Hongyang Hu ,Hai Zhong ,Wei Ye and Ying Guo,?
1 School of Automation,Central South University,Changsha 410083,China
2 School of Computer Science and Engineering,Central South University,Changsha 410083,China
Abstract Simultaneous two-way classical and quantum (STCQ) communication combines both continuous classical coherent optical communication and continuous-variable quantum key distribution (CVQKD),which eliminates all detection-related imperfections by being measurement-device-independent(MDI).In this paper,we propose a protocol relying on STCQ communication on the oceanic quantum channel,in which the superposition-modulation-based coherent states depend on the information bits of both the secret key and the classical communication ciphertext.We analyse the encoding combination in classical communication and consider the probability distribution transmittance under seawater turbulence with various interference factors.Our numerical simulations of various practical scenarios demonstrate that the proposed protocol can simultaneously enable two-way classical communication and CV-MDI QKD with just a slight performance degradation transmission distance compared to the original CV-MDI QKD scheme.Moreover,the asymmetric situation outperforms the symmetric case in terms of transmission distance and optical modulation variance.We further take into consideration the impact of finite-size effects to illustrate the applicability of the proposed scheme in practical scenarios.The results show the feasibility of the underwater STCQ scheme,which contributes toward developing a global quantum communication network in free space.
Keywords: continuous-variable quantum key distribution,measurement-device-independent,simultaneous,oceanic turbulence channel transmittance
Quantum key distribution (QKD) can share secure keys between two legitimate parties (Alice and Bob) across an unsecured quantum channel where an eavesdropper (Eve)might exist[1–3].There are two categories of protocols for the implementation,which are called discrete-variable(DV)QKD[4] and continuous-variable (CV) QKD [5].A CV-QKD technique based on the Gaussian-modulated coherent states(GMCS)protocol has been proposed as an alternative solution to DV-QKD [6,7],which eliminates the barrier to implementing required specialized hardware,such as a single-photon detector and source.It can transmit the secret key by modulating the quadrature components of the optical field and utilizing heterodyne or homodyne detection,which has demonstrated security under both coherent attacks [8] and collective attacks[9].Gratifyingly,many studies have been put forward to improve the transmission performance[10–12].On the other hand,the development of the technique of wavelength division multiplexing[13]shows a viable way to use a single coherent communication system to implement both classical communication and CV-QKD.
Recently,a novel scheme known as simultaneous QKD and classical communication (SQCC) was proposed,which is an attractive scheme due to the similarity of the hardware required for implementing classical coherent optical communication and the GMCS QKD in practice [14].To achieve better performance,impressive developments in terms of the classical carrier phase estimation (CPE) technique [15] and a plug-and-play configuration [16] have been achieved to simplify the complexity of the SQCC system in fiber channels.Moreover,techniques of using measurement-device-independent (MDI) QKD [17,18] were proposed to prevent all potential attacks on side-channel attacks caused by practical detectors,compared with point-to-point (PP) CV-QKD via Bell-state detection on an untrustworthy third party (Charlie).Furthermore,the sending-or-not-sending twin-field (SNS-TF)QKD protocol was reported to tolerate a large misalignment error rate [19].Based on the SNS-TF QKD,a field-test QKD over 428 km of deployed commercial fiber was demonstrated[20],and a task of 511 km long-haul fiber trunk linking two distant metropolitan areas was completed [21].The results,which provide a new distance record,bridge the gap between laboratory and applications and pave the way for large-scale fiber quantum networks across cities with MDI QKD.
Intriguingly,an improved Kalman filter method[22]over the satellite-mediated link was proposed to extend the SQCC scheme to the employment of free space,which shows its potential to develop a range of global applications.Moreover,the first free space MDI QKD over a 19.2 km urban atmospheric channel was realized[23],and a decoy-state BB84 in MDI QKD was used [24],which opened the way for longdistance MDI QKD in free space.
However,as part of constructing a worldwide network without fiber constraints [25],we also need to value the cruciality of underwater SQCC for ocean development and modern communications.This can provide a more secure approach compared with the traditional acoustic technique in the military field,such as in submarines,ocean sensor networks,and various ocean vehicles.Unfortunately,there is still a lack of research on underwater simultaneous two-way classical communication and QKD(STCQ)MDI communication.
Against this background,we analyse the feasibility and security of STCQ MDI transmittance,where legitimate partners exchange a series of classical bits concurrently in the pure ocean channel.By analysing the encoding combination,we detail the protocol and demonstrate the feasibility of communicating with legitimate partners to exchange classical data concurrently.To estimate the transmittance of diverse ocean depths,we consider the probability distribution transmittance (PDT) for the underwater channel,including the random ellipse light model caused by the atmospheric turbulence and the influence of the extinction coefficient based on existing marine chlorophyll data.We perform numerical simulations to determine the optimal modulation variance for low bit error rates (BERs) of 10?9while maintaining a positive secret key rate(SKR).Furthermore,we also take into consideration the SKR under finite-size effects and show the feasibility of our proposed scheme in practical scenarios.Our work shows the significance of choosing the appropriate transmission depth and modulation variance according to the different types of oceans on Earth,paving the way for practical implementation of the underwater STCQ scheme.
This paper is organized as follows.In section 2,detailed descriptions of the protocol conceived are given.In section 3,we calculate the SKR for the STCQ protocol under the performance of a low BER of 10?9with consideration of the influence of the probability distribution of the transmittance,and numerical simulations based on experimental system parameters are provided with discussions of related trends in performance.Finally,we conclude this paper in section 4.
This section shows the details of the proposed STCQ scheme over the ocean channel,and a measurement result analysis of classical bit transmission is performed.
Due to the equivalence of the prepare-and-measure (PM)method and entanglement-based (EB) method,we adopt the PM STCQ scheme to simplify the undersea description of the protocol.The quadrature phase-shift keying (QPSK)description and the STCQ protocol shown in figures 1(a)and(b) are described as follows.
Step 1.Alice prepares her encoded classical bits{mA,nA} and Gaussian random numbers with zero means and a variance ofVAon a coherent stateMeanwhile,Bob prepareswith zero means and a variance ofVBencoded by classical bits{mB,nA}to convey the classical ciphertext bits.After encoding and preparing,Alice and Bob send their coherent states to Charlie through different oceanic quantum channels with lengthsLACandLBC,respectively.
Step2.The coherent states from Alice and Bob interfere at a balanced beam splitter(BS).Both theXquadrature andPquadrature are measured by using Bell-state measurement[26] asThen Charlie broadcasts the measurement results{XC,PD}.
Step 3.After receiving the measurement results{XC,PD},Alice and Bob decode each other’s data,respectively,based on the measurement findings and the data supplied by themselves.Then Bob removes the classical displacement asXB=xB+kXC,PB=pB+kPCto obtain the Gaussian data associated with the secret key.kis the amplification coefficient related to channel loss,which is described asin the equivalent EB scheme[17],gis the gain of displacement,andVBis related to the variance Gaussian modulation.The details above are calculated in appendix C.
Step 4.Alice and Bob perform parameter estimation via an authenticated public channel,information reconciliation,and privacy amplification to share the secret key.
In practice,the EB scheme usually easily performs security analysis.The EB scheme of the STCQ protocol shown in figure 2(b) comprises the following steps: First,Alice and Bob prepare entanglement resources EPR1 and EPR2 with variances of VA and VB,respectively.Then,they keep modes A1 and B1,and send the other modes A2 and B2 to Charlie through the underwater channel.After that,Charlie receives modes A2 and B2 and performs Bell-state measurement detection,and broadcasts the measurement results through the classical channel publicly.According to the data announced,Bob modifies mode B1 to B1’ by a displacing operation with a gain ofg,and the mode of Alice remains.Ultimately,Alice measures mode A1,and Bob measures mode B1’ to obtain the final data by heterodyne detection.
The scheme can realize two-way classical communication while completing the distribution of quantum keys.To represent the features and benefits of this coding accurately,we analyse the measurement results from Charlie’s side.Note that the analysis does not imply that it is possible to prove the security of Alice’s and Bob’s sending when doing two-way classical communication.For the convenience of demonstration,we suppose that Alice and Bob have no information leakage in the process of sending to Charlie,and Eve can only intercept the information that Charlie broadcasts to the outside world.Here are nine different measurements,as shown in figure 3,which are related to the Bell detection and the encoding method in figure 1(a).After receiving the results published by the untrusted third party Charlie,Alice and Bob can locate the corresponding combination according to the data sent by themselves,further inferring the other party’s data.For example,as soon as Alice knows that Charlie has announced the‘grey’combination after she has sent the code‘11’,she knows Bob has sent the‘11’as well.So Bob knows,based on the combination result.However,even though Eve knows the measurement result,she cannot infer the users’classical bits by precisely guessing two ‘grey’ combinations between{11,11} and{01,01} .
A variety of colored blocks have been used to mark the Bell-state measurement results to explore the characteristics of two-way classical communication further.Moreover,we use three sequence numbers (I),(II),and (IV) to classify the number of times that the measurement result of the different colored blocks appears in figure 4,and the colored blocks with an order corresponding to the measurement results in figure 3.
wherep(R(i))is the probability of measured combination results when transmitting a random sequence,andN(i)is the number of specific bits corresponding to the measurement result,as shown in figure 4.Moreover,and the length of the coding transition sequence isn.Therefore,the results are shown in figure 5.
In this section,the BER of two-way classical communication and the PDT are considered to determine the SKR of STCQ protocol.Subsequently,we show the performance of our proposed scheme compared to the original CV-MDI QKD scheme.
Unlike the quantum channels in fibers with fixed attenuation coefficients,SKR is affected by the transmission fluctuation in the oceanic fading channel.
The attenuation properties of seawater vary significantly between oceans,mainly owing to differences in its composition.Even within the exact location,the attenuation effect varies according to the ocean’s depth and the transmission distance.Beer’s law [27,28] can be used to estimate total extinction losses as
whereLis the horizontal transmission distance and the total attenuation coefficientC(λ,d)is the function of the wavelengthλand the depthd,which is noted in appendix A.
Moreover,we consider the regular refraction in turbulence changes,which are connected to temperature and salinity fluctuations,and follow the statistics of turbulent scalar fields.The probability distribution for oceanic transmittance is applied,including beam shape deformation,beam wandering,and beam-broadening effects.This model,dubbed the elliptic beam approximation,applies to weak and strong turbulence,covering most of the regimes seen in underwater communication situations [29].
The transmittanceTcan be calculated in the Monte Carlo simulation by [30]
where the extinction transmittanceTextis denoted in equation (2),andT0indicates the transmittance without the effects of beam wandering and extinction,which is given in appendix B.Other parameters are related to the shape of the ellipse model of beam sources,which is shown in figure B1.
In addition,the modulation variance has to be optimized before we calculate the SKR.We take the BER of 10-9achieved in the experiment in a phase-shift keying communication system based on optical homodyne as the computational requirement [31],which the details are given in appendix C,and the required signal amplitudeαof STCQ can be expressed as
where erfc-1represents the inverse complementary error function,ηhomis the homodyne detection efficiency,andσφandσsare the extra-noise variance and shot-noise variance,respectively.Moreover,ε0Aandε0Bare the excess noise of Alice and Bob,and〈TA〉and〈TB〉denote the estimated channel mean transmittance of Alice or Bob,respectively.
If we assume that Bob’s two-mode compressed states and the displacement operation are untrustworthy,the STCQ protocol’s equivalent EB scheme is turned into a general oneway CV QKD model.As a result,the lower limit key rate of CV-MDI QKD qualifies the SKR inferred from the common one-way CV QKD.In the case of reverse reconciliation,the asymptotic SKRKof the CV-MDI QKD under optimum collective attack is given by [6]
whereβis the reconciliation efficiency,IABdenotes Alice and Bob’s Shannon mutual information,andχBErepresents the maximum accessible information between Eve and Bob,which is the Holevo bound.The details above are calculated in appendix C,and the secure key rateRcan be further written as
whereG(*)=(*+1) log2(*+1)-* log2*related to the von Neumann entropy,andλiare the symplectic eigenvalues of the covariance matrices.Moreover,TABrepresents the total quantum channel transmittance between Alice and Bob.
Furthermore,the SKR above is achieved in the asymptotic regime under idealized simplification assumptions in the asymptotic limit of infinite data size.In practical scenarios,a pair of legal users cannot exchange an infinite number of signals,implying that the secret key has a finite length [32].Naturally,a part of the exchanged signals has to be used for parameter estimation due to the unidentifiable characteristics of the quantum channel [16].
Under the finite-size regime,the SKRKFSRis given by
where M represents the total number of signals exchanged by Alice and Bob during the scheme when they useN signals to generate the keys,where half of the (M-N) signals will be used in parameter estimation.Kis the asymptotic key rate in equation (6),and the other details are shown in appendix C.
In the following,the modulation variance is optimized before we show the simulation results of our STCQ protocol based on the oceanic turbulence at the low BER of 10?9.As a result,we focus on the SKR and amplitude as a function of the modulation variance over various transmission distances,showing two different application scenarios in the oceans S2 and S5 in figure 6.Furthermore,we set the simulated depth of transmission at 75 m for the sake of avoiding the range of absorption peaks,in whichd?[92,106] m for S2 andd?[31,62] m for S5,which can be seen in fgiures A1 and B2.
In the symmetric cases,Charlie is positioned directly in the middle of the two senders (LAC=LBC),which favors the use of the star topology[33].However,when the transmission distance increases,the transmission loss increases rapidly because the postprocessing step is asymmetric when Bob modifies his data and Alice keeps hers,which cannot result in the system’s best performance,as shown in figure 6.
We can note that the longer the transmission distance,the narrower the range of near-optimal modulation variance,and the lower the SKR becomes.Moreover,in the symmetric cases,the optimal modulation variances of oceans S2 and S5 are 33 and 35,respectively,which are reached around the peak of SKR.The optimal modulation variance’s corresponding amplitude values are about 24.75 and 25.48 for oceans S2 and S5,respectively,as presented in the inset graphs of figures 6(a)and (b).The relationship between modulation variance and amplitude can also be verified from equation(4).The curves in the illustration are nearly coincident for different transmission distances and for the sake of the PDT are included in both the denominator and numerator simultaneously.
Analogously,we can plot the SKR and amplitude as a function of the modulation variance over various transmission distances in the extremely asymmetric case,where Charlie is very close to Bob(LBC≈0),as shown in figures 6(c)and(d).The optimal modulation variance’s corresponding amplitude values are about 17.25 and 17.75 for oceans S2 and S5,respectively,when the optimal modulation variances are 15 and 16.The distinction is that the appropriate range of modulation variance is wider in the extremely asymmetric case than in the symmetric scenario compared to the equivalent transmission distances.
Consequently,the flexibility of optional modulation variance gives it superiority in long-distance communication,which is suitable for point-to-point transmission.On the other hand,the comparison of the secure key rate will be shown in the next part.
As previously discussed,we undertake numerical simulations of the asymptotic SKR of STCQ QKD in symmetric and asymmetric instances at oceans S2 and S5 under the constraint of a low BER of 10?9in classical communication.The modulation variance has been optimized,and the modulation variances are taken as 33 at S2 and 35 at S5 in symmetric and 15 at S2 and 16 at S5 in asymmetric scenarios,respectively,as shown in figure 6.Figure 7 presents the simulation results,while the Pirandola–Laurenza–Ottaviani–Banchi(PLOB)bound[34]of the SKR of direct transmission over lossy bosonic channels and the SKR of original Gaussian CV-MDI QKD [17] are also plotted for comparison.
Figure B1.Schematic of an ellipse model.In this model,the beam source is deformed from the transmission distance of L with ellipse semi-axes w1 and w2,where a andr represent the aperture radius and the beam-deflection distance,respectively.
Figure A1.Extinction coefficient of extinction as a function of submarine depth including absorption and scattering in various ocean types.The S1–S6 oceanic parameters are given in table A1.
Figure 2.(a) Scenario of STCQ-based underwater submarine communication;one of the motherships releases an unmanned undersea vehicle as the repeater without exposing the risk.(b)Entanglement-based(EB)scheme of STCQ protocol.TMS,two-mode squeezed state;Het,heterodyne detection;Dis,displacement operation.
Figure 3.Nine different measurement results are mapped in the phase space and classified by order(I),(II),and(IV).The number of times each color’s measurement result appears in (a) is represented by these orders.In terms of the measurement findings,the transmitter and receiver are symmetric.
Figure 4.Combination of the results based on the Bell-state measurement.
Figure 5.Probability that Eve correctly deduces the coding sequence with length n.For comparison,we assume that the user transmits the easiest and hardest guessable bits all the time in the most unfavorable and the most advantageous case,respectively.
Figure 6.Secret key rate(SKR)(main graph)and amplitude of the classical signal(inset graph)as a function of the modulation variance in the symmetric scenario where the BER is less than 10?9on oceans S2 for(a)and S5 for(b)and in the asymmetric scenario where the BER is less than 10?9 on oceans S2 for (c) and S5 for (d).Other simulation parameters are set as follows: the extra noise in two channels that is independent of the amplitude of the classical signalε0A=ε0B=0.002,the detector efficiencyηhom=0.98,the electronic noiseνel=0.01,the phase-noise varianceσφ=10-6,and the reconciliation efficiency β=0.98.
Figure 7.SKR as a function of the transmission distance in the symmetric scenario at oceans S2 for(a)and S5 for(b),and in the extremely asymmetric scenario at oceans S2 for (c) and S5 for (d),where the BER is less than 10?9.For comparison,the SKR following Beer’s law(dotted line),considered the nonturbulence channel,is computed based on the same parameters of the turbulence channel(solid line).Other simulation parameters are set as follows: the extra noise in two channels that is independent of the amplitude of the classical signal ε0A=ε0B=0.002,the detector efficiencyηhom=0.98,the electronic noiseνel=0.01,the phase-noise varianceσφ=10-6,and the reconciliation efficiency β=0.98.
Figure 8.Finite-size key rates of the STCQ protocol of the asymmetric scenario in ocean S2 for (a) and S5 for (b).Other simulation parameters are set the same as in figure 7.
According to the numerical simulation results,the gap between the proposed STCQ protocol and the original CVMDI QKD scheme in symmetric scenarios is shorter than in the asymmetric cases,whether in the ocean S2 or S5,where the original protocol is more in tune with the PLOB bound(the solid line).The STCQ protocol,on the other hand,is capable of enabling concurrent two-way classical communication and CV-MDI QKD with just a slight performance degradation,which is only minor degradation of about 0.08 m and 0.04 m in terms of the maximum distance at SKR of 10?4bit/pulse on oceans S2 and S5,respectively,in the symmetric scenarios.
Moreover,while the BER gradually increases with transmission distance in the asymmetric case,which is more sensitive than the symmetric case,it is always less than our goal BER of 10?9.It is also shown that the positivity and necessity of choosing appropriate modulation variance and optimization based on different ocean types and application scenarios.It is worth noting that the curve of the SKR is slightly undulated in the case of transmitting a relatively further distance,as shown in figures 7(b) and (d) on the asymmetric scenario.This can be attributed to the transmission fluctuations [35] in the oceanic fading channel.
In addition,figure 8 shows the SKR in the finite-size regime of the asymmetric configuration.For comparison,different block lengthsN and the asymptotic regime are also plotted.
In this paper,we have proposed an STCQ protocol for fluctuating oceanic channels and investigated regular extinction and random turbulence effects based on real-data modelling of chlorophyll concentration and numerical simulation via the Monte Carlo method respectively.Our numerical simulations choose ocean S2 and ocean S6 as objects of study,which have different transmittance and absorption peaks of 92 m and 57 m,respectively.This result shows the importance of choosing the appropriate transmission depth depending on the ocean type for submarines,where the valley range of the PDT will seriously affect the transmission distance.In addition,performance simulations have shown that the asymmetric scenario is superior to the symmetric case both in desirable transmission distance and in selecting the optimal modulation variance.Furthermore,we have taken into account the finitesize effect to accommodate the practical implementation.It can be seen that the fewer signals exchanged,the more pronounced the finite-size impact is,and the more rapidly the SKR and security transmission distance decrease.As the block lengthN increases from 105to 109,more signals may be used to estimate parameters and extract keys,and the SKR approaches the asymptotic value.These results show a feasible way to apply our proposed scheme to the ocean scenario,which demonstrates the potential of sea,land,and air integrated communication,making the STCQ extend to a broader range of worldwide applications.
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant No.61871407),the Natural Science Foundation of Hunan Province (Grant No.2021JJ30878),and the Key Project of Research and Development Plan of Hunan Province (Grant Nos.2020GK4063,2022GK2016).We acknowledge the support from the Optoelectronic Information Center of Central South University and Hunan Railway Engineering Machinery Electrohydraulic Control Engineering Technology Research Center.
Appendix A.Regular extinction coefficient
In general,the profile shape parameters change with the chlorophyll concentration on the surface,which causes difficulty in coefficient determination.A study experimentally quantified the parameters using 2419 distinct chlorophyll profiles [36].The ocean’s location on Earth was classified into several serial groups equivalently,each of which corresponded to a specific range of chlorophyll concentrations near the surface.A complete list of the parameters for each above is given in table A1.
What follows demonstrate the effect of the STCQ scheme on the underwater CV-QKD system.The regular extinction of an optical signal produced by seawater absorption and scattering across various ocean types and the probability density function of transmittance using the ellipse model are also considered.The total attenuation coefficient is given as
whereCsca(λ,d)andCabs(λ,d)are the factors of scattering and absorption respectively,which are affected by the concentration of chlorophyll-a,fulvic and humic acid absorption.
Chlorophyll-a refers to phytoplankton,fulvic acid,and humic acid is the nutrient for phytoplankton.Therefore,the absorption coefficient in the chlorophyll-a-based model can be given by
whereaw(λ)is the absorption coefficient of pure water in proportion to the wavelengthλ[37].Cc(d)is the concentration of chlorophyll-a(cc=1 mg m-3)given in the following.We chose a wavelength of 530 nm to minimize losses in the450–550 nm transmission window on seawater [38].The scattering coefficient,which is affected by pure water and particulate matter scattering,also follows a similar form:
Table A1.Parameter values for S1–S6 oceans [36].
wherebw=0.005826 (4 00/λ)4.322is the coefficient of the scattering spectrum for pure water.Moreover,the other specific parameters are coefficients of fulvic acid,humic acid,and the scattering coefficient of small and large particulate matter.
In the chlorophyll-a-based model,various biological characteristics determine the spectra of the absorption and scattering spectra,which are classified according to their optical properties.For absorption in equation (A1),af=35.959 m2mg-1andah=18.828 m2mg-1are the specific absorption coefficient of fulvic acid and humic acid,respectively;kf=0.0189 nm-1andkh=0.01105 nm-1are the fulvic acid and humic acid exponential coefficients,respectively.The concentration of fulvic acidCf(d)and the concentration of humic acidCh(d)are related to the oneparameter model for attenuation and have the form
whereCc(d)is the concentration of chlorophyll-a,which can be can be modelled at a depthdas a Gaussian curve with five numerically determined parameters as [39]
wherecbkgis the chlorophyll concentration at the surface in the background,Sis the vertical gradient of concentration,which is negative because to the gradual loss of chlorophyll with depth,His the amount of chlorophyll that exceeds the background level,dmaxis the depth of the deep chlorophyll maximum (DCM),and the standard deviationσis given by
and the concentration of small particles Cs(d)and large particles Cl(d)are given by the following equations:
The distribution of extinction coefficientC(λ,d)as a function of submarine depthdfor S1–S6 is plotted in figure A1.The above sections discussed two distinct ocean quality types: the S2 ocean (the red solid line) and the S5 ocean (the green solid line),in which the extinction coefficient reaches its maximum value at depths of 92 m and 47 m,respectively.Generally,a submersible’s operating range is limited to a few hundred meters.We limit our numeral calculations to depths of 200 m in both oceans for analytical purposes.
Appendix B.Elliptic-beam model
The theory of quantum light propagation via the atmosphere is well researched,with the atmosphere being regarded as a quantum channel with fluctuating transmission [40].When the loss fluctuation is assumed to be a valid random variable,the theory also agrees rather well with the log-normal model[28],as demonstrated in Canary Islands studies [41],and overcomes the inherent inconsistency of physical properties [29].
Due to the random property of oceanic turbulence channels and atmospheric turbulence channels being similar[42],the quasi-probabilistic Glauber–SudarshanPfunction can be given to describe the PDT in oceanic turbulence as
wherePoutandPinare the output and inputPfunctions,respectively,TA(B)being the intensity transmittance of Alice or Bob given by
whereS is the aperture area,I(r;L)is the normalized intensity,and with respect to the full plantr={x,y}.In general,ocean turbulence acts as a loss source for transmitted photons,which are detected at the receiver by a sensor module with a restricted aperture when a Gaussian beam that propagates along thez-axis onto the aperture plane at distancez=Lis taken into our consideration.
The irregular losses are induced by the displacement of the beam centroid caused by beam wandering and the redistribution of energy throughout the beam section caused by beam widening and deformation.Furthermore,the receiving beam is expected to have an elliptical profile in the elliptic beam model and can be described using a random vector asv=(x0,y0,Θ1,Θ2).In the received aperture,(x0,y0) are the beam-centroid coordinates of the incoming beam,Θ denotes the consequences of beam broadening and ellipticdeformation,andwhere the ellipse semi-axes arew1andw2with the initial beam radiusw0,as depicted in figure B1.
The Monte Carlo method was used to apply the Kolmogorov power spectrum to maritime turbulence and estimate P(T),are shown as follows.Based on the above,the mean values of vectorvhave the form [43]
with the covariance matrix given by
By applying the classical Kolmogorov power spectrum on underwater turbulence[44],the parameters ofvandΣ can be calculated as
The transmittance without the effects of beam wandering and extinctionT0has the form
where Λ(*) andR(*)are the scale and shape functions,which have the form
where Iidenotes theith-order modified Bessel function.With deformation effects,Weff(*)represents the effective spot radius of the form
whereW is the Lambert function.Moreover,r=(x0,y0)is the beam-centroid vector,ais the receiver telescope radius,andφandφare the angle of beam-ellipse orientation and the angle formed by the vectorrand thez-axis,respectively.
For reliable results,the number of Monte Carlo random numerical simulations is set to 10 000.Then,the mean of the PDT on Alice’s and Bob’s sides can be computedFigure B2 shows the mean transmittance〈T〉of oceans S2 and S5 as functions of the depthdand transmission distanceL.
Figure B2.Mean transmittance as a function of submarine depth and transmission distance,including the effects of extinction and turbulence on ocean S2 for (a) and ocean S5 for (b).Other simulation parameters are set as follows: the dissipation rate of temperature or salinity variance ζ=10-11,the kinetic energy dissipation rate ω=10-3,the receiver telescope radius a=0.25m,and the initial beam radiusw0=80mm.
Moreover,the grey surface is also plotted for comparison,representing the extinction coefficient transmittance without considering turbulence based on Beer’s law in equation (2).We observe that the mean transmittance diminishes as horizontal transmission depth increases in both oceans in both seas.However,the mean transmittance is lowest at a depth of 92 m in the S2 ocean,and the different statistics of the S5 ocean result in a depth of 57 m.This finding demonstrates the necessity of varying the depth in terms of ocean type for improved transmission,which we should avoid in the depths of the extinction coefficient peak ranges.
Appendix C.Derivation of the secret key rate
The phase of a coherent state is mapped from the classical binary information and decoded using optical homodyne detection in the QPSK modulation process,as shown in figure 1.The BERcBERof STCQ mentioned encoded by QPSK can be evaluated by the ratio of the carrier power and the noise power when using the CV Bell measurement,which is given by [47]
whereerfc(*)is the complementary error function,〈T〉A(chǔ)and 〈TB〉are the channel mean transmittance of Alice and Bob,respectively,andηhomdenotes the homodyne detection efficiency.Typically,is the shot-noise variance when the homodyne detector is shot-noise limited.Ntstands for the overall noise variance at Charlie’s side,which has the form
whereVMAandVMBare the variance Gaussian modulation for CV-MDI QKD of Alice and Bob,respectively;velis the electronic noise of the detector,which characterizes all the noises above;and the variance of a vacuum is normalized to 1[48].Moreover,the Alice-to-Charlie and Bob-to-Charlie quantum channels incurεtAandεtBexcess noise,which are defined as whereε0Aandε0Bare the excess noise of Alice and Bob,which are independent of the amplitudeα[49],andis the phase noise commonly produced by phase instability in the presence of[14],whereσφis the extra noise variance.
Afterwards,we use the equivalent EB technique and describe the quantum state with a two-mode covariance matrix for easier security analysis.The overall covariance matrix,which is average-weighted by each subchannel at the output of the fluctuating channel,is given by [50]
whereTABstands for the total quantum channel transmittance between Alice and Bob,for which we can choose the gain of displacementto optimize the equivalent excess noise [17].
where the required symplectic eigenvalues of ΣABhave the form
Moreover,the total amount of detection-induced noise and equivalent excess noise is denoted byχt,which has the form
whereχhomis the detection noise related to the electronic noise varianceveland the detection efficiencyηhom,which is given by
andε′ is the equivalent excess noise,which is given by
where the noise contribution caused by Eve’s two-mode correlation isNE,which can be calculated by the correlation components of Eve’sxquadrature orpquadrature as
where
representing the modes of Charlie’s side under the correlated attacks by Eve [51].We estimate the SKR above under the premise of the two-mode attack because the two-mode attack is shown to be the most effective [26],so Eve uses a twomode correlated coherent Gaussian attack,introducing quantum correlations{E1,E2} in both quantum channels.Moreover,Eve stores the ancillary states interacted with Alice and Bob to the quantum memory (QM),then deduces the secret key by executing an optimum collective measurement on the ensemble of stored ancilla anytime.
It is worth noting that the two-mode attack may degenerate into a one-mode attack when the correlation between the two quantum channels becomes weak,in which Eve uses her half of each EPR pair to conduct entangling cloning on Alice’s and Bob’s modes individually [52].Furthermore,these two forms of assault are similar in the extremely asymmetric situation,where Bob is physically adjacent to Charlie.Conversely,the double-mode attack on the key rate will be more formidable when Alice and Bob are more symmetric with respect to Eve.As indicated in equation(C12),the correlation between Eve’s two modes will decrease sharply and degenerate into a one-mode attack when extreme asymmetry occurs,namelyLBC≈ 0,〈TBC〉≈1.
Additionally,we further consider the finite-size effect,and the most important parameter in equation(8)is related to the security of the private key amplification [53],which is given by
whereHXis the dimension of the Hilbert space corresponding to the variablexused in the raw key,which takes dim HX=2 in our STCQ protocol encoded by the binary bits.Moreover,is a smoothing parameter,and?PFis the failure probability of the privacy amplification procedure.
In this finite-size scenario,the estimation of the covariance matrixis made through the sampling of (M-N)couples of correlated variables(Xi,Yi)i=1…m,and the data between Alice and Bob are linked through the correlated linear relation,which has the form
wheret=and Z follows a centered normal distribution with unknown varianceσ2=1+〈T〉ξ.We can minimize the SKR with a probability of at least1-?PAonce we find the covariance matrix,which is given as
wheretminrepresents the minimal value oft,andσmaxis the maximal value ofσ,which is compatible with sampled couples except with probabilityHere,the maximumlikelihood estimators are used for the normal linear model
Communications in Theoretical Physics2022年12期