This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Sending-or-not-sending twin-filed quantum key distribution with discrete phase modulation

Cong Jiang1,2, Zong-Wen Yu2,4, Xiao-Long Hu2 and Xiang-Bin Wang1,2,3,5111Email Address: [email protected]222Also at Center for Atomic and Molecular Nanosciences, Tsinghua University, Beijing 100084, China 1 Jinan Institute of Quantum technology, SAICT, Jinan 250101, China
2State Key Laboratory of Low Dimensional Quantum Physics, Department of Physics,
Tsinghua University, Beijing 100084, China
3 Synergetic Innovation Center of Quantum Information and Quantum Physics,
University of Science and Technology of China, Hefei, Anhui 230026, China
4Data Communication Science and Technology Research Institute, Beijing 100191, China
5 Shenzhen Institute for Quantum Science and Engineering, and Physics Department,
Southern University of Science and Technology, Shenzhen 518055, China
Abstract

We study the sending-or-not-sending (SNS) protocol with discrete phase modulation of coherent states. We first make the security of the SNS protocol with discrete phase modulation. We then present analytic formulas for key rate calculation. We take numerical simulations for the key rate through discrete phase modulation of both the original SNS protocol and the SNS protocol with two way classical communications of active-odd-parity pairing (AOPP). Our numerical simulation results show that only with 66 phase values, the key rates of the SNS protocol can exceed the linear bound, and with 1212 phase values, the key rates are very close to the results of the SNS protocol with continuously modulated phase-randomization.

I Introduction

The theories and experiments of quantum key distribution (QKD) Bennett and Brassard (1984); Ekert (1991); Pirandola et al. (2019); Xu et al. (2019); Gisin et al. (2002); Gisin and Thew (2007); Scarani et al. (2009); Shor and Preskill (2000); Koashi (2009); Hwang (2003); Wang (2005); Lo et al. (2005); Wang et al. (2019a); Kraus et al. (2005); Yin et al. (2016); Liao et al. (2017); Boaron et al. (2018); Chen et al. (2020); Yin et al. (2020) have been widely studied since the first QKD protocol was proposed by Bennet and Brassard in 1984 Bennett and Brassard (1984). The secure key rate and the distance are central issues in practical application of QKD. In particular, the decoy-state method Hwang (2003); Wang (2005); Lo et al. (2005) improves the relationship between key rate RR and channel transmittance η\eta from square scale, RO(η2)R\sim O(\eta^{2}), to linear scale, RO(η)R\sim O(\eta). Recently, the idea of twin-field QKD (TFQKD) Lucamarini et al. (2018) and its variants Wang et al. (2018); Tamaki et al. (2018); Cui et al. (2019); Curty et al. (2019); Ma et al. (2018); Lin and Lütkenhaus (2018); Yu et al. (2019); Maeda et al. (2019); Lu et al. (2019); Jiang et al. (2019); Xu et al. (2020); Grasselli et al. (2019); Wang and Lo (2019); Hu et al. (2019); Zhang et al. (2019); Zhou et al. (2019) have further improved the key rate to the scale of square root of channel transmittance, RO(η)R\sim O(\sqrt{\eta}), which can break linear bound Takeoka et al. (2014); Pirandola et al. (2017) of QKD. So far, the TFQKD has been demonstrated by a number of experiments Minder et al. (2019); Liu et al. (2019); Wang et al. (2019b); Zhong et al. (2019); Chen et al. (2020).

Among all the variants of TFQKD, the sending-or-not-sending (SNS) protocol Wang et al. (2018) together with its modified protocols Hu et al. (2019); Xu et al. (2020); Jiang et al. (2020) have attracted many attentions due to its large noise tolerance and high key rate. Moreover, the SNS protocol has a unique advantage that the traditional decoy-state method directly applies, which makes the finite-key analysis very efficient. The SNS protocol has been experimentally demonstrated in proof-of-principle in Ref. Minder et al. (2019), and realized in real optical fiber with the finite-key effects taken into consideration Chen et al. (2020); Liu et al. (2019). Notably, the SNS protocol has been experimentally demonstrated over 509 km optical fiber Chen et al. (2020) which is the longest secure distance of QKD in optical fiber.

In practice, we need the decoy-state method Hwang (2003); Wang (2005); Lo et al. (2005) to assure the security of those protocols with imperfect sources. In the traditional decoy-state method, phase randomization is requested so that the source state can be regarded as the classical mixture of different photon-number states. However, the perfect phase randomization by continuous modulation is technically not likely. In a real experiment, the phases of WCS sources are discretely modulated to 2mπN\frac{2m\pi}{N} where m=0,1,2,,N1m=0,1,2,\cdots,N-1 and NN is always an even number. The major difference between the discrete modulation and continuous modulation is that the actual states of the latter case are Fock states while that of the former case is not.

To close the gap between the theory and experiment, we study the SNS protocol with discrete phase modulation of WCS sources. Although the effects of discrete-phase-randomization have been studied for the protocols such as the traditional decoy-state BB84 Hwang (2003); Wang (2005); Lo et al. (2005) in Ref. Cao et al. (2015), the MDIQKD Braunstein and Pirandola (2012); Lo et al. (2012); Wang (2013); Tamaki et al. (2012); Xu et al. (2013); Curty et al. (2014); Xu et al. (2014); Zhou et al. (2016) in Ref. Cao (2020), the non-post selection protocol Curty et al. (2019); Cui et al. (2019) of TFQKD in Ref. Lorenzo et al. (2020), no investigation has been done on the SNS protocol. Here we study this based on the structure of the SNS protocol. We prove it’s security and present the formulas for key rate calculation. Unlike other protocols with discrete-phase-randomized WCS sources Cao et al. (2015); Cao (2020); Lorenzo et al. (2020); Zhang et al. (2020); Primaatmaja et al. (2019). We then present analytical formulas of the upper bound of the phase-flip error rate and the lower bound of the yield of untagged bits while the prior arte works have to solve linear programming problems. Our numerical simulation results show that only with 6 phase values, the key rates of the SNS protocol can exceed the PLOB bound, the linear bound of the key rate established by Pirandola, Laurenza, Ottaviani, and Banchi Pirandola et al. (2017). With 12 phase slices, the key rates are very close to the SNS protocol with continuously modulated phase-randomized WCS sources. Since the property of no bit-flip error in the untagged bits in SNS protocl still holds with discrete phase modulation, we can directly apply the active-odd-parity pairing (AOPP) method proposed in our previous work Xu et al. (2020) to improve the key rate. The numerical results show that the advantage of the AOPP method still holds.

The article is arranged as follows. We first introduce how to perform the SNS protocol with discrete phase modulation of WCS sources. Based on the equivalent entanglement protocol of the SNS protocol, we show how to get the formula of the phase-flip error rate. We then show how to apply the decoy-state method to obtain the upper bound of the phase-flip error rate and the lower bound of the yield of untagged bits. Using these bounds, we present numerical results for both the original SNS protocol and the SNA protocol with AOPP method. The article is ended with the concluding remarks.

II The SNS protocol with discrete phase modulation of weak coherent state sources

II.1 The protocol

The implementation process of the SNS protocol with discrete phase modulation WCS sources is similar to that of the original SNS protocol Wang et al. (2018). Here we first introduce the 4-intensity protocol as follows. Obviously, the special case that the intensity of signal state equals to that of one of the decoy state in the 4-intensity makes the 3-intensity protocol.

For each time window, Alice (Bob) randomly decides it is a decoy window or a signal window. If it is a decoy window, Alice (Bob) randomly chooses to prepare a pulse of state |0|0\rangle, |e2mπi/Nμx|e^{2m\pi i/N}\sqrt{\mu_{x}}\rangle or |e2mπi/Nμy|e^{2m^{\prime}\pi i/N}\sqrt{\mu_{y}}\rangle (|0|0\rangle, |e2nπi/Nμx|e^{2n\pi i/N}\sqrt{\mu_{x}}\rangle or |e2nπi/Nμy|e^{2n^{\prime}\pi i/N}\sqrt{\mu_{y}}\rangle), where m,m,n,nm,m^{\prime},n,n^{\prime} are randomly chosen from {0,1,2,,N1}\{0,1,2,\cdots,N-1\} and NN is assumed to be an even number. If it is a signal window, Alice (Bob) randomly chooses to prepare a vacuum pulse or a pulse of state |e2lπi/Nμz|e^{2l\pi i/N}\sqrt{\mu_{z}}\rangle with probabilities 1ϵ1-\epsilon and ϵ\epsilon respectively, where ll is randomly chosen from {0,1,2,,N1}\{0,1,2,\cdots,N-1\}. If Alice (Bob) decides to send out a vacuum pulse, that is to say sending nothing or not sending, Alice (Bob) takes the corresponding classical bit value as 0(1)0(1). If Alice (Bob) decides to send out a pulse of state |e2lπi/Nμz|e^{2l\pi i/N}\sqrt{\mu_{z}}\rangle, Alice (Bob) takes the corresponding classical bit value as 1(0)1(0).

Then Alice and Bob send their pulses to Charlie, Charlie is assumed to perform interferometric measurements on the received pulses. If only one of the two detectors clicks, Charlie would announce this pulse pair causes a click and whether the left detector or right detector clicks. Alice and Bob take it as a one-detector heralded event.

After Alice and Bob repeat the above process for many times, they acquire a series of data which are used to perform the data post-processing.

The first step of data post-processing is sifting. Alice and Bob first announce the types of each time window they have decided. For a window that both Alice and Bob have decided a signal window, it is a ZZ window. The corresponding bits of the one-detector heralded event of the ZZ windows, which are also called as the sifted key, are used to extract the final key. Except for the ZZ windows, Alice and Bob announce the intensities and phases they have chosen in each window. For a window that both Alice and Bob have decided a decoy window, and the intensity of the pulse is μx\mu_{x} and their phases satisfy

1|cos(2mπN2nπN)|δ,1-|\cos(\frac{2m\pi}{N}-\frac{2n\pi}{N})|\leq\delta, (1)

where δ\delta is a positive number close to 0, it is an X1X_{1} window. Here in our calculation we shall simply set

|cos(2mπN2nπN)|=1|\cos(\frac{2m\pi}{N}-\frac{2n\pi}{N})|=1 (2)

for the post selection condition of X1X_{1} windows above. The data of X1X_{1} windows are used to estimate the phase-flip error rate of untagged bits. The data of other windows are used for decoy-state analysis.

As the phases of WCS pulses in the ZZ windows are never announced in the public channel, the density matrix of those WCS pulses is

ρz=1Nl=0N1|e2lπi/Nμze2lπi/Nμz|.\rho_{z}=\frac{1}{N}\sum_{l=0}^{N-1}|e^{2l\pi i/N}\sqrt{\mu_{z}}\rangle\langle e^{-2l\pi i/N}\sqrt{\mu_{z}}|. (3)

For convenience, we define the approximated jj-photon state |λj|\lambda_{j}\rangle in the following form Cao et al. (2015):

|λj=1Pj(μz)k=0(μz)kN+j(kN+j)!|kN+j,|\lambda_{j}\rangle=\frac{1}{\sqrt{P_{j}(\mu_{z})}}\sum_{k=0}^{\infty}\frac{(\sqrt{\mu_{z}})^{kN+j}}{\sqrt{(kN+j)!}}|kN+j\rangle, (4)

and j=0,1,2,N1j=0,1,2\cdots,N-1. It is easy to see that ρz\rho_{z} is a classical mixture of different |λj|\lambda_{j}\rangle. Explicitly, we have

ρz=j=0N1Pj(μz)|λjλj|,\rho_{z}=\sum_{j=0}^{N-1}P_{j}(\mu_{z})|\lambda_{j}\rangle\langle\lambda_{j}|, (5)

where

Pj(μz)=k=0μzkN+jeμz(kN+j)!.P_{j}(\mu_{z})=\sum_{k=0}^{\infty}\frac{\mu_{z}^{kN+j}e^{-\mu_{z}}}{(kN+j)!}. (6)

For the pulse pairs in X1X_{1} windows, if the phases of the pulse pair satisfy n(m+q)modNn\equiv(m+q){\rm mod}N where qq is a constant integer, the density matrix of those pulse pairs is

ρX1(q)=1Nm=0N1|e2mπi/NμxA|e2nπi/NμxBe2mπi/Nμx|Ae2nπi/Nμx|B,\rho_{X1}(q)=\frac{1}{N}\sum_{m=0}^{N-1}|e^{2m\pi i/N}\sqrt{\mu_{x}}\rangle_{A}|e^{2n\pi i/N}\sqrt{\mu_{x}}\rangle_{B}\langle e^{-2m\pi i/N}\sqrt{\mu_{x}}|_{A}\langle e^{-2n\pi i/N}\sqrt{\mu_{x}}|_{B}, (7)

where the subscript AA and BB indicate Alice and Bob respectively. After a simple calculation, one can find that ρX1(q)\rho_{X1}(q) is actually the classical mixture of the state |φjq|\varphi_{j}^{q}\rangle,

ρX1(q)=j=0N1PXj(μx)|φjqφjq|\rho_{X1}(q)=\sum_{j=0}^{N-1}PX_{j}(\mu_{x})|\varphi_{j}^{q}\rangle\langle\varphi_{j}^{q}| (8)

where

|φjq=eμxPXj(μx)k=0k1=0kN+j(μx)kN+jk1!(kN+jk1)!e2πiNq(kN+jk1)|k1;kN+jk1,|\varphi_{j}^{q}\rangle=\frac{e^{-\mu_{x}}}{\sqrt{PX_{j}(\mu_{x})}}\sum_{k=0}^{\infty}\sum_{k_{1}=0}^{kN+j}\frac{(\sqrt{\mu_{x}})^{kN+j}}{\sqrt{k_{1}!(kN+j-k_{1})!}}e^{\frac{2\pi i}{N}q(kN+j-k_{1})}|k_{1};kN+j-k_{1}\rangle, (9)

and the probability to obtain the state |φjq|\varphi_{j}^{q}\rangle is

PXj(μx)=k=0k1=0kN+jμxkN+je2μxk1!(kN+jk1)!=k=0(2μx)kN+je2μx(kN+j)!=Pj(2μx).PX_{j}(\mu_{x})=\sum_{k=0}^{\infty}\sum_{k_{1}=0}^{kN+j}\frac{{\mu_{x}}^{kN+j}e^{-2\mu_{x}}}{{k_{1}!(kN+j-k_{1})!}}=\sum_{k=0}^{\infty}\frac{{(2\mu_{x})}^{kN+j}e^{-2\mu_{x}}}{{(kN+j)!}}=P_{j}(2\mu_{x}). (10)

II.2 The security analysis

Follow the security proof in Ref. Wang et al. (2018), let’s first consider the equivalent entanglement protocol of the SNS protocol.

In the entanglement protocol, for each time window, Alice and Bob pre-share the entanglement state

|Ψ1=12(|0λ1|0~0~+|λ10|1~1~)=12[12(|0λ1+|λ10)12(|0~0~+|1~1~)+12(|0λ1|λ10)12(|0~0~|1~1~)],\begin{split}|\Psi_{1}\rangle=&\frac{1}{\sqrt{2}}(|0\lambda_{1}\rangle\otimes|\tilde{0}\tilde{0}\rangle+|\lambda_{1}0\rangle\otimes|\tilde{1}\tilde{1}\rangle)\\ =&\frac{1}{\sqrt{2}}[\frac{1}{\sqrt{2}}(|0\lambda_{1}\rangle+|\lambda_{1}0\rangle)\otimes\frac{1}{\sqrt{2}}(|\tilde{0}\tilde{0}\rangle+|\tilde{1}\tilde{1}\rangle)+\frac{1}{\sqrt{2}}(|0\lambda_{1}\rangle-|\lambda_{1}0\rangle)\otimes\frac{1}{\sqrt{2}}(|\tilde{0}\tilde{0}\rangle-|\tilde{1}\tilde{1}\rangle)],\end{split} (11)

where |0~0~|\tilde{0}\tilde{0}\rangle and |1~1~|\tilde{1}\tilde{1}\rangle are local states that only exist in Alice’s and Bob’s labs and |0λ1|0\lambda_{1}\rangle and |λ10|\lambda_{1}0\rangle are real states that are sent to Charlie. According to the measurement results announced by Charlie, Alice and Bob can get a series of almost perfect entanglement state by applying entanglement purification to the local states. Two parameters are needed in the entanglement purification: the first is the bit-flip error rate in the ZZ basis, eze_{z}, and the second is the bit-flip error rate in the XX basis, ephe^{ph}, which is also the phase-flip error rate in the ZZ basis. Here the ZZ basis means {|0~,|1~}\{|\tilde{0}\rangle,|\tilde{1}\rangle\}, and the XX basis means {12(|0~+|1~),12(|0~|1~)}\{\frac{1}{\sqrt{2}}(|\tilde{0}\rangle+|\tilde{1}\rangle),\frac{1}{\sqrt{2}}(|\tilde{0}\rangle-|\tilde{1}\rangle)\}. Finally, by measuring the local states in the ZZ basis, Alice and Bob can get secure final keys.

As Alice and Bob only concern about the secure final keys, they needn’t have to measure their local states after Charlie announces his measurement results, but they can just measure their local states before they send the real states to Charlie. If Alice and Bob each measures their local qubits in the ZZ basis, it is equivalent to that Alice and Bob randomly send the pulse of state |0λ1|0\lambda_{1}\rangle or |λ10|\lambda_{1}0\rangle to Charlie. If Alice and Bob each measures their local qubits in the XX basis, it is equivalent to that Alice and Bob randomly send the pulse of state |χ0=12(|0λ1+|λ10)|\chi_{0}\rangle=\frac{1}{\sqrt{2}}(|0\lambda_{1}\rangle+|\lambda_{1}0\rangle) or |χ1=12(|0λ1|λ10)|\chi_{1}\rangle=\frac{1}{\sqrt{2}}(|0\lambda_{1}\rangle-|\lambda_{1}0\rangle) to Charlie. As shown in Ref. Wang et al. (2018), a phase error happens if Alice and Bob send |χ0|\chi_{0}\rangle to Charlie and Charlie announces the right detector clicks or Alice and Bob send |χ1|\chi_{1}\rangle to Charlie and Charlie announces the left detector clicks.

Denote T0RT_{0}^{R} as the probability that Charlie announces the right detectors clicks while Alice and Bob send |χ0|\chi_{0}\rangle to Charlie. Denote T1LT_{1}^{L} as the probability that Charlie announces the left detectors clicks while Alice and Bob send |χ1|\chi_{1}\rangle to Charlie. Denote s1s_{1} as the yield of 12(|0λ10λ1|+|λ10λ10|)\frac{1}{2}(|0\lambda_{1}\rangle\langle 0\lambda_{1}|+|\lambda_{1}0\rangle\langle\lambda_{1}0|). We can calculate the phase-flip error rate by

eph=T0R+T1L2s1.e^{ph}=\frac{T_{0}^{R}+T_{1}^{L}}{2s_{1}}. (12)

According to the above discussion and the tagged-model, we can define the untagged bits in the real protocol as the bits in the ZZ windows that Alice decides not to send and Bob actually sends a pulse of state |λ1λ1||\lambda_{1}\rangle\langle\lambda_{1}| while Bob decides to send a WCS pulse with intensity μz\mu_{z}, or Bob decides not to send and Alice actually sends a pulse of state |λ1λ1||\lambda_{1}\rangle\langle\lambda_{1}| while Alice decides to send a WCS pulse with intensity μz\mu_{z}. Finally, we can get the secure final key rate by

R=2ϵ(1ϵ)P1(μz)s1[1H(eph)]SzfH(E),R=2\epsilon(1-\epsilon)P_{1}(\mu_{z})s_{1}[1-H(e^{ph})]-S_{z}fH(E), (13)

where H(x)=xlog2(x)(1x)log2(1x)H(x)=-x\log_{2}(x)-(1-x)\log_{2}(1-x) is the Shannon entropy, SzS_{z} is the yield of the events in the ZZ windows, ff is error correction efficiency factor, and EE is the bit error rate of the sifted keys.

II.3 The decoy-state method

To clearly show how to apply the decoy-state method to this protocol, we denote Alice’s sources |0|0\rangle, |e2mπi/Nμx|e^{2m\pi i/N}\sqrt{\mu_{x}}\rangle, and |e2mπi/Nμy|e^{2m^{\prime}\pi i/N}\sqrt{\mu_{y}}\rangle by oAo_{A}, xAx_{A}, and yAy_{A} respectively, and we also denote Bob’s sources |0|0\rangle, |e2nπi/Nμx|e^{2n\pi i/N}\sqrt{\mu_{x}}\rangle, and |e2nπi/Nμy|e^{2n^{\prime}\pi i/N}\sqrt{\mu_{y}}\rangle by oBo_{B}, xBx_{B}, and yBy_{B}. We denote the source of pulse pairs by κAςB\kappa_{A}\varsigma_{B}, where κ,ς=o,x,y\kappa,\varsigma=o,x,y. And for simplicity, we omit the subscripts. For example, source oxox represents that Alice uses the source oAo_{A} and Bob uses the source xBx_{B}. Without phase post-selection, the density matrices of sources xA,yA,xB,yBx_{A},y_{A},x_{B},y_{B} have similar form with Eq. (4). Specifically, we have

ρw=j=0N1Pj(μw)|λjwλjw|,(w=x,y),\rho_{w}=\sum_{j=0}^{N-1}P_{j}(\mu_{w})|\lambda_{j}^{w}\rangle\langle\lambda_{j}^{w}|,\quad(w=x,y), (14)

where

|λjw=1Pj(μw)k=0(μw)kN+j(kN+j)!|kN+j,|\lambda_{j}^{w}\rangle=\frac{1}{\sqrt{P_{j}(\mu_{w})}}\sum_{k=0}^{\infty}\frac{(\sqrt{\mu_{w}})^{kN+j}}{\sqrt{(kN+j)!}}|kN+j\rangle, (15)

and Pj(μw)P_{j}(\mu_{w}) is defined in Eq. (6). Here ρx\rho_{x} is the density matrix of sources xAx_{A} and xBx_{B}, and ρy\rho_{y} is the density matrix of sources yAy_{A} and yBy_{B}.

Denote the yield of sources κς\kappa\varsigma by SκςS_{\kappa\varsigma}. Denote the yield of states |0λjw0λjw||0\lambda_{j}^{w}\rangle\langle 0\lambda_{j}^{w}| and |λjw0λjw0||\lambda_{j}^{w}0\rangle\langle\lambda_{j}^{w}0| by YvjwY_{vj}^{w} and YjvwY_{jv}^{w}. In the original SNS protocol Wang et al. (2018), as the continuously modulated phase-randomized WCS sources are used, we have

Yvjx=Yvjy,Yjvx=Yjvy,Y_{vj}^{x}=Y_{vj}^{y},\quad Y_{jv}^{x}=Y_{jv}^{y}, (16)

but this equality no longer holds in this protocol. Consider the properties of trace distance Cao et al. (2015), we have

|YvjxYvjy|1(Fxyj)2,|YjvxYjvy|1(Fxyj)2,|Y_{vj}^{x}-Y_{vj}^{y}|\leq\sqrt{1-\left(F_{xy}^{j}\right)^{2}},\quad|Y_{jv}^{x}-Y_{jv}^{y}|\leq\sqrt{1-\left(F_{xy}^{j}\right)^{2}}, (17)

where

Fxyj=|λjx|λjy|λjx|λjxλjy|λjy=k=0(μxμy)(kN+j)/2(kN+j)!k=0μxkN+j(kN+j)!k=0μykN+j(kN+j)!,F_{xy}^{j}=\frac{|\langle\lambda_{j}^{x}|\lambda_{j}^{y}\rangle|}{\sqrt{\langle\lambda_{j}^{x}|\lambda_{j}^{x}\rangle\langle\lambda_{j}^{y}|\lambda_{j}^{y}\rangle}}=\frac{\sum_{k=0}^{\infty}\frac{(\mu_{x}\mu_{y})^{(kN+j)/2}}{(kN+j)!}}{\sqrt{\sum_{k=0}^{\infty}\frac{\mu_{x}^{kN+j}}{(kN+j)!}\sum_{k=0}^{\infty}\frac{\mu_{y}^{kN+j}}{(kN+j)!}}}, (18)

is the fidelity of states |λjx|\lambda_{j}^{x}\rangle and |λjy|\lambda_{j}^{y}\rangle.

Denote the yield of states |0λ1|0\lambda_{1}\rangle and |λ10|\lambda_{1}0\rangle by s01s_{01} and s10s_{10} respectively. And we have s1=12(s01+s10)s_{1}=\frac{1}{2}(s_{01}+s_{10}). We can get the lower bound of s1s_{1} by either analytical formula or the linear programming.

Combining the equations

Sox=j=0N1Pj(μx)Yvjx=j=0N1Pj(μx)Yvjy+Δ,Soy=j=0N1Pj(μy)Yvjy,S_{ox}=\sum_{j=0}^{N-1}P_{j}(\mu_{x})Y_{vj}^{x}=\sum_{j=0}^{N-1}P_{j}(\mu_{x})Y_{vj}^{y}+\Delta,\quad S_{oy}=\sum_{j=0}^{N-1}P_{j}(\mu_{y})Y_{vj}^{y}, (19)

where

Δ=j=0N1Pj(μx)(YvjxYvjy).\Delta=\sum_{j=0}^{N-1}P_{j}(\mu_{x})(Y_{vj}^{x}-Y_{vj}^{y}). (20)

we have

Yv1y=P2(μy)SoxP2(μx)Soy[P0(μx)P2(μy)P0(μy)P2(μx)]Yv0yP2(μy)ΔξP1(μx)P2(μy)P1(μy)P2(μx),Y_{v1}^{y}=\frac{P_{2}(\mu_{y})S_{ox}-P_{2}(\mu_{x})S_{oy}-[P_{0}(\mu_{x})P_{2}(\mu_{y})-P_{0}(\mu_{y})P_{2}(\mu_{x})]Y_{v0}^{y}-P_{2}(\mu_{y})\Delta-\xi}{P_{1}(\mu_{x})P_{2}(\mu_{y})-P_{1}(\mu_{y})P_{2}(\mu_{x})}, (21)

where

ξ=j=3N1[Pj(μx)P2(μy)Pj(μy)P2(μx)]Yvjy.\xi=\sum_{j=3}^{N-1}[P_{j}(\mu_{x})P_{2}(\mu_{y})-P_{j}(\mu_{y})P_{2}(\mu_{x})]Y_{vj}^{y}. (22)

It is easy to check that ξ0\xi\leq 0 if the following condition holds

P1(μx)P1(μy)P2(μx)P2(μy)Pj(μx)Pj(μy),j=3,4,,N1,\frac{P_{1}(\mu_{x})}{P_{1}(\mu_{y})}\geq\frac{P_{2}(\mu_{x})}{P_{2}(\mu_{y})}\geq\frac{P_{j}(\mu_{x})}{P_{j}(\mu_{y})},\quad j=3,4,\cdots,N-1, (23)

which can be easily examined given values of μx\mu_{x} and μy\mu_{y}. And in our numerical simulation, we found Eq. (23) always holds. With

Yv0ySoo+1F02,ΔΔU=j=0N1Pj(μx)1(Fxyj)2,s01Yv1y1F12,Y_{v0}^{y}\leq S_{oo}+\sqrt{1-F_{0}^{2}},\quad\Delta\leq\Delta^{U}=\sum_{j=0}^{N-1}P_{j}(\mu_{x})\sqrt{1-\left(F_{xy}^{j}\right)^{2}},\quad s_{01}\geq Y_{v1}^{y}-\sqrt{1-F_{1}^{2}}, (24)

where

F0=1k=0μykN(kN)!,F1=k=0(μyμz)(kN+1)/2(kN+1)!k=0μykN+1(kN+1)!k=0μykN+1(kN+1)!.F_{0}=\frac{1}{\sqrt{\sum_{k=0}^{\infty}\frac{\mu_{y}^{kN}}{(kN)!}}},\quad F_{1}=\frac{\sum_{k=0}^{\infty}\frac{(\mu_{y}\mu_{z})^{(kN+1)/2}}{(kN+1)!}}{\sqrt{\sum_{k=0}^{\infty}\frac{\mu_{y}^{kN+1}}{(kN+1)!}\sum_{k=0}^{\infty}\frac{\mu_{y}^{kN+1}}{(kN+1)!}}}. (25)

We have

s01s01L=P2(μy)SoxP2(μx)Soy[P0(μx)P2(μy)P0(μy)P2(μx)](Soo+1F02)P2(μy)ΔUP1(μx)P2(μy)P1(μy)P2(μx)1F12.s_{01}\geq s_{01}^{L}=\frac{P_{2}(\mu_{y})S_{ox}-P_{2}(\mu_{x})S_{oy}-[P_{0}(\mu_{x})P_{2}(\mu_{y})-P_{0}(\mu_{y})P_{2}(\mu_{x})]\left(S_{oo}+\sqrt{1-F_{0}^{2}}\right)-P_{2}(\mu_{y})\Delta^{U}}{P_{1}(\mu_{x})P_{2}(\mu_{y})-P_{1}(\mu_{y})P_{2}(\mu_{x})}-\sqrt{1-F_{1}^{2}}. (26)

By similar method, we can prove that

s10s10L=P2(μy)SxoP2(μx)Syo[P0(μx)P2(μy)P0(μy)P2(μx)](Soo+1F02)P2(μy)ΔUP1(μx)P2(μy)P1(μy)P2(μx)1F12,s_{10}\geq s_{10}^{L}=\frac{P_{2}(\mu_{y})S_{xo}-P_{2}(\mu_{x})S_{yo}-[P_{0}(\mu_{x})P_{2}(\mu_{y})-P_{0}(\mu_{y})P_{2}(\mu_{x})]\left(S_{oo}+\sqrt{1-F_{0}^{2}}\right)-P_{2}(\mu_{y})\Delta^{U}}{P_{1}(\mu_{x})P_{2}(\mu_{y})-P_{1}(\mu_{y})P_{2}(\mu_{x})}-\sqrt{1-F_{1}^{2}}, (27)

if Eq. (23) holds. Finally, we have s112(s01L+s10L)s_{1}\geq\frac{1}{2}(s_{01}^{L}+s_{10}^{L}).

The remaining task is to estimate the upper bound of phase-flip error rate, ephe^{ph}, which is equivalent to estimate the upper bounds of T0RT_{0}^{R} and T1LT_{1}^{L}.

Denote T+RT_{+}^{R} as the probability that Charlie announces the right detector clicks while Alice and Bob send out the pulse pairs in the X1X_{1} window and their phases satisfy m=nm=n. Denote TLT_{-}^{L} as the probability that Charlie announces the left detector clicks while Alice and Bob send out the pulse pairs in the X1X_{1} window and their phases satisfy m=(n+N/2)modNm=(n+N/2){\rm mod}N. Given the discussion above, we know that the pulse pairs in the X1X_{1} window whose phases satisfy m=nm=n are the classical mixture of the state |φj0|\varphi_{j}^{0}\rangle. Thus by denoting tjRt_{j}^{R} as the probability that Charlie announces the right detector clicks while Alice and Bob send out the pulse pairs of state |φj0|\varphi_{j}^{0}\rangle, we have

T+R=j=0N1PXj(μx)tjR.T_{+}^{R}=\sum_{j=0}^{N-1}PX_{j}(\mu_{x})t_{j}^{R}. (28)

Denote T00T_{00} and T00T_{00}^{\prime} as the probability that Charlie announces the right detector clicks and left detector clicks while Alice and Bob send out a vacuum pulse pair. Consider the properties of trace distance, we have

|t0RT00|1F002,|t1RT0R|1[F11+(0)]2,|t_{0}^{R}-T_{00}|\leq\sqrt{1-F_{00}^{2}},\quad|t_{1}^{R}-T_{0}^{R}|\leq\sqrt{1-\left[F_{11}^{+}(0)\right]^{2}}, (29)

where

F00=|φ00|0|φ00|φ000|0=1k=0(2μx)kN(kN)!,F_{00}=\frac{|\langle\varphi_{0}^{0}|0\rangle|}{\sqrt{\langle\varphi_{0}^{0}|\varphi_{0}^{0}\rangle\langle 0|0\rangle}}=\frac{1}{\sqrt{\sum_{k=0}^{\infty}\frac{{(2\mu_{x})}^{kN}}{{(kN)!}}}}, (30)

and

F11+(q)=|φ1q|χ0|φ1q|φ1qχ0|χ0=Re+2+Im2k=0(2μx)kN+1(kN+1)!k=0μzkN+1(kN+1)!,Re+=12k=0(μxμz)(kN+1)/2(kN+1)![1+cos2πNq(kN+1)],Im=12k=0(μxμz)(kN+1)/2(kN+1)!sin2πNq(kN+1).\begin{split}&F_{11}^{+}(q)=\frac{|\langle\varphi_{1}^{q}|\chi_{0}\rangle|}{\sqrt{\langle\varphi_{1}^{q}|\varphi_{1}^{q}\rangle\langle\chi_{0}|\chi_{0}\rangle}}=\frac{\sqrt{Re_{+}^{2}+Im^{2}}}{\sqrt{\sum_{k=0}^{\infty}\frac{{(2\mu_{x})}^{kN+1}}{{(kN+1)!}}\sum_{k=0}^{\infty}\frac{\mu_{z}^{kN+1}}{(kN+1)!}}},\\ &Re_{+}=\frac{1}{\sqrt{2}}\sum_{k=0}^{\infty}\frac{(\mu_{x}\mu_{z})^{(kN+1)/2}}{(kN+1)!}[1+\cos\frac{2\pi}{N}q(kN+1)],\\ &Im=\frac{1}{\sqrt{2}}\sum_{k=0}^{\infty}\frac{(\mu_{x}\mu_{z})^{(kN+1)/2}}{(kN+1)!}\sin\frac{2\pi}{N}q(kN+1).\end{split} (31)

Combine Eqs. (28) and (29), we have

T0RT0R,U=T+RPX0(μx)(T001F002)PX1(μx)+1[F11+(0)]2.T_{0}^{R}\leq T_{0}^{R,U}=\frac{T_{+}^{R}-PX_{0}(\mu_{x})\left(T_{00}-\sqrt{1-F_{00}^{2}}\right)}{PX_{1}(\mu_{x})}+\sqrt{1-\left[F_{11}^{+}(0)\right]^{2}}. (32)

With similar method, we have

T1LT1L,U=TLPX0(μx)(T001F002)PX1(μx)+1[F11(N2)]2,T_{1}^{L}\leq T_{1}^{L,U}=\frac{T_{-}^{L}-PX_{0}(\mu_{x})\left(T_{00}^{\prime}-\sqrt{1-F_{00}^{2}}\right)}{PX_{1}(\mu_{x})}+\sqrt{1-\left[F_{11}^{-}(\frac{N}{2})\right]^{2}}, (33)

where

F11(q)=|φ1q|χ1|φ1q|φ1qχ1|χ1=Re2+Im2k=0(2μx)kN+1(kN+1)!k=0μzkN+1(kN+1)!,Re=12k=0(μxμz)(kN+1)/2(kN+1)![1cos2πNq(kN+1)].\begin{split}&F_{11}^{-}(q)=\frac{|\langle\varphi_{1}^{q}|\chi_{1}\rangle|}{\sqrt{\langle\varphi_{1}^{q}|\varphi_{1}^{q}\rangle\langle\chi_{1}|\chi_{1}\rangle}}=\frac{\sqrt{Re_{-}^{2}+Im^{2}}}{\sqrt{\sum_{k=0}^{\infty}\frac{{(2\mu_{x})}^{kN+1}}{{(kN+1)!}}\sum_{k=0}^{\infty}\frac{\mu_{z}^{kN+1}}{(kN+1)!}}},\\ &Re_{-}=\frac{1}{\sqrt{2}}\sum_{k=0}^{\infty}\frac{(\mu_{x}\mu_{z})^{(kN+1)/2}}{(kN+1)!}[1-\cos\frac{2\pi}{N}q(kN+1)].\end{split} (34)

and ImIm has already been shown in Eq. (31). Finally, we have

ephT0R,U+T1L,Us01L+s10L.e^{ph}\leq\frac{T_{0}^{R,U}+T_{1}^{L,U}}{s_{01}^{L}+s_{10}^{L}}. (35)

With all those formulas, we can now calculate the secure final key rate according to the observed values in the experiment.

We have obtained explicit formulas above for key rate calculation. In our calculation below, we shall use our analytical formulas above. Definitely, the key rate here can be also calculated through linear programming. It is

mins1=12(s01+s10),s.t.constraintswithobservedvaluesofnumberofpostselectedcounts,e.g.Sox=j=0N1Pj(μx)Yvjx,Soy=j=0N1Pj(μy)Yvjy,Sxo=j=0N1Pj(μx)Yjvx,Syo=j=0N1Pj(μy)Yjvy,|SooY0vy|1F02,|SooYv0y|1F02,|YvjxYvjy|1(Fxyj)2,|YjvxYjvy|1(Fxyj)2,|s01Yv1y|1F12,|s10Y1vy|1F12,\begin{split}\min\quad&s_{1}=\frac{1}{2}(s_{01}+s_{10}),\\ s.t.\;\;\;\,\,&{\rm constraints\;with\;observed\;values\;of\;number\;of\;post\;selected\;counts,\;e.g.}\\ \quad&S_{ox}=\sum_{j=0}^{N-1}P_{j}(\mu_{x})Y_{vj}^{x},\quad S_{oy}=\sum_{j=0}^{N-1}P_{j}(\mu_{y})Y_{vj}^{y},\\ &S_{xo}=\sum_{j=0}^{N-1}P_{j}(\mu_{x})Y_{jv}^{x},\quad S_{yo}=\sum_{j=0}^{N-1}P_{j}(\mu_{y})Y_{jv}^{y},\\ &|S_{oo}-Y_{0v}^{y}|\leq\sqrt{1-F_{0}^{2}},\quad|S_{oo}-Y_{v0}^{y}|\leq\sqrt{1-F_{0}^{2}},\\ &|Y_{vj}^{x}-Y_{vj}^{y}|\leq\sqrt{1-(F_{xy}^{j})^{2}},\quad|Y_{jv}^{x}-Y_{jv}^{y}|\leq\sqrt{1-(F_{xy}^{j})^{2}},\\ &|s_{01}-Y_{v1}^{y}|\leq\sqrt{1-F_{1}^{2}},\quad|s_{10}-Y_{1v}^{y}|\leq\sqrt{1-F_{1}^{2}},\end{split} (36)

and so on. After we get the lower bound of s1s_{1} through linear programming, the remaining process is the same to the above method.

II.4 4-intensity protocol and 3-intensity protocol

The 3-intensity protocol is simply a special case of our 4-intensity above by setting μz=μy\mu_{z}=\mu_{y}.

III The numerical simulation

In this part, we shall show some numerical simulation results.

We use the linear model to simulate the observed values Yu et al. (2019); Jiang et al. (2019). The distance between Alice and Charlie and the distance between Bob and Charlie is assumed to be the same. The properties of the two detectors of Charlie are assumed to be the same. The lowest intensities of the sources in the decoy window are set as μx0.001\mu_{x}\geq 0.001 and μy0.002\mu_{y}\geq 0.002, and the remaining parameters including μz\mu_{z} and ϵ\epsilon are optimized to obtained the highest key rates. The ‘Distance’ shown in the figures of this part means the length of fiber between Alice and Bob. And the experiment parameters used in our numerical simulation are listed in Table. 1.

pdp_{d} ede_{d} ηd\eta_{d} ff αf\alpha_{f}
1.0×1081.0\times 10^{-8} 3%3\% 30.0%30.0\% 1.11.1 0.20.2
Table 1: List of experimental parameters used in numerical simulations. Here pdp_{d} is the dark count rate of Charlie’s detectors; ede_{d} is the misalignment-error probability; ηd\eta_{d} is the detection efficiency of Charlie’s detectors; ff is the error correction inefficiency; αf\alpha_{f} is the fiber loss coefficient (dB/kmdB/km).

Figure 1 is the key rate of the SNS protocol with different number of phase values. The cyan curve is the PLOB bound which is established by established by Pirandola, Laurenza, Ottaviani, and Banchi to measure the linear upper bound of the key rate of QKD Pirandola et al. (2017). The key rates are almost coincide for the cases N>12N>12. Thus the curves for N>12N>12 are not listed in this figure. Figure 1 shows that only with 66 phase values, the key rate of the SNS protocol can exceed the PLOB bound, and with 1212 phase values , the key rates is very close to the SNS protocol with continuously modulated phase-randomized WCS sources.

Refer to caption
Figure 1: The key rates of the SNS protocol with different number of phase values. The experiment parameters used in the numerical simulation are shown in Table. 1. The PLOB bound is used to measure the linear upper bound of the key rate of QKD Pirandola et al. (2017).

Figure 2 is the key rate of the SNS protocol with AOPP Xu et al. (2020) and different number of phase values, while Figure 3 is the comparison of the key rates of the original SNS protocol and the AOPP method. The AOPP method is an error rejection process through two way classical communication, which is only related to the sifted keys. As the property of no bit-flip error in the untagged bits holds in the SNS protocol with discrete phase modulaion of WCS sources, we can directly apply the formulas got in our previous work Xu et al. (2020) to calculate the key rate after AOPP. Figure 3 shows that key rates of the SNS protocol with AOPP exceed those of the original SNS protocol by about 70%70\% in all distances. While the distance between Alice and Bob is less than 150 km, the key rates of the AOPP method with 6 phase values are even higher than those of the original SNS protocol with 10 phase values.

Refer to caption
Figure 2: The key rates of the SNS protocol with active-odd-parity pairing (AOPP) Xu et al. (2020) and different number of phase values. The experiment parameters used in the numerical simulation are shown in Table. 1. The PLOB bound is used to measure the linear upper bound of the key rate of QKD Pirandola et al. (2017).
Refer to caption
Figure 3: The comparison of the key rates of the original SNS protocol and the active-odd-parity pairing (AOPP) method Xu et al. (2020). The experiment parameters used in the numerical simulation are shown in Table. 1. The PLOB bound is used to measure the linear upper bound of the key rate of QKD Pirandola et al. (2017).

Figure 4 is the comparison of the key rates of the 4-intensity protocol and the 3-intensity protocol. In the 4-intensity protocol introduced in Sec. II.1, μy\mu_{y} dosen’t have to be equal to μz\mu_{z}. By adding a constraint that μy=μz\mu_{y}=\mu_{z}, we get the 3-intensity protocol Yu et al. (2019), which is a more convenient protocol in the experiments. Figure 4 shows that while the number of phase values is large, which is closer to the case of continuously modulated protocol, the key rates of the 3-intensity protocol is almost the same as those of the 4-intensity protocol. As the number of phase values decreases, the key rate gap between the two protocols gradually increases.

Refer to caption
Figure 4: The comparison of the key rates of the 4-intensity protocol (μyμz\mu_{y}\neq\mu_{z}) and the 3-intensity protocol (μy=μz\mu_{y}=\mu_{z}). The experiment parameters used in the numerical simulation are shown in Table. 1. The PLOB bound is used to measure the linear upper bound of the key rate of QKD Pirandola et al. (2017).

IV Conclusion

In summary, we have studied the SNS protocol with discrete phase modulation. Starting from the security proof, we obtain analytical formulas of the phase-flip error rate when the discrete phase modulation. With our derivations, we also get the lower bound of the yield of untagged bits. Our numerical results show that only with 66 phase values, the key rates of the SNS protocol can exceed the PLOB bound, and with 1212 phase values, the key rates are very close to the SNS protocol with continuously modulated phase-randomized WCS sources. The AOPP method proposed in Ref. Xu et al. (2020) can be directly applied here, and the numerical results show that the advantage of the AOPP method still holds in the SNS protocol with discrete phase modulation of WCS sources.

References

  • Bennett and Brassard (1984) C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (1984), pp. 175–179.
  • Ekert (1991) A. K. Ekert, Physical Review Letters 67, 661 (1991).
  • Pirandola et al. (2019) S. Pirandola, U. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, et al., arXiv preprint arXiv:1906.01645 (2019).
  • Xu et al. (2019) F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, arXiv preprint arXiv:1903.09051 (2019).
  • Gisin et al. (2002) N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Reviews of Modern Physics 74, 145 (2002).
  • Gisin and Thew (2007) N. Gisin and R. Thew, Nature Photonics 1, 165 (2007).
  • Scarani et al. (2009) V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, Reviews of Modern Physics 81, 1301 (2009).
  • Shor and Preskill (2000) P. W. Shor and J. Preskill, Physical Review Letters 85, 441 (2000).
  • Koashi (2009) M. Koashi, New Journal of Physics 11, 045018 (2009).
  • Hwang (2003) W.-Y. Hwang, Physical Review Letters 91, 057901 (2003).
  • Wang (2005) X.-B. Wang, Physical Review Letters 94, 230503 (2005).
  • Lo et al. (2005) H.-K. Lo, X. Ma, and K. Chen, Physical Review Letters 94, 230504 (2005).
  • Wang et al. (2019a) X.-B. Wang, X.-L. Hu, and Z.-W. Yu, Physical Review Applied 12, 054034 (2019a).
  • Kraus et al. (2005) B. Kraus, N. Gisin, and R. Renner, Physical Review Letters 95, 080501 (2005).
  • Yin et al. (2016) H.-L. Yin, T.-Y. Chen, Z.-W. Yu, H. Liu, L.-X. You, Y.-H. Zhou, S.-J. Chen, Y. Mao, M.-Q. Huang, W.-J. Zhang, et al., Physical Review Letters 117, 190501 (2016).
  • Liao et al. (2017) S.-K. Liao, W.-Q. Cai, W.-Y. Liu, L. Zhang, Y. Li, J.-G. Ren, J. Yin, Q. Shen, Y. Cao, Z.-P. Li, et al., Nature 549, 43 (2017).
  • Boaron et al. (2018) A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussières, M.-J. Li, et al., Physical Review Letters 121, 190502 (2018).
  • Chen et al. (2020) J.-P. Chen, C. Zhang, Y. Liu, C. Jiang, W. Zhang, X.-L. Hu, J.-Y. Guan, Z.-W. Yu, H. Xu, J. Lin, et al., Physical review letters 124, 070501 (2020).
  • Yin et al. (2020) J. Yin, Y.-H. Li, S.-K. Liao, M. Yang, Y. Cao, L. Zhang, J.-G. Ren, W.-Q. Cai, W.-Y. Liu, S.-L. Li, et al., Nature pp. 1–5 (2020).
  • Lucamarini et al. (2018) M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, Nature 557, 400 (2018).
  • Wang et al. (2018) X.-B. Wang, Z.-W. Yu, and X.-L. Hu, Physical Review A 98, 062323 (2018).
  • Tamaki et al. (2018) K. Tamaki, H.-K. Lo, W. Wang, and M. Lucamarini, arXiv preprint arXiv:1805.05511 (2018).
  • Cui et al. (2019) C. Cui, Z.-Q. Yin, R. Wang, W. Chen, S. Wang, G.-C. Guo, and Z.-F. Han, Physical Review Applied 11, 034053 (2019).
  • Curty et al. (2019) M. Curty, K. Azuma, and H.-K. Lo, NPJ Quantum Information 5, 64 (2019).
  • Ma et al. (2018) X. Ma, P. Zeng, and H. Zhou, Physical Review X 8, 031043 (2018).
  • Lin and Lütkenhaus (2018) J. Lin and N. Lütkenhaus, Physical Review A 98, 042332 (2018).
  • Yu et al. (2019) Z.-W. Yu, X.-L. Hu, C. Jiang, H. Xu, and X.-B. Wang, Scientific Reports 9, 3080 (2019).
  • Maeda et al. (2019) K. Maeda, T. Sasaki, and M. Koashi, Nature Communications 10, 3140 (2019).
  • Lu et al. (2019) F.-Y. Lu, Z.-Q. Yin, R. Wang, G.-J. Fan-Yuan, S. Wang, D.-Y. He, W. Chen, W. Huang, B.-J. Xu, G.-C. Guo, et al., New Journal of Physics 21, 123030 (2019).
  • Jiang et al. (2019) C. Jiang, Z.-W. Yu, X.-L. Hu, and X.-B. Wang, Physical Review Applied 12, 024061 (2019).
  • Xu et al. (2020) H. Xu, Z.-W. Yu, C. Jiang, X.-L. Hu, and X.-B. Wang, Physical Review A 101, 042330 (2020).
  • Grasselli et al. (2019) F. Grasselli, A. Navarrete, and M. Curty, New Journal of Physics 21, 113032 (2019).
  • Wang and Lo (2019) W. Wang and H.-K. Lo, New Journal of Physics 22, 013020 (2019).
  • Hu et al. (2019) X.-L. Hu, C. Jiang, Z.-W. Yu, and X.-B. Wang, Physical Review A 100, 062337 (2019).
  • Zhang et al. (2019) C.-H. Zhang, C.-M. Zhang, and Q. Wang, Optics letters 44, 1468 (2019).
  • Zhou et al. (2019) X.-Y. Zhou, C.-H. Zhang, C.-M. Zhang, and Q. Wang, Physical Review A 99, 062316 (2019).
  • Takeoka et al. (2014) M. Takeoka, S. Guha, and M. M. Wilde, Nature Communications 5, 5235 (2014).
  • Pirandola et al. (2017) S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, Nature Communications 8, 15043 (2017).
  • Minder et al. (2019) M. Minder, M. Pittaluga, G. Roberts, M. Lucamarini, J. Dynes, Z. Yuan, and A. Shields, Nature Photonics 13, 334 (2019).
  • Liu et al. (2019) Y. Liu, Z.-W. Yu, W. Zhang, J.-Y. Guan, J.-P. Chen, C. Zhang, X.-L. Hu, H. Li, C. Jiang, J. Lin, et al., Physical Review Letters 123, 100505 (2019).
  • Wang et al. (2019b) S. Wang, D.-Y. He, Z.-Q. Yin, F.-Y. Lu, C.-H. Cui, W. Chen, Z. Zhou, G.-C. Guo, and Z.-F. Han, Physical Review X 9, 021046 (2019b).
  • Zhong et al. (2019) X. Zhong, J. Hu, M. Curty, L. Qian, and H.-K. Lo, Physical Review Letter 123, 100506 (2019).
  • Jiang et al. (2020) C. Jiang, X.-L. Hu, H. Xu, Z.-W. Yu, and X.-B. Wang, New Journal of Physics 22, 053048 (2020).
  • Cao et al. (2015) Z. Cao, Z. Zhang, H.-K. Lo, and X. Ma, New Journal of Physics 17, 053014 (2015).
  • Braunstein and Pirandola (2012) S. L. Braunstein and S. Pirandola, Physical Review Letters 108, 130502 (2012).
  • Lo et al. (2012) H.-K. Lo, M. Curty, and B. Qi, Physical Review Letters 108, 130503 (2012).
  • Wang (2013) X.-B. Wang, Physical Review A 87, 012320 (2013).
  • Tamaki et al. (2012) K. Tamaki, H.-K. Lo, C.-H. F. Fung, and B. Qi, Physical Review A 85, 042307 (2012).
  • Xu et al. (2013) F. Xu, M. Curty, B. Qi, and H.-K. Lo, New Journal of Physics 15, 113007 (2013).
  • Curty et al. (2014) M. Curty, F. Xu, W. Cui, C. C. W. Lim, K. Tamaki, and H.-K. Lo, Nature Communications 5, 4732 (2014).
  • Xu et al. (2014) F. Xu, H. Xu, and H.-K. Lo, Physical Review A 89, 052333 (2014).
  • Zhou et al. (2016) Y.-H. Zhou, Z.-W. Yu, and X.-B. Wang, Physical Review A 93, 042324 (2016).
  • Cao (2020) Z. Cao, Physical Review A 101, 062325 (2020).
  • Lorenzo et al. (2020) G. C. Lorenzo, L. Wooltorton, and M. Razavi, arXiv preprint arXiv:2008.03222 (2020).
  • Zhang et al. (2020) C.-M. Zhang, Y.-W. Xu, R. Wang, and Q. Wang, arXiv preprint arXiv:2008.05277 (2020).
  • Primaatmaja et al. (2019) I. W. Primaatmaja, E. Lavie, K. T. Goh, C. Wang, and C. C. W. Lim, Physical Review A 99, 062332 (2019).