You are on page 1of 4

RAPID COMMUNICATIONS

PHYSICAL REVIEW A, VOLUME 61, 010303共R兲

Continuous variable quantum cryptography


T. C. Ralph*
Department of Physics, Faculty of Science, The Australian National University, ACT 0200 Australia
共Received 22 July 1999; published 8 December 1999兲
We propose a quantum cryptographic scheme in which small phase and amplitude modulations of cw light
beams carry the key information. The presence of Einstein-Podolsky-Rosen type correlations provides the
quantum protection.

PACS number共s兲: 03.67.Dd, 42.50.Dv

Quantum cryptographic schemes use fundamental proper- particular rf frequency with respect to the optical carrier. The
ties of quantum mechanics to ensure the protection of ran- quantum noise that is inevitably added when dividing the

dom number keys 关1,2兴. In particular, the act of measurement mode is V m . The splitting ratio is ␩ ⫾ and ␩ ⫹ ⫽1⫺ ␩ ⫺ 共e.g,
in quantum mechanics inevitably disturbs the system. Fur- a 50:50 beam splitter has ␩ ⫹ ⫽ ␩ ⫺ ⫽0.5). The spectral pow-
thermore, for single quanta, such as a photon, simultaneous ers are normalized to the quantum noise limit 共QNL兲 such
measurements of noncommuting variables are forbidden. By that a coherent beam has V ⫾ n ⫽1. Normally the partition
randomly encoding the information between noncommuting ⫾
noise will also be at this limit (V m ⫽1). For a classical light
observables of a stream of single photons any eavesdropper ⫾
field, i.e., where V n Ⰷ1 the penalty will be negligible. How-
共Eve兲 is forced to guess which observable to measure for ever, for a coherent beam a halving of the signal-to-noise
each photon. On average, half the time Eve will guess ratio for both quadratures is unavoidable when the splitting
wrong, revealing herself through the back action of the mea- ratio is a half. The Hartley-Shannon law 关5兴 applies to
surement to the sender 共Alice兲 and receiver 共Bob兲. There are Gaussian, additive-noise, communication channels such as
some disadvantages in working with single photons, particu- we will consider here. It shows, in general, that if informa-
larly in free space, where scattered light levels can be high. tion of a fixed bandwidth is being sent down a communica-
Also it is of fundamental interest to quantum information tion channel at a rate corresponding to the channel capacity
research to investigate links between discrete-variable, and the signal-to-noise ratio is reduced, then errors will in-
single-photon phenomena and continuous variable, multi- evitably appear at the receiver. Thus, under such conditions,
photon effects. This motivates a consideration of quantum any attempt by an eavesdropper to make simultaneous mea-
cryptography using multiphoton light modes. In particular, surements will introduce errors into the transmission. In the
we consider encoding key information as small signals car- following we will first examine what level of security is
ried on the amplitude and phase quadrature amplitudes of the guaranteed by this uncertainty principle if a coherent state
beam. These are the analogues of position and momentum mode is used. We will then show that the level of security
for a light mode and hence are continuous, conjugate vari- can in principle be made as strong as for the single quanta
ables. Although simultaneous measurements of these non- case by using a special type of two-mode squeezed state. The
commuting observables can be made in various ways, for question of optimum protocols and eavesdropper strategies is
example, splitting the beam on a 50:50 beam splitter and complex and has been studied in detail for the single quanta
then making homodyne measurements on each beam, the case 关6兴. Here we only examine the most obvious strategies
information that can be obtained is strictly limited by the and do not attempt to prove equal security for all possible
generalized uncertainty principle for simultaneous measure- strategies.
ments 关3,4兴. If an ideal measurement of one quadrature am- Consider the setup depicted in Fig. 1. A possible protocol
plitude produces a result with a signal to noise of is as follows. Alice generates two independent random
V s⫾ strings of numbers and encodes one on the phase quadrature
共 S/N 兲 ⫾ ⫽ , 共1兲 and the other on the amplitude quadrature of a bright coher-
V⫾
n ent beam. Bob uses homodyne detection to detect either the
amplitude or phase quadrature of the beam when he receives
then a simultaneous measurement of both quadratures cannot
give a signal-to-noise result in excess of


共 S/N 兲 sim ⫽ 冉 ␩ ⫾ V s⫾
␩ ⫾V ⫾
n ⫹ ␩ 冊

⫿ ⫾ S/N .
V m
共2兲

Here V s⫾ and V ⫾
n are, respectively, the signal and noise
power of the amplitude (⫹) or phase (⫺) quadrature at a

*FAX: ⫹61 7 3365 1242. FIG. 1. Schematic of the coherent light cryptographic setup. AM
Electronic address: ralph@physics.uq.edu.au is an amplitude modulator while PM is a phase modulator.

1050-2947/99/61共1兲/010303共4兲/$15.00 61 010303-1 ©1999 The American Physical Society


RAPID COMMUNICATIONS

T. C. RALPH PHYSICAL REVIEW A 61 010303共R兲

However, for bright beams it is possible to make simulta-


neous measurements of the quadratures, with the caveat that
there will be some loss of information. So a second strategy
that Eve could follow would be to split the beam in half,
measure both quadratures, and impose the information ob-
tained on the respective quadratures of another coherent
beam that she sends to Bob 关Fig. 2共b兲兴. How well will this
strategy work? Suppose Alice wishes to send the data to Bob
with a bit error rate 共BER兲 of about 1%. For bandwidth lim-
ited transmission of binary pulse code modulation 关7兴 the
BER is given by

B⫽ erfc 冑 12 S/N.
1 1
共3兲
2 2

Thus Alice must impose her data with a S/N ratio of about
13 dB. For simultaneous measurements of a coherent state
the signal-to-noise ratio obtained is halved 关see Eq. 共2兲兴. As
a result, using Eq. 共3兲, we find the information Eve intercepts
and subsequently passes on to Bob will only have a BER of
6%. This is clearly a superior strategy and would be less
FIG. 2. Schematics of three eavesdropper strategies. Only 共a兲 is easily detected. Furthermore, Eve could adopt a third strat-
available in single quanta schemes. egy of only intercepting a small amount of the beam and
doing a simultaneous detection on it 关Fig. 2共c兲兴. For ex-
it. He swaps randomly which quadrature he detects. On a
ample, by intercepting 16% of the beam, Eve could gain
public line Bob then tells Alice at which quadrature he was
information about both quadratures with a BER of 25%,
looking at any particular time. They pick one quadrature to
while Bob and Alice would observe only a small increase of
be the test and the other to be the key. For example, they
their BER to 1.7%. In other words, Eve could obtain about
may pick the amplitude quadrature as the test signal. They
the same amount of information about the key that she could
would then compare results for the times that Bob was look-
obtain using the ‘‘guessing’’ strategy, while being very dif-
ing at the amplitude quadrature. If Bob’s results agreed with
ficult to detect, especially in the presence of losses.
what Alice sent, to within some acceptable error rate, they
The preceding discussion has shown that a cryptographic
would consider the transmission secure. They would then use
scheme based on coherent light provides much less security
the undisclosed phase quadrature signals, sent while Bob was
than single quanta schemes 关8兴. We now consider whether
observing the phase quadrature, as their key. By randomly
squeezed light can offer improved security. For example,
swapping which quadrature is key and which is test through-
amplitude squeezed beams have the property V ⫹ ⫺
n ⬍1⬍V n .
out the data comparison an increased error rate on either
Because the amplitude quadrature is sub-QNL, greater deg-
quadrature will immediately be obvious.
To quantify our results we will consider the specific en- radation of S/N than the coherent case occurs in simulta-
coding scheme of binary pulse code modulation, in which neous measurements of amplitude signals 关see Eq. 共2兲兴. Un-
the data is encoded as a train of 1 and 0 electrical pulses that fortunately the phase quadrature must be super-QNL; thus
are impressed on the optical beam at some rf frequency using there is less degradation of S/N for phase signals. As a result
electro-optic modulators. The amplitude and phase signals the total security is in fact less than for a coherent beam.
are imposed at the same frequency with equal power. Let us However, in the following we will show that by using two
now consider what strategies Eve could adopt 共see Fig. 2兲. squeezed light beams, security comparable to that achieved
Eve could guess which quadrature Bob is going to measure with single quanta can be obtained.
and measure it herself 关Fig. 2共a兲兴. She could then reproduce The setup is shown in Fig. 3. Once again Alice encodes
the digital signal of that quadrature and impress it on another her number strings digitally, but now she impresses them on
coherent beam that she would send on to Bob. She would the amplitude quadratures of two, phase locked, amplitude
learn nothing about the other quadrature through her mea- squeezed beams a and b, one on each. A ␲ /2 phase shift is
surement and would have to guess her own random string of imposed on beam b and then they are mixed on a 50:50 beam
numbers to place on it. When Eve guesses the right quadra- splitter. The resulting output modes c and d are given by

c⫽ 冑 12 共 a⫹ib 兲 ,
ture to measure, Bob and Alice will be none the wiser; how-
ever, on average 50% of the time Eve will guess wrong.
Then Bob will receive a random string from Eve unrelated to 共4兲
the one sent by Alice. These will agree only 50% of the time. d⫽ 冑 12 共 a⫺ib 兲 .
Thus Bob and Alice would see a 25% bit error rate in the test
transmission if Eve were using this strategy. This is analo- These beams are now in an entangled state that will exhibit
gous to the result for single quanta schemes in which this Einstein-Podolsky-Rosen 共EPR兲 type correlations 关9,10兴. Lo-
type of strategy is the only available. cal oscillator beams 共LO’s兲 of the same power as, and with
010303-2
RAPID COMMUNICATIONS

CONTINUOUS VARIABLE QUANTUM CRYPTOGRAPHY PHYSICAL REVIEW A 61 010303共R兲

time delay. For small phase shifts beam c becomes c ⬘ ⫽(a


⫹ib)(1⫹i ␾ ). Mixing c ⬘ and d on a beam splitter will pro-
duce outputs with amplitude power spectra

V c ⬘ ⫹d ⫽V s,a ⫹V n,a ⫹ ␣ 2V ␾ ,

共7兲
V c ⬘ ⫺d ⫽V s,b ⫹V n,b ⫹ ␣ 2V ␾ ,

where ␣ 2 is proportional to the intensity of beams a and b


and V ␾ is the power spectrum of the phase fluctuations. If
FIG. 3. Schematic of squeezed light cryptographic setup. Sqza ␾ (t) has a white power spectrum over frequencies from well
and sqzb are phase-locked squeezed light sources. Rna and Rnb are below to well above the signal frequency, the signals will be
independent random number sources. Bs and pbs are nonpolarizing obscured. It is not possible to directly control the phase shifts
and polarizing beam splitters, respectively. Half-wave plates to ro- without similarly suppressing the signals. However, the
tate the polarizations are indicated by ␭/2 and optical amplification phase shifts are also present on the LO copropagating with
by A. The ␲ /2 phase shift is also indicated. HD stands for homo- c ⬘ . Mixing the two LO’s will produce an output with ampli-
dyne detection system. tude power spectra

their polarizations rotated to be orthogonal to, c and d are V ⫹LO ⫽1⫹E 2 V ␾ , 共8兲
then mixed with the beams on polarizing beam splitters. A
rapidly varying random time delay is imposed on one of the where E 2 is proportional to the intensity of the LO’s and the
beams. Both mixed beams are then transmitted to Bob, who ‘‘one’’ is from the quantum noise of the LO’s. It is possible
uses polarizing beam splitters to extract the local oscillator to use this output to control the phase noise on the mixed
from each beam. Bob cannot remix the signal beams (c and signal beams, giving 共ideally兲 the amplitude power spectra
d) to separate a and b because the random time delay intro- ␣2
C ⫹
duced between the beams has destroyed their coherence at V c ⬘ ⫹d ⫽V s,a ⫹V n,a ⫹ ,
the signal frequency. However, because each beam has a E2
corresponding local oscillator that has suffered the same time 共9兲
delays, Bob can make individual, phase-sensitive measure- C ⫹
␣2
V c ⬘ ⫺d ⫽V s,b ⫹V n,b ⫹ ,
ments on each of the beams and extract either the informa- E2
tion on a or the information on b by amplifying the local
oscillators and using balanced homodyne detection. Note where the remaining penalty arises from the quantum noise
that the noise of the LO’s is increased by amplification, but of the LO’s. If E 2 Ⰷ ␣ 2 共as is normally the case for a LO兲
balanced homodyne detection is insensitive to LO noise. He then this penalty can be made negligible, thus retrieving the
randomly chooses to either 共i兲 measure the amplitude signals. This is why it is essential that the LO’s have the
quadratures of each beam and add them together, in which same power as the signal beams at the point where the phase
case he obtains the power spectrum fluctuations are imposed. This makes the ratio of the corre-
lated phase noise to the independent quantum noise the same
for the LO and the signal beam. This cannot be changed by
V ⫹ ⫽ 具 兩 共 c̃ † ⫹c̃ 兲 ⫹ 共 d̃ † ⫹d̃ 兲 兩 2 典
Eve. With E 2 ⫽ ␣ 2 the penalty is at the quantum limit. As we

⫽V s,a ⫹V n,a , 共5兲 shall see in a moment this is sufficient to reveal Eve.
Eve can still adopt the guessing strategy by detecting a
where the tildes indicate Fourier transforms 共thus he obtains particular quadrature of both beams and then using a similar
the data string impressed on beam a,V s,a , imposed on the apparatus to Alice’s to resend the beams. As before she will

sub-QNL noise floor of beam a,V n,a ); or 共ii兲 measure the only guess right half the time, thus introducing a BER of
phase quadratures of each beam and subtract them, in which 25%. Suppose instead she tries the second strategy of simul-
case he obtains the power spectrum taneous detection of both quadratures on each beam. She will
obtain the following power spectra for the summed ampli-
V ⫺ ⫽ 具 兩 共 c̃ † ⫺c̃ 兲 ⫺ 共 d̃ † ⫺d̃ 兲 兩 2 典 tude quadratures and the differenced phase quadratures:

⫽V s,b ⫹V n,b , 共6兲 1 ⫹
V ⫹ ⫽ 共 V s,a ⫹V n,a ⫹1 兲
2
i.e., he obtains the data string impressed on beam b,V s,b ,

imposed on the sub-QNL noise floor of beam b,V n,b . Thus 1 ⫹
the signals lie on conjugate quadratures but both have sub- V ⫺ ⫽ 共 V s,b ⫹V n,b ⫹1 兲 . 共10兲
2
QNL noise floors. This is the hallmark of the EPR correla-
tion 关11兴. The signal-to-noise ratio is reduced as predicted by Eq. 共2兲,
Consider now eavesdropper strategies. First, like Bob, but where the noise power for both quadrature measurements
Eve cannot remix c and d optically to obtain a and b due to is sub-QNL 关12兴. This leads to improved security. For ex-
the randomly varying phase shift 关 ␾ (t) 兴 introduced by the ample, with 10-dB squeezing (V n,a ⫽V n,b ⫽0.1) the signal-
010303-3
RAPID COMMUNICATIONS

T. C. RALPH PHYSICAL REVIEW A 61 010303共R兲

to-noise ratio in a simultaneous measurement will be reduced squeezing and 20% loss the second strategy penalty is re-
by a factor of 0.09. As a result, assuming initial S/N of 13 duced to a BER of 7.5%, similar to that of the coherent state
dB and using Eq. 共3兲, we find the information Eve intercepts scheme. However, for the third strategy, Eve must still inter-
and subsequently passes on to Bob will now have a BER of cept 29% of the light to obtain a BER of 25% and this will
about 24%. In other words, the security against an eaves- cause an 11% BER in Alice and Bob’s shared information,
dropper using simultaneous measurements is now on a par much larger than for the coherent case. Although these re-
with the guessing strategy. The third strategy is also now of sults demonstrate some tolerance to loss for our continuous
no use to Eve, as small samples of the fields carry virtually variable system it should be noted that single quanta schemes
no information. For example, with 10-dB squeezing, inter- can tolerate much higher losses 关14兴 making them more prac-
cepting 16% of the field will give Eve virtually no informa- tical from this point of view.
tion 共a BER of 49.5%兲 while already producing a 5% BER in In summary we have examined the quantum crypto-
Bob and Alice’s shared information.
graphic security of two continuous variable schemes, one
In any realistic situation losses will be present. Losses
based on coherent light, the other based on two-mode
tend in general to reduce security in quantum cryptographic
squeezed light. While the coherent light scheme is clearly
schemes 关13兴. The problem for our system is that losses force
Alice to increase her initial S/N in order to pass the infor- inferior to single quanta schemes, the squeezed light scheme
mation to Bob with a low BER. Eve can take advantage of offers, in principle, equivalent security. The quantum secu-
this by setting up very close to Alice. Nevertheless, reason- rity is provided by the generalized uncertainty relation. It is
able security can be maintained with sufficiently high levels also essential that the coherence between the two squeezed
of squeezing. For example, with 10-dB squeezing and 10% modes is destroyed. More generally this system is an ex-
loss, strategy two will result in a 15% BER in the shared ample of a new quantum information technology based on
information. Also Eve must intercept 29% of the light to continuous variable, multiphoton manipulations 关15兴. Such
obtain a 25% BER using the third strategy that will cause a technologies may herald a new approach to quantum infor-
20% BER in Alice and Bob’s information. With 6-dB mation.

关1兴 S. Wiesner, SIGACT News 15, 78 共1983兲. difference between 1,0 and 0,1. This again leads to a 25%
关2兴 C.H. Bennett and G. Brassard, in Proceedings IEEE Interna- BER.
tional Conference on Computers, Systems and Signal Process- 关9兴 A. Einstein, B. Podolsky, and N. Rosen, Phys. Rev. 47, 777
ing (Bangalore) 共IEEE, New York, 1984兲, pp. 175–179. 共1935兲.
关3兴 Y. Yamamoto and H.A. Haus, Rev. Mod. Phys. 58, 1001 关10兴 G. Yeoman and S.M. Barnett, J. Mod. Opt. 40, 1497 共1993兲;
共1986兲. T.C. Ralph and P.K. Lam, Phys. Rev. Lett. 81, 5668 共1998兲.
关4兴 E. Arthurs and M.S. Goodman, Phys. Rev. Lett. 60, 2447 关11兴 Z.Y. Ou, S.F. Pereira, H.J. Kimble, and K.C. Peng, Phys. Rev.
共1988兲. Lett. 68, 3663 共1992兲.
关5兴 C.E. Shannon, Bell Syst. Tech. J. 27, 623 共1948兲. 关12兴 The signal to noise properties of Eq. 共9兲 are the same as those
关6兴 C.A. Fuchs and A. Peres, Phys. Rev. A 53, 2038 共1996兲; C.A. of Eq. 共10兲.
Fuchs, N. Gisin, R.B. Griffiths, C.-S. Niu, and A. Peres, ibid.
关13兴 S.M. Barnett and S.J.D. Phoenix, Philos. Trans. R. Soc. Lon-
56, 1163 共1997兲; I. Cirac and N. Gisin, Phys. Lett. A 229, 1
don, Ser. A 354, 793 共1996兲.
共1997兲.
关14兴 W.T. Buttler et al., Phys. Rev. A 57, 2379 共1998兲.
关7兴 A. Yariv, Optical Electronics in Modern Communications, 5th
关15兴 Other examples include: S.L. Braunstein, Nature 共London兲
ed. 共Oxford University Press, 5th Edition, New York, 1997兲.
394, 47 共1998兲; A. Furusawa et al., Science 282, 706 共1998兲;
关8兴 Another strategy Eve could use is to do homodyne detection at
a quadrature angle half-way between phase and amplitude. S. Lloyd and S.L. Braunstein, Phys. Rev. Lett. 82, 1784
This fails because the signals become mixed. Thus Eve can tell 共1999兲; R.E.S. Polkinghorne and T.C. Ralph, ibid. 83, 2095
when both signals are 0 or both are 1 but she cannot tell the 共1999兲.

010303-4

You might also like