Abstract
Einstein-Podolsky-Rosen (EPR) entangled states can significantly enhance the secret key rate and secure distance of continuous-variable quantum key distribution (CV-QKD). In practical imperfections always exist in the preparation of two-mode squeezing (entangled states), which present an asymmetrical variance for the two quadratures. The imperfections induced by the bias effect of the entangled states are commonly treated as part of the untrusted channel to decrease the performance of the system. Here, we theoretically quantify the influence of bias effect on the secret key rate and secure distance, and propose a solution of generating unbiased entangled states protocol. The results demonstrated that the unbiased entangled states protocol guarantees the longest secure distance and highest key rate compared to that of coherent and biased entangled states.
© 2021 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
1. Introduction
Quantum key distribution (QKD) [1–8] is a prominent technology for quantum information science, which shares a pre-established secret key between two trusted parties based on the laws of quantum physics. In continuous-variable (CV) QKD systems, the secret key is encoded in the quadratures of the electromagnetic field, for example, coherent states [9–13], squeezed/entangled states [2–5,14], in which homodyne or heterodyne detection techniques are used for signal extraction [2,15,16]. Multiple protocols [9,10,13,17] indicated that the secret key rate and secure distance are mainly limited by the excess noise, optical losses, and finite reconciliation efficiency during the distribution [2,15,16]. Present CV-QKD systems are already working with state-of-the-art optical channels and the reconciliation efficiency [6,15–18]. The maximum secure distance has already reached 202 km based on coherent state, in which an ultralow-loss optical fiber combined with a phase compensation and highly-efficient reconciliation procedures was applied for the enhancement [17].
Compared with coherent-state protocol, entangled states protocol is more tolerant to excess noise, loss and reconciliation efficiency [3–5,15,19]. For instance, a -3.5 dB modulated two-mode squeezed states can significantly boost the robustness and distance for secure communication [3], in which, a secret raw key was generated between two parties connected by a noisy and lossy channel-a channel that is not secure for coherent state protocols. As the squeezing factor is improved to 10 dB, the superiority becomes more obvious. In addition, to further enhance the performance, Alice and Bob, share a pair of Einstein-Podolsky-Rosen (EPR) beams and randomly choose a quadrature (amplitude or phase) base measurement to decrypt the key [19]. Therefore, to keep the advantages of this protocol, the entanglement should be prepared not only with strong quantum correlations [20,21], but also with symmetric quantum correlations between the two quadrature components [22,23]. However, a bias of the two quadratures always accompanies with the preparation of high degree EPR states [23–25], which originates from several interdependent factors in the EPR states production [20,22,24,25]. Compared with unbiased EPR protocol, the bias effect in practical entanglement generation is commonly treated as part of the untrusted channel to weaken the secret key rate and secure distance. Currently, EPR states protocol with single-mode squeezing had been studied in detail with asymmetrical quadrature variance [23,26]. Or a position squeezed state with probability $P$ and a momentum one with probability $1-P$, prepared to produce a Gaussian modulated average isotropic thermal state, are theoretically demonstrated to have the same performance as an equivalent entanglement-based protocol [14,26]. However, the two-mode squeezing protocol has been demonstrated without considering the bias effect [3,4,19,27]. In [24], we had experimentally and theoretically researched the bias effect in detail, and given a methodology to produce an unbiased EPR states. This inspires the following works: (1) quantitative analysis of the dependence of the system performance of CV-QKD on the bias effect; (2) how to weaken the influence of the bias effect on the secret key rate and secure distance.
Here, we quantitatively analyze the secret key rate and secure distance for three protocols: coherent, biased, and unbiased entanglement. The results indicate a superiority for unbiased EPR protocol in long-distance communication, compared with biased entanglement and coherent protocols. Further, we model the generation process of EPR entangled states and propose a solution to construct unbiased entangled states protocol.
2. Theoretical analysis of CV-QKD with biased EPR protocol
Our CV-QKD protocol is shown in Fig. 1, which has three parts, the sender Alice with a state preparation (the EPR entanglement source and modulator) and detection, the quantum channel, and the remote receiver Bob with state detection. The entanglement source is prepared by mixing two amplitude squeezed states with amplitude variances ${{V}_{1}}\left ( X \right )$ and ${{V}_{2}}\left ( X \right )$ at a 50/50 beam splitter (BS), which outputs are two entangled modes ${{A}_{0}}$ and ${{B}_{0}}$, and belong to the trusted sender. Mode ${{A}_{0}}$ is a thermal state with a variance of ${{V}_{\textrm {a}}}\left ( X/Y \right )={\left ( {{V}_{\textrm {1}}}\left ( X/Y \right )+{{V}_{\textrm {2}}}\left ( Y/X \right ) \right )}/{2}\;$ ($X$ and $Y$ are the amplitude and phase components, respectively), which is homodyne detected by Alice with a detection efficiency of ${{\eta }_{\textrm {A}}}$. Mode ${{B}_{0}}$ with a variance of ${{V}_{\textrm {b}}}\left ( X/Y \right )={\left ( {{V}_{\textrm {1}}}\left ( X/Y \right )+{{V}_{\textrm {2}}}\left ( Y/X \right ) \right )}/{2}\;$.
Then mode ${{B}_{0}}$ transmits through a lossy $\eta$ and noisy $\varepsilon$ quantum channel, which is assumed to be fully controlled by an eavesdropper Eve, consequently, makes the channel untrusted. Then, mode ${{B}_{0}}$ is also homodyne detected by a trusted receiver Bob. $\textrm {Bob's}$ noisy detection is purified by placing a beam splitter with an EPR state ${{\rho }_{{{R}_{0}}G}}$ input, which transmission mimics his electronic noise ${{\nu }_{\textrm {elB}}}$ and detection efficiency ${{\eta }_{\textrm {B}}}$. Then the point-to-point repeaterless Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound can be expressed as $-{{\log }_{2}}\left ( 1-{{\eta }_{\textrm {A}}}{{\eta }_{\textrm {B}}}\eta \right )$ [8,26,28], which provides the exact benchmark and the secret key capacity of the lossy communication channel (pure-loss channel).
In the EPR based CV-QKD protocol, secret key is distilled from the state information shared by the two trusted parties-Alice and Bob. Considering a protocol with reverse reconciliation (RR) and collective attacks, the secret key rate is expressed as [3,4,27,29,30]
The protocol is secure, while the key rate $\Delta I>0$ [3,31]. ${{I}_{\textrm {AB}}}$ is the Shannon mutual information between Alice and Bob, and ${{\chi }_{\textrm {BE}}}$ is the Holevo quantity. Where $\beta \le 1$ refers to the reconciliation efficiency, which is determined by the signal-to-noise ratio (SNR) and algorithm being used for the reconciliation and computational power in trusted devices [32]. Nevertheless, imperfections always indwell in the devices, such as state generation (imperfect coherent or EPR state) and modulation in sender side, or state detection in $\textrm {Bob's}$ station. The imperfections introduce noises and losses into the detection parts, which can seriously shorten the secure distance or limit the key rate to an extremely lower level [32]. Therefore, the key rate in entanglement-based CV-QKD should be analyzed under imperfection conditions. By introducing the imperfections as trusted noise, the Shannon mutual information ${{I}_{\textrm {AB}}}$ between Alice and Bob related to the variances in the two stations and their correlation, is expressed as [4,27]For information eavesdropping, the upper bound information ${{\chi }_{\textrm {BE}}}$ accessible to Eve from Bob is limited by the Holevo quantity [27].
Obviously, ${{I}_{\textrm {AB}}}$ and ${{\chi }_{\textrm {BE}}}$ link the noise variances ${{V}_{\textrm {a}}}\left ( X/Y \right )$ and ${{V}_{\textrm {b}}}\left ( X/Y \right )$ to the secret key rate. Therefore, the variances ${{V}_{\textrm {a,b}}}$ of the two EPR modes should be dwelled on the actual preparation of EPR states. In the QKD process, unbiased entangled states with symmetrical quantum correlations are usually considered by coupling two equivalent squeezed states ${{V}_{1}}\left ( X \right )={{V}_{2}}\left ( X \right )$ on a 50/50 BS [3]. In fact, the variances of the two EPR modes are related to the trusted optical channel losses ${{l}_{\textrm {a,b}}}$, the relative phase between the two squeezing beams $\varphi$, variances of the squeezed states ${{V}_{1,2}}\left ( X \right )$ and balance of the BS (1-$T$):$T$ [20,22,24,25]. Any deviation of these parameters from the ideal value may destroy the symmetric correlations and introduce a bias effect as shown in Fig. 2 [22,24,25], which is harmful to the requirements of random quadrature base measurement and also weakens the superiority of the EPR states [23]. Taking into account the bias effect, the amplitude and phase correlation variances can be expressed as (without considering the relative phase between the two squeezing beams $\varphi$, the method is detailedly demonstrated in the Appendix)
When ${{V}_{1}}\left ( X \right )={{V}_{2}}\left ( X \right )$, the unbiased entangled states can be prepared by a balanced BS $T=0.5$ or loss ${{l}_{\textrm {a}}}={{l}_{\textrm {b}}}$, and more details can be found in Ref. [24]. In Ref. [24], we had firstly analyzed the origin of the bias effect in detail and directly observed an unbiased entanglement of -10.7 dB by using two single-mode squeezed states. It provides a superior unbiased entangled light source for CV-QKD protocol based on entangled states.
In general EPR states are treated as thermal states [31] with a circular noise distribution for the two quadratures. But for biased EPR states, the quadrature noise distributes to be an elliptical one as describing in Fig. 2 (initial or measured variance before mode B is sent to the untrusted channel), due to the asymmetrical noise redistribution of ${{V}_{1}}\left ( X \right )$ and ${{V}_{2}}\left ( X \right )$ to Alice and Bob. This asymmetrical noise redistribution of the practical systems is commonly treated as an untrusted part. Hence, Eve is able to extract the information from the untrusted channel, by preparing an appropriate squeezed state to restore the variance to the initial level, and pretend no information leakage to her. In this case, it decreases the performance of the system. To maintain the advanced performance with (single-mode or two-mode [3,4,26]) squeezed state, Bob should discard some information in one of the measured quadratures, which weakens the secure distance compared with unbiased protocol [23]. On the other hand, the existing theory for homodyne protocol with EPR state requires the two quadrature of the amplitude and phase variances should be equal with each other. Therefore, a modulated thermal state is proposed for the analysis of biased entanglement, in which the small variance quadrature is modulated to generate a circular thermal state [31], showed by the modulated variance in Fig. 2. Under this circumstance, ${{V}_{\textrm {a,b}}}$ evolves into ${{{V}'}_{{{\textrm {A}}_{\textrm {0}}}\textrm {,}{{\textrm {B}}_{\textrm {0}}}}}$, ${{{V}'}_{{{\textrm {A}}_{\textrm {0}}}}}\left ( X \right )\textrm {=}{{V}_{\textrm {a}}}\left ( X \right )+{{V}_{\textrm {M1}}}\left ( X \right )$, ${{{V}'}_{{{\textrm {A}}_{\textrm {0}}}}}\left ( Y \right )\textrm {=}{{V}_{\textrm {a}}}\left ( Y \right )$, ${{{V}'}_{{{\textrm {B}}_{\textrm {0}}}}}\left ( X \right )\textrm {=}{{V}_{\textrm {b}}}\left ( X \right )$, ${{{V}'}_{{{\textrm {B}}_{\textrm {0}}}}}\left ( Y \right )\textrm {=}{{V}_{\textrm {b}}}\left ( Y \right )+{{V}_{\textrm {M1}}}\left ( Y \right )$, and Eve cannot distinguish the difference between the biased or unbiased EPR protocols. CV-QKD for biased EPR states again restores the performance. Eve is allowed to achieve any attack by emulating the channel transmission and excess noise, and the bias does not affect the leakage information to Eve. Finally, the biased protocol can be treated with the standard CV-QKD theory for the pure state [3,4].
Under a high loss case with RR, i.e., communication in a long-distance fiber, the existing reconciliation algorithm suffers a low efficiency, which severely limits the key rate and distance. To overcome this problem, an additional modulation ${{V}_{\textrm {M2}}}$ is added to the prepared state (modulated thermal state in Fig. 2) to further extend the secure distances [3,4,19]. In an ideal situation (noiseless and lossless in the sender and receiver), arbitrary high modulation ($1\sim +\infty$) can be applied to greatly enhance the key rate and distance. However, a practical schema is always imperfect, and squeezing level can continuously improve the security parameters, while the modulation must be optimized to tolerate the channel noise [3,19,33].
During the key distribution, mode ${{B}_{0}}$ is sent to the remote trusted party-Bob, through a quantum channel characterized by the lossy $\eta$ and noisy $\varepsilon$, and the covariance matrix is expressed as
To simplify the analysis process, we assume a trusted noise in the detection part, and a narrow-band homodyne detector is applied [32,34,35]. Then, the modified variances of the quadratures measured by Alice and Bob are deduced as
3. Secret key rate and secure distance for biased and unbiased EPR protocols
Combining the theoretical models in section 2 and appendixes, we calculate the secure key rate and secure distance of the CV-QKD based on a fiber channel. Firstly, without considering the modulation schema and side-channel effect, the maximum secure distance is compared between the biased and unbiased EPR protocols. Here the maximum distance is stipulated as the key rate decreased to ${{10}^{-8}}$ bits/pulse. Taking the actual situation for states preparation into account, the initial system parameters for biased and unbiased protocols are given as, originating from Ref. [24]. With the precondition of ${{V}_{\textrm {1}}}(X)={{V}_{\textrm {2}}}(X)$, for $T=0.49$, a biased entanglement is obtained, and unbiased correlations are established for $T=0.5$, and more details can be found in our previous work [24]. Then, the differences of the secure distance between the biased and unbiased entanglement protocols ${{L}_{\textrm {unbias}}}-{{L}_{\textrm {bias}}}$ are demonstrated in Fig. 3, , and the parameters for the demonstration of the six sub-graphs are listed in Table 1. With ${{V}_{\textrm {1}}}(X)={{V}_{\textrm {2}}}(X)$ in Fig. 3(a), the secure distance for unbiased protocol is enhanced with the increasing of the squeezing level. The secure distance starts to surpass the coherent state protocol as the squeezing level increased above 5 dB, and the biased protocol appears to be lower than the unbiased one. Meanwhile, the difference of the maximum secure distance between the two EPR states becomes larger, especially higher than 10 dB (the dotted box in Fig. 3(a)), where the bias begins to quickly weaken the secure distance compared with the unbiased protocol. In the precondition of ${{V}_{1}}\left ( X \right )={{V}_{2}}\left ( X \right )=-12$ dB, the reconciliation efficiency $\beta$, excess noise $\varepsilon$, the channel loss coefficient $\alpha$, efficiency ${{\eta }_{\textrm {B}}}$, and detection electronic noise ${{\nu }_{\textrm {elB}}}$ of Bob are considered as the influence factors to the biased protocol. The magnitude of the reconciliation efficiency $\beta$ amends the difference between the biased and unbiased entanglement protocols. As showing in Fig. 3(b), ${{L}_{\textrm {unbias}}}$ is more superior to ${{L}_{\textrm {bias}}}$ as $\beta$ approaching the unit. And this conclusion is also suitable for a noiseless or lossless quantum channel, i.e., in Fig. 3(c) and (d), less excess noise or channel loss is more favorable to the unbiased protocol for secure distance enhancement. Moreover, in Fig. 3(e) and (f), the detection efficiency ${{\eta }_{\textrm {B}}}$ and electronic noise ${{\nu }_{\textrm {elB}}}$ in $\textrm {Bob's}$ station have no impact on ${{L}_{\textrm {unbias}}}-{{L}_{\textrm {bias}}}$, which act as linear noise injection for the two protocols. From the above argument, we can see that unbiased entanglement proves to be more preferable for long-distance communication, especially for a squeezing level above 10 dB. The results are also supported by Ref. [23].
Before secret key rate calculation, we provide a channel estimation [36] analysis based on current experimental conditions for EPR protocol. A standard single-mode fiber (a loss coefficient $\alpha =0.2$ dB/km) serves as the transmission channel of the entangled states from Alice to Bob. Assuming one of the EPR modes in Alice station is prepared with a detection efficiency ${{\eta }_{\textrm {A}}}$>99$\%$ (an optical propagation efficiency is better than 0.2$\%$, an interference visibility of 99.8$\%$, a quantum efficiency inferred by the measured squeezing level is about 99.5$\%$) [35]. In $\textrm {Bob's}$ station, we suppose the transmitted states from the channel are coupled by fiber devices, and injected into space homodyne detection, which efficiency is given as ${{\eta }_{\textrm {B}}}=0.843$ (the optical propagation efficiency based on the fiber devices is 85.5$\%$, $\textrm {homodyne detector's}$ visibility is 99.8$\%$, the quantum efficiency of the photodiodes is also better than 99$\%$) [3,4,18,29,37]. Then, the key distribution is simulated with the schema in Ref. [4], and all the above parameters are used to estimate the channel. Incorporating Ref. [36,38] (models of channel estimation) and the noise variances of -10 dB, the excess noise of the protocol is estimated to be better than 0.1. In our theoretical analysis, excess noise is chosen as 0.1 to meet the realistic situation. Imperfections at $\textrm {Alice's}$ and $\textrm {Bob's}$ stations introduce the side-channel effects, that make the protocol more sensitive to the channel noise and can even break the security for purely attenuating channel. With the above parameters and the theoretical results for two-mode squeezing in Ref. [39,40], the side-channel limits the maximum tolerable channel noise to be approximately 0.72 SNU at Alice’s station and 0.65 SNU at Bob’s station. It demonstrated that the EPR protocol was more tolerant to the prepared and detected noises, hence we omit the side-channel effects.
In the key rate calculation, the reconciliation efficiency $\beta \textrm {=}0.99$ is considered as the highest level in practical protocols [18]. Assumed an infinite number of measured samples is used to extract the key rate. For all protocols, imperfect reconciliation efficiency $\beta <1$ limits the modulated variances to a finite value [33]. As a consequence, there is an optimal ${{V}_{\textrm {M}}}$ to guarantee the best performance of the QKD. Inferred from equations (32) and (39), the biased EPR can be transformed to an unbiased one by changing the variances of the squeezed states ${{V}_{1,2}}\left ( X \right )$, the trusted optical losses ${{l}_{\textrm {a,b}}}$ in the preparation part or balance of the BS (1-$T$):$T$ [24]. The details for the production of unbiased entangled states were investigated in a recent paper [24]. However, in CV-QKD, channel loss is uncontrollable. To maintain the maximum entanglement level and secure distance, the balance of the BS is favorable compared with the other two parameters. Figure 4(a) shows the calculated secret key rate and maximum secure distance, and the parameters for the calculation are listed in Table 2. The results demonstrated that the unbiased EPR protocol (curves 6 and 7) is superior to the other two protocols (biased EPR and coherent protocols) in the maximum secure distance, and still can be improved by a finite modulation (${{V}_{\textrm {M2}}}=4.7$, the secure distance is increased from 251 km to 263 km). The biased EPR protocol (curves 2 and 3) is more robust compared with the coherent one (curve 1), but is less robust than the unbiased EPR one. The unbiased EPR of curves 4 and 5 in Fig. 4(a) is obtained by substituting $T=0.49$ into $T=0.5$ (column number 2 and number 4 in Table 2). From curves 2-5, it can be found that the weakness of the biased EPR protocol is able to compensate by transforming the biased EPR into an unbiased one. The results also show that the QKD protocols presented here are unable to beat the PLOB bound (curve 8 in Fig. 4(a)). Figure 4(b) shows a relation between the secure distance and bias effect. It also can be seen that the bias effects weaken the secure distance, and the unbiased EPR represents the optimum choice for entangled states CV-QKD, which will greatly enhance the secret key rate and secure distance compared with the biased EPR protocols.
For a hundred-kilometer standard optical fiber channel, the visibility of the homodyne detection remains the same compared with free space, but introduces a differential phase fluctuation and excess noise between the two quantum channels. It forms the main challenge in implementing the EPR based CV-QKD, because an entangled state is more sensitive to the phase and excess noise. Although a stable controlling of the phase fluctuation is available in local EPR sources [20,35,41–43], more effort should be done to meet the long-distance optical fiber communication. Although a rigorous experiment proof for hundred-kilometer standard optical fiber distribution is beyond the scope of this paper, this result with a bias effect analysis constitutes a fundamental advance in EPR based CV-QKD.
4. Conclusion
We compare the secret key rate and secure distance of CV-QKD in three distribution protocols: coherent state, biased entangled states, and unbiased entangled states. The theoretical results show that the weakness of the biased EPR protocol in long-distance communication can be lowered by transforming it into an unbiased one, and the unbiased EPR protocol is superior to other protocols for long-distance distribution, especially the noise reduction goes beyond 10 dB. And the QKD protocols presented here are unable to beat the PLOB bound. By considering the practical imperfections (original squeezing variance, trusted optical loss, and non-ideal BS) in the preparation, transmission, and detection processes of entangled states, we provide a feasible proposal for constructing unbiased entangled states protocol. With the improvement of the phase control technique, an unbiased entanglement source [24] will be expected to apply to a practical available CV-QKD protocol and further boost the secret key rate and distance.
Appendixes: theoretical models of the biased entanglement
The entangled states are prepared by coupling two equivalent squeezed states ${{{S}}_{1}}$ and ${{{S}}_{2}}$ on a beam splitter (BS) with transmittance $T$. Considering the phase difference $\varphi$ between the two squeezing beams, the output operators of the BS are
The amplitude quadrature operators for Alice and Bob areFunding
National Natural Science Foundation of China (11654002, 11804206, 11804207, 11874250, 62027821, 62035015); National Key Research and Development Program of China (2020YFC2200402); Key Research and Development Projects of Shanxi Province (201903D111001); Program for Sanjin Scholar of Shanxi Province; Program for Outstanding Innovative Teams of Higher Learning Institutions of Shanxi; Fund for Shanxi “1331 Project” Key Subjects Construction.
Disclosures
The authors declare no conflicts of interest.
Data availability
Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.
References
1. T. C. Ralph and P. K. Lam, “A bright future for quantum communications,” Nat. Photonics 3(12), 671–673 (2009). [CrossRef]
2. C. Weedbrook, “Continuous-variable quantum key distribution with entanglement in the middle,” Phys. Rev. A 87(2), 022308 (2013). [CrossRef]
3. L. S. Madsen, V. C. Usenko, M. Lassen, R. Filip, and U. L. Andersen, “Continuous variable quantum key distribution with modulated entangled states,” Nat. Commun. 3(1), 1083 (2012). [CrossRef]
4. N. Wang, S. N. Du, W. Y. Liu, X. Y. Wang, Y. M. Li, and K. C. Peng, “Long-distance continuous-variable quantum key distribution with entangled states,” Phys. Rev. Appl. 10(6), 064028 (2018). [CrossRef]
5. N. Wang, S. N. Du, W. Y. Liu, X. Y. Wang, and Y. M. Li, “Generation of Gaussian-modulated entangled states for continuous variable quantum communication,” Opt. Lett. 44(15), 3613–3616 (2019). [CrossRef]
6. J. F. D. M. Lucamarini, Z. L. Yuan, and A. J. Shields, “Overcoming the rate–distance limit of quantum key distribution without quantum repeaters,” Nature 557(7705), 400–403 (2018). [CrossRef]
7. C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, (IEEE, 1984), p. 175–179.
8. S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. S. Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, “Advances in quantum cryptography,” Adv. Opt. Photonics 12(4), 1012–1236 (2020). [CrossRef]
9. F. Grosshans, G. V. Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003). [CrossRef]
10. A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light,” Phys. Rev. Lett. 95(18), 180503 (2005). [CrossRef]
11. A. Leverrier and P. Grangier, “Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation,” Phys. Rev. Lett. 102(18), 180504 (2009). [CrossRef]
12. R. Namiki and T. Hirano, “Security of quantum cryptography using balanced homodyne detection,” Phys. Rev. A 67(2), 022308 (2003). [CrossRef]
13. F. Grosshans and P. Grangier, “Continuous Variable Quantum Cryptography Using Coherent States,” Phys. Rev. Lett. 88(5), 057902 (2002). [CrossRef]
14. N. J. Cerf, M. Lévy, and G. V. Assche, “Quantum distribution of Gaussian keys using squeezed states,” Phys. Rev. A 63(5), 052311 (2001). [CrossRef]
15. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013). [CrossRef]
16. H. Ko, B. S. Choi, J. S. Choe, K. J. Kim, J. H. Kim, and C. J. Youn, “High-speed and high-performance polarization-based quantum key distribution system without side channel effects caused by multiple lasers,” Photonics Res. 6(3), 214–219 (2018). [CrossRef]
17. Y. C. Zhang, Z. Y. Chen, S. Pirandola, X. Y. Wang, C. Zhou, B. J. Chu, Y. J. Zhao, B. J. Xu, S. Yu, and H. Guo, “Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,” Phys. Rev. Lett. 125(1), 010502 (2020). [CrossRef]
18. M. Milicevic, C. Feng, L. M. Zhang, and P. G. Gulak, “Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography,” npj Quantum Inf. 4(1), 21 (2018). [CrossRef]
19. V. C. Usenko and R. Filip, “Squeezed-state quantum key distribution upon imperfect reconciliation,” New J. Phys. 13(11), 113007 (2011). [CrossRef]
20. T. Eberle, V. Händchen, and R. Schnabel, “Stable control of 10 dB two-mode squeezed vacuum states of light,” Opt. Express 21(9), 11546–11553 (2013). [CrossRef]
21. S. Steinlechner, J. Bauchrowitz, T. Eberle, and R. Schnabel, “Strong Einstein-Podolsky-Rosen steering with unconditional entangled states,” Phys. Rev. A 87(2), 022104 (2013). [CrossRef]
22. W. P. Bowen, P. K. Lam, and T. C. Ralph, “Biased EPR entanglement and its application to teleportation,” J. Mod. Opt. 50(5), 801–813 (2003). [CrossRef]
23. T. Eberle, V. Händchen, J. Duhme, T. Franz, F. Furrer, R. Schnabel, and R. F. Werner, “Gaussian entanglement for quantum key distribution from a single-mode squeezing source,” New J. Phys. 15(5), 053049 (2013). [CrossRef]
24. Y. J. Wang, W. H. Zhang, R. X. Li, L. Tian, and Y. H. Zheng, “Generation of -10.7 dB unbiased entangled states of light,” Appl. Phys. Lett. 118(13), 134001 (2021). [CrossRef]
25. K. Wagner, J. Janousek, S. Armstrong, J. F. Morizur, P. K. Lam, and H. A. Bachor, “Asymmetric EPR entanglement in continuous variable systems,” J. Phys. B: At., Mol. Opt. Phys. 47(22), 225502 (2014). [CrossRef]
26. S. Pirandola, “Limits and security of free-space quantum communications,” Phys. Rev. Res. 3(1), 013279 (2021). [CrossRef]
27. A. Becir and M. R. B. Wahiddin, “Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement,” Quantum Inf. Process. 12(2), 1155–1171 (2013). [CrossRef]
28. S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, “Fundamental limits of repeaterless quantum communications,” Nat. Commun. 8(1), 15043 (2017). [CrossRef]
29. J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76(4), 042305 (2007). [CrossRef]
30. D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016). [CrossRef]
31. C. Weedbrook, S. Pirandola, S. Lloyd, and T. C. Ralph, “Quantum cryptography approaching the classical limit,” Phys. Rev. Lett. 105(11), 110501 (2010). [CrossRef]
32. V. C. Usenko and R. Filip, “Feasibility of continuous-variable quantum key distribution with noisy coherent states,” Phys. Rev. A 81(2), 022318 (2010). [CrossRef]
33. X. Y. Wang, S. Y. Guo, P. Wang, W. Y. Liu, and Y. M. Li, “Realistic rate–distance limit of continuous-variable quantum key distribution,” Opt. Express 27(9), 13372–13386 (2019). [CrossRef]
34. V. C. Usenko and R. Filip, “Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense,” Entropy 18(1), 20 (2016). [CrossRef]
35. W. H. Zhang, J. R. Wang, Y. H. Zheng, Y. J. Wang, and K. C. Peng, “Optimization of the squeezing factor by temperature-dependent phase shift compensation in a doubly resonant optical parametric oscillator,” Appl. Phys. Lett. 115(17), 171103 (2019). [CrossRef]
36. L. Ruppert, V. C. Usenko, and R. Filip, “Long-distance continuous-variable quantum key distribution with efficient channel estimation,” Phys. Rev. A 90(6), 062310 (2014). [CrossRef]
37. J. Mizuno, K. Wakui, A. Furusawa, and M. Sasaki, “Experimental demonstration of entanglement-assisted coding using a two-mode squeezed vacuum state,” Phys. Rev. A 71(1), 012304 (2005). [CrossRef]
38. W. Y. Liu, X. Y. Wang, N. Wang, S. N. Du, and Y. M. Li, “Imperfect state preparation in continuous-variable quantum key distribution,” Phys. Rev. A 96(4), 042312 (2017). [CrossRef]
39. I. Derkach, V. C. Usenko, and R. Filip, “Preventing side-channel effects in continuous-variable quantum key distribution,” Phys. Rev. A 93(3), 032309 (2016). [CrossRef]
40. I. Derkach, V. C. Usenko, and R. Filip, “Continuous-variable quantum key distribution with a leakage from state preparation,” Phys. Rev. A 96(6), 062309 (2017). [CrossRef]
41. W. H. Yang, S. P. Shi, Y. J. Wang, W. G. Ma, Y. H. Zheng, and K. C. Peng, “Detection of stably bright squeezed light with the quantum noise reduction of 12.6 dB by mutually compensating the phase fluctuations,” Opt. Lett. 42(21), 4553–4556 (2017). [CrossRef]
42. S. Shi, L. Tian, Y. Wang, Y. Zheng, C. Xie, and K. Peng, “Demonstration of channel multiplexing quantum communication exploiting entangled sideband modes,” Phys. Rev. Lett. 125(7), 070502 (2020). [CrossRef]
43. J. R. Wang, W. H. Zhang, L. Tian, Y. Wang, R. C. Yang, J. Su, and Y. H. Zheng, “Balanced Homodyne Detector with Independent Phase Control and Noise Detection Branches,” IEEE Access 7, 57054–57059 (2019). [CrossRef]