Composable finite-size effects in free-space CV-QKD systems
Abstract
Free-space channels provide the possibility of establishing continuous-variable quantum key distribution (CV-QKD) in global communication networks. However, the fluctuating nature of transmissivity in these channels introduces an extra noise which reduces the achievable secret key rate. We consider two classical post-processing strategies, post-selection of high-transmissivity data and data clusterization, to reduce the fluctuation-induced noise of the channel. We undertake the first investigation of such strategies utilising a composable security proof in a realistic finite-size regime against both collective and individual attacks. We also present an efficient parameter estimation approach to estimate the effective Gaussian parameters over the post-selected data or the clustered data. Although the composable finite-size effects become more significant with the post-selection and clusterization both reducing the size of the data, our results show that these strategies are still able to enhance the finite-size key rate against both individual and collective attacks with a remarkable improvement against collective attacks–even moving the protocol from an insecure regime to a secure regime under certain conditions.
I Introduction
Quantum key distribution (QKD) Scarani.et.al.RVP.09 ; Xu.et.al.arxiv.19 ; Pirandola.et.al.arxiv.19 allows two trusted parties (traditionally called Alice and Bob) to share a secret key which is unknown to a potential eavesdropper (traditionally called Eve) by using quantum communication over an insecure quantum channel and classical communication over an authenticated classical channel. QKD systems were first proposed for discrete-variable quantum systems Bennett.Brassard.IEEE.84 ; Ekert.PRL.91 , where the key information is encoded onto the degrees of freedom of single photons, and the detection is realized by single-photon detectors, and then extended for continuous-variable (CV) quantum systems Ralph.PRA.99 ; Hillery.PRA.00 ; Reid.PRA.00 , where the key information is encoded onto the amplitude and phase quadratures of the quantized electromagnetic field of light, and detection is realised by (faster and more efficient) homodyne or heterodyne detectors. CV-QKD systems (see Garcia-Patron.PhD.07 ; Weedbrook.et.al.RVP.12 ; Diamanti.Leverrier.Entropy.15 ; Pirandola.et.al.arxiv.19 for review) have the potential of achieving higher secret key rates, as well as the advantage of compatibility with current telecommunication optical networks.
CV-QKD systems have experimentally been demonstrated over optical fibres experiment-CVQKD-2013 ; experiment-CVQKD-2016 ; chip-CVQKD-2019 ; commercial-fiber-CVQKD-2019 ; 200km-CVQKD-2020 , however the maximum secure transmission distance is still limited to few hundred kilometres. As an alternative, free-space channels have the potential to extend the maximum transmission range of CV-QKD systems Hosseini.et.al.IEEE.19 ; Hosseini.Malaney.PRA1.15 as thay provide a possibility for the implementation of satellite-based QKD systems satellite-2017-1 ; satellite-2017-2 . However, in free-space channels (in contrast to optical fibers) the channel suffers from atmospheric turbulence (causing beam-wandering, beam shape deformation, beam broadening, etc.), which results in a random variation of channel transmissivity in time. This fluctuation effect can be characterized by a probability distribution of the channel transmissivity. Depending on the atmospheric effects, advanced probability distribution models have been proposed for the channel transmissivity Semenov.Vogel.PRA.09 ; Vasylyev.et.al.PRL.12 ; Vasylyev.et.al.PRL.16 ; Vasylyev.et.al.PRA.17 ; Vasylyev.et.al.PRA.18 , which accurately describe free-space experiments squeezing-freespace ; Usenko-NJP-12 .
A free-space channel can be considered as a set of sub-channels, where the transmissivity of the channel is relatively stable for each sub-channel Usenko-NJP-12 . In a Gaussian CV-QKD protocol Garcia-Patron.PhD.07 ; Weedbrook.et.al.RVP.12 , Alice prepares Gaussian quantum states, which are modulated with a Gaussian distribution. Once these Gaussian states are transmited over a free-space channel to Bob, the fluctuating transmissivity of the channel makes the received state (at Bob’s station) a non-Gaussian mixture of the Gaussian states obtained for each sub-channel Bohmann-Gaussianentanglement . This non-Gaussian effect introduces an extra noise, which reduces the key rate Usenko-NJP-12 ; Hosseini.Malaney.ICC.15 ; NJP-2018 , however, the fluctuating transmissivity also provides a possibility to recover the key rate through the post-selection of data from sub-channels with high transmissivity Usenko-NJP-12 . The post-selection decreases the amount of channel fluctuation (i.e., decreases the variance of the transmissity distribution), which leads to a post-selected state with a more Gaussian nature (i.e., with less non-Gaussian noise). This post-selection has been shown to be effective for CV-QKD protocols in the asymptotic regime Usenko-NJP-12 ; Hosseini.Malaney.ICC.15 against Gaussian collective attacks111Note that the post-selection of transmission bins with high value has also been shown effective for enhancing the squeezing properties of light transmitted through the turbulent atmosphere squeezing-freespace ; Vasylyev.et.al.PRL.16 , and improving the fidelity of the coherent-state teleportation over the turbulent atmosphere teleportation-freespace .. The other classical post-processing strategy which can also reduce the negative effect of the fluctuation-induced noise is to partition the recorded data into different clusters cluster-2019 , and analyse the security for each cluster separately. Although these strategies are both effective in reducing the fluctuation-induced noise, they also reduce the size of the effective data set used for the security analysis. Hence, since in practice a finite number of signals are exchanged between Alice and Bob, the composable finite-size issues become even more significant when either post-selection or clusterisation is applied. Thus, whether these classical post-processing strategies are still effective in a composable finite-size regime remains an open question.
We consider the no-switching no-switching-2004 ; no-switching-2005 CV-QKD protocol (based on Gaussian-modulated coherent states and heterodyne detection) over a free-space channel. For the channel probability distribution we consider the elliptic-beam model Vasylyev.et.al.PRL.16 , which accounts for the deflection and deformation of a Gaussian beam caused by turbulence in atmospheric channels. We analyse the composable finite-size security of the protocol by using the recent security proof, stating that according to the Gaussian de Finetti reduction, for the no-switching protocol it is sufficient to consider Gaussian collective attacks in the finite-size, composable security proof Finite-size-Leverrier2017 ; Finite-size-Leverrier2019 . We answer the question whether the post-selection of high-tranmissivity sub-channels and data clusterisation can improve the performance of the free-space CV-QKD system in a composable finite-size regime against both collective and individual attacks222Note that when Eve has a restricted quantum memory, individual attacks can become the optimal eavesdropping attacks for the no-switching CV-QKD protocol Neda-Nathan-Tim ..
For both post-selection and clusterisation, the sub-channel transmissivity has to be estimated by publicly revealing a randomly-chosen subset of the data obtained over the stability time. There are other proposed methods channel-estimation-2012 ; channel-estimation-2015 ; channel-estimation-LO , which utilize classical auxiliary probes or the local oscillator to estimate the sub-channel transmissivity. However, since these classical signals could be likely manipulated by Eve, the classical estimation of the channel may compromise the security. Note that in principle the parameters of the channel, i.e., transmissivity and excess noise, can be estimated for each sub-channel realization separately, however, in practice only a small number of signals can be transmitted over the stability time of the channel, which results in pessimistic error bars for the estimated parameters, which consequently overestimates Eve’s information, and leads to a pessimistic bound for key rate. Hence, to estimate Eve’s information, instead of estimating the parameters of each sub-channel, we utilize the data revealed over all sub-channels (which are used for the security analysis) to estimate the effective Gaussian parameters. Our security analysis shows that the optimised post-selection can improve the finite-size key rate against both individual and collective attacks. Our previous work on Gaussian post-selection postselection-Neda showed a relatively modest improvement in the finite-size collective attacks in comparison with the significant improvement predicted by an asymptotic analysis. Surprisingly, our present work shows that the post-selection of high-transmissivity sub-channels provides a significant improvement in the composable finite-size regime, comparable to that predicted asymptotically. Further, we show that the data clusterisation can also significantly improve the composable finite key rates against collective attacks, provided an optimal clusterisation of sub-channels are chosen.
The structure of the remainder of the paper is as follows. In Sec. II, the no-switching CV-QKD system is described, with the security discussed in the composable finite-size regime. In Sec. III, the CV-QKD system over free-space channels is discussed, with the security analysed using two approaches in the composable finite-size regime by introducing an efficient parameter estimation approach. In Sec. IV, the finite-size composable security is analysed for the system with post-selection of high-transmissivity sub-channels and for the system with data clusterisation, and the significant improvement of the composable finite key rates against collective attacks using these strategies is illustrated. Finally, concluding remarks are provided in Sec. V.
II System model
We consider a Gaussian no-switching CV-QKD protocol no-switching-2004 ; no-switching-2005 , where Alice prepares Gaussian modulated coherent states and Bob uses heterodyne detection. In a prepare-and-measure scheme Alice generates two random real variables, , drawn from two independent Gaussian distributions of variance . Alice prepares coherent states by modulating a coherent laser source by amounts of . The variance of the beam after the modulator is (where the 1 is for the shot noise variance), hence an average output state is thermal of variance . The prepared coherent states are transmitted over an insecure quantum channel to Bob. For each incoming state, Bob uses heterodyne detection and measures both the and quadratures to obtain . In this protocol, sifting is not needed, since both of the random variables generated by Alice are used for the key generation. When all the incoming quantum states have been measured by Bob, classical post-processing (including discretization, parameter estimation, error correction, and privacy amplification) over a public but authenticated classical channel is commenced to produce a shared secret key.
The prepare-and-measure scheme can be represented by an equivalent entanglement-based scheme Garcia-Patron.PhD.07 ; Weedbrook.et.al.RVP.12 , where Alice generates a pure two-mode squeezed vacuum state with the quadrature variance . Alice keeps one mode, while sending the second mode to Bob over the insecure quantum channel. When Alice applies a heterodyne detection to her mode, she projects the other mode onto a coherent state. At the output of the channel, Bob applies a heterodyne detection to the received mode.
II.1 Composable Finite-size security analysis
In the asymptotic regime collective attacks are as powerful as coherent attacks Renner.Cirac.PRL.2009 , and for Gaussian protocols, Gaussian collective attacks are asymptotically optimal Garcia-Patron.Cerf.PRL.06 ; Navascues.Grosshans.PRL.06 ; Wolf.Giedke.Cirac.PRL.06 . Note also that for Gaussian protocols, among individual attacks, Gaussian individual attacks are asymptotically optimal Garcia-Patron.PhD.07 .
In the finite-size regime, the no-switching CV-QKD protocol with coherent states sent by Alice to Bob is -secure against Gaussian collective attacks in a reverse reconciliation scenario if Finite-size-Leverrier-2015 ; Finite-size-Lupo-MDI and if the key length is chosen such that Finite-size-Leverrier-2015 ; Finite-size-Lupo-MDI
(1) |
where Finite-size-Leverrier-2015 ; Finite-size-Lupo-MDI
(2) |
where , with the number of data points Alice and Bob are required to disclose during the parameter estimation, is the discretization parameter (i.e., each symbol is encoded with bits of precision), is the smoothing parameter, and are the maximum failure probabilities for the error correction and parameter estimation, respectively, and is the classical mutual information shared between Alice and Bob, and is the reconciliation efficiency. Note that in the finite-size regime the usual (the maximum mutual information shared between Eve and Bob limited by the Holevo bound for the collective attack) has to be replaced by , taking into account the finite precision of the parameter estimation. In fact, it is now assumed that Eve’s information is upper bounded by , except with the probability . The final key rate is then given by .
Note that for the -security analysis of the same protocol against Gaussian individual attacks we can still use Eq. (1), where must be replaced by the classical mutual information between Eve and Bob, maximised by except with the probability .
Note also that based on the recent security proof in Finite-size-Leverrier2017 ; Finite-size-Leverrier2019 , for analysing the composable finite-size security of the no-switching CV-QKD protocol against general attacks, the security of the protocol can be first analysed against Gaussian collective attacks with a security parameter Finite-size-Leverrier-2015 through the use of Eq. (1), and then, by using the Gaussian de Finetti reduction Finite-size-Leverrier2017 , the security can be obtained against general attacks with a polynomially larger security parameter Finite-size-Leverrier2017 . Note that the security loss due to the reduction from general attacks to Gaussian collective attacks scales like Finite-size-Leverrier2017 . More precisely, according to Finite-size-Leverrier2017 , -security against Gaussian collective attacks implies -security against general attacks, with .
III Free-space CV-QKD systems
In free-space channels the atmospheric effects will cause the transmitted beam to experience fading. Hence, in contrast to a fiber link with a fixed transmissivity, the transmissivity, , of a free-space channel fluctuates in time. Such fading channels can be characterized by a probability distribution Usenko-NJP-12 ; Dong-PRA-10 . In fact, a fading channel can be decomposed into a set of sub-channels. Each sub-channel is defined as the set of events, for which the transmissivity is relatively stable, meaning that the fluctuations of the transmissivity is negligible. Each sub-channel occurs with probability so that or for a continuous probability distribution, where is the maximum realizable value of transmissivity of the fading channel. Thus, the Wigner function of the output state is the sum of the Wigner functions of the states after sub-channels weighted by sub-channel probabilities Dong-PRA-10 . Hence, the input Gaussian state remains Gaussian after passing through each sub-channel, however, the resulting state at the output of the channel, , (with the Gaussian state resulted from the transmission of the input Gaussian state through the sub-channel ) is a non-Gaussian state Dong-PRA-10 .
In the equivalent entanglement-based scheme of the no-switching CV-QKD protocol, the initial pure two-mode Gaussian entangled state with the quadrature variance is completely described by its first moment, which is zero, and its covariance matrix,
(5) |
Alice keeps mode and sends mode through an insecure free-space channel. After transmission of mode through a quantum sub-channel with transmissivity and excess noise (relative to the input of the sub-channel with transmissivity ), the covariance matrix of the Gaussian state at the output of the sub-channel is given by
(6) |
Since the ensemble-average state at the output of a free-space channel, , is a non-Gaussian mixture of Gaussian states obtained from individual sub-channels, the elements of the covariance matrix of the ensemble-average state are given by the convex sum of the moments given by Eq. (6). Hence, the covariance matrix of the non-Gaussian ensemble-average state at the output of the free-space channel is given by
(7) |
where the symbol denotes the mean value over the sub-channels (or over all possible values of ), i.e.,
(8) |
Note that unlike the previous theoretical works on free-space CV-QKD Usenko-NJP-12 ; Hosseini.Malaney.ICC.15 ; NJP-2018 ; Hosseini.Malaney.PRA2.15 ; Hosseini.Malaney.QIC.17 ; Hosseini.Malaney.GLOBECOM.16 ; fast-fading with the assumption of fixed excess noise, here we have assumed the channel excess noise can also randomly vary in time, where the value of the excess noise depends on the the value of the channel transmissivity.
From the covariance matrix of the non-Gaussian ensemble-average state in Eq. (7), it is evident that the fluctuating channel can be considered as a non-fluctuating channel with the effective transmissivity and effective excess noise , so that the covariance matrix of the ensemble-average state can be rewritten as
(9) |
According to Eq. (9), the extra non-Gaussian noise, caused by the fluctuating nature of the channel, depends on the variance of the transmissivity fluctuations, , and the modulation variance, .
IV Composable finite-size Security analysis for free-space CV-QKD sytems
Here we analyse the composable finite-size security of the no-switching CV-QKD protocol implemented over free-space channels using two approaches, first by analysing the security over all data, and second by analysing the security for each sub-channel separately. We also analyse the security against both general attacks (i.e., memory-assisted attacks) and individual attacks (i.e., non-memory attacks).
IV.1 Security analysis over all data
IV.1.1 General attacks
Based on the leftover hash lemma lemma1 ; lemma2 , the number of approximately secure bits, , that can be extracted from the raw key should be slightly smaller than the smooth min-entropy of Bob’s string conditioned on Eve’s system (which characterizes Eve’s quantum state , as well as the public classical variable leaked during the QKD protocol), denoted by lemma1 , i.e., we have , where comes from the leftover hash lemma. Note that indicates the length of Bob’s string after the parameter estimation. The chain rule for the smooth min-entropy Finite-size-Leverrier-2015 gives , where , with the size of data leakage during the error correction. Note that the leakage during the error correction can be given by Finite-size-Leverrier-2015 ; Finite-size-Furrer ; Finite-size-Lupo-MDI , where is Bob’s Shannon entropy. In order to calculate the length of the final key which is -secure ( Finite-size-Leverrier-2015 ; Finite-size-Lupo-MDI ), the conditional smooth min-entropy has to be lower bounded when the protocol did not abort. Under the assumption of independent and identically distributed (i.i.d) attacks such as collective or individual attacks, where every signal transmitted is attacked with the same quantum operation, the asymptotic equipartition property Finite-size-Leverrier-2015 ; Marco-thesis ; Marco can be utilized to lower bound the conditional smooth min-entropy with the conditional von Neumann entropy. Explicitly, we have Finite-size-Leverrier-2015 ; Finite-size-Lupo-MDI , where is the conditional von Neumann entropy. The conditional von Neumann entropy is given by , where Eve’s information on Bob’s string is upper bounded by , except with probability for a given attack (for collective attacks we have and for individual attacks we have ).
In our finite-size security analysis the assumption of collective attacks to lower bound the conditional smooth min-entropy comes with no loss of generality because based on the Gaussian de Finetti reduction, for the security analysis of the no-switching protocol against general attacks, it is sufficient to consider Gaussian collective attacks in the composable finite-size security proof Finite-size-Leverrier2017 ; Finite-size-Leverrier2019 .
Since the covariance matrix of the non-Gaussian ensemble-average state resulting from a free-space channel, given by Eq. (9), can be described by the effective parameters and , for the security analysis we can consider an optimal Gaussian collective attack with parameters and . In this optimal attack Eve interacts individually with each transmitted signal through an optimal entangling cloner attack Entangling-cloner-2008 with the effective parameters and , with her output ancillae stored in her quantum memory to be collectively measured later. Since this attack is i.i.d over all sub-channels, the conditional smooth min-entropy can be lower bounded by the conditional von Neumann entropy. Thus the total finite-size key rate with the security parameter against Gaussian collective attacks is given by
(10) |
Note that we assume is the number of signals transmitted over each sub-channel, from which signals are revealed for the parameter estimation and signals are used for the key generation. In total, a number of signal states are transmitted, from which signals are revealed over all sub-channels for the parameter estimation and signals are used for the key generation. Note that in Eq. (10), is calculated based on the effective parameters and , and Eve’s information from collective attack, , is calculated based on the covariance matrix of the ensemble-average state, which can be estimated based on a relatively large number of signals (where ) revealed over all sub-channels (see Sec. IV.3). Note that according to Finite-size-Leverrier2017 , for the no-switching protocol, -security against collective attacks implies -security against general attacks, with .
IV.1.2 Individual attacks
Considering the fact that in reality Eve has access to a restricted quantum memory with limited coherence time, where each state stored into her quantum meory undergoes a specific amount of decoherence over the storage time, individual attacks might be more beneficial for Eve than collective attacks Neda-Nathan-Tim . In terms of the interaction with the transmitted signals, an individual attack is the same as a collective attack, while in terms of the measurement Eve performs an individual measurement instead of a collective measurement. Among individual attacks, Gaussian attacks are also known to be optimal for the Gaussian CV-QKD protocols.
For the security analysis against Gaussian individual attacks we can also consider an optimal Gaussian individual attack with parameters and . In this attack Eve interacts individually with each signal sent from Alice to Bob with the effective parameters and 333Note that different schemes have been proposed for a Gaussian interaction in an optimal individual attack against the no-switching CV-QKD protocol, with the entangling cloner is one of them individula-2007-1 ; individula-2007-2 ., with an individual measurement on her output ancillary state as soon as she obtains it. Note that in the no-switching CV-QKD protocol Eve does not need a quantum memory to perform the individual measurement, since there is no basis information withheld in this protocol. This individual attack is also i.i.d over all sub-channels, which means the conditional smooth min-entropy can be lower bounded by the conditional von Neumann entropy. Thus the total finite-size key rate with the security parameter against Gaussian individual attacks can also be given by Eq. (10), where must be replaced by . Note that has to be calculated based on the effective parameters of the channel, i.e., and .
IV.2 Security analysis for each sub-channel separately
For the security analysis against collective attacks with the security parameter () one could also write , where is the conditional smooth min-entropy for a sub-channel with parameters and occurring with probability , and . By considering an optimal Gaussian collective attack with parameters and over the sub-channel, one can lower bound by the conditional von Neumann entropy since the attack is i.i.d over the sub-channel (note that this attack is not i.i.d over all sub-channels). More explicitly, one can analyse the security for each sub-channel separately, i.e., calculate the composable finite-size key length for each sub-channel with the security parameter (where ) as (where , and where is the classical mutual information between Alice and Bob for the sub-channel, and is Eve’s information from collective attack over the sub-channel, which is calculated based on the covariance matrix with parameter ), and then average over all sub-channels to obtain the total finite-size key rate with the security parameter as . Note that in a realistic finite-size regime this approach might result in pessimistic key rates. This is due to the fact that in practice only a small number of signal states can be transmitted over each sub-channel, which results in a very pessimistic finite key length for each sub-channel, i.e., , since Eve’s information, , which is estimated based on a small number of signals (where ), might be overestimated (when the block size is reduced, the error bar on the estimators of channel parameters increases, which results in estimating higher information for Eve). Note that this type of security analysis can also be used against individual attacks, however as discussed earlier the resulting key rate is expected to be pessimistic.
Note that in practice, it would be more practical to estimate the average SNR of the free-space channel based on the whole revealed data, and then choose an error-correction code rate based on this average SNR for the error correction of the whole remaining data. This means the mutual information should be calculated theoretically based on the effective parameters of the channel, i.e., and . Alternatively and also ideally, it could be possible to estimate the SNR for each sub-channel separately, and then choose an error-correction code rate based on the sub-channel SNR for the error correction of the sub-channel data, which means the mutual information should be calculated theoretically by averaging over the mutual information obtained from each sub-channel as . However, estimation of SNR for each sub-channel based on a small number of signals revealed for each sub-channel does not give a good estimation of SNR. Note that in our numerical simulations we calculate the mutual information based on the effective parameters and , which is a lower bound on .
IV.3 Parameter estimation for free-space CV-QKD systems
Alice and Bob are able to estimate the channel transmissivity and check its stability during the transmission of data cluster-2019 ; PE-freespace2019 . This is experimentally feasible, as the typical rate of free-space channel fluctuations is of the order of KHz, while the modulation and detection rate is typically of the order of several MHz, i.e., at least thousands of signal states can be transmitted during the stability time of the free-space channel Usenko-NJP-12 . The proper sub-channel estimation requires a large number of states to be sent through the channel during its stability. Then, some of the states for each sub-channel occurrence are randomly chosen for the parameter estimation.
For instance, let us consider the free-space channel fluctuation rate of 1 KHz. Then, we can assume that within each millisecond the channel is relatively stable and can be modelled with a fixed-transmissivity sub-channel of transmissivity . Let us also consider the transmission and detection rate of 100 MHz. Hence, signal states can be transmitted and detected at the receiver during the stability time of the channel. A fraction of these signals () can be randomly chosen to reveal for parameter estimation, with the remaining data contributing to the secret key. Finally, for instance, for 100 seconds of data transmission we will have transmitted signal states (with signal states being transmitted during each stability time of the channel), with a fraction of which, , revealed over all sub-channels for the parameter estimation. Then, a number of signals will contribute to the shared secret key. Note that the security is not analysed for each sub-channel occurrence separately as it results in pessimistic key rates (see Sec. IV.2), instead the security is shown for the ensemble-average state, being obtained from the set of data of size upon all sub-channels.
Since in our security analysis it is sufficient to consider an optimal Gaussian attack with parameters and , we can generalize the parameter estimation method introduced for a fixed-transmissivity quantum channel in MLE-estimator2010 ; MLE-estimator2012 to estimate the covariance matrix of the ensemble-average state using the data of size revealed over all sub-channels. For a no-switching CV-QKD protocol with Bob’s heterodyne detector efficiency and electronic noise , for a channel with fluctuating transmissivity , we can consider a normal linear model for Alice and Bob’s correlated variables, and , respectively.
(11) |
where , and follows a centred normal distribution with unknown variance (note that Alice’s variable has the variance ). Using the total revealed data of size , we can calculate the maximum-likelihood estimators for and , which are given by
(12) |
where and are the realizations of and , respectively. The confidence intervals for these parameters are given by , and where
(13) |
Note that when no signal is exchanged, Bob’s variable with realization follows a centred normal distribution with unknown variance , which is Bob’s shot noise variance. The maximum-likelihood estimator for is given by . The confidence intervals for this parameters is given by , where 444Note that is such that .. Now we can estimate the effective parameters and , which are given by
(14) |
where is the estimator of Bob’s detector efficiency with uncertainty . Note that in order to maximise Eve’s information from collective and individual attacks, the worst-case estimators of the effective parameters and should be used to evaluate Eve’s information.
Note that for the sub-channel post-selection which we discuss in the next section, Alice and Bob also need to estimate the transmissivity of each sub-channel separately. We can use the similar method as discussed above to estimate the sub-channel transmissivity. Considering a normal linear model for a sub-channel with transmissivity , the maximum-likelihood estimators for the sub-channel parameters, and (i.e., the variance of ), are given by MLE-estimator2010 ; MLE-estimator2012
(15) |
where and are the realizations of and for the sub-channel, respectively, and is the number of signals revealed for the sub-channel. The error bar for these parameters are given by
(16) |
The worst-case estimator of the sub-channel transmissivity is then given by
(17) |
Note that Alice and Bob have to perform their post-selection based on .
V Classical post-processing strategies to improve free-space CV-QKD systems
If we compare a fluctuating channel with an equivalent fixed-transmissivity channel with transmissivity and excess-noise , the fluctuating channel has an extra non-Gaussian noise of (see Eq. (9)), which reduces the key rate. Although fluctuating transmissivity of a free-space channel reduces the key rate, it also provides the possibility to improve or even recover it through the post-selection of sub-channels with high transmissivity Usenko-NJP-12 or the clusterisation of sub-channels cluster-2019 .
In the post-selection technique as introduced in Usenko-NJP-12 , the data collected for each sub-channel is kept, conditioned on the estimated sub-channel transmissivity being larger than a post-selection threshold , and discarded otherwise. In this technique, the security should be analysed over the post-selected data. With such a post-selection, the post-selected data becomes more Gaussian and more strongly correlated, since the post-selection reduces the fluctuation variance of the channel, while increases the average transmissivity of the channel.
In the clusterisation technique as introduced in cluster-2019 , for the classical post-processing, Alice and Bob partition their data into different clusters, and perform classical post-processing (including reconciliation and privacy amplification) over each cluster separately. The clusterization we consider here is such that the th cluster corresponds to the th channel transmissivity bin , with the bin size . Note that the clusterisation we consider here is the uniform binning of the probability distribution, however, in principle the width of each cluster can be optimised depending on the probability distribution. With such a technique, the clusterised data becomes more Gaussian, since the fluctuation variance of the channel is reduced within each cluster.
The post-selection has been shown to improve the free-space CV-QKD performance in terms of the key rate in the asymptotic regime against Gaussian collective attacks Usenko-NJP-12 ; Hosseini.Malaney.ICC.15 , and the clusterisation has been shown to improve the key rate in the finite-size regime against Gaussian collective attacks Usenko-NJP-12 ; Hosseini.Malaney.ICC.15 , but not in a composable-security regime. However, both post-selection and clusterisation reduces the size of the data used for the security analysis and the size of the data used for the parameter estimation. Hence, the composable finite-size effects become more significant in these scenarios. In the following sections we investigate the effectiveness of the post-selection and clusterisation in the composable finite-size regime against both individual and collective attacks (where the security against general attacks can be obtained by the security against collective attacks with a larger security parameter).
V.1 Composable finite-size security analysis for the post-selection
In the finite-size regime, the size of the post-selected data is , where is the post-selection success probability, i.e., the total probability for the channel transmissivity to fall within the post-selected region, , and is given by . Note that since in the post-selection protocol Eve’s information should be estimated based on the post-selected data, Alice and Bob can only use the revealed data over the post-selected sub-channels to estimate the covariance matrix of the post-selected ensemble-average state, which means a data of size is used for the parameter estimation. Recall that is the amount of revealed data over all sub-channels. Hence, the data of size contributes to the post-selected key. Explicitly, the finite-size key length of the post-selection protocol which is -secure against Gaussian collective attacks in the reverse reconciliation scenario is given by
(18) |
Eve’s information from Gaussian collective attack in the post-selection protocol, is calculated based on the covariance matrix of the post-selected ensemble-average state , which is given by
(19) |
where the symbol denotes the mean value over the post-selected sub-channels, i.e.,
(20) |
Similarly, the finite-size key length of the post-selection protocol which is -secure against Gaussian individual attacks in the reverse reconciliation scenario is given by
(21) |
where Eve’s information from Gaussian individual attack in the post-selection protocol has to also be calculated based on the effective parameters and . Note that Eve’s information and should be calculated based on the worst-case estimators of the effective parameters and , where the estimations in Eqs. (12) to (14) have to be calculated based on the revealed data over the post-selected sub-channels of size . Note also that the classical mutual information between Alice and Bob obtained from the post-selection, , is calculated based on the effective parameters and , and is calculated using Eq. (2) with being replaced by . Finally, the finite-size key rate of the post-selection protocol is given by . See Appendix A for the detailed calculation of Eve’s information and Alice and Bob’s mutual information.
Note that the post-selection of high-transmissivity sub-channels has two different effects on the finite-size key rate. In fact, on the positive side the post-selection makes the ensemble-average state more Gaussian and more strongly correlated, while on the negative side the post-selection reduces the block size, and also makes the error bars larger in the parameter estimation.
As discussed earlier in Sec. IV.3, Alice and Bob can estimate the transmissivity of each sub-channel by revealing a fraction of the data allocated to each sub-channel. In the post-selection protocol, based on such an estimation of sub-channel transmissivity, they decide to keep or discard the sub-channel data. Note that the sub-channel transmissivity can be estimated using different schemes, e.g., by transmitting auxiliary coherent (classical) light probe signals that are intertwined with the quantum information channel-estimation-2012 ; channel-estimation-2015 , or by monitoring the local oscillator at the receiver, where the signal and the local oscillator have been sent in two orthogonally polarized modes through the free-space channel channel-estimation-LO . However, in all these scenarios it would be very likely for Eve to manipulate the classical probe signal or the local oscillator in such a way to gain an advantage, for instance, forcing Alice and Bob to post-select a particular sub-channel, which is not actually within the post-selection region, can result in underestimating Eve’s information by Alice and Bob.

Fig. 6 shows the post-selected key rate in both the asymptotic and composable finite-size regime as a function of the post-selection threshold , where the security is analysed against both collective and individual attacks. As can be seen for both asymptotic and finite-size regime, the key rate resulting from both collective and individual attacks first improves up to an optimized value, as the threshold value increases, and then the key rate decreases. As the threshold value increases, the variance of the channel fluctuations, decreases, while the effective efficiency, increases. As a result, the post-selected state becomes more Gaussian (i.e., with less non-Gaussian noise) and more strongly correlated, which increases the mutual information between Alice and Bob. However, this increase in the mutual information happens at the cost of lower success probability, , and larger error bars for the estimated parameters. Hence, there is an optimal threshold value which maximizes the post-selected key rate. As can be seen, from left to right, the post-selection becomes more effective. In fact, this type of post-selection is more useful for recovering the key rate in cases where it was strongly diminished by the free-space channel. Fig. 6 also shows the significant improvement of the finite-size key rate from collective attacks due to the post-selection compared to the asymptotic regime. While without the post-selection, positive finite key rates cannot be generated against collective attacks for , by performing the post-selection beyond , Alice and Bob are able to move from an insecure regime to a secure regime, and generate non-trivial positive finite key rates.
V.2 Composable finite-size security analysis for the clusterisation

For the clusterisation technique, in order to compute the key rate with security parameter (where ), the conditional smooth min-entropy can be written as the convex sum of the conditional smooth min-entropy of different clusters of data, i.e., , with is the probability for the channel transmissivity to fall within the th cluster, and . Note that for each cluster Eve’s attack can be considered as an i.i.d Gaussian attack with effective parameters and , given by
(22) |
where the symbol denotes the mean value over all sub-channels within the th cluster, i.e.,
(23) |
Since the attack can be considered i.i.d over each cluster, we can lower bound with the conditional von Neumann entropy and compute the key length with security parameter for the th cluster as against collective attacks, and against individual attacks, where is the classical mutual information between Alice and Bob for the th cluster calculated based on the effective parameters and , and is Eve’s information from collective attack over the th cluster, which is calculated based on the covariance matrix
(24) |
and is Eve’s information from individual attack over the th cluster, which is calculated based on the effective parameters and . Note that Eve’s information, and , is now estimated based on the worst-case estimators of the effective parameters and , where the estimations in Eqs. (12) to (14) have to be calculated based on the revealed data over cluster of size , with the maximum failure probability . Note also that is calculated using Eq. (2) with being replaced by , and is now calculated based on the parameters , , and . The total key rate with security parameter is then given by .
Fig. 2 shows the key rate in both the asymptotic and composable finite-size regime secure against collective/individual attacks as a function of the number of clusters . Note that indicates no clusterization, where security is analysed over all data. As can be seen clusterization always increases the asymptotic key rate against collective/individual attacks. However, by considering composable finite-size effects in the security analysis, there is an optimal number of clusters which maximises the key rate. In fact, as the number of clusters increases, the variance of channel fluctuation within each cluster decreases. As a result, the non-Gaussian noise becomes smaller for each cluster, which makes the state obtained over each cluster more Gaussian. However, as the number of clusters increases, the number of signals for each cluster decreases. As a result, the composable finite-size effects (i.e., the effect of -term, and the effect of parameter estimation which is now performed based on signals with ) become more significant, which reduces the key rate. Fig. 2 shows that while for , without clusterization (i.e., ) the protocol is not secure against collective attacks in the composable finite-size regime, if Alice and Bob perform clusterisation as described above, the protocol becomes secure against collective attacks and finite key rate is maximised for . Note that when the number of clusters, , becomes sufficiently large, the security analysis is performed as if the security is analysed over each sub-channel separately (as described in Sec. IV.2).
VI Conclusions
We have analysed the security of the no-switching CV-QKD protocol over free-space channels with fluctuating transmissivity in the composable finite-size regime against both collective and individual attacks. We introduced a parameter estimation approach, where Alice and Bob can efficiently estimate the effective parameters (i.e., the effective transmissivity and excess noise) of an optimal Gaussian attack using the data revealed over all sub-channels used for the security analysis. We analysed two classical post-processing strategies, the post-selection of high-transmissivity sub-channels and partitioning sub-channels into different clusters, in the composable finite-size regime, showing that these strategies can improve the finite-size key rate against both individual and collective attacks. Most remarkable improvement is for the finite-size collective attacks, which are the most practically relevant, where we see these classical post-processing allows significant key rates in situations that would otherwise be completely insecure.
VII Acknowledgements
The authors gratefully acknowledge valuable discussions with Andrew Lance, and Thomas Symul. This research is supported by the Australian Research Council (ARC) under the Centre of Excellence for Quantum Computation and Communication Technology (Project No. CE170100012). NW acknowledges funding support from the European Unions Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No.750905 and Q.Link.X from the BMBF in Germany.
Appendix A Key rate calculation
A.1 Eve’s information from collective attack
At the output of the channel Bob applies heterodyne detection to mode . Bob’s heterodyne detector with efficiency and electronic noise variance of can be modeled by placing a beam splitter of transmissivity before an ideal heterodyne detector inefficient_homodyne ; inefficient_heterodyne . The heterodyne detector’s electronic noise can be modelled by a two-mode squeezed vacuum state, , of quadrature variance , where . One input port of the beam splitter is the received mode , and the second input port is fed by one half of the entangled state , mode , while the output ports are mode (which is measured by the ideal heterodyne detector) and mode .
In a collective attack, Eve’s information, , is given by , where is the von Neumann entropy of the state . Here we assume Bob’s detection noise is not accessible to Eve. In this case , where the entropy can be calculated through the symplectic eigenvalues of covariance matrix 777The von Neumann entropy of an -mode Gaussian state with the covariance matrix is given by , where are the symplectic eigenvalues of the covariance matrix , and . in Eq. (9). The second entropy we require in order to determine can be written as . The covariance matrix of the conditional state is given by , where , and where , where
(25) |
Note that the matrices , and can be derived from the decomposition of the covariance matrix
(26) |
Note that the covariance matrix is given by , where is the matrix for the beam splitter transformation (applied on modes and ), given by
(29) |
and the covariance matrix of the entangled state is given by
(32) |
Note that in the finite-size regime, should be calculated based on the worst-case estimators of and . Note also that for the post-selection protocol, the parameters and have to be replaced by the post-selection parameters and from Eq. (19), and for the clusterisation, the parameters and have to be replaced by the cluster parameters and from Eq. (22).
A.2 Eve’s information from individual attack
Considering a free-space channel with effective parameters and , defined in Eq. (9), in the individual attack, Eve’s information, , is given by individula-2007-1 ; individula-2007-2 , where is the variance of heterodyne-detected mode for the post-selected sub-channel, and is given by , where is given in Eq. (25). Note that in the case of Bob’s detection noise not being accessible to Eve is given by , where , and . Note that in the finite-size regime, should be calculated based on the worst-case estimators of and . Note also that the parameters and have to be replaced by parameters and from Eq. (19) for the post-selection protocol, and by parameters and from Eq. (22) for cluster .
A.3 Mutual information between Alice and Bob
The classical mutual information between Alice and Bob is given by . The conditional variance is the variance of heterodyne-detected mode conditioned on Alice’s heterodyne detection of mode , which is given by , where , with . Note that for the post-selected protocol, the parameters and have to be replaced by the post-selection parameters and , and for the clusterisation, the parameters and have to be replaced by the cluster parameters and .
Appendix B Elliptic-beam model
We have considered a free-space channel, where the probability distribution for the channel transmissivity is given by the elliptic-beam model Vasylyev.et.al.PRL.16 . This model can be used for an atmospheric channel including beam wandering, beam broadening and beam shape deformation Vasylyev.et.al.PRL.16 . However, for this model, referred to as the elliptic beam approximation, there is not an explicit form for the probability distribution. Here, we briefly discuss how to apply the model of the elliptic-beam approximation for calculation of the key rate. Further details on the model can be found in Vasylyev.et.al.PRL.16 . Within this model, it is assumed that turbulent disturbances along the propagation path result in beam wandering and deformation of the Gaussian beam profile into an elliptical form. The elliptic beam at the aperture plane is characterized by the beam-centroid position , and and as semi-axes of the elliptic spot, where the semi-axis has an angle relative to the axis. Defining , the aperture transmissivity is a function of real parameters Vasylyev.et.al.PRA.17 , which are randomly changed by the atmosphere. Note that and are related to the semi-axes, as Vasylyev.et.al.PRL.16 for with the initial beam-spot radius. Note also that random fluctuations of the beam-centroid position , i.e. the parameters and cause the effect of beam wandering. For the parameters , we can assume a four-dimensional Gaussian distribution, and for the parameter , by assuming isotropic turbulence, we can assume a uniform distribution in the interval Vasylyev.et.al.PRA.17 . Under the assumption of isotropic turbulence, there is no correlation between with other linear parameters Vasylyev.et.al.PRL.16 . We also assume that , i.e., beam wandering fluctuations are placed around the reference-frame origin. Under this assumption, correlations between , and vanish Vasylyev.et.al.PRL.16 . Hence, we first generate independent Gaussian random vectors , and random uniformly-distributed angles . The Gaussian random parameters can be characterized by the covariance matrix,
(33) |
and the mean value . The elements of the covariance matrix and the mean values for weak turbulence are given by Vasylyev.et.al.PRL.16
(34) |
where is the Rytov parameter, is the Fresnel parameter, is the wave number and is the propagation distance. After generating random vectors , and random angles , we can generate random transmissivity as Vasylyev.et.al.PRL.16
(35) |
where , is the distance between the beam and the aperture center, and is the radius of the circular receiver aperture. The transmissivity for the centered beam, i.e., for is given by Vasylyev.et.al.PRL.16
(36) |
The further parameters, including effective squared spot radius, , the scale and shape functions are given by are given by Vasylyev.et.al.PRL.16
(37) |
where is the Lambert function, and is the modified Bessel function of the th order.
We also consider a deterministic (constant) tranmissivity , which means the total transmissivity of the channel would be . Note that can be considered as the extinction factor of the atmospheric channel describing the absorption and scattering losses Vasylyev.et.al.PRA.17 . Based on the generated sampling data, one can estimate the mean value of any function of the transmissivity as . For instance, Eq. (8) can be modified as
(38) |
In our numerical analysis we have first fitted a probability distribution to the generated sampled data (shown in Fig. 3), which gives us a numerical form for . Note that since no closed-form solution for could be used, the integrals required to be computed for the security analysis (provided in Eqs. (20) and (23)) should be numerically evaluated.

References
- (1) V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, The security of practical quantum key distribution, Rev. Mod. Phys. 81, 1301 (2009).
- (2) S. Pirandola, et al., Advances in Quantum Cryptography, arXiv:1906.01645.
- (3) F. Xu, X. Zhang, H.-K. Lo, J.-W. Pan, Quantum cryptography with realistic devices, arXiv:1903.09051.
- (4) C. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. IEEE, New York, p. 175, 1984.
- (5) A. K. Ekert, Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett. 67, 661 (1991).
- (6) T. C. Ralph, Continuous variable quantum cryptography, Phys. Rev. A 61, 010303(R) (1999).
- (7) M. Hillery, Quantum cryptography with squeezed states, Phys. Rev. A 61, 022309 (2000).
- (8) M. D. Reid, Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Phys. Rev. A 62, 062308 (2000).
- (9) R. Garcia-Patron, (PhD Thesis. Universite Libre de Bruxelles, 2007).
- (10) C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, Rev. Mod. Phys. 84, 621-699 (2012).
- (11) E. Diamanti and A. Leverrier, Distributing secret keys with quantum continuous variables: Principle, security and implementations, Entropy 17, 6072 (2015).
- (12) F. Grosshans, G. van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, Quantum key distribution using gaussian-modulated coherent states, Nature 421, 238 (2003).
- (13) P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, Experimental demonstration of long-distance continuous-variable quantum key distribution, Nat. Photonics 7, 378 (2013).
- (14) D. Huang, P. Huang, D. Lin, and G. Zeng, Long-distance continuous-variable quantum key distribution by controlling excess noise, Scientific Reports 6, 19201 (2016).
- (15) G. Zhang, J. Haw, H. Cai, F. Xu, S. Assad, J. Fitzsimons, X. Zhou, Y. Zhang, S. Yu, J. Wu et al., An integrated silicon photonic chip platform for continuous-variable quantum key distribution, Nat. Photonics 13, 839 (2019).
- (16) Y. Zhang et al., Continuous-variable QKD over 50 km commercial fiber, Quantum Sci. Technol. 4, 035006 (2019).
- (17) Y.-C. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, H. Guo, Long-distance continuous-variable quantum key distribution over 202.81 km fiber, arXiv:2001.02555.
- (18) N. Hosseinidehaj, Z. Babar, R. Malaney, S. X. Ng, and L. Hanzo, Satellite-Based Continuous-Variable Quantum Communications: State-of-the-Art and a Predictive Outlook, IEEE Communications Surveys and Tutorials 21, 881 (2019).
- (19) N. Hosseinidehaj and R. Malaney, Gaussian entanglement distribution via satellites, Phys. Rev. A 91, 022304 (2015).
- (20) S.-K. Liao, Satellite-to-ground quantum key distribution, Nature 549, 43 (2017).
- (21) J. Yin, Satellite-to-Ground Entanglement-Based Quantum Key Distribution, Phys. Rev. Lett. 119, 200501 (2017).
- (22) A. A. Semenov and W. Vogel, Quantum light in the turbulent atmosphere, Phys. Rev. A 80, 021802(R) (2009).
- (23) D. Yu. Vasylyev, A. A. Semenov, and W. Vogel, Toward Global Quantum Communication: Beam Wandering Preserves Nonclassicality, Phys. Rev. Lett. 108, 220501 (2012).
- (24) D. Yu. Vasylyev, A. A. Semenov, and W. Vogel, Atmospheric Quantum Channels with Weak and Strong Turbulence, Phys. Rev. Lett. 117, 090501 (2016).
- (25) D. Vasylyev, A. A. Semenov, W. Vogel, K. Günthner, A. Thurn, Ö. Bayraktar, and C. Marquardt, Free-space quantum links under diverse weather conditions, Phys. Rev. A. 96, 043856 (2017).
- (26) D. Vasylyev, W. Vogel, and A. A. Semenov, Theory of atmospheric quantum channels based on the law of total probability, Phys. Rev. A 97, 063852 (2018).
- (27) V. C. Usenko, B. Heim, C. Peuntinger, C. Wittmann, C. Marquardt, G. Leuchs, and R. Filip, New J. Phys. 14, 093048 (2012).
- (28) C. Peuntinger, B. Heim, C. R. Müller, C. Gabriel, C. Marquardt, and G. Leuchs, Distribution of Squeezed States through an Atmospheric Channel, Phys. Rev. Lett. 113, 060502 (2014).
- (29) M. Bohmann, A. A. Semenov, J. Sperling, and W. Vogel, Gaussian entanglement in the turbulent atmosphere, Phys. Rev. A 94, 010302(R) (2016).
- (30) N. Hosseinidehaj and R. Malaney, Quantum key distribution over combined atmospheric fading channels, IEEE International Conference on Communications (ICC), London, pp. 7413-7419 (2015).
- (31) S. Wang, P. Huang , T. Wang, and G. Zeng, Atmospheric effects on continuous-variable quantum key distribution, New J. Phys. 20, 083037 (2018).
- (32) K. Hofmann, A. A. Semenov, W. Vogel, and Martin Bohmann, Quantum teleportation through atmospheric channels, Phys. Scr. 94, 125104 (2019).
- (33) L. Ruppert, C. Peuntinger, B. Heim, K. Günthner, V. C. Usenko, D. Elser, G. Leuchs, R. Filip and C. Marquardt, Fading channel estimation for free-space continuous-variable secure quantum communication, New J. Phys. 21 123036 (2019).
- (34) C. Weedbrook, A. M. Lance, W. P. Bowen, T. Symul, T. C. Ralph, and P. K. Lam, Phys. Rev. Lett. 93, 170504 (2004).
- (35) A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, Phys. Rev. Lett. 95, 180503 (2005).
- (36) A. Leverrier, Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction, Phys. Rev. Lett. 118, 200501 (2017).
- (37) S. Ghorai, E. Diamanti, and A. Leverrier, Composable security of two-way continuous-variable quantum key distribution without active symmetrization, Phys. Rev. A 99, 012311 (2019).
- (38) N. Hosseinidehaj, N. Walk, and T. C. Ralph, Optimal realistic attacks in continuous-variable quantum key distribution, Phys. Rev. A 99, 052336 (2019).
- (39) I. Capraro, A. Tomaello, A. Dall’Arche, F. Gerlin, R. Ursin, G. Vallone, and P. Villoresi, Impact of Turbulence in Long Range Quantum and Classical Communications, Phys. Rev. Lett. 109, 200502 (2012).
- (40) G. Vallone et al., Adaptive real time selection for quantum key distribution in lossy and turbulent free-space channels, Phys. Rev. A 91, 042320 (2015).
- (41) A. A. Semenov, F. Töppel, D. Y. Vasylyev, H. V. Gomonay, and W. Vogel, Homodyne detection for atmosphere channels, Phys. Rev. A 85, 013826 (2012).
- (42) N. Hosseinidehaj, A. M. Lance, T. Symul, N. Walk, T. C. Ralph, Finite-size effects in continuous-variable QKD with Gaussian post-selection, arXiv:1912.09638.
- (43) R. Renner and J. I. Cirac, de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography, Phys. Rev. Lett. 102, 110504 (2009).
- (44) M. M. Wolf, G. Giedke, and J. I. Cirac, Extremality of Gaussian quantum states, Phys. Rev. Lett. 96, 080502 (2006).
- (45) M. Navascues, F. Grosshans, and A. Acin, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Phys. Rev. Lett. 97, 190502 (2006).
- (46) R. Garcia-Patron, and N. J. Cerf, Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Phys. Rev. Lett. 97, 190503 (2006).
- (47) A. Leverrier, Composable security proof for continuous-variable quantum key distribution with coherent states, Phys. Rev. Lett. 114, 070501 (2015).
- (48) C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks, Phys. Rev. A 97, 052327 (2018).
- (49) R. Dong, M. Lassen, J. Heersink, C. Marquardt, R. Filip, G. Leuchs, and U. L. Andersen, Continuous-variable entanglement distillation of non-Gaussian mixed states, Phys. Rev. A 82, 012312 (2010).
- (50) N. Hosseinidehaj and R. Malaney, Entanglement generation via non-Gaussian transfer over atmospheric fading channels, Phys. Rev. A 92, 062336 (2015).
- (51) N. Hosseinidehaj and R. Malaney, CV-QKD with Gaussian and Non-Gaussian Entangled States over Satellite-Based Channels, IEEE Global Communications Conference (GLOBECOM), Washington, DC, pp. 1-7 (2016).
- (52) N. Hosseinidehaj and R. Malaney, CV-MDI quantum key distribution via satellite, Quantum Inf. Comput. 17, 361 (2017).
- (53) P. Papanastasiou, C. Weedbrook, and S. Pirandola, Continuous-variable quantum key distribution in uniform fast-fading channels, Phys. Rev. A 97, 032311 (2018).
- (54) R. Renner, Security of qunatum key distribution, Int. J. Quantum Inf. 6, pp. 1-127 (2008).
- (55) M. Tomamichel, C. Schaffner, A. Smith, and R. Renner, Leftover Hashing against quantum side information, IEEE Trans. Inf. Theory 57, 5524 (2011).
- (56) F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks, Phys. Rev. Lett. 109, 100502 (2012).
- (57) M. Tomamichel, Ph.D. thesis, Swiss Federal Institute of Technology (ETH), Zurich (2012), arXiv:1203.2142.
- (58) M. Tomamichel, R. Colbeck, and R. Renner, “A Fully quantum Asymptotic Equipartition property, IEEE Trans. Inf. Theory 55, 5840 (2009).
- (59) S. Pirandola, S. L. Braunstein, and S. Lloyd, Characterization of Collective Gaussian Attacks and Security of Coherent-State Quantum Cryptography, Phys. Rev. Lett. 101, 200504 (2008).
- (60) J. Lodewyck and P. Grangier, Tight bound on the coherent-state quantum key distribution with heterodyne detection, Phys. Rev. A 76, 022332 (2007).
- (61) J. Sudjana, L. Magnin, R. Garcia-Patron, and N. J. Cerf, Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switching, Phys. Rev. A 76, 052301 (2007).
- (62) G. Chai, Z. Cao, W. Liu, S. Wang, P. Huang, and G. Zeng, Parameter estimation of atmospheric continuous-variable quantum key distribution, Phys. Rev. A 99, 032326 (2019)
- (63) A. Leverrier, F. Grosshans, and P. Grangier, Finite-size analysis of a continuous-variable quantum key distribution, Physical Review A 81, 062343 (2010).
- (64) P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, Analysis of imperfections in practical continuous-variable quantum key distribution, Physical Review A 86, 032309 (2012).
- (65) A. A. Semenov1, and W. Vogel, Entanglement transfer through the turbulent atmosphere, Phys. Rev. A 81, 023835 (2010).
- (66) R. Garcia-Patron and N. J. Cerf, Continuous-Variable quantum key distribution protocols over noisy channels, Phys. Rev. Lett. 102, 130501 (2009).
- (67) S. Fossier, E. Diamanti, T Debuisschert, R. Tualle-Brouri, and P. Grangier, Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers, J. Phys. B: At. Mol. Opt. Phys. 42, 114014 (2009).