Abstract
We propose a rigorous calibration method for homodyne detection efficiency, which combines all the factors that affect detection efficiency to calibrate together through the actual homodyne detection. With this method, the transmittance converted from electronic noise in the one-time calibration method of the shot noise can be attributed to the detection inefficiency. Thus, a trusted detection noise-free model for continuous-variable quantum key distribution (CV-QKD) can be established, which simplifies the calibration of shot noise while having the same performance as the trusted detection noise model. We demonstrate this calibration method with a balanced detector based on a transimpedance amplifier. Experimental results show that detection efficiency will be overestimated if the integration factor of the detector is overlooked. The overestimation of the detection efficiency leads to an underestimation of modulation variance and excess noise when the modulation variance is monitored by the balanced detector, which opens security loopholes. Our method may prove a necessary method in the calibration of detection efficiency for CV-QKD.
© 2022 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement
1. Introduction
As a family of quantum key distribution (QKD) protocols, continuous-variable (CV) QKD has its unique advantages in allowing two communication parties to share secure keys [1]. The similarities between CV-QKD and coherent optical communication enable the former to be realized with commercial optical communication components. Due to the highly effective filtering of the local oscillator (LO) used in the coherent detection, CV-QKD can tolerate more incoherent channel noise than discrete-variable QKD. Thus, it has good compatibility with conventional optical fiber networks [2,3]. The Gaussian-modulated coherent state (GMCS) protocol [4,5] is the most widely studied protocol in CV-QKD. Theoretically, its security against collective attacks has already been proven [6–8], while its composable security against general attacks has also been well established [9,10]. Experimentally, the GMCS protocol has been demonstrated over long transmission distances [11–13], with high repetition rate systems [14–16], and in field fiber [17–21].
Although CV-QKD has made remarkable achievements in both theory and experiment, there are still crucial steps to be taken to reduce the gap between theory and practice implementation. This gap opens security loopholes to an eavesdropper, who may launch various attacks [22–28]. For a practical CV-QKD system, the detection imperfections such as detection inefficiency and electronic noise of the detector should be considered. In actual homodyne detection, detection efficiency is affected by various factors [29]. It is inconvenient to calibrate these factors one by one, which requires exploring all the factors that affect detection efficiency. The detection efficiency will be overestimated if any factors are overlooked.
In this paper, we propose a method to calibrate the detection efficiency, which combines all the factors to calibrate together. All known or unknown factors are included in the calibrated detection efficiency to achieve rigorous calibration of detection efficiency. When the shot noise is calibrated using the one-time calibration method [30], the transmittance converted from electronic noise can be included in the detection efficiency and calibrated together with other factors. Thus, a trusted detection noise-free model can be established. A balanced detector based on a transimpedance amplifier is used in actual homodyne detection to demonstrate this method. The experimental results show that the detection efficiency of this type of detector will be affected by the integration factor, which represents the incomplete integration of the optical pulse by the detector. The detection efficiency will be overestimated if the integration factor of the detector is overlooked. Hence the calibration method we propose here should be used in CV-QKD to close the security loopholes caused by overestimating detection efficiency.
The rest of the paper is organized as follows. In Section 2, the rigorous calibration method of detection efficiency is given and combined with the one-time calibration method of shot noise, thereby establishing a trusted detection noise-free model in Section 3. In Section 4, the calibration method is demonstrated experimentally. Based on the experimental results, we analyze the practical security of CV-QKD with overestimated detection efficiency in Section 5, and draw the conclusions in Section 6.
2. Rigorous calibration of detection efficiency
Figure 1 depicts the homodyne detection implementation. An optical signal pulse with a certain pulse width is used to prepare the desired coherent state. When homodyne detection is performed, it interferes with the LO. The interference result is converted into an electric pulse by a balanced detector and then sampled by an ADC. For fiber-based homodyne detection, the detection efficiency can be written as [29]
where $\eta _m$ is the interferometer mode-matching efficiency, $\eta _t$ is the transmittance of a fiber coupler, $\eta _d$ is the quantum efficiency of the photodiodes. Here, three factors need to be calibrated, though more factors should be considered in some cases. For the balanced detector based on a transimpedance amplifier, if the pulse width of the optical signal pulse is much larger than the response time of the photodiodes used in detector, multiple sampling points should be collected and integrated since the quadrature of the coherent state is proportional to the area under the electric pulse [31]. To simplify data collection, the prepared optical pulse should be narrow enough to be completely integrated by the detector. Then the quadrature is proportional to the peak value of the electric pulse, which can taken as the measurement result [32–34]. However, the optical pulse width prepared in CV-QKD is usually on the order of nanoseconds [14,35,36], which should not be assumed to be completely integrated by the detector. In such a situation, the integration factor representing the completeness of the integration should be calibrated. Otherwise, the detection efficiency will be overestimated.In order to avoid overestimating the detection efficiency, we propose a method to calibrate the detection efficiency $\eta$ rigorously. First, it is required to prepare $m$ coherent states with the same amplitude and four different phases, $\left \{| {\alpha _\mathrm {A} e^{i(\theta +\varphi _k)}}\right \rangle \}_{k=1 \ldots m}$. Here, $\theta$ is the initial phase of each coherent state, and $\varphi _k\in \lbrace 0, \mathrm{\pi} /2, \mathrm{\pi}, 3\mathrm{\pi} /2\rbrace$ is the phase that modulates on the coherent state. The number of coherent states modulating the four phases is the same. These coherent states directly enter Bob’s detection device without passing through the quantum channel. Bob performs homodyne detection on these coherent states. Due to the homodyne detection inefficiency, the relation between the measurement voltage-output result of the quadrature $q_{U,k}$ and the coherent state $| {\alpha _\mathrm {A} e^{i(\theta +\varphi _k)}} \rangle$ prepared can be written as
Here, $N_0$ is the shot noise, $N_0=\tilde {N}_0-V_\text {el}$, which can be calibrated in two steps in the conventional method. The first step is to obtain the total detection noise $\tilde {N}_0$, which can be measured as the output-voltage variance of the detector with only LO light input. The second step is to obtain electronic noise $V_\text {el}$, which can be measured as the output-voltage variance of the detector without signal and LO light input. The measurement noise $\delta _k$ follows a normal distribution with a mean of zero and a variance of $\sigma _0^2=1+v_\text {el}$, where $v_\text {el}=\left. V_\text {el}\right /N_0$. Here, the estimator of $\eta$ is given by
In Ref. [30], a one-time calibration method of shot noise is proposed, where only $\tilde {N}_0$ is obtained. Then $\left.q_{U,k}\right /\sqrt {\tilde {N}_0}=\sqrt {\eta _e}\left. q_{U,k}\right /\sqrt {N_0}$, where $\eta _e=\left. N_0\right /\tilde {N}_0=1-\left. V_\text {el}\right /\tilde {N}_0$. Here, $V_\text {el}$ is converted to $\eta _e$, which is not calibrated and attributed to the channel loss in Ref. [30]. By using the calibration method we proposed, $\eta _e$ can be attributed to the detection inefficiency. In this way, the homodyne detection efficiency should be replaced by
with the estimator of $\eta '$ written asSimilarly, the approximate estimator of $\eta '$ can be written as
for the coherent state with $\alpha _\mathrm {A}^2>1000$.3. Trusted detection noise-free model
In the prepare-and-measure (PM) scheme of the GMCS protocol based on homodyne detection, Alice prepares a coherent state $| {\frac {q_\mathrm {A}+\mathrm {i} p_\mathrm {A}}{2}} \rangle $ and transmits it to Bob through the quantum channel. The two independent and identically distributed (i.i.d.) random numbers $(q_\mathrm {A}, p_\mathrm {A})$ are drawn from a zero-mean bi-dimensional Gaussian distribution with a variance of $V_\mathrm {A}$. Bob performs practical homodyne detection to randomly measure either the quadrature $Q$ or quadrature $P$, and the measurement result is $y=q_{\mathrm {B}_2}$ or $y=p_{\mathrm {B}_2}$.
The entanglement-based (EB) scheme of GMCS protocol based on homodyne detection is shown in Fig. 2, which is equivalent to the PM scheme [37] . Alice prepares the two-mode squeezed vacuum (EPR) state $\rho _\mathrm {A'A}$. She keeps mode $\mathrm {A'}$ of each EPR state and sends mode $\mathrm {A}$ to Bob through the quantum channel, which is characterized by transmittance $T$, and total channel added noise $\chi =1/T-1+\xi$. Here, $\xi$ is the excess noise, and all noises are expressed in shot-noise units. The quantum state $\rho _\mathrm {A'A}$ becomes $\rho _\mathrm {A'B_1}$, which can be described by the covariance matrix (CM),
In actual homodyne detection, detection efficiency $\eta$ and electronic noise $V_\text {el}$ should be calibrated accurately. In the trusted detection noise model [37], as shown in Fig. 2, a beam splitter with transmittance $\eta$ is used to model the detector efficiency. An EPR state of variance $v=1+\left.v_\text {el}\right /(1-\eta )$ is used to model the electronic noise. When the one-time calibration method of shot noise and the rigorous calibration method of detection efficiency are used, the electronic noise is converted to the detection inefficiency rather than the channel loss in the Ref. [30], which is calibrated together with detection efficiency. In this way, a trusted detection noise-free model can be established, in which the detection efficiency is modeled by a beam splitter with transmittance $\eta '=\eta \eta _e$, as shown in Fig. 3.
We follow the derivation process in the Refs. [30,37] to obtain the asymptotic secret key rate of this model under collective attacks, which can be expressed as
where $\beta$ is the reconciliation efficiency, $I_\mathrm {AB}$ is the mutual information between Alice and Bob, where $\chi _t=\chi +\frac {1-\eta '}{T\eta '}=\frac {1}{T\eta '}-1+\xi$. The Holevo bound can be written asHere, $m_\mathrm {B_3}$ represents the measurement result of Bob, $p(m_\mathrm {B_3})$ is the probability density of the measurement result. The system $\mathrm {E}$ of Eve purifies $\mathrm {A'B_1}$, so that $S(\rho _\mathrm {E})=S(\rho _\mathrm {A'B_1})= g(\lambda _1)+ g(\lambda _2)$, where $g(\lambda )=\left (\frac {\lambda +1}{2}\right ) \log _2\left (\frac {\lambda +1}{2}\right )-\left (\frac {\lambda -1}{2}\right ) \log _2\left (\frac {\lambda -1}{2}\right )$, $\lambda _1$ and $\lambda _2$ are the symplectic eigenvalues of $\mathbf {V}_{\mathrm {A'B_1}}$, given by
Bob’s measurement purifies the system $\mathrm {A'EH}$, thus $S(\rho _\mathrm {E}^{m_\mathrm {B_3}})=S(\rho _\mathrm {A'H}^{m_\mathrm {B_3}})= g(\lambda _3)+ g(\lambda _4)$, where $\lambda _{3,4}$ are the symplectic eigenvalues of $\mathbf {V}_\mathrm {A'H|B_3}$. The CM $\mathbf {V}_\mathrm {A'H|B_3}$ is obtained by performing homodyne detection on mode $\mathrm {B_3}$ of $\mathbf {V}_\mathrm {A'HB_3}$, which can be expressed as
The symplectic eigenvalues $\lambda _{3,4}$ are given by
Compared with the trusted detection noise model, this model replaces $\eta$ with $\eta \eta _e$ and sets $v_\text {el}=0$. Although the final key rate of this model remains the same as that of the trusted detection noise model, the calibration procedure of shot noise is simplified.
4. Experimental demonstration
As shown in Fig. 4, we present the experimental setup to calibrate homodyne detection efficiency. A narrow-linewidth $ {1550}\,\textrm{nm }$ fiber laser is used to generate continuous-wave coherent light, which passes through a variable optical attenuator (VOA). Then, it is divided into signal light and LO light by a beam splitter (BS). The purpose of placing a VOA here is to adjust the LO light to a suitable intensity and prevent the detector from being saturated. Another VOA is used to adjust the intensity of the signal light to the required value, i.e., $ {-53.87}\,\textrm{dBm}$ after passing through a Sagnac loop (SL) and a phase modulator (PM). Before the SL, a circulator (CIR) blocks light from reflection. The SL converts the continuous wave into signal pulses with a pulse width of $w= {5}\,\textrm{ns }$ and a repetition rate of $ {20}\,\textrm{MHz }$. It can be achieved by loading a $ {10}\,\textrm{MHz }$ square wave signal on the PM. The optical fiber delay difference on both sides of the PM in the SL is $ {5}\,\textrm{ns }$. It should be noted that two adjacent signal pulses generated in this way will have an additional $\mathrm{\pi}$ phase difference. These signal pulses then are phase modulated by a PM, with the modulated phases being $0$, $0$, $0$, $\mathrm{\pi} /2$, $\mathrm{\pi} /2$, $\mathrm{\pi} /2$, $\mathrm{\pi} /2$, and $0$ in turn. Thus, the total phases of the signal pulses modulated by the SL and the PM are $0$, $\mathrm{\pi}$, $0$, $3\mathrm{\pi} /2$, $\mathrm{\pi} /2$, $3\mathrm{\pi} /2$, $\mathrm{\pi} /2$, and $\mathrm{\pi}$, respectively. In this way, a series of coherent states with four phases and an average photon number of 1600 are prepared.
In order to perform homodyne detection well, two VOAs and a variable optical delay line (VODL) are used to control the insertion loss and delay between the BS and the balanced detector (BD) with $ {200}\,\textrm{MHz }$ bandwidth. When signal light pulses enter the input port of BS, the polarization controller (PC) is adjusted to minimize the indication value of the power sensor (PS) so that the polarization of the signal light and the LO light are as consistent as possible. An isolator (ISO) is inserted here to block the LO light reflected from the detector. In the experiment, the balanced detector used is based on a transimpedance amplifier and the peak value of the electric pulse is taken as the measurement result.
The experimental results are given in Table 1. The detection efficiency $\hat {\eta }_R=0.263$ and $\hat {\eta }'_R=0.247$ are obtained through rigorous calibration. The reduced detection efficiency of $\hat {\eta }'_R$ compared to $\hat {\eta }_R$ corresponds to the $\eta _e$. By using the conventional calibration method, $\hat {\eta }_C \approx \eta _t \eta _d=0.557$ is also obtained. Clearly, $\hat {\eta }_C$ and $\hat {\eta }_R$ are quite different. It can be inferred that the prepared optical pulse is too wide to be completely integrated by the detector, resulting in a smaller measured quadrature than expected. This conclusion can be further verified by preparing the signal pulses with the same average photon number and wider pulse width. The wider the prepared optical pulse, the more incomplete the integration of the detector will be. When the pulse width increases from $ {5}\,\textrm{ns }$ to $ {10}\,\textrm{ns }$, the detection efficiency $\hat {\eta }_R$ is approximately reduced by half. As the pulse width increases, the detection efficiency $\hat {\eta }_R$ is further reduced. Indeed, the integration factor will affect the detection efficiency of this type of detector.
The detection efficiency will be overestimated if the integration factor is overlooked. Therefore, the rigorous calibration method should be adopted to prevent overestimating the detection efficiency. For the balanced detector based on a transimpedance amplifier, if ultrafast pulses cannot be prepared, taking the peak value as the measurement result decreases the burden of data processing at the price of reducing the detection efficiency. In order to pursue high detection efficiency, the balanced detector based on a charge amplifier is more suitable for homodyne detection of nanosecond optical pulses [38].
5. Practical security analysis
After $N$ rounds of quantum transmission, Bob announces which quadrature he measured for each received coherent state, and Alice reserves the corresponding $x=q_\mathrm {A}$ or $x=p_\mathrm {A}$. Alice and Bob obtain a set of correlated raw keys $(x_i,y_i)_{i=1 \ldots N}$. Then, they reveal a portion of raw keys to perform parameter estimation. If only the homodyne detection efficiency is overestimated, $\hat {\eta }>\eta$, and the modulation variance $V_\mathrm {A}$ is correctly obtained, the estimated values and the actual values of the channel parameters are linked through
In practice, however, it is convenient to use a calibrated homodyne detector to determine $V_\mathrm {A}$. In Ref. [28], $V_\mathrm {A}$ is monitored by the homodyne detector to prevent the reduced optical attenuation attack. In such a situation, Eq. (15) should be replaced by
6. Conclusion
In conclusion, we have proposed a rigorous method to calibrate the homodyne detection efficiency, preventing overestimating the detection efficiency due to overlooking some unknown factors that affect detection efficiency. We have established a trusted detection noise-free model by combining this method with the one-time calibration method of shot noise. While this model simplifies the calibration of shot noise, it still has the same performance as the trusted detection noise model. We have experimentally demonstrated this method and found that for the balanced detector based on a transimpedance amplifier, the influence of the integration factor on the detection efficiency should be considered. Otherwise, the detection efficiency will be overestimated. If the modulation variance is monitored by the homodyne detector, the overestimation of detection efficiency will leads to an underestimation of the modulation variance and excess noise, thus opening security loopholes of CV-QKD. Therefore, applying our calibration method to the practical CV-QKD implementation is necessary.
Funding
China State Railway Group Co., Ltd Scientific and Technological Research Project (K2019G062); National Natural Science Foundation of China (61875182); Anhui Initiative in Quantum Information Technologies and Fundamental Research Funds for the Central Universities (WK2340000083).
Acknowledgments
M. Z. thanks Hao Qin for fruitful discussion and Prof. Yongmin Li for construction advice.
Disclosures
The authors declare no conflicts of interest.
Data availability
Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.
References
1. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81(3), 1301–1350 (2009). [CrossRef]
2. B. Qi, W. Zhu, L. Qian, and H.-K. Lo, “Feasibility of quantum key distribution through a dense wavelength division multiplexing network,” New J. Phys. 12(10), 103042 (2010). [CrossRef]
3. R. Kumar, H. Qin, and R. Alléaume, “Coexistence of continuous variable qkd with intense dwdm classical channels,” New J. Phys. 17(4), 043027 (2015). [CrossRef]
4. F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88(5), 057902 (2002). [CrossRef]
5. F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003). [CrossRef]
6. R. García-Patrón and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97(19), 190503 (2006). [CrossRef]
7. M. Navascués, F. Grosshans, and A. Acín, “Optimality of gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97(19), 190502 (2006). [CrossRef]
8. A. Leverrier and P. Grangier, “Simple proof that gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a gaussian modulation,” Phys. Rev. A 81(6), 062314 (2010). [CrossRef]
9. A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett. 114(7), 070501 (2015). [CrossRef]
10. A. Leverrier, “Security of continuous-variable quantum key distribution via a gaussian de finetti reduction,” Phys. Rev. Lett. 118(20), 200501 (2017). [CrossRef]
11. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013). [CrossRef]
12. D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016). [CrossRef]
13. Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, and H. Guo, “Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,” Phys. Rev. Lett. 125(1), 010502 (2020). [CrossRef]
14. D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015). [CrossRef]
15. H. Wang, Y. Pi, W. Huang, Y. Li, Y. Shao, J. Yang, J. Liu, C. Zhang, Y. Zhang, and B. Xu, “High-speed gaussian-modulated continuous-variable quantum key distribution with a local local oscillator based on pilot-tone-assisted phase compensation,” Opt. Express 28(22), 32882–32893 (2020). [CrossRef]
16. S. Ren, S. Yang, A. Wonfor, I. White, and R. Penty, “Demonstration of high-speed and low-complexity continuous variable quantum key distribution system with local local oscillator,” Sci. Rep. 11(1), 9454 (2021). [CrossRef]
17. S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New J. Phys. 11(4), 045023 (2009). [CrossRef]
18. P. Jouguet, S. Kunz-Jacques, T. Debuisschert, S. Fossier, E. Diamanti, R. Alléaume, R. Tualle-Brouri, P. Grangier, A. Leverrier, P. Pache, and P. Painchault, “Field test of classical symmetric encryption with continuous variables quantum key distribution,” Opt. Express 20(13), 14030–14041 (2012). [CrossRef]
19. D. Huang, P. Huang, H. Li, T. Wang, Y. Zhou, and G. Zeng, “Field demonstration of a continuous-variable quantum key distribution network,” Opt. Lett. 41(15), 3511–3514 (2016). [CrossRef]
20. A. Aguado, V. Lopez, D. Lopez, M. Peev, A. Poppe, A. Pastor, J. Folgueira, and V. Martin, “The engineering of software-defined quantum key distribution networks,” IEEE Commun. Mag. 57(7), 20–26 (2019). [CrossRef]
21. Y. Zhang, Z. Li, Z. Chen, C. Weedbrook, Y. Zhao, X. Wang, Y. Huang, C. Xu, X. Zhang, Z. Wang, M. Li, X. Zhang, Z. Zheng, B. Chu, X. Gao, N. Meng, W. Cai, Z. Wang, G. Wang, S. Yu, and H. Guo, “Continuous-variable QKD over 50 km commercial fiber,” Quantum Sci. Technol. 4(3), 035006 (2019). [CrossRef]
22. J.-Z. Huang, C. Weedbrook, Z.-Q. Yin, S. Wang, H.-W. Li, W. Chen, G.-C. Guo, and Z.-F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013). [CrossRef]
23. X.-C. Ma, S.-H. Sun, M.-S. Jiang, and L.-M. Liang, “Local oscillator fluctuation opens a loophole for eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013). [CrossRef]
24. P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87(6), 062313 (2013). [CrossRef]
25. J.-Z. Huang, S. Kunz-Jacques, P. Jouguet, C. Weedbrook, Z.-Q. Yin, S. Wang, W. Chen, G.-C. Guo, and Z.-F. Han, “Quantum hacking on quantum key distribution using homodyne detection,” Phys. Rev. A 89(3), 032304 (2014). [CrossRef]
26. H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A 94(1), 012325 (2016). [CrossRef]
27. H. Qin, R. Kumar, V. Makarov, and R. Alléaume, “Homodyne-detector-blinding attack in continuous-variable quantum key distribution,” Phys. Rev. A 98(1), 012312 (2018). [CrossRef]
28. Y. Zheng, P. Huang, A. Huang, J. Peng, and G. Zeng, “Practical security of continuous-variable quantum key distribution with reduced optical attenuation,” Phys. Rev. A 100(1), 012313 (2019). [CrossRef]
29. P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfections in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012). [CrossRef]
30. Y. Zhang, Y. Huang, Z. Chen, Z. Li, S. Yu, and H. Guo, “One-time shot-noise unit calibration method for continuous-variable quantum key distribution,” Phys. Rev. Appl. 13(2), 024058 (2020). [CrossRef]
31. Y.-M. Chi, B. Qi, W. Zhu, L. Qian, H.-K. Lo, S.-H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011). [CrossRef]
32. H. Hansen, T. Aichele, C. Hettich, P. Lodahl, A. I. Lvovsky, J. Mlynek, and S. Schiller, “Ultrasensitive pulsed, balanced homodyne detector: application to time-domain quantum measurements,” Opt. Lett. 26(21), 1714–1716 (2001). [CrossRef]
33. C. Wang, P. Huang, D. Huang, D. Lin, and G. Zeng, “Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects,” Phys. Rev. A 93(2), 022315 (2016). [CrossRef]
34. H. Li, C. Wang, P. Huang, D. Huang, T. Wang, and G. Zeng, “Practical continuous-variable quantum key distribution without finite sampling bandwidth effects,” Opt. Express 24(18), 20481–20493 (2016). [CrossRef]
35. D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015). [CrossRef]
36. T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018). [CrossRef]
37. J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 202.81 km with an all-fiber continuous-variable system,” Phys. Rev. A 76(4), 042305 (2007). [CrossRef]
38. S. Du, Z. Li, W. Liu, X. Wang, and Y. Li, “High-speed time-domain balanced homodyne detector for nanosecond optical field applications,” J. Opt. Soc. Am. B 35(2), 481–486 (2018). [CrossRef]
39. A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010). [CrossRef]