term precisely denotes the probability of the state shared by Alice and Bob passing the energy test and being outside the relevant -dimensional subspace for security analysis, which decreases exponentially with and is proportional to the distance between a thermal state and a convergent mixture of coherent states (Proposition LABEL:prop:erro-aproximacao). Therefore, it is expected that the unconditional security factor for a protocol with discrete modulation, where the constellation converges in distribution to a Gaussian curve, is proportional to the security developed in [3] for a protocol with continuous modulation.
However, there are still operational factors that may make the unconditional security proofs developed for Gaussian protocols incompatible with non-Gaussian modulation protocols, mainly due to the symmetrization procedures used to guarantee the necessary symmetry arguments. The Finetti and Postselection theorems assume that the protocol is invariant under permutations, and in [3, 5, 6], the security (and composability) proofs of protocols with Gaussian modulation use passive linear operations (beam splitters and phase displacements) before measuring the states received by Bob to apply rotations in the phase space and exploit the protocol’s invariance to rotations. As discussed in Section LABEL:sec:problemas-formatacao, the architecture of a transmitter for constellations with probabilistic shaping would be incompatible with random permutations of subsystems, preventing the protocol from having the required property in the assumptions of the security proof.
Regarding rotations in the phase space, a potential problem is that these rotations result in rotations in the vector representing the measurement outcomes. The possibility of reversing the effect of the symmetrization procedure by applying the inverse operation does not solve the problem since DM-CVQKD protocols must use an optimized detection architecture that is tailored to the constellation format. Therefore, it is naive to assume that applying the symmetrization procedure to the multimode state and then reversing the effect by applying a rotation to the measurement data maintains the protocol’s performance intact. To achieve this, it is necessary to ensure that the operation that performs rotations in the phase space commutes with the coherent pulse detection system and the constellation symbol estimation, whose description in terms of POVMs is not yet known [7]. Additionally, the symmetrization procedure, which corresponds to a network of beam splitters and phase displacements, becomes impractical in realistic scenarios with a large number of transmitted states.
Furthermore, it is important to emphasize that the assumption used in [8], that for a protocol with non-Gaussian modulation in which the distance and the Gaussian modulation protocol has unconditional security , the non-Gaussian protocol would then be -secure, where encompasses a ”preparation error” of the thermal state in a Gaussian modulation, derived in [9]. The problem with this approach is that in [9], the preparation error refers to the limitation of the modulation device in generating truncated values in the preparation of coherent states and is calculated in the scenario where the running protocol is with Gaussian modulation, such that Bob and Eve expect to observe a thermal state. Therefore, the security factor does not directly apply to the case of discrete modulations, where there is no truncation error in the modulation, and Bob (and Eve) do not expect to observe a thermal state at Alice’s laboratory output.
[Perturbation Theory in a Nutshell] In this section, a brief introduction to the theory of perturbation of linear operators will be given, restricted only to the necessary points for the proof of LABEL:prop:spectrum-convergence. For further details, refer to the textbook Consider a Banach space333A Banach space is defined as a complete normed vector space, where completeness is related to the existence of limits for every Cauchy sequence , . A Hilbert space is then a Banach space whose norm is induced by the inner product. and a linear operator . An eigenvalue of is defined as a complex number for which there exists a nonzero element in the domain of that satisfies the identity , and is an eigenvector of associated with the eigenvalue . Similarly, is an eigenvalue of if the null space of the transformation is nontrivial, with being the multiplicity of . Assume that is closed444An operator is said to be closed if its domain is a closed set. in . Then, is closed for every , and if is invertible,
(36) |
is called the resolvent of , and belongs to the resolvent set of , defined as the complement (with respect to the complex plane) of the spectrum of , i.e., . The resolvent set is a subset of for which, given a nonzero element , there exists a solution to the equation
(37) |
Consider the perturbed operator , . is called the unperturbed operator, and it is valid to question how the eigenvalue spectrum and eigenvectors of change as the operator is perturbed. In general, the perturbation will be of the same order of magnitude as . As it will be relevant in this work to analyze the perturbation of eigenvalues and eigenvectors according to the norm of the perturbation operator, , we will use the notation , and denote the perturbed operator by . Represent the resolvent of the perturbed operator by as
(38) |
It is possible to represent the resolvent as a power series in (and consequently in ), resulting in
(39) | ||||
(40) |
where , is called the second Neumann series for the resolvent and denotes the effects of the operator on the resolvent set, which is directly connected to the eigenvalue spectrum. Similarly, the perturbation in the eigenprojectors of can be observed. Let be an eigenvalue of with multiplicity , and let be a closed curve in containing and no other eigenvalues of . The operator defined by
(41) | ||||
(42) |
is a projector that equals the sum of all eigenprojectors related to the eigenvalues of that lie within , where .
References
- [1] A. S. Holevo, Quantum Systems, Channels, Information: A Mathematical Introduction, 2nd ed., ser. Texts and Monographs in Theoretical Physics. Berlin ; Boston: De Gruyter, 2019.
- [2] A. Wehrl, “Three theorems about entropy and convergence of density matrices,” Reports on Mathematical Physics, vol. 10, no. 2, pp. 159–163, Oct. 1976.
- [3] A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Physical Review Letters, vol. 110, no. 3, p. 030502, Jan. 2013.
- [4] T. Katō, Perturbation Theory for Linear Operators, ser. Classics in Mathematics. Berlin: Springer, 1995.
- [5] A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett., vol. 114, no. 7, 2015.
- [6] ——, “Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction,” Phys. Rev. Lett., vol. 118, no. 20, 2017.
- [7] Z. Chen, X. Wang, S. Yu, Z. Li, and H. Guo, “Continuous-mode quantum key distribution with digital signal processing,” npj Quantum Information, vol. 9, no. 1, p. 28, Mar. 2023.
- [8] F. Roumestan, A. Ghazisaeidi, J. Renaudier, P. Brindel, E. Diamanti, and P. Grangier, “Demonstration of probabilistic constellation shaping for continuous variable quantum key distribution,” in 2021 Optical Fiber Communications Conference and Exhibition (OFC), 2021, pp. 1–3.
- [9] P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfections in practical continuous-variable quantum key distribution,” Phys. Rev. A, vol. 86, p. 32309, 2012.