Next Article in Journal
Fiducial Inference in Linear Mixed-Effects Models
Previous Article in Journal
Improved CNN Prediction Based Reversible Data Hiding for Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Improvement for Discretely Modulated Continuous-Variable Measurement-Device-Independent Quantum Key Distribution with Imbalanced Modulation

1
School of Semiconductor and Physics, North University of China, Taiyuan 030051, China
2
School of Information and Communication Engineering, North University of China, Taiyuan 030051, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(2), 160; https://doi.org/10.3390/e27020160
Submission received: 23 December 2024 / Revised: 30 January 2025 / Accepted: 30 January 2025 / Published: 3 February 2025
(This article belongs to the Section Quantum Information)

Abstract

:
The modulation mode at the transmitters plays a crucial role in the continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol. However, in practical applications, differences in the modulation schemes between two transmitters can inevitably impact protocol performance, particularly when using discrete modulation with four-state or eight-state formats. This work primarily investigates the effect of imbalanced modulation at the transmitters on the security of the CV-MDI-QKD protocol under both symmetric and asymmetric distance scenarios. By employing imbalanced discrete modulation maps and numerical convex optimization techniques, the proposed CV-MDI-QKD protocol achieves a notably higher secret key rate and outperforms existing protocols in terms of maximum transmission distance. Specifically, simulation results demonstrate that the secret key rate and maximum transmission distance are boosted by approximately 77.77% and 24.3%, respectively, compared to the original protocol. This novel and simplified modulation method can be seamlessly implemented in existing experimental setups without requiring equipment modifications. Furthermore, it provides a practical approach to enhancing protocol performance and enabling cost-effective applications in secure quantum communication networks under real-world environments.

1. Introduction

Quantum key distribution (QKD), with theoretical unconditional security guaranteed by the fundamental principles of quantum mechanics rather than the complexity of mathematical computations, enables two distant legitimate parties to share a secure key string over an insecure quantum channel [1,2,3,4,5,6]. Recently, with applications in quantum communication, computing, metrology, and fundamental testing, quantum networks have become crucial in quantum information science. While significant theoretical and experimental advancements have been made over the past two decades in developing entangled quantum nodes and global quantum networks, the integration of quantum technology with 6G networks holds the potential to revolutionize communication. The enhanced security, accelerated transmission speeds, and expanded network capacity of the quantum internet are expected to drive the development of a diverse range of innovative applications and services [7,8]. At the same time, the twin-field quantum key distribution (TF-QKD) protocol has also received widespread attention [9,10]. At present, QKD protocols are primarily categorized into discrete-variable quantum key distribution (DV-QKD) and continuous variable quantum key distribution (CV-QKD). In CV-QKD protocol, key information is encoded into a continuous-spectrum quantum observable, such as the amplitude or phase quadrature of the light field. The security of CV-QKD protocols has been theoretically demonstrated against coherent attacks under ideal assumptions and experimentally implemented through the procedure of parameter estimation, data reconciliation, and privacy amplification. Due to its high compatibility with existing classical telecommunication systems, relatively simpler and low-cost practical implementations, and the ability to achieve a high secure key rate over metropolitan distances, CV-QKD has garnered extensive attention. Over the past two decades, significant theoretical and experimental advancements have been made in this field. Furthermore, discrete modulation schemes have been shown to achieve a relatively higher secret key rate compared to the traditional Gaussian modulation in CV-QKD, owing to improved reconciliation efficiency, particularly in long-distance transmission scenarios [11,12,13,14,15,16,17,18,19,20,21,22,23].
The CV-QKD protocol, employing either Gaussian modulation or discrete modulation, has been proven to be unconditionally secure against possible attacks under certain ideal assumptions [24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42]. However, in practical implementations, discrepancies between the theoretical ideal model and real-world devices introduce non-negligible gaps, potentially leading to security vulnerabilities. These loopholes can be exploited by an eavesdropper to launch unpredictable attacks, stealing information without detection. To address these vulnerabilities, the measurement-device-independent (MDI) QKD protocol was proposed [43,44,45,46,47]. In MDI-QKD, both transmitting terminals, Alice and Bob, send modulated quantum states to an untrusted third party, Charlie. Charlie performs a continuous-variable (CV) Bell-state measurement (BSM) and publicly announces the measurement results to the legitimate parties [48]. After a series of information-processing steps, a secure key is established between Alice and Bob. The MDI-QKD protocol inherently eliminates all known and unknown side-channel attacks on detectors, regardless of their nature. By leveraging this advantage, the MDI-QKD protocol facilitates the scalable deployment of CV-QKD in practical quantum communication networks.
According to previous work, all the protocols mentioned use traditional modulation methods, meaning they are based on balanced modulation techniques [49,50,51,52,53]. Symmetric Gaussian-modulated coherent states are generally used in both the theoretical analysis and experimental implementation of the CV-MDI-QKD protocol [49,54,55,56,57]. In this setup, Alice and Bob displace the quadratures of the transmitted states according to a Gaussian distribution. However, achieving perfect symmetric modulation is not feasible in realistic communication environments due to the finite range and precision of practical devices. Furthermore, imperfections in both the source and detection have been extensively studied, both theoretically and experimentally. To facilitate high-rate and low-cost applications in secure quantum communication networks, researchers have proposed discrete-modulation schemes for the CV-MDI-QKD protocol, avoiding the experimental complexity associated with Gaussian modulation. In this approach, Alice and Bob prepare M-symbol coherent states that are modulated to be equidistantly distributed in the phase space. The theoretical security of the discrete-modulation protocol has been demonstrated using convex optimization techniques, and several recent experiments have successfully implemented discrete modulation [58,59,60].
Motivated by prior work [61], we mainly extend the advantages of the discrete-modulation CV-MDI-QKD and explore the impact of imbalanced modulation on transmitters Alice and Bob in this paper. Specifically, we explore the effects of 4-phase-shift-keying(PSK) and 8-PSK on the security of CV-MDI-QKD schemes [22,23,49]. Theoretical models of the imbalanced modulation method are demonstrated under the condition of arbitrary two-mode Gaussian attacks, considering both asymmetric and symmetric distances. Based on these models, we also compare the difference of the secure key rate and secure transmission distances between imbalanced and balanced modulation. To clarify these differences, we mainly focus on the impact of specific parameters, including Shannon’s mutual information and Holevo Bound on the performance of the protocol by numerical methods considering the source and detection noise in detail. The results demonstrate that the imbalanced modulation using 4-PSK and 8-PSK increases the key rate by approximately 68.04% and 77.77%, respectively, compared to the original balanced modulation. This method of imbalanced modulation paves the way for simplifying the experimental scheme as well as significantly improving the performance of the protocol, making the protocol highly attractive for practical application. Imbalanced modulation mode also transcends the traditional discrete modulation CV-MDI-QKQ under the case of extreme asymmetric distance [55,62,63,64,65,66].
The rest of this paper is organized as follows. In Section 2, we provide a theoretical description of the CV-MDI-QKD protocol with imbalanced modulation, specifically focusing on four-state and eight-state modulations under the case of symmetric and asymmetric transmitted distances. In Section 3, we demonstrate the numeric results, including the secret key rate and maximum transmission distance for the proposed scheme. In Section 4, we summarize our results and give a discussion.

2. Discrete-State CV-QKD with Imbalanced Modulation

In this section, we first provide a detailed review of the CV-MDI-QKD protocol based on discrete modulation. We then examine the influence of imbalanced modulation on key parameters against a two-mode Gaussian attack in the protocol under both symmetric and asymmetric distance conditions. Furthermore, the reason for the significant improvement observed with this modulation system has also been analyzed. In general, the entanglement-based (EB) model of the CV-MDI-QKD protocol is equivalent to the standard model of prepare and measure (PM) [16,65,66]. To illustrate both models, Figure 1 and Figure 2 show the structure of the PM scheme and EB scheme based on the CV-MDI-QKD protocol, respectively. In the PM model, both Alice’s side and Bob’s side prepare the coherent state of form α k = α e i k 2 π M for some α > 0 , and these modulated states are transmitted to an unauthenticated third party (Charlie) through two different separated unsecured quantum channels, respectively. Charlie performs the homodyne or heterodyne detection on the incidence quantum state and announces the detection results to the Alice and Bob side simultaneously. Finally, Alice and Bob can share a common secret key over a quantum channel through a series of procedures, including parameter estimation, information reconciliation, and privacy amplification procedures. For convenience, the EB scheme is introduced to provide comprehensive proof for security analysis.
As illustrated in Figure 2, both Alice and Bob independently prepare a two-mode squeezed state with same variance (in this paper, we primarily focus on the case of different variance) and keep one of the modes on each side; the other mode is transmitted to a third party, Charlie, through the unsecured quantum channel in the EB model. Different detection methods are adopted to mode A and B, while the modes A 1 and B 1 are projected into the coherent state or squeezed state. In addition, the Einstein–Podolsky–Rosen (EPR) mode can be employed to simulate source noise and detection noise. The third relay party, Charlie, conducts continuous-variable (CV) Bell detection on the incoming modes by blending them in a balanced beam-splitter (BS) whose output ports are conjugately homodyned and the resulting outcomes are broadcast to Alice and Bob.
We begin by providing a detailed description of the prepare and measure (PM) scheme for the discrete-modulation CV-MDI-QKD protocol. The specific process is outlined as follows:
(1) Alice’s side prepares and randomly selects one of coherent states ρ = q ^ A + i p A , where · is symbolically represented as follows:
{ α k = α e i k π 4 k = 0 , 1 , 2 , 3 o r k = 0 , 1 , 7 } ,
with the modulation variance of V M = 2 α 2 . Then, Alice sends these coherent states to the third party Charlie through the unsecured and lossy standard quantum channel that can be controlled by the eavesdropper (Eve). At the same time, Bob performs the same operation. The third party Charlie receives two independent quantum signals and performs the measurement for the quadrature operation q ^ = ( q ^ A i p B ) / 2 and q ^ + = ( q ^ A + i p B ) / 2 ;
(2) The third party Charlie announces the results of χ , which is a complex variable consisting of q ^ and q ^ + , and χ is denoted as χ = ( q ^ + i p ^ + ) / 2 . Based on the knowledge derived from the third party, Alice and Bob can share a group of common secret keys by the process of parameter estimation, information reconciliation, and privacy amplification with the aid of an authenticated classical channel.
For the convenience of calculating the secret key rate, the equivalent entanglement-based (EB) scheme is introduced for the security analysis. Alice and Bob prepare the two-mode squeezed state Ψ m A A 1 and Ψ m B 1 B 3 , where m = 4 or m = 8 for the four-state and eight-state protocol, respectively. At the same time, the variances of the two-mode squeezed state of Alice and Bob are denoted as V A = V M A + 1 and V B = V M B + 1 , respectively. The expression form of | Ψ m is expressed as follows:
Ψ m = k = 0 m λ k ϕ k ϕ k ,
where
ϕ k = e α 2 / 2 λ k n = 0 α n m + k n m + k ! n m + k .
After deducing and integrating Equations (1)–(3), we can obtain the key parameters λ k for the four-state and eight-state modulations. For the four-state modulation [21,22], the key parameter λ k can be denoted as follows:
λ 0 , 2 = 1 2 e α 2 cosh ( α 2 ) ± cos ( α 2 ) λ 1 , 3 = 1 2 e α 2 sinh ( α 2 ) ± sin ( α 2 ) .
For the eight-state modulation [23], the key parameter λ k can be expressed as follows:
λ 0 , 4 = 1 4 e α 2 cosh ( α 2 ) + cos ( α 2 ) ± 2 cos ( α 2 2 ) cosh ( α 2 2 ) λ 1 , 5 = 1 4 e α 2 sinh ( α 2 ) + sin ( α 2 ) ± 2 cos ( α 2 2 ) sinh ( α 2 2 ) ± 2 sin ( α 2 2 ) cosh ( α 2 2 ) λ 2 , 6 = 1 4 e α 2 cosh ( α 2 ) cos ( α 2 ) ± 2 sin ( α 2 2 ) sinh ( α 2 2 ) λ 3 , 7 = 1 4 e α 2 sinh ( α 2 ) sin ( α 2 ) 2 cos ( α 2 2 ) sinh ( α 2 2 ) ± 2 sin ( α 2 2 ) cosh ( α 2 2 )
The covariance matrix γ A B between Alice and Bob can be described as follows:
γ A B = a I 2 c σ z c σ z b I 2 = ( V M A + 1 ) I 2 T Z m σ z T Z m σ z [ T ( V M A + 1 + χ ) ] I 2
where I 2 is a 2 × 2 identity matrix, σ z = d i a g ( 1 , 1 ) . The transmission distances from Alice (Bob) to Charlie L A C and L B C are T A = 10 α L A C 10 and T B = 10 α L B C 10 , where T B represents the optical fiber loss during transmission, respectively, with the parameter α = 0.2 dB/km denoting the loss of optical fiber. Then, the equivalent transmission distance to a one-way protocol is T = T A g 2 2 . Here, we choose the gain of displacement g = 2 V B 1 T B V B + 1 to minimize the equivalent excess noise; thus, we have
ε = ε A + 1 T A T B ( ε B 2 ) + 2 ,
and the total channel-added noise expressed in shot-noise units is χ = 1 T T + ε .
The secret key rate of the CV-MDI-QKD protocol with discrete modulation can be calculated as follows [44]:
K = β I A B χ B E ,
where β is the reconciliation efficiency. I A B is the Shannon mutual information between Alice and Bob. Furthermore, it can be calculated as follows:
I A B = 2 × 1 2 log 2 V A M V A M | B M = log 2 a + 1 a + 1 c 2 / ( b + 1 )
and χ B E denotes the Holevo bound between Bob and Eve. It defines the maximum information that Eve can obtain from Bob, so it is expressed as follows:
χ B E = S ρ A B S ρ A m B = i = 1 2 G ν i 1 2 G ν 3 1 2
where the von Neumann entropy G x = x + 1 log 2 x + 1 x log 2 x , and S ρ A B is a function of the symplectic eigenvalues ν 1 , 2 of the covariance matrix γ A B , given by the following:
ν 1 , 2 2 = 1 2 [ Δ ± Δ 2 4 D 2 ]
with Δ = a 2 + b 2 2 c 2 and D = a b c 2 , and with Eve’s condition entropy S ρ A m B based on Bob’s measurement result m B being a function of the symplectic eigenvalue ν 3 of the covariance matrix γ A m B = a I 2 c σ 2 ( b I 2 + I 2 ) 1 c T σ 2 , which is given by the following:
ν 3 = a ( b + 1 ) c 2 b + 1

3. CV-MDI-QKD Protocol for Four-State and Eight-State Imbalanced Modulations Under Symmetric Distances

In this section, the performance of the protocol using imbalanced modulation variance with four-state and eight-state configurations is analyzed under symmetric distances L A C = L B C , where the total transmission distance, L = L A C + L B C . For the purpose of figuring out the relationship between modulation variance and the maximum secret key rate, we first investigate the dependence of the secret key rate on the modulation variance. As depicted in Figure 3a, we plot the curve about the key rate versus the modes of imbalanced and balanced modulations. The dashed lines represent the results of imbalanced modulation between Alice and Bob, which gives a higher key rate comparing the solid lines which represent the results of balanced modulation. More specifically, the optimum key rate can be obtained by performing a fine-grained search for the modulation variance V M A in the interval [0.1, 2] across different transmission distances. The fine-grained process is to determine the modulation variance V M A , and then scan for the modulation variance V M B in the range [0.1, 2] with a step size of 0.0001 to find the maximum value. Whenever the modulation variance V M A changes by a step size of 0.0001, the modulation variance V M B repeats the above process once. Although the fine-grained search method increases the computational complexity, it can effectively improve the searching precision through advanced optimization algorithms and parallel computing technology. In terms of experimental verification, we demonstrate the performance of the fine-grained search method under different conditions, especially, with regard to its robustness in the face of noise and hardware imperfections. These results indicate that fine-grained search methods have important application value in practical quantum key distribution systems and can significantly improve the performance and robustness of the system.
Clearly, there is an optimal value of modulation variance, denoted by the star symbols, for maximizing the key rate of either balanced or imbalanced modulations. Additionally, we can see that the imbalanced modulation mode improves the key rate over the balanced modulation mode under the symmetric distances; where the total distance was set to 0.1 km, 0.2 km, and 0.3 km for comparison, the key rates are increased by 95.53 % , 120.37 % , and 194.09 % , respectively. Based on the advantages of imbalanced modulation, we present the achievable key rates at different transmission distances for different excess noise in Figure 3b. The upper solid line is the Pirandola–Laurenza–Ottaviani–Banchi bound, which denotes the maximum secret key rate achievable in a repeater-less and lossy channel system. The key rate has been taken as the optimum value by adopting the optimal modulation variance. Under an excess noise setting of 0.002, the maximum transmission distances can be further improved by 20.27% if the imbalanced modulation is adopted to the scheme of the protocol for the four-state configuration. At the same transmission distance, the dashed-line representing the imbalanced modulation is always higher than the solid line representing the balanced modulation. In addition, the balanced modulation mode is a sub-aggregate of the imbalanced modulation mode with respect to the searching method.
In order to further investigate the efficiency of the imbalanced modulation mode, the performance of the CV-MDI-QKD protocol with an eight-state configuration is demonstrated in Figure 4a,b. To maximize the key rate of the protocol, we perform fine-grained global optimization for the modulation variance, which can result in the optimal key rate. For the total transmission distance of 0.3 km, we achieve a key rate of 0.0401 bits/pulse, which is 223.19% higher than the balanced modulation mode and 253.97% higher than the protocol with a four-state configuration. With the increase in the total distance, the key rate decrease correspondingly. We observe that the key rate and total distance under the case of imbalanced modulation is significantly higher than that of the balanced modulation. Based on Figure 3 and Figure 4, the result proves that adopting the imbalanced modulation can exhibit superior performance, exceeding the traditional method of modulation.
For the sake of clarifying the reasons for the advantages of imbalanced modulation, we give the simulation results for the Shannon mutual information ( I A B ) and Holevo bound ( χ B E ) with the protocol for the four-state modulation. As shown in Figure 5a, by varying the modulation, the simulation results indicate that both I A B and χ B E are correspondingly increasing under the same key parameters, including excess noise and imperfect detection efficiency. The gap denoting the key rate between I A B and χ B E decreases gradually with the increase in the transmission distance. Notice that the difference between I A B and χ B E under the imbalanced modulation is higher than the balanced modulation in spite the fact that both I A B and χ B E are increasing in comparison with the balanced modulation mode. Following a similar procedure, we can also obtain the same results in the protocol with an eight-state configuration, as shown in Figure 5b. The advantage of the imbalanced modulation mode may pave the way for improving the performance of the protocol without adding extra modulation equipment. The finite size effect and composedly secure analysis can be calculated by adopting the same modulation method in future works.

4. CV-MDI-QKD Protocol for Four-State and Eight-State Imbalanced Modulations Under Asymmetric Distances

After introducing the simulation model results under the case of symmetric distance, the secret key rate and transmission distance are analyzed with four-state and eight-state modulations in the extreme asymmetric case in this section. Figure 6 reveals the secret key rate of the system as a function of modulation variance and transmission distance when the channel transmittance obeys the extreme asymmetric distances. The fixed key parameters for the numeric simulation are the same as the symmetric distance.
Figure 6 depicts the secret key rate of the protocol as a function of the modulation variance in the extreme asymmetric case when the Alice and Bob utilize the balanced and imbalanced modulation mode. It is clear that there is an optimal key rate versus modulation variance regardless of imbalanced or balanced modulation, with the same results shown in Figure 3 and Figure 4. Here, the fixed key parameters for the numeric simulation results remain unchanged. For the transmission distance of 35 km, the optimal key rate of the key parameter V M A and V M B are 0.3606 and 0.3422, which result in a key rate that is 217.45% higher than that of the balanced modulation. It is obvious that the performance of the protocol with imbalanced modulation is improved compared with the balanced modulation mode. It is clear that the optimal imbalanced modulation variance is always larger than the optimal balanced modulation variance for the secret key rate. Explicitly, the total maximal transmission distances of the imbalanced modulation increase by approximately 2.91 km compared with the balanced modulation mode under certain system parameters, that is, ϵ A = ϵ B = 0.003 . The impact of the imperfections of the detectors on the performance of the protocol is also investigated in Figure 6b. To further validate the robustness and general applicability of the imbalanced modulation method, we extended the same analysis to the CV-MDI-QKD protocol with an eight-state modulation, shown in Figure 7 and Figure 8.
As mentioned above, we also analyze the reason why imbalanced modulation improves the key rate and maximum transmission distances for the extreme asymmetric distance conditions. As observed in Figure 8, with an increase in the modulation variance for both modulation modes, the difference between I A B and χ B E grows more rapidly in the imbalanced modulation mode compared to the balanced modulation mode under extreme asymmetric distances. The details ensure the more reliable validation of the advantageous effect; the same modulation approach is implemented on the protocol with an eight-state configuration and the simulation results reveal that the imbalanced modulation mode enhances the protocol’s overall performance, including the secret key rate and transmission distances.

5. Discussion

As mentioned in the theoretical analysis above, the results obtained from applying the imbalanced modulation demonstrate a significant improvement in the key rate and transmission distances, with protocol performance surpassing traditional modulation techniques in both symmetric and asymmetric distance scenarios. This improvement can be attributed to the CV-MDI-QKD protocol with discrete modulation. The comparisons indicate that our approach provides a viable alternative in contexts where reliability and feasibility are critical. Despite the positive results, there are limitations to the modulation method, particularly when considering source noise and detection noise, which can be reformulated into quantum efficiency and vacuum electronic noise. Future work could address these challenges by incorporating optical phase-sensitive amplifiers (PSA) while simultaneously accounting for the finite-size effect and composable security analysis.

6. Conclusions

In this paper, we have theoretically investigated and analyzed the performance of the protocol with four-state and eight-state modulations, comparing imbalanced and balanced modulation methods. The security analysis demonstrates that imbalanced modulation outperforms balanced modulation under both symmetric and extreme asymmetric distance conditions. Furthermore, these simulation results provide valuable guidance for designing experimental schemes aimed at reducing cost and complexity. According to the use of the proposed advantageous modulation method, the key rate is found to be 60–70% higher than that of the previous protocol and achieves an additional transmission distance over 2.91 km compared to the traditional balanced modulation mode. The CV-MDI-QKD protocol implements a multi-party information transmission mechanism by allowing multiple transmitting ends to exchange information with the relay node (Charlie). The protocol supports the expansion of the number of transmitting terminals and converges all information to the communication center, thereby building a quantum network communication architecture. Under this framework, studying the differences in modulation variances of individual senders will help us to deeply analyze the impact of modulation imbalance on key performance indicators such as the key rate. According to the channel conditions and detector performance, the modulation variance can be dynamically adjusted to optimize the balance between the signal-to-noise ratio and the key rate. However, in practice, factors such as imperfect detection efficiency and source noise can influence the performance of the protocol. To mitigate these issues, phase-sensitive amplifiers (PSA) can be incorporated into the experimental implementation of the CV-MDI-QKD protocol.

Author Contributions

Conceptualization, Z.L.; methodology and investigation, Z.L. and W.L.; software, Z.L. and W.L.; validation, W.L. and F.L.; writing—original draft preparation, Z.L.; writing—review and editing, W.L. and Z.L.; visualization and supervision, W.L. and J.B.; project administration, W.L. and Y.L.; funding acquisition, W.L., Y.T. and F.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (NSFC) (Grant No. 12104419, No. 12104417, and No. 62304209); the Fundamental Research Program of Shanxi Province (Grant No. 20210302124689, No. 20210302124161, and No. 20210302123203, and No. 202403021212343).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of the study are available from the first author and the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef]
  2. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef]
  3. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  4. Lo, H.K.; Curty, M.; Tamaki, K. Secure quantum key distribution. Nat. Photon. 2014, 8, 595–604. [Google Scholar] [CrossRef]
  5. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photon. 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  6. Xu, F.H.; Ma, X.F.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  7. Rozenman, G.G.; Kundu, N.K.; Liu, R.Q.; Zhang, L.Y.; Maslennikov, A.; Reches, Y.; Youm, H.Y. The quantum internet: A synergy of quantum information technologies and 6G networks. IET Quan. Commun. 2023, 4, 147–166. [Google Scholar] [CrossRef]
  8. Wei, S.H.; Jing, B.; Zhang, X.Y.; Liao, J.Y.; Yuan, C.Z.; Fan, B.Y.; Lyu, C.; Zhou, D.L.; Wang, Y.; Deng, G.W.; et al. Towards Real-World Quantum Networks: A Review. Laser Photonics Rev. 2022, 3, 2100219. [Google Scholar] [CrossRef]
  9. Zhang, C.M.; Wang, Z.; Wu, Y.D.; Zhu, J.R.; Wang, R.; Li, H.W. Discrete-phase-randomized twin-field quantum key distribution with advantage distillation. Phys. Rev. A 2024, 109, 052432. [Google Scholar] [CrossRef]
  10. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.J.; Hu, X.L.; Guan, J.Y.; Yu, Z.W.; Xu, H.; Lin, J.; et al. Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef]
  11. Leverrier, A.; Grangier, P. Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation. Phys. Rev. Lett. 2012, 102, 14030–14041. [Google Scholar] [CrossRef] [PubMed]
  12. Li, Y.Y.; Wang, T.Y. Security Analysis of Unidimensional Continuous-variable Quantum Key Distribution with Discretized Amplitude Modulation. J. Phys. B At. Mol. Opt. Phys. 2024, 57, 145502. [Google Scholar] [CrossRef]
  13. Ding, J.Z.; Li, Y.; Mao, Y.; Guo, Y. Discrete modulation continuous variable quantum secret sharing. Int. J. Theor. Phys. 2022, 61, 108. [Google Scholar] [CrossRef]
  14. Wu, L.X.; Feng, Y.Y.; Zhou, J.; Shi, R.H.; Shi, J.J. The effect of acceleration on continuous-variable quantum key distribution with discrete modulation. Eur. Phys. J. Plus 2023, 138, 963. [Google Scholar] [CrossRef]
  15. Li, M.; Cvijetic, M. Continuous-Variable Quantum Key Distribution With Self-Reference Detection and Discrete Modulation. IEEE J. Quantum Electron. 2018, 54, 8000408. [Google Scholar] [CrossRef]
  16. Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptology 1992, 5, 3–28. [Google Scholar] [CrossRef]
  17. Lo, H.K.; Chau, H.F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 1999, 283, 2050–2056. [Google Scholar] [CrossRef]
  18. Deutsch, D.; Ekert, A.; Jozsa, R.; Macchiavello, C.; Popescu, S.; Sanpera, A. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 1996, 77, 2818. [Google Scholar] [CrossRef]
  19. Renner, R. Security of quantum key distribution. Int. J. Quantum Inf. 2008, 6, 1–127. [Google Scholar] [CrossRef]
  20. Scarani, V.; Renner, R. Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 2008, 100, 200501. [Google Scholar] [CrossRef]
  21. Liao, Q.; Xiao, G.; Xu, C.G.; Xu, Y.; Guo, Y. Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source. Phys. Rev. A 2020, 102, 032604. [Google Scholar] [CrossRef]
  22. Yang, J.; Xu, B.J.; Peng, X.; Guo, H. Four-state continuous-variable quantum key distribution with long secure distance. Phys. Rev. A 2012, 85, 052302. [Google Scholar] [CrossRef]
  23. Becir, A.; El-Orany, F.; Wahiddin, M. Continuous-variable quantum key distribution protocols with eight-state discrete modulation. Int. J. Quantum Inf. 2012, 10, 1250004. [Google Scholar] [CrossRef]
  24. Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef]
  25. Lance, A.M.; Symul, T.; Sharma, V.; Weedbrook, C.; Ralph, T.C.; Lam, P.K. No-switching quantum key distribution using broadband modulated coherent light. Phys. Rev. Lett. 2005, 95, 180503. [Google Scholar] [CrossRef]
  26. Qi, B.; Huang, L.L.; Qian, L.; Lo, H.K. Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers. Phys. Rev. A 2007, 76, 052323. [Google Scholar] [CrossRef]
  27. Lodewyck, J.; Bloch, M.; García-Patrón, R.; Fossier, S.; Karpov, E.; Diamanti, E.; Debuisschert, T.; Cerf, N.J.; McLaughlin, S.W.; Grangier, P.; et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 2007, 76, 042305. [Google Scholar] [CrossRef]
  28. Qi, B.; Zhu, W.; Qian, L.; Lo, H.K. Feasibility of quantum key distribution through a dense wavelength division multiplexing network. New J. Phys. 2010, 12, 103024. [Google Scholar] [CrossRef]
  29. Madsen, L.S.; Usenko, V.C.; Lassen, M.; Filip, R.; Andersen, U.L. Continuous variable quantum key distribution with modulated entangled states. Nat. Commun. 2012, 3, 1083. [Google Scholar] [CrossRef]
  30. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photon. 2013, 7, 378–381. [Google Scholar] [CrossRef]
  31. Kumar, R.; Hao, Q.; Alléaume, R. Coexistence of continuous variable QKD with intense DWDM classical channels. New J. Phys. 2015, 17, 043027. [Google Scholar] [CrossRef]
  32. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photon. 2015, 9, 397–403. [Google Scholar] [CrossRef]
  33. Walk, N.; Hosseini, S.; Geng, J.; Thearle, O.; Haw, J.Y.; Armstrong, S.J.; Assad, S.M.; Janousek, J.; Ralph, T.C.; Symul, T.; et al. Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution. Optica 2016, 3, 634–642. [Google Scholar] [CrossRef]
  34. Li, Y.M.; Wang, X.Y.; Bai, Z.L.; Liu, W.Y.; Yang, S.S.; Peng, K.C. Continuous variable quantum key distribution. Chin. Phys. B 2017, 26, 040303. [Google Scholar] [CrossRef]
  35. Liu, W.Y.; Wang, X.Y.; Wang, N.; Du, S.N.; Li, Y.M. Imperfect state preparation in continuous-variable quantum key distribution. Phys. Rev. A 2017, 96, 042312. [Google Scholar] [CrossRef]
  36. Liu, W.Y.; Cao, Y.X.; Wang, X.Y.; Li, Y.M. Continuous-variable quantum key distribution under strong channel polarization disturbance. Phys. Rev. A 2020, 102, 032625. [Google Scholar] [CrossRef]
  37. Tian, Y.; Wang, P.; Liu, J.Q.; Du, S.; Liu, W.Y.; Lu, Z.G.; Wang, X.Y.; Li, Y.M. Experimental demonstration of continuous-variable measurement-device-independent quantum key distribution over optical fiber. Optica 2022, 9, 492–500. [Google Scholar] [CrossRef]
  38. Karinou, F.; Brunner, H.H.; Fung, C.H.F.; Comandar, L.C.; Bettelli, S.; Hillerkuss, D.; Kuschnerov, M.; Mikroulis, S.; Wang, D.; Xie, C.S.; et al. Toward the Integration of CV Quantum Key Distribution in Deployed Optical Networks. IEEE Photon. Technol. Lett. 2018, 30, 650–653. [Google Scholar] [CrossRef]
  39. Huang, D.; Lin, D.K.; Wang, C.; Liu, W.Q.; Fang, S.H.; Peng, J.Y.; Huang, P.; Zeng, G.H. Continuous-variable quantum key distribution with 1 Mbps secure key rate. Opt. Express 2015, 23, 17511–17519. [Google Scholar] [CrossRef]
  40. Kleis, S.; Steinmayer, J.; Derksen, R.H.; Schaeffer, C.G. Experimental investigation of heterodyne quantum key distribution in the S-band or L-band embedded in a commercial C-band DWDM system. Opt. Express 2019, 27, 16540–16549. [Google Scholar] [CrossRef]
  41. Eriksson, T.A.; Hirano, T.; Puttnam, B.J.; Rademacher, G.; Luis, R.S.; Fujiwara, M.; Namiki, R.; Awaji, Y.; Takeoka, M.; Wada, N.; et al. Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels. Commun. Phys. 2019, 2, 9. [Google Scholar] [CrossRef]
  42. Braunstein, S.L.; Pirandola, S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 2012, 108, 130502. [Google Scholar] [CrossRef] [PubMed]
  43. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed]
  44. Wang, Q.; Wang, X.B. Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A 2013, 88, 052332. [Google Scholar] [CrossRef]
  45. Liu, Y.; Chen, T.Y.; Wang, L.J.; Liang, H.; Shentu, G.L.; Wang, J.; Cui, K.; Yin, H.L.; Liu, N.L.; Li, L.; et al. Experimental Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2013, 111, 130502. [Google Scholar] [CrossRef]
  46. Hu, X.L.; Cao, Y.; Yu, Z.W.; Wang, X.B. Measurement-device-independent quantum key distribution over asymmetric channel and unstable channel. Sci. Rep. 2018, 8, 17634. [Google Scholar] [CrossRef]
  47. Liu, H.; Wang, W.Y.; Wei, K.J.; Fang, X.T.; Li, L.; Liu, N.L.; Liang, H.; Zhang, S.J.; Zhang, W.J.; Li, H.; et al. Experimental demonstration of high-rate measurement-device-independent quantum key distribution over asymmetric channels. Phys. Rev. Lett. 2019, 122, 160501. [Google Scholar] [CrossRef]
  48. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef]
  49. Ma, H.X.; Huang, P.; Bai, D.Y.; Wang, T.; Wang, S.Y.; Bao, W.S.; Zeng, G.H.Z. Long-distance continuous-variable measurement-device-independent quantum key distribution with discrete modulation. Phys. Rev. A 2019, 99, 022322. [Google Scholar] [CrossRef]
  50. Wei, Y.; Guo, Y.; Zhang, H.; Zhong, H.; Mao, Y.; Hu, L.Y. Enhancing discrete-modulated continuous-variable measurement-device-independent quantum key distribution via quantum catalysis. J. Phys. B Mol. Opt. 2021, 54, 045501. [Google Scholar]
  51. Zhao, W.; Shi, R.H.; Shi, J.J.; Ruan, X.C.; Guo, Y.; Huang, D. Phase-noise estimation using Bayesian inference for discretely modulated measurement-device-independent continuous-variable quantum key distribution. Phys. Rev. A 2020, 102, 022621. [Google Scholar] [CrossRef]
  52. Khan, M.B.; Waseem, M.; Irfan, M.; Mehmood, A.; Qamar, S. Zero-photon catalysis based eight-state discrete modulated measurement-device-independent continuous-variable quantum key distribution. J. Opt. Soc. Am. B 2023, 40, 763–772. [Google Scholar] [CrossRef]
  53. Wu, X.D.; Huang, D.; Huang, P.; Guo, Y. Discrete modulation continuous-variable measurement-device-independent quantum key distribution scheme based on realistic detector compensation. Acta Phys. Sin. 2022, 71, 240304. [Google Scholar] [CrossRef]
  54. Li, Z.Y.; Zhang, Y.C.; Xu, F.H.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef]
  55. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Gui, M.; Liang, L.M. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 042335. [Google Scholar] [CrossRef]
  56. Wang, P.; Wang, X.Y.; Li, Y.M. Continuous-variable measurement-device-independent quantum key distribution using modulated squeezed states and optical amplifiers. Phys. Rev. A 2019, 99, 042309. [Google Scholar] [CrossRef]
  57. Zheng, Y.; Shi, H.B.; Pan, W.; Wang, Q.T.; Mao, J.H. Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments. Entropy 2022, 24, 127. [Google Scholar] [CrossRef]
  58. Song, T.T.; Wen, Q.Y.; Guo, F.Z.; Tan, X.Q. Finite-key analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 2012, 86, 022332. [Google Scholar] [CrossRef]
  59. Curty, M.; Xu, F.H.; Gui, W.; Lim, C.C.W.; Tamaki, K.; Lo, H.K. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 2014, 5, 3732. [Google Scholar] [CrossRef]
  60. Papanastasiou, P.; Ottaviani, C.; Pirandola, S. Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables. Phys. Rev. A 2017, 96, 042332. [Google Scholar] [CrossRef]
  61. Liu, W.Y.; Liu, Z.H.; Bai, J.D.; Jie, Q.; Zhang, G.W.; Tian, Y.; Jing, J.J. Impact of Imbalanced Modulation on Security of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution. Photonics 2024, 11, 649. [Google Scholar] [CrossRef]
  62. Ma, X.F.; Fung, C.H.F.; Razavi, M. Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 2012, 86, 052305. [Google Scholar] [CrossRef]
  63. Yu, Z.W.; Zhou, Y.H.; Wang, X.B. Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Phys. Rev. A 2015, 91, 032318. [Google Scholar] [CrossRef]
  64. Wang, C.; Yin, Z.Q.; Wang, S.; Chen, W.; Guo, G.C.; Han, Z.F. Measurement-device-independent quantum key distribution robust against environmental disturbances. Optica 2017, 4, 1016–1023. [Google Scholar] [CrossRef]
  65. Zang, Y.C.; Li, Z.Y.; Yu, S.; Gu, W.Y.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution using squeezed states. Phys. Rev. A 2014, 90, 052325. [Google Scholar] [CrossRef]
  66. Fossier, S.; Diamanti, E.; Debuisschert, T. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B-AT. Mol. Opt. 2009, 42, 114014. [Google Scholar] [CrossRef]
Figure 1. Prepare-and-measure scheme of the CV-MDI-QKD protocol. Ψ m A A 1 and Ψ m B 1 B 3 are discrete modulated states prepared by Alice and Bob. Here, m = 4 and m = 8 are four-state and eight-state modulations. x—measurement results of homodyne detection for x-quadrature for incoming mode B 2 . p—measurement results of homodyne detection for p-quadrature for incoming mode A 2 . D ( β ) —the displacement operation of Bob. BS—50:50 beam splitter.
Figure 1. Prepare-and-measure scheme of the CV-MDI-QKD protocol. Ψ m A A 1 and Ψ m B 1 B 3 are discrete modulated states prepared by Alice and Bob. Here, m = 4 and m = 8 are four-state and eight-state modulations. x—measurement results of homodyne detection for x-quadrature for incoming mode B 2 . p—measurement results of homodyne detection for p-quadrature for incoming mode A 2 . D ( β ) —the displacement operation of Bob. BS—50:50 beam splitter.
Entropy 27 00160 g001
Figure 2. Entanglement-based scheme of CV-MDI-QKD under imbalanced modulated quantum state. Both Alice and Bob prepare the same discrete quantum state Ψ m A A 1 and Ψ m B 1 B 3 , except for the modulation variance, and send the other mode to an untrusted third party, Charlie, through a quantum channel with the length L A C ( L B C ) , respectively. Here, m = 4 and m = 8 are four-state and eight-state modulations. Two quantum channels and Charlie can be controlled by Eve, but Eve has no access to the apparatuses in Alice’s and Bob’s stations. The imperfection of the detectors is characterized by quantum efficiency η and the thermal state V N that simulates the electronic noise of the realistic detector. Het denotes the heterodyne detection. D ( β ) —the displacement operation of Bob. BS—50:50 beam splitter.
Figure 2. Entanglement-based scheme of CV-MDI-QKD under imbalanced modulated quantum state. Both Alice and Bob prepare the same discrete quantum state Ψ m A A 1 and Ψ m B 1 B 3 , except for the modulation variance, and send the other mode to an untrusted third party, Charlie, through a quantum channel with the length L A C ( L B C ) , respectively. Here, m = 4 and m = 8 are four-state and eight-state modulations. Two quantum channels and Charlie can be controlled by Eve, but Eve has no access to the apparatuses in Alice’s and Bob’s stations. The imperfection of the detectors is characterized by quantum efficiency η and the thermal state V N that simulates the electronic noise of the realistic detector. Het denotes the heterodyne detection. D ( β ) —the displacement operation of Bob. BS—50:50 beam splitter.
Entropy 27 00160 g002
Figure 3. Symmetric CV-MDI-QKD with a four-state modulation. (a) Secret key rate versus modulation variance in the symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line), and η = 0.999 ,   v e l = 0.001 (purple dotted line), corresponding to the optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Figure 3. Symmetric CV-MDI-QKD with a four-state modulation. (a) Secret key rate versus modulation variance in the symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line), and η = 0.999 ,   v e l = 0.001 (purple dotted line), corresponding to the optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Entropy 27 00160 g003
Figure 4. Symmetric CV-MDI-QKD with eight-state modulation. (a) Secret key rate versus modulation variance in the symmetric case for optimal balanced modulation variance (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line), and η = 0.999 ,   v e l = 0.001 (purple dotted line), corresponding to the optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Figure 4. Symmetric CV-MDI-QKD with eight-state modulation. (a) Secret key rate versus modulation variance in the symmetric case for optimal balanced modulation variance (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line), and η = 0.999 ,   v e l = 0.001 (purple dotted line), corresponding to the optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Entropy 27 00160 g004
Figure 5. I A B and χ B E for symmetric CV-MDI-QKD with four-state and eight-state modulations. (a) Shannon mutual information and χ B E versus modulation variance in the four-state symmetric case for optimal balanced modulation (solid line) and imbalanced modulation variance (dashed line) with ideal detection, respectively. (b) Shannon mutual information and χ B E versus modulation variance in the eight-state symmetric case for optimal balanced modulation (solid line) and imbalanced modulation variance (dashed line) with ideal detection, respectively. Here, we set the reconciliation efficiency to β = 0.95 and the excess noise ε A = ε B = 0.002 shot noise units (SNUs).
Figure 5. I A B and χ B E for symmetric CV-MDI-QKD with four-state and eight-state modulations. (a) Shannon mutual information and χ B E versus modulation variance in the four-state symmetric case for optimal balanced modulation (solid line) and imbalanced modulation variance (dashed line) with ideal detection, respectively. (b) Shannon mutual information and χ B E versus modulation variance in the eight-state symmetric case for optimal balanced modulation (solid line) and imbalanced modulation variance (dashed line) with ideal detection, respectively. Here, we set the reconciliation efficiency to β = 0.95 and the excess noise ε A = ε B = 0.002 shot noise units (SNUs).
Entropy 27 00160 g005
Figure 6. Extreme asymmetric CV-MDI-QKD with a four-state modulation. (a) Secret key rate versus modulation variance in the extreme asymmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the extreme symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line) and η = 0.999 ,   v e l = 0.001 (purple dotted line) corresponding to optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Figure 6. Extreme asymmetric CV-MDI-QKD with a four-state modulation. (a) Secret key rate versus modulation variance in the extreme asymmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the extreme symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line) and η = 0.999 ,   v e l = 0.001 (purple dotted line) corresponding to optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Entropy 27 00160 g006
Figure 7. Extreme asymmetric CV-MDI-QKD with an eight-state modulation. (a) Secret key rate versus modulation variance in the extreme symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the extreme asymmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line), and η = 0.999 ,   v e l = 0.001 (purple dotted line), corresponding to the optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Figure 7. Extreme asymmetric CV-MDI-QKD with an eight-state modulation. (a) Secret key rate versus modulation variance in the extreme symmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) variance with ideal detection, respectively. 🟉 indicates the maximum secret key rate. Here, we set the excess noise to ε A = ε B = 0.002 shot noise units (SNUs). (b) Secret key rate versus transmission distances in the extreme asymmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) with ideal detection, respectively. For comparing the ideal and practical detection efficiency, we set η = 0.999 ,   v e l = 0.001 (orange dotted line), and η = 0.999 ,   v e l = 0.001 (purple dotted line), corresponding to the optimal imbalanced and balanced modulation modes, respectively. Here, we set the reconciliation efficiency to β = 0.95 .
Entropy 27 00160 g007
Figure 8. I A B and χ B E for extreme asymmetry CV-MDI-QKD with a four-state modulation and an eight-state modulation. (a) Shannon mutual information and χ B E versus modulation variance in the four-state extreme asymmetric case for optimal balanced modulation (solid line) imbalanced modulation (dashed line) with ideal detection, respectively. (b) Shannon mutual information and χ B E versus modulation variance in the eight-state extreme asymmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) with ideal detection, respectively. Here, we set the reconciliation efficiency to β = 0.95 and the excess noise to ε A = ε B = 0.002 shot noise units (SNUs).
Figure 8. I A B and χ B E for extreme asymmetry CV-MDI-QKD with a four-state modulation and an eight-state modulation. (a) Shannon mutual information and χ B E versus modulation variance in the four-state extreme asymmetric case for optimal balanced modulation (solid line) imbalanced modulation (dashed line) with ideal detection, respectively. (b) Shannon mutual information and χ B E versus modulation variance in the eight-state extreme asymmetric case for optimal balanced modulation (solid line) and imbalanced modulation (dashed line) with ideal detection, respectively. Here, we set the reconciliation efficiency to β = 0.95 and the excess noise to ε A = ε B = 0.002 shot noise units (SNUs).
Entropy 27 00160 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Z.; Bai, J.; Li, F.; Li, Y.; Tian, Y.; Liu, W. Performance Improvement for Discretely Modulated Continuous-Variable Measurement-Device-Independent Quantum Key Distribution with Imbalanced Modulation. Entropy 2025, 27, 160. https://doi.org/10.3390/e27020160

AMA Style

Liu Z, Bai J, Li F, Li Y, Tian Y, Liu W. Performance Improvement for Discretely Modulated Continuous-Variable Measurement-Device-Independent Quantum Key Distribution with Imbalanced Modulation. Entropy. 2025; 27(2):160. https://doi.org/10.3390/e27020160

Chicago/Turabian Style

Liu, Zehui, Jiandong Bai, Fengchao Li, Yijun Li, Yan Tian, and Wenyuan Liu. 2025. "Performance Improvement for Discretely Modulated Continuous-Variable Measurement-Device-Independent Quantum Key Distribution with Imbalanced Modulation" Entropy 27, no. 2: 160. https://doi.org/10.3390/e27020160

APA Style

Liu, Z., Bai, J., Li, F., Li, Y., Tian, Y., & Liu, W. (2025). Performance Improvement for Discretely Modulated Continuous-Variable Measurement-Device-Independent Quantum Key Distribution with Imbalanced Modulation. Entropy, 27(2), 160. https://doi.org/10.3390/e27020160

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop