Continuous-Variable Quantum Cryptography With Discrete Alphabets Composable Security
Continuous-Variable Quantum Cryptography With Discrete Alphabets Composable Security
DOI: 10.1103/PhysRevResearch.3.013047
with amplitude αk := 2−1 α exp(i2kπ N −1 ), where α 0 and with β 0 and θ ∈ [−π N −1 , π N −1 ], we obtain
k = 0, . . . , N − 1 (so that the classical label k is chosen with 1 −[β cos(2lπN −1 +θ )−√τ α cos(2lπN −1 )]2
probability Pk = N −1 ). More generally, she prepares her mode Pβθl|k = e 2
013047-2
CONTINUOUS-VARIABLE QUANTUM CRYPTOGRAPHY … PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
τ
10-2 qBk = α cos (2kπ /N ) + qno , (19)
2
τ 1−τ 1
qno := qth + qE + qh , (20)
2 2 2
-3
10
where qth is Alice preparation noise with variance ν th + 1, qE
is Eve’s noise variable with variance ω, and qh is the noise
variable due to Bob’s heterodyne measurement. The variable
10-4 qBk is Gaussian with mean
0 2 4 6 8
Attenuation in dB τ
E qBk = α cos (2kπ /N ), (21)
2
FIG. 1. Secret key rate for N = 2 versus attenuation in dB. We
assume α = 2 and excess noise ε = 0.01. We show the asymptotic and variance
case with ξ = 1 (black solid line) and the composable case, for which
we assume s = h = 10−10 , PE = 10−10 , p = 0.9, ξ = 0.99, and Vno = 21 = 21 (τ νth + Vε + 2). (22)
r = 0.01, for M = 1012 (blue dashed line) and M = 109 (blue solid
We can then create maximum likelihood estimators for the
line). All the lines have a truncation accuracy of 10 Fock-basis states.
For comparison, we also plot the corresponding asymptotic rate (gray
mean value and variance of qBk starting from the samples Bk i .
solid line) assuming a pure loss channel. In fact, we may write
m/N m/N
N N 2
They can choose worst-case parameters to be used in the q̄Bk = Bk i , Vnok = Bk i − q̄Bk . (23)
m i=1
m i=1
computation of the key rate in Eq. (18).
Therefore, assume that Alice reveals the encoding k of m The mean value and variance of the estimator q̄Bk are given by
signal states out of a block of M = m + n signal states. For
m/N
m sufficiently large, we have that m/N can be chosen to be N
an integer. Bob will have samples Bk i for i = 1, . . . , m/N E q̄Bk = E(Bk i ) = E qBk , (24)
m i=1
2 m/N
N N
100 Var q̄Bk = 2 Var(Bk i ) = Vno , (25)
m i=1
m
value E(qBk ) due to the fact that its variance in Eq. (25)
vanishes for m 1. Thus, we can write the variance estimator
Vnok in Eq. (23) as
10-2
m/N 2
N Bk i − E qBk
Vnok = Vno √ . (26)
m i=1 Vno
10-3 The term inside the brackets follows a standard normal distri-
bution with zero mean and unit variance. Therefore, the sum
0 5 10 15 term follows a noncentral chi-squared distribution with mean
Attenuation in dB equal to m/N and variance 2m/N. Consequently, for the mean
and variance of the estimator Vnok we obtain
FIG. 2. The secret key rate for N = 3 versus attenuation in dB. m/N 2
We assume α = 2 and excess noise ε = 0.01. We include the asymp- N Bk i − E qBk
totic case with ξ = 1 (black solid line) and the composable case, for E Vnok = Vno E √ = Vno , (27)
m Vno
which we assume s = h = 10−10 , PE = 10−10 , p = 0.9, ξ = 0.99, i=1
2 m/N 2
and r = 0.01, for M = 1012 (blue dashed line) and M = 109 (blue 2 N Bk i −E qBk N
solid line). All the lines have a truncation accuracy of 10 Fock-basis Var Vnok = Vno Var √ = 2 Vno2 .
m i=1
Vno m
states. For comparison, we also plot the corresponding asymptotic
rate (gray solid line) assuming a pure loss channel. (28)
013047-3
PAPANASTASIOU AND PIRANDOLA PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
Based on the estimator q̄Bk we can build an estimator for for the transmissivity is equal to
the transmissivity [cf. Eq. (19)]
8 V no
2 τ PE = τ − 6.5 τ . (35)
τ̂k = 2α −2 cos−2 (2kπ /N ) q̄Bk . (29) m α2
Starting from Vnok we may also define an estimator for the
The estimator q̄Bk is the sample mean of Bk i and as such
excess noise. Solving Eq. (22) with respect to Vε , we obtain
follows a Gaussian distribution. We then can express Eq. (29)
with the help of the noncentral chi-squared variable χk ≡ Vεk = 2Vnok − τ̂ νth − 2. (36)
q̄ 2
( Nm √VBk ) as follows: Then the mean and variance of this estimator are given by
no
2 E Vεk = 2Vno − τ νth − 2, (37)
Vno N m q̄Bk
τ̂k = 2 √ . (30)
[α cos (2kπ /N )]2 m N Vno N
Var Vεk := sk2 = 8 Vno2 + σ 2 νth2 , (38)
m τ [α cos (2kπ/N )]2
m
Because χk has mean value 1 + N 2Vno
and variance
where we used Eqs. (27), (28), and (34). The variance of the
2 Nm τ [α cos2V2kπ/N]
2
2(1 + ), the estimator of the transmissivity has
no
optimal linear combination Vε of all the estimators Vεk (also
mean and variance equal to considering the p-quadrature) is given by
2Vno N 4Vno2 σ 2 νth2
E(τ̂k ) = s2 = + . (39)
mα 2 cos2 (2kπ /N ) m 2N
m τ [α cos (2kπ /N )]2 Based on the assumption of large m, we approximate the
× 1+ distribution of each Vnok to be Gaussian. As a result, the
N 2Vno
distribution of Vε is Gaussian with the same mean and variance
= τ + O(1/m), (31) given by s2 above. Assuming an error PE = 10−10 , we obtain
2 the 6.5 confidence intervals for Vε . Therefore, the worst-case
2Vno N
Var(τ̂k ) := σk2 = value is give by
mα 2 cos2 (2kπ /N )
σ 2 νth2
m τ [α cos(2kπ /N )]2 PE 4Vno2
×2 1 + 2 Vε = Vε + 6.5 + . (40)
N 2Vno m 2N
N Vno Using the worst-case values τ PE and VεPE , we can write a
= 8τ + O(1/m2 ). (32) finite-size expression of the key rate R = R(τ, Vε ) of Eq. (18)
m α 2 cos2 (2kπ /N )
which accounts for the imperfect parameter estimation and the
Since there will be other estimators corresponding to the reduced number of signals. This is given by replacing
other values of Alice’s encoding k, we can create an optimal n n
linear combination of them with variance [43] R(τ, Vε ) → R τ PE , VεPE := RPE . (41)
M M
N−1 −1
2 −1
σq =
2
σk IV. COMPOSABLE SECURITY UNDER
k=0 COLLECTIVE ATTACKS
N−1 −1 The following study for the composable security is based
N Vno
= 8τ cos (2kπ /N ) on various ingredients [44–50]. More precisely, it follows the
m α2 k=0 procedure formulated in Ref. [44], which is here specified and
16 Vno applied to a discrete alphabet.
=τ . (33) After the parties exchange n signal states and apply error
m α2 correction (EC), they share a state ρ̃ n from which, according
So far, we used only samples from the q-quadrature to the leftover hash lemma, they can extract sn bits of uniform
of Bob’s outcomes. Similar relations will hold for the p- randomness, or in other words secret key bits. This number of
quadrature. Combining all the available q- and p-samples, the bits is bounded according to the following relation [47,48]:
optimal linear estimator τ̂ of the transmissivity will have s
√
sn Hmin (l n |E n )ρ̃ n + 2 log2 2h − leak n,EC (n, cor ). (42)
8 Vno s
E(τ̂ ) = τ, Var(τ̂ ) := σ 2 = τ . (34) Here, Hmin (l n |E n ) is the smooth min-entropy of Bob’s variable
m α2 l conditioned on Eve’s systems E , and leak EC (n, cor ) is the
In fact, for large m, we can approximate all the 2N estimators classical information exchanged by the parties for EC (stored
τ̂k to have Gaussian distributions with the same mean and by Eve in her register).
variance σ p2 = σq2 . As a result, the global estimator τ̂ is a The uniform randomness h and smoothing s parameters
Gaussian variable with the same mean τ and variance equal define the secrecy of the protocol sec = h + s which, along
to σ 2 . Now, assuming an error PE = 10−10 for channel pa- with the EC parameter cor , defines the security parameter
rameter estimation (PE), we have to consider a 6.5 standard tot = cor + sec . The later bounds the trace distance D of the
deviation interval for τ . This means that the worst-case value state ρ̄ n (after privacy amplification) from the ideal output
013047-4
CONTINUOUS-VARIABLE QUANTUM CRYPTOGRAPHY … PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
state ρid of a QKD protocol, i.e., a classical-quantum state rate of Eq. (18) appears if we make the previous replacements
where the uniformly distributed classical registers of Alice in Eq. (46) obtaining
and Bob are uncorrelated from Eve’s systems [50]. Each of √
the epsilon parameters introduced above can be considered to sn nRρ − nAEP ps2 /3, N
√
be very small. We take them of the order of 10−10 . + log2 p 1 − s2 /3 + 2 log2 2h . (50)
Equation (42) can be further simplified so as to be con-
nected with the asymptotic secret key rate. In fact, we can Finally, let us account for the PE in the bound above. This
further bound the smooth min-entropy calculated in terms of means that we need to write Eq. (50) considering the worst-
ρ̃ n with the smooth min-entropy of the state before EC ρ ⊗n , case scenario state ρM−m
PE
, where the channel parameters τ and
which is in a tensor-product form due to the fact that we Vε are bounded by τ PE and VεPE , and also accounting for the
assumed a collective attack. More precisely, we exploit the fact that we sacrificed m out of M signal states. Therefore, we
following inequality [44]: obtain
√
s
Hmin
p 2 /3
(l n |E n )ρ̃ n Hmins (l n |E n )ρ ⊗n + log2 p 1 − s2 /3 . sM−m (M − m)RPE − M − mAEP ps2 /3, N
(43) √
+ log2 p 1 − s2 /3 + 2 log2 2h , (51)
Here p is the probability of successful EC, i.e., the probability
that the protocol is not aborted after Alice and Bob compared where RPE is the finite-size rate of Eq. (41). This is true only
hashes of their sequences [4]. The value of 1 − p is given with probability 1 − PE since there is a nonzero probability
by the experimental frame error rate [56]. Note that, even PE that the actual values of the channel parameters are not
if the protocol does not abort (because the hashes are the bounded by τ PE and VεPE . Dividing Eq. (51) by the total
same), Alice’s and Bob’s sequences are identical up to an error number M of signal states, multiplying by the EC success
probability cor . probability p, and setting r = Mm
, we obtain the secret key rate
The replacement in Eq. (43) allows us to use the asymptotic
equipartition property (AEP) theorem [49] so as to reduce the 1
conditional smooth-min entropy of the tensor-product form RM,r (1 − r)p RPE − √ AEP ps2 /3, N
(1 − r)M
ρ ⊗n to the conditional von Neumann entropy S(l|E )ρ of the √
single copy ρ. In particular, one may write the following [48]: log2 p 1 − s2 /3 + 2 log2 2h
+ , (52)
p 2 /3 √ (1 − r)M
Hmins (l n |E n )ρ ⊗n nS(l|E )ρ − nAEP ps2 /3, |L| , (44)
where which is valid up to an overall tot = cor + s + h + pPE .
See Ref. [44] for corresponding analytical formulas but in the
AEP (s , |L|) := 4 log2 (2 |L| + 1) log 2/s2 . (45) setting of Gaussian-modulated protocols.
In Fig. 1, we plot the composable key rate for the proto-
The parameter |L| is the cardinality of Bob’s outcome (alpha- col with two states (N = 2) versus the attenuation in dB for
bet) and, in our case, it is equal to N. r = 0.01, M = 1012 (blue dashed line) and M = 109 (blue
Replacing Eqs. (43) and (44) in Eq. (42), one obtains the solid line). We assume excess noise ε = 0.01 and set the se-
following bound for the number of secret bits: curity parameters to s = h = PE = 10−10 . We assume that
√ the reconciliation efficiency parameter is ξ = 0.99 and the EC
sn nS(l|E )ρ − nAEP ps2 /3, N
success probability is p = 0.9. (Note that, in our analysis the
+ log2 p 1 − s2 /3 EC error cor is contained in ξ .) In Fig. 2, we plot the secret
√ key rate for N = 3, both in the asymptotic (black line) and
+ 2 log2 2h − leak EC (n, cor ). (46) the composable cases (blue lines) for channel excess noise
To further simplify the bound above, consider the definition ε = 0.01. As expected, the performance of the protocol is
of quantum mutual information between two systems Q and dependent on the number M of signals.
E in terms of the (conditional) von Neumann entropy As we can see in Fig. 3, increasing preparation (trusted)
thermal noise νth [23], the fidelity of the signal states in-
I (Q : E ) = S(Q) − S(Q|E ). (47) creases, making them more difficult to distinguish, resulting
in a better secret key rate performance. In more detail, we
When Q is a classical system described by a variable l, I (l : observe that the fidelity (computed according to Ref. [61])
E ) takes the form of the Holevo information χ (E : l ) and the reaches a saturation point faster when α is smaller. Further-
von Neumann entropy simplifies to the Shannon entropy H (l ). more, in this point the fidelity becomes closer to 1 as α gets
Thus we can write smaller. Taking into consideration the channel propagation,
S(l|E )ρ = H (l )ρ − χ (E : l )ρ . (48) this leads to a configuration where Bob’s states may have
almost the initial fidelity, while the fidelity of Eve’s states
Moreover, let us set the quantity may be at the saturation point. This can happen for example
H (l )ρ − n−1 leak EC (n, cor ) := ξ I (k : l )ρ , (49) for transmissivities that are close to 1. An additional optimal
value of the thermal preparation noise can boost this effect for
where I (k : l ) is the classical mutual information between other transmissivities. In fact, we can observe this in Fig. 4,
Alice’s and Bob’s variables and ξ ∈ [0, 1] defines the recon- where we consider excess noise ε = 0.01 and preparation
ciliation efficiency [57]. As a result, the asymptotic secret key noise νth = 0.1, i.e., Alice sending thermal states. We observe
013047-5
PAPANASTASIOU AND PIRANDOLA PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
1 100
0.8
10-1
Rate (bits/use)
0.6
Fidelity
10-2
0.4
0.2 10-3
0
0 1 2 3 4 10-4
Trusted thermal noise th 0 2 4 6 8
Attenuation in dB
FIG. 3. The fidelity between two signal states (N = 2) for k = 0
FIG. 4. The secret key rate for N = 2 and νth = 0.1 versus the
and k = 1 versus the thermal preparation noise νth . We include plots
attenuation in dB. We assume α = 2 and excess noise ε = 0.01. We
for different amplitudes α = 0.5 (solid line), α = 1 (dashed line),
include the asymptotic case with ξ = 1 (red solid line) and the com-
and α = 2 (dashed-dotted line). As the thermal noise increases, the
posable case, for which we assume s = h = 10−10 , PE = 10−10 ,
fidelity between the two states arrives at a saturation point close to 1.
p = 0.9, ξ = 0.99, and r = 0.01, for M = 1012 (yellow dashed line)
The smaller the value of α the faster this saturation happens.
and M = 109 (yellow solid line). For comparison, we also plot the
secret key rate assuming coherent states (νth = 0, black solid line).
We observe an advantage when we use preparation trusted noise
an advantage for the secret key rate when we use preparation (compare red and black lines) that can be exploited to mitigate the
noise that compensates the rate degradation due to the finite- decrease of the rate in the finite-size regime (similar performance
size effects. of yellow dashed line and black solid line). All the lines have a
truncation accuracy of 14 Fock-basis states.
013047-6
CONTINUOUS-VARIABLE QUANTUM CRYPTOGRAPHY … PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
1.073934 0.784915
12 =0.01, =1.01, =0.01,
1.0739335
N=2, =2, =1.01, N=2,
=0.001 0.784914
1.073933 =1, =0.001
1.0739325 0.784913
entropy
entropy
10 12 14
1.073932 16 18
1.0739315 0.784912
1.073931
0.784911
14 18
1.0739305 16
0.78491
0 1 2 3 4 5 6 0 1 2 3 4 5 6
Time (h) Time (h)
FIG. 5. Entropy convergence versus computational time. Every FIG. 7. Entropy convergence versus computational time. For
point has been plotted with a different truncation number in the Fock completeness, we present the case of Fig. 5 but for α = 1, where 10
basis which is indicated on top of the point. As this number is getting to 12 states could be enough if we want to keep the fifth significant
larger the entropy is converging to its actual value. For keeping digit.
the sixth significant digit, we need to truncate at 14 states, which
needs about 1.5h. For this plot, we used preparation noise ν = 0.01,
channel thermal noise ω = 1.01, number of ensemble states N = 2,
amplitude α = 2 and channel transmissivity τ = 0.001.
set preparation noise ν = 0.01, channel noise ω = 1.01, and
states increases. This functional is simpler to examine and transmissivity τ = 0.001. From Figs. 5, 8, and 9, we may
provides a good estimate of the time needed for the full also compare the performances with different values of the
key rate. Note that, as the transmissivity decreases, i.e., the transmissivity τ = 0.001, 0.1, 0.6. In Fig. 10, we present the
distance increases, the secret key becomes lower and lower; corresponding case for zero preparation noise. Calculations
for this reason, we need more significant digits to approxi- were performed using MATLAB 2018 on a core of a 20-core
mate it. Correspondingly, this demands extra significant digits 2.0 GHz Intel Xeon 6138 of the Viking cluster [63].
for the calculation of the entropy. In Figs. 5–7 we compare
this convergence for different values of α = 1, 2, 3 while we
1.0908 1.05935
=0.01, =1.01, =0.01, =1.01,
N=2, =3, 1.059345 N=2, =2, =0.1
1.09075 =0.001
1.05934
entropy
entropy
14
1.0907 1.059335
14
16 18
1.05933
1.09065 16
1.059325
1.0906 1.05932
0 1 2 3 4 0 2 4 6 8 10
Time (h) Time (h)
FIG. 6. Entropy convergence versus computational time. Here FIG. 8. Entropy convergence versus computational time. We
we present the case of Fig. 5 but for α = 3. For keeping the fourth present the case of Fig. 5 but for τ = 0.1. Here we need at least 14
significant digit we need to truncate at 16 states or more. states for keeping the fourth significant digit.
013047-7
PAPANASTASIOU AND PIRANDOLA PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
0.88571 1.03212
=0.01, =1.01, =0, =1.01,
N=2, =2, =0.6 N=2, =2,
0.885705 1.032115 =0.001
entropy
10 14 16 18
entropy
12 14 16 18 12
0.8857 1.03211
0.885695 1.032105
0.88569 1.0321
0 2 4 6 8 0 1 2 3 4 5 6
Time (h) Time (h)
FIG. 9. Entropy convergence versus computational time. We FIG. 10. Entropy convergence versus computational time. For
present the case of Fig. 5 but for τ = 0.6. We observe that as the completeness, we present the case of Fig. 5 but for ν = 0.
transmissivity increases, the convergence becomes faster.
[1] C. H. Bennett and G. Brassard, Quantum cryptography: Public [12] N. J. Cerf, M. Levy, and G. Van Assche, Quantum distribu-
key distribution and coin tossing, Proceedings of the Interna- tion of Gaussian keys using squeezed states, Phys. Rev. A 63,
tional Conference on Computers, Systems & Signal Processing, 052311 (2001).
Bangalore, India, pp. 175-179, December 1984. See also Theor. [13] G. Van Assche, J. Cardinal, and N. Cerf, Reconciliation of a
Comput. Sci. 560, 7 (2014). quantum-distributed Gaussian key, IEEE Trans. Inf. Theory 50,
[2] A. K. Ekert, Quantum cryptography based on Bell’s theorem, 394 (2004).
Phys. Rev. Lett. 67, 661 (1991). [14] F. Grosshans and P. Grangier, Continuous Variable Quantum
[3] C. H. Bennett, G. Brassard, and N. D. Mermin, Quantum Cryptography Using Coherent States, Phys. Rev. Lett. 88,
cryptography without Bell’s theorem, Phys. Rev. Lett. 68, 557 057902 (2002).
(1992). [15] R. García-Patrón, S. Pirandola, S. Lloyd, and J. H. Shapiro,
[4] S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, Reverse Coherent Information, Phys. Rev. Lett. 102, 210501
R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, (2009).
J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, [16] S. Pirandola, R. García-Patrón, S. L. Braunstein, and S. Lloyd,
V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, Ad- Direct and Reverse Secret-Key Capacities of a Quantum Chan-
vances in quantum cryptography, Adv. Opt. Photon. 12, 1012 nel, Phys. Rev. Lett. 102, 050503 (2009).
(2020). [17] S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, Fun-
[5] W. Wootters and W. Zurek, A single quantum cannot be cloned, damental limits of repeaterless quantum communications, Nat.
Nature 299, 802 (1982). Commun. 8, 15043 (2017).
[6] J. Park, The concept of transition in quantum mechanics, Found. [18] S. Pirandola, S. L. Braunstein, R. Laurenza, C. Ottaviani,
Phys. 1, 23 (1970). T. P. W. Cope, G. Spedalieri, and L. Banchi, Theory of channel
[7] S. L. Braunstein and P. van Loock, Quantum informa- simulation and bounds for private communication, Quantum
tion with continuous variables, Rev. Mod. Phys. 77, 513 Sci. Technol. 3, 035009 (2018).
(2005). [19] R. Filip, Continuous-variable quantum key distribution with
[8] C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. noisy coherent states, Phys. Rev. A 77, 022310 (2008).
Ralph, J. H. Shapiro, and S. Lloyd, Gaussian quantum informa- [20] V. C. Usenko and R. Filip, Feasibility of continuous-variable
tion, Rev. Mod. Phys. 84, 621 (2012). quantum key distribution with noisy coherent states, Phys. Rev.
[9] T. C. Ralph, Continuous variable quantum cryptography, Phys. A 81, 022318 (2010).
Rev. A 61, 010303 (1999). [21] C. Weedbrook, S. Pirandola, S. Lloyd, and T. C. Ralph, Quan-
[10] M. Hillery, Quantum cryptography with squeezed states, Phys. tum Cryptography Approaching the Classical Limit, Phys. Rev.
Rev. A 61, 022309 (2000). Lett. 105, 110501 (2010).
[11] M. D. Reid, Quantum cryptography with a predetermined [22] C. Weedbrook, S. Pirandola, and T. C. Ralph, Continuous-
key, using continuous-variable Einstein-Podolsky-Rosen corre- variable quantum key distribution using thermal states, Phys.
lations, Phys. Rev. A 62, 062308 (2000). Rev. A 86, 022318 (2012).
013047-8
CONTINUOUS-VARIABLE QUANTUM CRYPTOGRAPHY … PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
[23] V. C. Usenko and R. Filip, Trusted Noise in Continuous- [41] F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and
Variable Quantum Key Distribution: A Threat and a Defense, P. Grangier, Virtual Entanglement and Reconciliation Proto-
Entropy 18, 20 (2016). cols for Quantum Cryptography with Continuous Variables,
[24] P. Papanastasiou, C. Ottaviani, and S. Pirandola, Gaussian one- Quantum Inf. Comput. 3(7), 535 (2003).
way thermal quantum cryptography with finite-size effects, [42] A. Leverrier, F. Grosshans, and P. Grangier, Finite-size analysis
Phys. Rev. A 98, 032314 (2018). of a continuous-variable quantum key distribution, Phys. Rev.
[25] S. Pirandola, S. Mancini, S. Lloyd, and S. L. Braunstein, A 81, 062343 (2010).
Continuous-variable quantum cryptography using two-way [43] L. Ruppert, V. C. Usenko, and R. Filip, Long-distance
quantum communication, Nat. Phys. 4, 726 (2008). continuous-variable quantum key distribution with efficient
[26] C. Weedbrook, C. Ottaviani, and S. Pirandola, Two-way quan- channel estimation, Phys. Rev. A 90, 062310 (2014).
tum cryptography at different wavelengths, Phys. Rev. A 89, [44] S. Pirandola, Limits and security of free-space quantum com-
012309 (2014). munications, arXiv:2010.04168.
[27] V. C. Usenko and F. Grosshans, Unidimensional continuous- [45] A. Leverrier, Composable Security Proof for Continuous-
variable quantum key distribution, Phys. Rev. A 92, 062337 Variable Quantum Key Distribution with Coherent States, Phys.
(2015). Rev. Lett. 114, 070501 (2015).
[28] T. Gehring, C. S. Jacobsen, and U. L. Andersen, Single- [46] C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola,
quadrature continuous-variable quantum key distribution, Continuous-variable measurement-device-independent quan-
Quantum Inf. Comput. 16, 1081 (2016). tum key distribution: Composable security against coherent
[29] S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. attacks, Phys. Rev. A 97, 052327 (2018).
Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. [47] M. Tomamichel, C. Schaffner, A. Smith, and R. Renner, Left-
Andersen, High-rate measurement-device-independent quan- over Hashing Against Quantum Side Information, IEEE Trans.
tum cryptography, Nat. Photon. 9, 397 (2015). Inf. Theory 57, 5524 (2011).
[30] C. Silberhorn, T. C. Ralph, N. Lütkenhaus, and G. Leuchs, [48] M. Tomamichel, Ph.D. thesis, Swiss Federal Institute of Tech-
Continuous Variable Quantum Cryptography: Beating the 3 dB nology (ETH), Zurich, 2012, arXiv:1203.2142.
Loss Limit, Phys. Rev. Lett. 89, 167901 (2002). [49] M. Tomamichel, R. Colbeck, and R. Renner, A Fully Quantum
[31] M. Heid and N. Lütkenhaus, Security of coherent-state quantum Asymptotic Equipartition Property, IEEE Trans. Inf. Theory 55,
cryptography in the presence of Gaussian noise, Phys. Rev. A 5840-5847 (2009).
76, 022313 (2007). [50] C. Portmann and R. Renner, Cryptographic security of quantum
[32] Y.-B. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, Asymptotic key distribution, arXiv:1409.3525v1.
security of binary modulated continuous-variable quantum key [51] G. Giedke and J. I. Cirac, Characterization of Gaussian op-
distribution under collective attacks, Phys. Rev. A 79, 012307 erations and distillation of Gaussian states, Phys. Rev. A 66,
(2009). 032316 (2002).
[33] K. Bradler and C. Weedbrook, Security proof of continuous- [52] J. Eisert and M. Plenio, Introduction to the basics of entangle-
variable quantum key distribution using three coherent states, ment theory in continuous-variable systems, Int. J. Quantum.
Phys. Rev. A 97, 022310 (2018). Inform. 1, 479 (2003).
[34] A. Leverrier and P. Grangier, Unconditional Security Proof [53] S. Pirandola, G. Spedalieri, S. L. Braunstein, N. J. Cerf, and
of Long-Distance Continuous-Variable Quantum Key Distribu- S. Lloyd, Optimality of Gaussian Discord, Phys. Rev. Lett. 113,
tion with Discrete Modulation, Phys. Rev. Lett. 102, 180504 140405 (2014).
(2009). [54] This state is calculated by using [[4], Eq. (A7)] replacing
[35] D. Sych and G. Leuchs, Coherent state quantum key distribution its mean and CM from Eqs. (6) and (7) and expressing the
with multi letter phase-shift keying, New J. Phys. 12, 053019 quadrature operators in terms of the Fock basis considering the
(2010). appropriate truncation.
[36] P. Papanastasiou, C. Lupo, C. Weedbrook, and S. Pirandola, [55] I. Devetak, The private classical capacity and quantum capac-
Quantum key distribution with phase-encoded coherent states: ity of a quantum channel, IEEE Trans. Inf. Theory 51, 44
Asymptotic security analysis in thermal-loss channels, Phys. (2005).
Rev. A 98, 012340 (2018). [56] Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y.
[37] A. Leverrier and P. Grangier, Continuous-variable quantum- Zhao, B. Xu, S. Yu, and H. Guo, Long-Distance Continuous-
key-distribution protocols with a non-Gaussian modulation, Variable Quantum Key Distribution over 202.81 km of Fiber,
Phys. Rev. A 83, 042312 (2011). Phys. Rev. Lett. 125, 010502 (2020).
[38] S. Ghorai, P. Grangier, E. Diamanti, and A. Leverrier, Asymp- [57] The analytical dependence of leak EC (n, cor ) on cor is deter-
totic Security of Continuous-Variable Quantum Key Distri- mined in an experimental scenario after the choice of the linear
bution with a Discrete Modulation, Phys. Rev. X 9, 021059 EC code. At that point, one can more precisely relate ξ to cor
(2019). through Eq. (49). From typical experiments for Gaussian pro-
[39] J. Lin, T. Upadhyaya, and N. Lütkenhaus, Asymptotic Security tocols, it is known that ξ = 0.95 [58] and ξ = 0.98 [[59,60]] is
Analysis of Discrete-Modulated Continuous-Variable Quantum achievable. In the case of discrete-alphabet encoding the EC is
Key Distribution, Phys. Rev. X 9, 041064 (2019). very efficient. This is why we chose a reconciliation efficiency
[40] S. Pirandola, S. L. Braunstein, and S. Lloyd, Characterization equal to ξ = 0.99.
of Collective Gaussian Attacks and Security of Coherent- [58] P. Jouguet, D. Elkouss, and S. Kunz-Jacques, High-bit-rate
State Quantum Cryptography, Phys. Rev. Lett. 101, 200504 continuous-variable quantum key distribution, Phys. Rev. A 90,
(2008). 042329 (2014).
013047-9
PAPANASTASIOU AND PIRANDOLA PHYSICAL REVIEW RESEARCH 3, 013047 (2021)
[59] M. Milicevic, C. Feng, L. M. Zhang, and P. G. [61] L. Banchi, S. L. Braunstein, and S. Pirandola, Quantum Fidelity
Gulak, Quasi-cyclic multi-edge LDPC codes for long- for Arbitrary Gaussian States, Phys. Rev. Lett. 115, 260501
distance quantum cryptography, npj Quant. Info. 4, 21 (2015).
(2018). [62] A. Leverrier, Security of Continuous-Variable Quantum Key
[60] X. Wang, Y.-C. Zhang, Z. Li, B. Xu, S. Yu, and H. Guo, Distribution via a Gaussian de Finetti Reduction, Phys. Rev.
Efficient rate-adaptive reconciliation for continuous-variable Lett. 118, 200501 (2017).
quantum key distribution, Quantum Inf. Comput. 17, 1123 [63] https://wiki.york.ac.uk/display/RHPC/Viking+-+The+York+
(2017). Super+Advanced+Research+Computing+Cluster
013047-10