This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Discrete-modulation continuous-variable quantum key distribution with high key rate

Pu Wang State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People’s Republic of China    Jianqiang Liu State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People’s Republic of China    Zhenguo Lu State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People’s Republic of China    Xuyang Wang State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People’s Republic of China Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, People’s Republic of China    Yongmin Li [email protected] State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People’s Republic of China Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, People’s Republic of China
(October 1, 2021)
Abstract

Discrete-modulation continuous-variable quantum key distribution has the potential for large-scale deployment in the secure quantum communication networks due to low implementation complexity and compatibility with the current telecom systems. The security proof for four coherent states phase-shift keying (4-PSK) protocol has recently been established by applying numerical methods. However, the achievable key rate is relatively low compared with the optimal Gaussian modulation scheme. To enhance the key rate of discrete-modulation protocol, we first show that 8-PSK increases the key rate by about 60% in comparison to 4-PSK, whereas the key rate has no significant improvement from 8-PSK to 12-PSK. We then expand the 12-PSK to two-ring constellation structure with four states in the inner ring and eight states in the outer ring, which significantly improves the key rate to be 2.4 times of that of 4-PSK. The key rate of the two-ring constellation structure can reach 70% of the key rate achieved by Gaussian modulation in long distance transmissions, making this protocol an attractive alternative for high-rate and low-cost application in secure quantum communication networks.

I INTRODUCTION

Quantum key distribution (QKD) [1, 2], as one of the most prominent application of quantum information sciences, allows two distant parties to share a common secret key, where the security is guaranteed by the fundamental laws of quantum physics [3, 4]. Continuous-variable (CV) QKD encodes the key information into continuous-spectrum quantum observables, such as the quadrature components of the light field, which has the potential to offer larger key rates at metropolitan distances [5, 6, 7, 8]. CV-QKD can employ the similar components as classical telecom systems and has received extensive attentions and witnessed rapid development both theoretically and experimentally [9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35].

At present, most of the CV-QKD schemes are based on Gaussian modulation, meaning that Alice displaces the quadratures of the sent states according to a Gaussian distribution, which reaches the channel capacity and achieves a high key rate. However, this type of protocol puts a lot of requirements on the modulation devices and error-correction procedure. Moreover, a perfectly Gaussian modulation cannot be met in realistic applications due to finite range and precision of practice modulators. In practice, the Guassian modulation is approximated by a modulation constellation with a finite number of states and it has shown that at least 8100 states (90 ×\times 90 size constellation) are needed to satisfactorily simulate a Gaussian distribution [36]. In order to release these stringent restrictions and simplify the protocol, discrete-modulation schemes for CV-QKD are proposed [36, 37, 38, 39, 40, 41]. Among them, four coherent states phase-shift keying (4-PSK) protocol has attracted the most interest. However, different from Gaussian modulation that can apply the proof method of Gaussian attacks optimality [42, 43, 44], the security analysis of discrete modulation CV-QKD is more complex. Previous security proofs for 4-PSK protocol is restricted to Gaussian attacks [45, 46, 47], which are not believed to be optimal for discrete modulation schemes, thus the key rate obtained cannot be considered to be secure.

Recently, the security of such protocol in the asymptotic regime is established by applying numerical methods [48, 49], more precisely convex optimization techniques. Without using the Gaussian optimality proof method, the approach in Ref. [49] provides a tighter bound and thus higher key rate than that in Ref. [48]. However, that key rate is still relatively low compared with the optimal Gaussian modulation, about a quarter of the key rate achievable of Gaussian modulation, which makes the 4-PSK protocol less attractive.

In this paper, we focus on the design of the optimized discrete-modulation protocol. To this end, we first extend the 4-PSK protocol to more signal states, eight states (8-PSK) and twelve states (12-PSK), and derive the asymptotic secure key rate by numerical methods considering the realistic trusted noisy detection. The results show that 8-PSK increases the key rate by about 60%, compared with the original 4-PSK protocol, while the key rate has only small improvement from 8-PSK to 12-PSK. This is because the performance of 8-PSK has tended to be saturated for a single-ring constellation protocol, and further increasing the number of states would not gain more advantages. To enlarge the distribution range of states in phase space and further improve the performance, we propose to use the two-ring constellation scheme, where not only the phase quadrature but the amplitude quadrature is modulated. By optimizing the amplitudes and the probabilities assigned to each states, and the boundary between the two rings, the two-ring constellation with twelve states (four states in the inner ring and eight states in the outer ring) get a superior performance. In comparison with the original 4-PSK protocol, the secret key rate is increased to 2.4 times. This value is about 70% of the key rate achievable for Gaussian modulation and therefore the performance of the two-ring constellation protocol is close to the Gaussian modulation protocol, but the implementation is simpler, which makes it very attractive for practical applications.

The rest of the paper is organized as follows. In Sec. II, we analyze the performance of discrete-modulation protocol of 8-PSK and 12-PSK with single-ring constellation. In Sec. III, we apply the two-ring constellation structure to 12-PSK, and investigate the dependence of key rate on various parameters to optimize the protocol. The results are compared with Gaussian modulation CV-QKD protocol under realistic trusted noisy detection. Our conclusions are drawn in Sec. IV.

II DISCRETE-MODULATION CV-QKD WITH SINGLE-RING CONSTELLATION

II.1 The protocol description

The schematic of single-ring signal constellation for discrete-modulation CV-QKD of 8-PSK and 12-PSK is illustrated in Fig. 1. For 8-PSK, the sender Alice prepares the coherent state |αx=|αeixπ/4\left|{{\alpha}_{x}}\right\rangle=\left|\alpha{{e}^{{ix\pi}/{4}}}\right\rangle with x{0,1,2,3,4,5,6,7}x\in\left\{0,1,2,3,4,5,6,7\right\}, each coherent state is chosen with an equal probability px=1/8{{p}_{x}}={1}/{8}. Similarly, for 12-PSK, Alice randomly selects a state from the set {|αx=|αeixπ/6, x=0,,11}\left\{\left|{{\alpha}_{x}}\right\rangle=\left|\alpha{{e}^{{ix\pi}/{6}}}\right\rangle,\text{ }x=0,\cdot\cdot\cdot,11\right\}, where α\alpha is a pre-determined amplitude and can be optimized. The prepared states are sent to Bob through an insecure quantum channel to generate secret keys. Bob measures the received states with heterodyne detection and records the measurement outcome yy\in\mathbb{C}.

Refer to caption
Figure 1: Schematic diagram of the single-ring constellation for multiple signal states: (a) 8-PSK, (b) 12-PSK. Rj{{R}_{j}} represents the key mapping region, where Bob maps the measurement outcomes to the corresponding discretized key values.

After obtaining enough data, Alice and Bob randomly select a small part of the data for parameter estimation. If the parameter estimation passes, they use the remaining data to extract the keys. Bob obtains his raw key string by a key map. Specifically, Bob labels each outcome y=|y|eiθy=\left|y\right|{{e}^{i\theta}} according to the region Rj{{R}_{j}} as

z={j,if θ[(2j1)π8,(2j+1)π8)yRj, 8-PSKj,if θ[(2j1)π12,(2j+1)π12)yRj, 12-PSK,z=\left\{\begin{array}[]{l}j,\text{if }\theta\in\left[\frac{\left(2j-1\right)\pi}{8},\frac{\left(2j+1\right)\pi}{8}\right)\to y\in{{R}_{j}}\text{, 8-PSK}\\ j,\text{if }\theta\in\left[\frac{\left(2j-1\right)\pi}{12},\frac{\left(2j+1\right)\pi}{12}\right)\to y\in{{R}_{j}}\text{, 12-PSK}\end{array}\right., (1)

where j{0,,7}j\in\left\{0,\cdot\cdot\cdot,7\right\} for 8-PSK and j{0,,11}j\in\left\{0,\cdot\cdot\cdot,11\right\} for 12-PSK. The raw key string of Alice consists of the label xx of her randomly selected state αx{{\alpha}_{x}}. Finally, Alice and Bob implement error correction and privacy amplification procedures to extract secret keys.

II.2 Secret key rate

For convenience of security analysis, we consider the equivalent entanglement-based (EB) scheme. Here, we mainly use the numerical security proof method presented in Ref. [49, 50] to obtain the secure key rate. In the EB scheme, Alice initially prepares the bipartite state

|ψAA=xpx|xA|αxA,{{\left|\psi\right\rangle}_{A{A}^{\prime}}}=\sum\limits_{x}{\sqrt{{{p}_{x}}}}{{\left|x\right\rangle}_{A}}{{\left|{{\alpha}_{x}}\right\rangle}_{{{A}^{\prime}}}}, (2)

where |x\left|x\right\rangle is an orthonormal basis for register AA. Alice keeps AA and sends the register A{A}^{\prime} to Bob. To establish the equivalence between the EB scheme and the original prepare-and-measure scheme, Alice applies a local projective measurement on register AA, which can be described by a POVM MA={MxA=|xx|}{{M}^{A}}=\left\{M_{x}^{A}=\left|x\right\rangle\left\langle x\right|\right\}. When obtaining a measurement outcome xx with probability px{{p}_{x}}, the state sent to Bob is effectively collapsed to |αx\left|{{\alpha}_{x}}\right\rangle. After the quantum channel transmission, the joint state shared by Alice and Bob is

ρAB=(idAAB)(|ψψ|AA),{{\rho}_{AB}}=\left({{\operatorname{id}}_{A}}\otimes{{\mathcal{E}}_{{A}^{\prime}\to B}}\right)\left(\left|\psi\right\rangle{{\left\langle\psi\right|}_{A{A}^{\prime}}}\right), (3)

where idA{{\operatorname{id}}_{A}} is the identity channel acting on AA and AB{{\mathcal{E}}_{{A}^{\prime}\to B}} describes the quantum channel, which is a completely positive and trace-preserving (CPTP) map. Bob uses his POVM Gy{{G}_{y}} on register BB to perform realistic trusted noisy detection.

With the reverse reconciliation, the asymptotic secret key rate against collective attacks is expressed as [49]

K=minρAB𝒮D(𝒢(ρAB)𝒵[𝒢(ρAB)])ppassδEC,{{K}^{\infty}}=\min\limits_{{{\rho}_{AB}}\in\mathcal{S}}D\left(\left.\mathcal{G}\left({{\rho}_{AB}}\right)\right\|\mathcal{Z}\left[\mathcal{G}\left({{\rho}_{AB}}\right)\right]\right)-{{p}_{\operatorname{pass}}}{{\delta}_{\operatorname{EC}}}, (4)

where D(ρσ)=Tr(ρlog2ρ)Tr(ρlog2σ)D\left(\left.\rho\right\|\sigma\right)=\operatorname{Tr}\left(\rho{{\log}_{2}}\rho\right)-\operatorname{Tr}\left(\rho{{\log}_{2}}\sigma\right) is the quantum relative entropy; 𝒢\mathcal{G} describes a completely positive and trace nonincreasing map for postprocessing steps; 𝒵\mathcal{Z} denotes a pinching quantum channel that reads out the result of key map; 𝒮\mathcal{S} represents the set of available density operators compatible with experimental observations; ppass{{p}_{\operatorname{pass}}} is the sifting probability of data for key generation; δEC{{\delta}_{\operatorname{EC}}} stands for the leaked information of per signal pulse during the error correction phase and can be computed as follows

δEC\displaystyle{{\delta}_{\operatorname{EC}}} =\displaystyle= H(Z)βI(X;Z)\displaystyle H\left(Z\right)-\beta I\left(X;Z\right) (5)
=\displaystyle= (1β)H(Z)+βH(Z|X),\displaystyle\left(1-\beta\right)H\left(Z\right)+\beta H\left(\left.Z\right|X\right),

where β\beta is the reconciliation efficiency. XX and ZZ represent the raw key string of Alice and Bob, respectively.

In order to compute the expected secret key rate, the key point is to find the minimum value of D(𝒢(ρAB)𝒵[𝒢(ρAB)])D\left(\left.\mathcal{G}\left({{\rho}_{AB}}\right)\right\|\mathcal{Z}\left[\mathcal{G}\left({{\rho}_{AB}}\right)\right]\right), which is a convex optimization problem matching some constraints and expressed as [50]

minimize D(𝒢(ρAB)𝒵[𝒢(ρAB)])subject toTr[ρAB(|xx|AF^Q)]=pxF^QxTr[ρAB(|xx|AF^P)]=pxF^PxTr[ρAB(|xx|AS^Q)]=pxS^QxTr[ρAB(|xx|AS^P)]=pxS^PxTr[ρAB]=1,ρAB0,\begin{aligned} &\text{minimize }D\left(\left.\mathcal{G}\left({{\rho}_{AB}}\right)\right\|\mathcal{Z}\left[\mathcal{G}\left({{\rho}_{AB}}\right)\right]\right)\\ &\text{subject to}\\ &\quad\quad\quad\quad\operatorname{Tr}\left[{{\rho}_{AB}}\left(\left|x\right\rangle{{\left\langle x\right|}_{A}}\otimes{{{\hat{F}}}_{Q}}\right)\right]={{p}_{x}}{{\left\langle{{{\hat{F}}}_{Q}}\right\rangle}_{x}}\\ &\quad\quad\quad\quad\operatorname{Tr}\left[{{\rho}_{AB}}\left(\left|x\right\rangle{{\left\langle x\right|}_{A}}\otimes{{{\hat{F}}}_{P}}\right)\right]={{p}_{x}}{{\left\langle{{{\hat{F}}}_{P}}\right\rangle}_{x}}\\ &\quad\quad\quad\quad\operatorname{Tr}\left[{{\rho}_{AB}}\left(\left|x\right\rangle{{\left\langle x\right|}_{A}}\otimes{{{\hat{S}}}_{Q}}\right)\right]={{p}_{x}}{{\left\langle{{{\hat{S}}}_{Q}}\right\rangle}_{x}}\\ &\quad\quad\quad\quad\operatorname{Tr}\left[{{\rho}_{AB}}\left(\left|x\right\rangle{{\left\langle x\right|}_{A}}\otimes{{{\hat{S}}}_{P}}\right)\right]={{p}_{x}}{{\left\langle{{{\hat{S}}}_{P}}\right\rangle}_{x}}\\ &\quad\quad\quad\quad\operatorname{Tr}\left[{{\rho}_{AB}}\right]=1,\\ &\quad\quad\quad\quad{{\rho}_{AB}}\geq 0\\ \end{aligned}, (6)

where F^Q{{\hat{F}}_{Q}} and F^P{{\hat{F}}_{P}} (S^Q{{\hat{S}}_{Q}} and S^P{{\hat{S}}_{P}}) represent the first-moment (second-moment) observables of quadrature operators q^\hat{q} and p^\hat{p}, respectively. Also notice that Eve cannot access Alice’s system, thus there is an additional constraint

TrB[ρAB]=ρA=i,j=0npipjαj|αi|ij|A,{{\operatorname{Tr}}_{B}}\left[{{\rho}_{AB}}\right]={{\rho}_{A}}=\sum\limits_{i,j=0}^{n}{\sqrt{{{p}_{i}}{{p}_{j}}}}\left\langle{{\alpha}_{j}}|{{\alpha}_{i}}\right\rangle\left|i\right\rangle{{\left\langle j\right|}_{A}}, (7)

where nn takes 7 or 11 according to 8-PSK or 12-PSK.

The postprocessing map 𝒢\mathcal{G} and pinching quantum channel 𝒵\mathcal{Z} can be written as [50]

𝒢(σ)=KσK,\displaystyle\mathcal{G}\left(\sigma\right)=K\sigma{{K}^{\dagger}}, (8)
K=z=0n|zRIA(Rz)B,\displaystyle K=\sum\limits_{z=0}^{n}{{{\left|z\right\rangle}_{R}}\otimes{{\operatorname{I}}_{A}}\otimes{{\left(\sqrt{{{R}_{z}}}\right)}_{B}}},
𝒵(σ)=j=0n(|jj|RIAB)σ(|jj|RIAB).\displaystyle\mathcal{Z}\left(\sigma\right)=\sum\limits_{j=0}^{n}{\left(\left|j\right\rangle{{\left\langle j\right|}_{R}}\otimes{{\operatorname{I}}_{AB}}\right)\sigma\left(\left|j\right\rangle{{\left\langle j\right|}_{R}}\otimes{{\operatorname{I}}_{AB}}\right)}.

To numerically minimize the objective function, available ρAB{{\rho}_{AB}} must be a finite dimension. The dimension of Alice’s system is determined by the number of different signal states that she prepares, which is finite. However the receiver Bob’s state is in an infinite dimensional Hilbert space. This can be circumvented by applying the photon-number cutoff assumption. When the photon number cutoff parameter Nc{{N}_{c}} is chosen to be large enough, this assumption is reasonable. Here, we set an appropriate parameter value of Nc{{N}_{c}} such that the probability of photon number of the received signal state smaller than Nc{{N}_{c}} is close to 1, and larger Nc{{N}_{c}} has no meaningful improvement for the key rate. Then, the matrix expressions of the first-moment observables F^Q{{\hat{F}}_{Q}}, F^P{{\hat{F}}_{P}}, the second-moment observables S^Q{{\hat{S}}_{Q}}, S^P{{\hat{S}}_{P}}, and the region operators Rj{{R}_{j}} in the photon-number basis can be obtained [50].

A tight lower bound on the key rate can be achieved by using a two-step procedure developed in Ref. [51]. At the first step, the Frank-Wolfe algorithm is used to approximately minimize the convex function, and hence obtaining an upper bound on the key rate. At the second step, converting this upper bound to a reliable lower bound by taking the numerical imprecision into account. By using the two-step procedure and defining f(ρ)=D(𝒢(ρ)𝒵[𝒢(ρ)])f\left(\rho\right)=D\left(\left.\mathcal{G}\left(\rho\right)\right\|\mathcal{Z}\left[\mathcal{G}\left(\rho\right)\right]\right), we have

minρ𝒮f(ρ)fϵ(ρ1)Tr(ρ1Tfϵ(ρ1))+fdmaxζϵ,\min\limits_{\rho\in\mathcal{S}}f\left(\rho\right)\geq{{f}_{\epsilon}}\left({{\rho}_{1}}\right)-\operatorname{Tr}\left(\rho_{1}^{T}\nabla{{f}_{\epsilon}}\left({{\rho}_{1}}\right)\right)+f_{d}^{\max}-{{\zeta}_{\epsilon}}, (9)

where ρ1{{\rho}_{1}} is the suboptimal state obtained in the first step. ϵ\epsilon is the perturbation parameter and fϵ(ρ1):=D(𝒢ϵ(ρ1)𝒵[𝒢ϵ(ρ1)]){{f}_{\epsilon}}\left({{\rho}_{1}}\right):=D\left(\left.{{\mathcal{G}}_{\epsilon}}\left({{\rho}_{1}}\right)\right\|\mathcal{Z}\left[{{\mathcal{G}}_{\epsilon}}\left({{\rho}_{1}}\right)\right]\right). ζϵ=2ϵ(d1)log2dϵ(d1){{\zeta}_{\epsilon}}=2\epsilon\left({d}^{\prime}-1\right){{\log}_{2}}\frac{{{d}^{\prime}}}{\epsilon\left({d}^{\prime}-1\right)}, where d{d}^{\prime} is the dimension of 𝒢(ρ)\mathcal{G}\left(\rho\right). The gradient fϵ(ρ1)\nabla{{f}_{\epsilon}}\left({{\rho}_{1}}\right) is given by

[fϵ(ρ1)]T=𝒢ϵ(log2𝒢ϵ(ρ1))𝒢ϵ(log2𝒵[𝒢ϵ(ρ1)]).{{\left[\nabla{{f}_{\epsilon}}\left({{\rho}_{1}}\right)\right]}^{T}}=\mathcal{G}_{\epsilon}^{\dagger}\left({{\log}_{2}}{{\mathcal{G}}_{\epsilon}}\left({{\rho}_{1}}\right)\right)-\mathcal{G}_{\epsilon}^{\dagger}\left({{\log}_{2}}\mathcal{Z}\left[{{\mathcal{G}}_{\epsilon}}\left({{\rho}_{1}}\right)\right]\right). (10)

fdmaxf_{d}^{\max} is the dual function and written as

fdmax=max(v,s)(γ~vϵi=1ncsi)subject tosvsi=1ncviΓ~iTfϵ(ρ1)(v,s)(nc,nc),\begin{aligned} &f_{d}^{\max}=\underset{\left(\vec{v},\vec{s}\right)}{\mathop{\max}}\,\left(\vec{\tilde{\gamma}}\cdot\vec{v}-{\epsilon}^{\prime}\sum\limits_{i=1}^{nc}{{{s}_{i}}}\right)\\ &\text{subject to}\\ &\quad\quad\quad\quad-\vec{s}\leq\vec{v}\leq\vec{s}\\ &\quad\quad\quad\quad\sum\limits_{i=1}^{nc}{{{v}_{i}}\tilde{\Gamma}_{i}^{T}}\leq\nabla{{f}_{\epsilon}}\left({{\rho}_{1}}\right)\\ &\quad\quad\quad\quad\left(\vec{v},\vec{s}\right)\in\left({{\mathbb{R}}^{nc}},{{\mathbb{R}}^{nc}}\right)\\ \end{aligned}, (11)

where Γi{{\Gamma}_{i}} and γi{{\gamma}_{i}} refer to both sides of the equality constraint, respectively, with the form Tr(Γiρ)=γi\operatorname{Tr}\left({{\Gamma}_{i}}\rho\right)={{\gamma}_{i}}. ncnc represents the number of all constraints. ϵ{\epsilon}^{\prime} is the security parameter related to the numerical imprecision.

We are now in a position to assess the performance of the protocol based on the above approach.

II.3 Performance analysis

Considering a typical phase-insensitive Gaussian channel in the context of the optical fiber communication. The simulated statistics are given by [50]

F^Qx=2ηTRe(αx),\displaystyle{{\left\langle{{{\hat{F}}}_{Q}}\right\rangle}_{x}}=\sqrt{2\eta T}\operatorname{Re}\left({{\alpha}_{x}}\right), (12)
F^Px=2ηTIm(αx),\displaystyle{{\left\langle{{{\hat{F}}}_{P}}\right\rangle}_{x}}=\sqrt{2\eta T}\operatorname{Im}\left({{\alpha}_{x}}\right),
S^Qx=2ηTRe(αx)2+1+12ηTξ+vel,\displaystyle{{\left\langle{{{\hat{S}}}_{Q}}\right\rangle}_{x}}=2\eta T\operatorname{Re}{{\left({{\alpha}_{x}}\right)}^{2}}+1+\frac{1}{2}\eta T\xi+{{v}_{el}},
S^Px=2ηTIm(αx)2+1+12ηTξ+vel,\displaystyle{{\left\langle{{{\hat{S}}}_{P}}\right\rangle}_{x}}=2\eta T\operatorname{Im}{{\left({{\alpha}_{x}}\right)}^{2}}+1+\frac{1}{2}\eta T\xi+{{v}_{el}},

where TT and ξ\xi represent the transmittance and excess noise of the channel, respectively, and η\eta and vel{{v}_{el}} denote the detection efficiency and electronic noise of the detector.

The probability density function for the result yy of a heterodyne measurement conditioned on Alice’s choice xx is

P(y|x)=1π(1+12ηTξ+vel)exp[|yηTαx|21+12ηTξ+vel].P\left(\left.y\right|x\right)=\frac{1}{\pi\left(1+\frac{1}{2}\eta T\xi+{{v}_{el}}\right)}\exp\left[-\frac{{{\left|y-\sqrt{\eta T}{{\alpha}_{x}}\right|}^{2}}}{1+\frac{1}{2}\eta T\xi+{{v}_{el}}}\right]. (13)

Then, according to the key mapping area, the probability that Bob obtains the discretized key value Z=zZ=z conditioned on Alice’s choice xx is

P~(z|x)={0r𝑑r(2z1)π/8(2z+1)π/8P(reiθ|x)𝑑θ (8-PSK)0r𝑑r(2z1)π/12(2z+1)π/12P(reiθ|x)𝑑θ (12-PSK).\tilde{P}\left(\left.z\right|x\right)=\left\{\begin{array}[]{l}\int_{0}^{\infty}{rdr}\int_{{\left(2z-1\right)\pi}/{8}}^{{\left(2z+1\right)\pi}/{8}}{P\left(\left.r{{e}^{i\theta}}\right|x\right)}d\theta\text{ (8-PSK)}\\ \int_{0}^{\infty}{rdr}\int_{{\left(2z-1\right)\pi}/{12}}^{{\left(2z+1\right)\pi}/{12}}{P\left(\left.r{{e}^{i\theta}}\right|x\right)}d\theta\text{ (12-PSK)}\end{array}\right.. (14)

To extract the optimal secret key rate and fairly compare the performance of different protocols, we first investigate the dependence of the key rate on the coherent state amplitude α\alpha. In Fig. 2(a), we plot the key rate versus the choice of α\alpha for 8-PSK and 12-PSK protocols, at a transmission distance of 50 km. Here, we consider the realistic parameters: reconciliation efficiency β=0.95\beta=0.95, excess noise ξ=0.01\xi=0.01, detection efficiency η=0.552\eta=0.552, and electronic noise vel=0.015{{v}_{el}}=0.015. The dashed line represents the result of step 1 of our algorithm, which gives an upper bound on the key rate, and solid line is the result after step 2, which provides an achievable lower secure bound on the key rate. The gap between step 1 and step 2 is small, hence the obtained bound is tight. We carry out a coarse-grained search for α\alpha in the interval [0.7, 1.1] with a step size of 0.05. It is clear that there is an optimal value of α\alpha to maximize the key rate. At 50 km, the optimal α\alpha for 8-PSK and 12-PSK is 0.9 and 0.92, respectively. In Fig. 2(b), we give the optimal values of α\alpha at different transmission distances and the results of 4-PSK protocol are also shown for comparison. Compared with the 4-PSK protocol, 8-PSK allows larger optimal value of α\alpha, thus providing higher signal-to-noise ratio (SNR). The difference between the optimal α\alpha for the 8-PSK and 12-PSK protocols gradually decreases with the increase of transmission distance and is almost indistinguishable over long distances.

Refer to caption
Refer to caption
Figure 2: (a) Secret key rates as a function of the coherent state amplitude α\alpha for 8-PSK and 12-PSK protocols at the transmission distance of L=50L=50 km. (b) The optimal choice of α\alpha at different transmission distances for 4-PSK, 8-PSK and 12-PSK protocols.

In Fig. 3, we present the achievable key rates at different transmission distances for different discrete-modulation protocols and Gaussian modulation protocol. The key rate has been optimized by adopting the optimal modulation amplitude (Fig. 2(b)) and variance. In addition, we have applied the postselection technology to the 4-PSK protocol to obtain the optimal key rate [50]. We can see that the 8-PSK protocol improves the key rate by about 60% over the 4-PSK protocol. Within 10 km, the key rate can be further improved by 10% - 30% if 12-PSK is employed. However, beyond 10 km, the key rate can only be increased by about 4%, which means that the performance of 8-PSK modulation is close to saturation and adding more signal states will not make much difference. Compared with the Gaussian-modulation protocol, the achievable key rate of discrete-modulation is still relatively low. Taking 50 km as an example, the key rates per pulse of the 4-PSK, 8-PSK, 12-PSK and Gaussian modulation protocols are 0.00602, 0.00966, 0.01008, and 0.02103 bits/pulse, respectively. The 4-PSK and 8-PSK protocols can reach approximately 28% and 45% of the key rate of Gaussian modulation. The data postselection is also an interesting strategy to further improve the key rate by 8% for 8-PSK and 12-PSK protocols (see Appendix).

Refer to caption
Figure 3: Achievable secret key rate versus the transmission distance for different protocols. The modulation amplitude and variance have been optimized. Other parameters are set to β=0.95\beta=0.95, ξ=0.01\xi=0.01, η=0.552\eta=0.552, and vel=0.015{{v}_{el}}=0.015.

III DISCRETE-MODULATION CV-QKD WITH TWO-RING CONSTELLATION

To further improve the performance of the discrete-modulation protocol, we extend the 12-PSK to two-ring constellation structure. As shown in Fig. 4, different from the single-ring PSK protocol, the states are prepared with two different amplitudes α1{{\alpha}_{1}} and α2{{\alpha}_{2}} in the designed two-ring constellation. The four states in the inner ring are expressed as {|αx=|α1eixπ/2}x=0,,3{{\left\{\left|{{\alpha}_{x}}\right\rangle=\left|{{\alpha}_{1}}{{e}^{{ix\pi}/{2}}}\right\rangle\right\}}_{x=0,\cdot\cdot\cdot,3}}, where each of states is chosen according to an equal probability p1{{p}_{1}}. The eight states in the outer ring take the form of {|αx=|α2ei(x4)π/4}x=4,,11{{\left\{\left|{{\alpha}_{x}}\right\rangle=\left|{{\alpha}_{2}}{{e}^{{i\left(x-4\right)\pi}/{4}}}\right\rangle\right\}}_{x=4,\cdot\cdot\cdot,11}} and each of which is chosen with an equal probability p2{{p}_{2}}. p1+2p2=1/4{{p}_{1}}+2{{p}_{2}}={1}/{4}. Alice transmits the randomly selected state αx{{\alpha}_{x}} to Bob and records the sequence of the state she sent. Upon receiving the state, Bob performs a heterodyne detection and obtains the measurement outcome yy. According to the region Rj{{R}_{j}}, Bob maps his outcome y=|y|eiθy=\left|y\right|{{e}^{i\theta}} to the discretized raw keys as follows

z=\displaystyle z=
{j, if θ[(2j1)π4,(2j+1)π4),|y|[0,αc) {Rj}0j3j, if θ[(2j9)π8,(2j7)π8),|y|[αc,) {Rj}4j11,\displaystyle\left\{\begin{array}[]{l}j,\text{ if }\theta\in\left[\frac{\left(2j-1\right)\pi}{4},\frac{\left(2j+1\right)\pi}{4}\right)\text{,}\left|y\right|\in\left[0,{{\alpha}_{c}}\right)\text{ }{{\left\{{{R}_{j}}\right\}}_{0\leq j\leq 3}}\\ j,\text{ if }\theta\in\left[\frac{\left(2j-9\right)\pi}{8},\frac{\left(2j-7\right)\pi}{8}\right),\left|y\right|\in\left[{{\alpha}_{c}},\infty\right)\text{ }{{\left\{{{R}_{j}}\right\}}_{4\leq j\leq 11}}\end{array}\right., (17)

where αc{{\alpha}_{c}} is the amplitude corresponding to the boundary between the inner and outer regions.

Refer to caption
Figure 4: Schematic diagram of the proposed two-ring constellation structure with twelve signal states.

The key rate can be optimized by finding the optimal parameter values of α1{{\alpha}_{1}}, α2{{\alpha}_{2}}, αc{{\alpha}_{c}}, and p1{{p}_{1}} (p1+2p2=1/4{{p}_{1}}+2{{p}_{2}}={1}/{4}). The dependence of key rate on these parameters are shown in Fig. 5. For the transmission distance of 50 km, the optimal choices of the parameters are α1=0.7{{\alpha}_{1}}=0.7, α2=1.6{{\alpha}_{2}}=1.6, αc=0.85{{\alpha}_{c}}=0.85, p1=7/48{{p}_{1}}={7}/{48} and p2=5/96{{p}_{2}}={5}/{96}. In this case, we achieve a key rate of 0.01459 bits/pulse, which is 50% higher than that of 8-PSK protocol and 140% higher than that of 4-PSK protocol. By varying the constellation geometry from the single-ring PSK structure to the two-ring constellation structure, we effectively overcomes the limitation of states distribution in phase space, and significantly improves the performance of the 4-PSK discrete-modulation protocol.

Refer to caption
Figure 5: Secure key rate versus the choices of α1{{\alpha}_{1}}, α2{{\alpha}_{2}}, αc{{\alpha}_{c}}, and p1{{p}_{1}}. The simulation parameters are β=0.95\beta=0.95, ξ=0.01\xi=0.01, η=0.552\eta=0.552, vel=0.015{{v}_{el}}=0.015, and L=50 kmL=50\text{ }\operatorname{km}. (a) The optimal α1{{\alpha}_{1}} is obtained via a coarse-grained search in the interval [0.5, 0.9] with a step size 0.05. The other parameters are set to α2=1.6{{\alpha}_{2}}=1.6, αc=0.85{{\alpha}_{c}}=0.85, and p1=7/48{{p}_{1}}={7}/{48}. (b) The value of α2{{\alpha}_{2}} is changed with a step size 0.05 in the interval [1.45, 1.85]. The other parameters are set to α1=0.7{{\alpha}_{1}}=0.7, αc=0.85{{\alpha}_{c}}=0.85, p1=7/48{{p}_{1}}={7}/{48}. (c) The value of αc{{\alpha}_{c}} is changed with a step size 0.05 in the interval [0.75, 1.1]. The other parameters are set to α1=0.7{{\alpha}_{1}}=0.7, α2=1.6{{\alpha}_{2}}=1.6, p1=7/48{{p}_{1}}={7}/{48}. (d) The value of p1{{p}_{1}} is searched in the interval [4/48, 11/48] with a step size 1/48. The other parameters are set to α1=0.7{{\alpha}_{1}}=0.7, α2=1.6{{\alpha}_{2}}=1.6, and αc=0.85{{\alpha}_{c}}=0.85.

In Fig. 6, we give the optimal choice of parameters α1{{\alpha}_{1}}, α2{{\alpha}_{2}}, αc{{\alpha}_{c}} and p1{{p}_{1}} at different transmission distances. The cutoff value of photon number Nc{{N}_{c}} is selected from the interval [14, 22] according to the modulation amplitudes. The optimal p1{{p}_{1}} is obtained via a coarse-grained search in the interval [1/48, 11/48] with a step size 1/48. We can see that the optimal αc{{\alpha}_{c}} is closer to α1{{\alpha}_{1}} and p1{{p}_{1}} is greater than p2{{p}_{2}}, which result in an approximate Gaussian distribution in phase space. Next, we employ the optimal parameters values to obtain the optimal key rate and analyze the performance of the protocol.

Refer to caption
Figure 6: The optimal choice of parameters α1{{\alpha}_{1}}, α2{{\alpha}_{2}}, αc{{\alpha}_{c}} and p1{{p}_{1}} at different transmission distances for two-ring constellation protocol with twelve signal states.

In Fig. 7, we compare the key rate of the two-ring constellation protocol with the previous PSK protocols and Gaussian modulation protocol. We observe that the key rate of the two-ring constellation with twelve states is higher than that of PSK protocols, and the gap of the key rate between two-ring constellation protocol and Gaussian modulation protocol decreases gradually with the increase of transmission distance. As shown in Fig. 8, for long distance transmission distance above 50 km, the two-ring constellation with twelve states can reach above 70% of key rate of Gaussian modulation protocol. Notice that two-ring constellation with twelve states require only 1-bit discretization for the amplitude of the light field and 3-bit discretization for the phase of the light field. Therefore, we proof that the concise two-ring constellation with twelve states can exhibit superior performance, which is very close to that of Gaussian modulation protocol.

Refer to caption
Figure 7: Achievable secret key rate versus the transmission distance for different protocols. Other parameters are set to β=0.95\beta=0.95, ξ=0.01\xi=0.01, η=0.552\eta=0.552, and vel=0.015{{v}_{el}}=0.015.
Refer to caption
Figure 8: Ratio of the key rate of various discrete-modulation protocols to Gaussian modulation protocol. TRC represents two-ring constellation protocol with twelve states and GM represents the Gaussian modulation protocol.

IV CONCLUSIONS

The optimized constellation design schemes were proposed to significantly improve the performance of the discrete-modulation CV-QKD protocol. The asymptotic secure key rate in the trusted detector noise scenario is obtained by applying the advanced numerical methods. For the sake of fair comparison, we optimized the coherent state amplitude at each transmission distance. Our numerical results showed that 8-PSK can increase the key rate by about 60% over conventional 4-PSK protocol, however adding the 8-PSK to 12-PSK does not significantly improve the key rate. Interestingly, by allocating twelve coherent states to a two-ring constellation that enlarges the distribution range of coherent states in phase space, the key rate with 140% higher than that of 4-PSK protocol was achieved. This key rate reaches about 70% of that of the Gaussian modulation protocol for transmission distance above 50 km. Our results confirm that the discrete-modulation protocol with ten or so appropriate constellation and optimal modulation parameters can approximate the key rate of Gaussian modulation protocol. We believe that the proposed discrete-modulation protocol can find promising applications in high-rate and low-cost secure quantum communication networks.

The future works include the optimization of the key rate of the discrete-modulation protocol in the short distance transmission by extending current state constellation or other new constellation design schemes [52], and finding better data postselection strategies [53, 54]. Extending our security analysis to include the impact of finite-size is also an important future task [55, 56, 57].

Acknowledgements.
This work is supported by the National Natural Science Foundation of China (NSFC) (Grants No.11774209); the Aeronautical Science Foundation of China (20200020115001); Key Research and Development Program of Guangdong Province (2020B0303040002); Shanxi 1331KSC.

Appendix A POSTSELECTION

In this Appendix, we apply the postselection technology to our proposed protocol. Postselection is useful to improve the key rate of the four state protocol [50]. It also reduces the amount of data for post-processing. In Fig. 9, taking the 8-PSK as an example, we illustrate the concept of postselection. There is a cut-off area at the center of the phase space, which is defined by a circle with radius α0{{\alpha}_{0}}. The data inside the circle is discarded and the data outside the circle is retained. Hence, the key mapping results of Bob become

z={j, if θ[(2j1)π8,(2j+1)π8) and |y|α0 , otherwise,z=\left\{\begin{array}[]{l}j,\text{ if }\theta\in\left[\frac{\left(2j-1\right)\pi}{8},\frac{\left(2j+1\right)\pi}{8}\right)\text{ and }\left|y\right|\geq{{\alpha}_{0}}\text{ }\\ \bot,\text{ otherwise}\end{array}\right., (19)

where α0{{\alpha}_{0}} is the postselection parameter, and α0=0{{\alpha}_{0}}=0 corresponds to the protocol without postselection.

The sifting factor is defined as ppass=x,zP~(x)P~(z|x){{p}_{\operatorname{pass}}}=\sum\limits_{x,z}{\tilde{P}\left(x\right)\tilde{P}\left(\left.z\right|x\right)}, where

P~(z|x)=α0r𝑑r(2z1)π/8(2z+1)π/8P(reiθ|x)𝑑θ,\tilde{P}\left(\left.z\right|x\right)=\int_{{{\alpha}_{0}}}^{\infty}{rdr}\int_{{\left(2z-1\right)\pi}/{8}}^{{\left(2z+1\right)\pi}/{8}}{P\left(\left.r{{e}^{i\theta}}\right|x\right)}d\theta, (20)

P~(x)\tilde{P}\left(x\right) is the probability that Alice chooses to send the state αx{{\alpha}_{x}}.

Refer to caption
Figure 9: The key mapping for 8-PSK protocol when postselection is considered.

In Fig. 10(a), we plot the key rate versus the postselection parameter α0{{\alpha}_{0}} for the 8-PSK and 12-PSK protocols at the distance L=50L=50 km. We observe that there exists an optimal postselection parameter to maximize the key rate. The optimal postselection parameter value for 8-PSK and 12-PSK protocols is α0=0.55{{\alpha}_{0}}=0.55. Compared with the original protocol without postselection, the key rate is increased by 8% for both 8-PSK and 12-PSK protocols. By inserting α0=0.55{{\alpha}_{0}}=0.55 into Eq. (20), we can obtain the value of the sifting factor ppass=0.75{{p}_{\operatorname{pass}}}=0.75, which means that the amount of data used for post-processing is reduced by 25%.

With the similar procedure, we search for the optimal postselection parameter for the two-ring constellation protocol with twelve states, as shown in Fig. 10(b). The result suggests that the optimal value is α0=0{{\alpha}_{0}}=0. Therefore, we do not need to postselect the data for the two-ring constellation scheme. It should be noted that there may be other postselection strategies that can improve the performance of the protocol, which is left for future work.

Refer to caption
Figure 10: (a) Secure key rate versus postselection parameter for the 8-PSK and 12-PSK protocols at the transmission distance of 50 km. The modulation amplitude is set to α=0.9\alpha=0.9 for 8-PSK protocol and α=0.92\alpha=0.92 for 12-PSK protocol. (b) Secure key rate versus postselection parameter for the two-ring constellation protocol at 50km, where the parameters value are set to α1=0.7{{\alpha}_{1}}=0.7, α2=1.6{{\alpha}_{2}}=1.6, αc=0.85{{\alpha}_{c}}=0.85 and p1=7/48{{p}_{1}}={7}/{48}. The optimal postselection parameter is obtained via a coarse-grained search for α0{{\alpha}_{0}} in the interval [0, 0.7] for (a) and [0, 0.4] for (b) with a step size 0.05. Other parameters for simulations are set to β=0.95\beta=0.95, ξ=0.01\xi=0.01, η=0.552\eta=0.552, and vel=0.015{{v}_{el}}=0.015.

References

  • [1] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Quantum cryptography, Rev. Mod. Phys. 74, 145 (2002).
  • [2] V. Scarani, H. Bechmann-Pasquinucci, N.J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, The security of practical quantum key distribution, Rev. Mod. Phys. 81, 1301 (2009).
  • [3] H.-K. Lo and H.F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science 283, 2050 (1999).
  • [4] F.-H. Xu, X.-F. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, Secure quantum key distribution with realistic devices, Rev. Mod. Phys. 92, 025002 (2020).
  • [5] S.L. Braunstein and P. van Loock, Quantum information with continuous variables, Rev. Mod. Phys. 77, 513 (2005).
  • [6] C. Weedbrook, S. Pirandola, R. García-Patrón, N.J. Cerf, T.C. Ralph, J.H. Shapiro, and S. Lloyd, Gaussian quantum information, Rev. Mod. Phys. 84, 621 (2012).
  • [7] E. Diamanti and A. Leverrier, Distributing secret keys with quantum continuous variables: Principle, security and implementations, Entropy 17, 6072 (2015).
  • [8] S. Pirandola, U.L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, et al., Advances in quantum cryptography, Adv. Opt. Photon. 12, 1012 (2020).
  • [9] T.C. Ralph, Continuous variable quantum cryptography, Phys. Rev. A 61, 010303 (1999).
  • [10] N.J. Cerf, M. Levy, and G. Van Assche, Quantum distribution of gaussian keys using squeezed states, Phys. Rev. A 63, 052311 (2001).
  • [11] F. Grosshans and P. Grangier, Continuous variable quantum cryptography using coherent states, Phys. Rev. Lett. 88, 057902 (2002).
  • [12] F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N.J. Cerf, and P. Grangier, Quantum key distribution using gaussian-modulated coherent states, Nature 421, 238 (2003).
  • [13] C. Weedbrook, A.M. Lance, W.P. Bowen, T. Symul, T.C. Ralph, and P.K. Lam, Quantum cryptography without switching, Phys. Rev. Lett. 93, 170504 (2004).
  • [14] A.M. Lance, T. Symul, V. Sharma, C. Weedbrook, T.C. Ralph, and P.K. Lam, No-switching quantum key distribution using broadband modulated coherent light, Phys. Rev. Lett. 95, 180503 (2005).
  • [15] J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N.J. Cerf, R. Tualle-Brouri, S.W. McLaughlin, et al., Quantum key distribution over 25 km with an all-fiber continuous-variable system, Phys. Rev. A 76, 042305 (2007).
  • [16] B. Qi, L.-L. Huang, L. Qian, and H.-K. Lo, Experimental study on the gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers, Phys. Rev. A 76, 052323 (2007).
  • [17] S. Pirandola, S. Mancini, S. Lloyd, and S.L. Braunstein, Continuous-variable quantum cryptography using two-way quantum communication, Nat. Phys. 4, 726 (2008).
  • [18] F. Furrer, T. Franz, M. Berta, A. Leverrier, V.B. Scholz, M. Tomamichel, and R.F. Werner, Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks, Phys. Rev. Lett. 109, 100502 (2012).
  • [19] L.S. Madsen, V.C. Usenko, M. Lassen, R. Filip, and U.L. Andersen, Continuous variable quantum key distribution with modulated entangled states, Nat. Commun. 3, 1083 (2012).
  • [20] P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, Experimental demonstration of long-distance continuous-variable quantum key distribution, Nat. Photonics 7, 378 (2013).
  • [21] T. Gehring, V. Händchen, J. Duhme, F. Furrer, T. Franz, C. Pacher, R.F. Werner, and R. Schnabel, Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks, Nat. Commun. 6, 8795 (2015).
  • [22] S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S.L. Braunstein, S. Lloyd, T. Gehring, C.S. Jacobsen, and U.L. Andersen, High-rate measurement-device-independent quantum cryptography, Nat. Photonics 9, 397 (2015).
  • [23] V.C. Usenko and F. Grosshans, Unidimensional continuous-variable quantum key distribution, Phys. Rev. A 92, 062337 (2015).
  • [24] D. Huang, P. Huang, H.S. Li, T. Wang, Y.-M. Zhou, and G.-H. Zeng, Field demonstration of a continuous-variable quantum key distribution network, Opt. Lett. 41, 3511 (2016).
  • [25] N. Walk, S. Hosseini, J. Geng, O. Thearle, J.Y. Haw, S. Armstrong, S.M. Assad, J. Janousek, T.C. Ralph, T. Symul, et al., Experimental demonstration of gaussian protocols for one-sided device-independent quantum key distribution, Optica 3, 634 (2016).
  • [26] A. Leverrier, Security of continuous-variable quantum key distribution via a gaussian de finetti reduction, Phys. Rev. Lett. 118, 200501 (2017).
  • [27] X.-Y. Wang, W.-Y. Liu, P. Wang, and Y.-M. Li, Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution, Phys. Rev. A 95, 062330 (2017).
  • [28] F. Furrer and W.J. Munro, Repeaters for continuous-variable quantum communication, Phys. Rev. A 98, 032335 (2018).
  • [29] F. Karinou, H.H. Brunner, C.F. Fung, L.C. Comandar, S. Bettelli, D. Hillerkuss, M. Kuschnerov, S. Mikroulis, D. Wang, C. Xie, et al., Toward the integration of cv quantum key distribution in deployed optical networks, IEEE Photonics Technol. Lett. 30, 650 (2018).
  • [30] N. Wang, S.-N. Du, W.-Y. Liu, X.-Y. Wang, Y.-M. Li, and K.-C. Peng, Long-distance continuous-variable quantum key distribution with entangled states, Phys. Rev. Appl. 10, 064028 (2018).
  • [31] Y.-C. Zhang, Z.-Y. Li, Z.-Y. Chen, C. Weedbrook, Y.-J. Zhao, X.-Y. Wang, Y.-D. Huang, C.-C. Xu, X.-X. Zhang, Z.-Y. Wang, et al., Continuous-variable qkd over 50 km commercial fiber, Quantum Sci. Technol. 4, 035006 (2019).
  • [32] S.-N. Du, Y. Tian, and Y.-M. Li, Impact of four-wave-mixing noise from dense wavelength-division-multiplexing systems on entangled-state continuous-variable quantum key distribution, Phys. Rev. Appl. 14, 024013 (2020).
  • [33] B. Qi, H. Gunther, P.G. Evans, B.P. Williams, R.M. Camacho, and N.A. Peters, Experimental passive-state preparation for continuous-variable quantum communications, Phys. Rev. Appl. 13, 054065 (2020).
  • [34] Y.-C. Zhang, Z.-Y. Chen, S. Pirandola, X.-Y. Wang, C. Zhou, B.-J. Chu, Y.-J. Zhao, B.-J. Xu, S. Yu, and H. Guo, Long-distance continuous-variable quantum key distribution over 202.81 km of fiber, Phys. Rev. Lett. 125, 010502 (2020).
  • [35] D. Dequal, L. Trigo Vidarte, V. Roman Rodriguez, G. Vallone, P. Villoresi, A. Leverrier, and E. Diamanti, Feasibility of satellite-to-ground continuous-variable quantum key distribution, npj Quantum Inform. 7, 3 (2021).
  • [36] E. Kaur, S. Guha, and M.M. Wilde, Asymptotic security of discrete-modulation protocols for continuous-variable quantum key distribution, Phys. Rev. A 103, 012412 (2021).
  • [37] A. Leverrier and P. Grangier, Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation, Phys. Rev. Lett. 102, 180504 (2009).
  • [38] Y.-B. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks, Phys. Rev. A 79, 012307 (2009).
  • [39] D. Sych and G. Leuchs, Coherent state quantum key distribution with multi letter phase-shift keying, New J. Phys. 12, 053019 (2010).
  • [40] X.-Y. Wang, Z.-L. Bai, S.-F. Wang, Y.-M. Li, and K.-C. Peng, Four-state modulation continuous variable quantum key distribution over a 30-km fiber and analysis of excess noise, Chin. Phys. Lett. 30, 010305 (2013).
  • [41] K. Brádler and C. Weedbrook, Security proof of continuous-variable quantum key distribution using three coherent states, Phys. Rev. A 97, 022310 (2018).
  • [42] R. García-Patrón and N.J. Cerf, Unconditional optimality of gaussian attacks against continuous-variable qkd, Phys. Rev. Lett. 97, 190503 (2006).
  • [43] M. Navascués, F. Grosshans, and A. Acín, Optimality of gaussian attacks in continuous-variable quantum cryptography, Phys. Rev. Lett. 97, 190502 (2006).
  • [44] A. Leverrier and P. Grangier, Simple proof that gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a gaussian modulation, Phys. Rev. A 81, 062314 (2010).
  • [45] A. Leverrier and P. Grangier, Continuous-variable quantum-key-distribution protocols with a non-gaussian modulation, Phys. Rev. A 83, 042312 (2011).
  • [46] T. Hirano, T. Ichikawa, T. Matsubara, M. Ono, Y. Oguri, R. Namiki, K. Kasai, R. Matsumoto, and T. Tsurumaru, Implementation of continuous-variable quantum key distribution with discrete modulation, Quantum Sci. Technol. 2, 024010 (2017).
  • [47] P. Papanastasiou, C. Lupo, C. Weedbrook, and S. Pirandola, Quantum key distribution with phase-encoded coherent states: Asymptotic security analysis in thermal-loss channels, Phys. Rev. A 98, 012340 (2018).
  • [48] S. Ghorai, P. Grangier, E. Diamanti, and A. Leverrier, Asymptotic security of continuous-variable quantum key distribution with a discrete modulation, Phys. Rev. X 9, 021059 (2019).
  • [49] J. Lin, T. Upadhyaya, and N. Lütkenhaus, Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution, Phys. Rev. X 9, 041064 (2019).
  • [50] J. Lin and N. Lütkenhaus, Trusted detector noise analysis for discrete modulation schemes of continuous-variable quantum key distribution, Phys. Rev. Appl. 14, 064030 (2020).
  • [51] A. Winick, N. Lütkenhaus, and P.J. Coles, Reliable numerical key rates for quantum key distribution, Quantum 2, 77 (2018).
  • [52] F. Jardel, T.A. Eriksson, C. Méasson, A. Ghazisaeidi, F. Buchali, W. Idler, and J.J. Boutros, Exploring and experimenting with shaping designs for next-generation optical communications, J. Lightw. Technol. 36, 5298 (2018).
  • [53] C. Silberhorn, T.C. Ralph, N. Lütkenhaus, and G. Leuchs, Continuous variable quantum cryptography: Beating the 3 db loss limit, Phys. Rev. Lett. 89, 167901 (2002).
  • [54] H.M. Chrzanowski, N. Walk, S.M. Assad, J. Janousek, S. Hosseini, T.C. Ralph, T. Symul, and P.K. Lam, Measurement-based noiseless linear amplification for quantum communication, Nat. Photonics 8, 333 (2014).
  • [55] A. Leverrier, F. Grosshans, and P. Grangier, Finite-size analysis of a continuous-variable quantum key distribution, Phys. Rev. A 81, 062343 (2010).
  • [56] D. Bunandar, L.C.G. Govia, H. Krovi, and D. Englund, Numerical finite-key analysis of quantum key distribution, npj Quantum Inform. 6, 104 (2020).
  • [57] T. Matsuura, K. Maeda, T. Sasaki, and M. Koashi, Finite-size security of continuous-variable quantum key distribution with digital signal processing, Nat. Commun. 12, 252 (2021).