Next Article in Journal
ApproximateSecret Sharing in Field of Real Numbers
Previous Article in Journal
A Quantum-like Approach to Semantic Text Classification
Previous Article in Special Issue
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploring Non-Gaussianity Reduction in Quantum Channels

by
Micael Andrade Dias
1,2,* and
Francisco Marcos de Assis
3
1
QuIIN—Quantum Industrial Innovation, EMBRAPII CIMATEC Competence Center in Quantum Technologies, SENAI CIMATEC, Av. Orlando Gomes 1845, Salvador 41650-010, BA, Brazil
2
Department of Electrical and Photonics Engineering, Technical University of Denmark, 2800 Lyngby, Denmark
3
Department of Electrical Engineering, Federal University of Campina Grande, Campina Grande 58429-900, PB, Brazil
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(7), 768; https://doi.org/10.3390/e27070768 (registering DOI)
Submission received: 21 May 2025 / Revised: 30 June 2025 / Accepted: 7 July 2025 / Published: 20 July 2025

Abstract

The quantum relative entropy between a quantum state and its Gaussian equivalent is a quantifying function of the system’s non-Gaussianity, a useful resource in several applications, such as quantum communication and computation. One of its most fundamental properties is to be monotonically decreasing under Gaussian evolutions. In this paper, we develop the conditions for a non-Gaussian quantum channel to preserve the monotonically decreasing property. We propose a necessary condition to classify between Gaussian and non-Gaussian channels and use it to define a class of quantum channels that decrease the system’s non-Gaussianity. We also discuss how this property, combined with a restriction on the states at the channel’s input, can be applied to the security analysis of continuous-variable quantum key distribution protocols.

1. Introduction

Quantum resource theory (QRT) stands as a cornerstone in the field of quantum information science, providing a formal framework for understanding and manipulating various quantum resources [1]. From entanglement to coherence, quantum resource theories offer a systematic approach to quantifying and harnessing the unique properties of quantum systems, allowing advancements in quantum communication, computation, and beyond [2,3].
A non-Gaussian (nG) resource theory, for instance, aims to understand which tasks require states and operations to have an nG character and how they can be better used, once the Gaussian sector of quantum states and operations is simpler to manipulate in a laboratory. Central to the study of an nG quantum resource theory (nG-QRT) is the quantum relative entropy (QRE), a powerful tool for quantifying the non-Gaussianity of quantum states [4]. In particular, the QRE plays a pivotal role as a resource quantifying function, offering insights into the distinguishability between a quantum state and its Gaussian equivalent [5,6]. A key property of the quantum relative entropy is its monotonic decrease under Gaussian operations, providing a robust foundation for characterizing nG transformations and their effects on the system’s non-Gaussianity.
Although quantum resource theory has found widespread applications across various domains of quantum information science [7,8,9,10], its integration into continuous-variable quantum key distribution (CV-QKD) protocols has been relatively limited. In some foundational studies, its developments have been utilized merely to corroborate well-known results from the existing literature, such as the optimality of Gaussian states for entropic quantities, rather than being actively exploited to improve the capabilities and security of CV-QKD schemes [11]. However, one promising avenue for application lies in the security analysis of CV-QKD protocols that utilize nG modulation of coherent states.
In the general setup of a QKD protocol, Alice and Bob (the trusted parties) distribute secret random keys by transmitting quantum states through an untrusted quantum channel. An eavesdropper (also called Eve) has access to the quantum channel and attempts to gain information employing some attack strategy. So, to keep secrecy, Alice and Bob must estimate how much information Eve has had access to during the protocol execution. When assessing this quantity, Alice and Bob must decide which model they will use to describe the quantum channel linking them, either a Gaussian or an nG. When assuming a Gaussian model, they in fact can upper bound Eve’s information by reconstructing a covariance matrix using solely the channel transmittance and excess noise parameters. Despite its practical relevance, the Gaussian channel model does not cover the worst-case scenario of Eve’s attacks, given that Alice did not prepare her states according to a Gaussian distribution [12].
State-of-the-art security analyses of CV-QKD with nG modulation often involve sophisticated optimization techniques [12,13,14]. These analyses aim to determine the maximal eavesdropper information by exploring the space of nG quantum channels compatible with the estimated parameters during quantum communication. When nG modulation is used for quantum state transmission, the non-Gaussianity must be taken into account in the security analysis.
In this paper, we investigate the gap between the Gaussian and nG security models of CV-QKD by using tools from nG-QRT. More precisely, we take as starting point one basic property of the QRE measure of non-Gaussianity, its monotone decrease under Gaussian operations, and investigate how it can be extended to nG quantum channels. By presenting the conditions under which an nG quantum channel reduces the system’s non-Gaussianity, we discuss how it can be used in security proofs of CV-QKD protocols with nG modulation. We also provide examples of such quantum channels, showing that, for specific mixtures of quantum states at the channel input, the covariance matrix remains unchanged while the system nG is reduced.
The remainder of the paper is structured as follows: Section 2 states the formal definitions and the problem we aim to address. In Section 3, we develop the main results for nG quantum channels, and in Section 4, we explore how it can be used in the security analysis of CV-QKD protocols, with the concluding remarks in Section 5.

Notation

In what follows, we use the standard Dirac notation for quantum mechanics. A and B are quantum systems with the associated Hilbert spaces H A and H B , respectively. B ( H A ) and D ( H A ) denote the space of bounded linear operators and the set of density operators in H A , respectively, with elements represented as A ^ B ( H A ) and ρ ^ D ( H A ) . The subset of D ( H A ) corresponding to Gaussian states will be denoted by G s ( H A ) , or simply G s .
The subspace of completely positive trace-preserving (CPTP) linear operators from H A to H B is denoted as Q ( H A H B ) with elements N A B . All indexes will be dropped when implicit. If N is a quantum channel, the evolution of a state and the transformations of any of its quantities are represented by N ( · ) or N . In particular, we denote by G c ( H A H B ) Q ( H A H B ) the subset of all Gaussian quantum channels, or only G c .

2. Preliminaries and Problem Statement

The question we are proposing is as follows: Can a quantum state have its non-Gaussianity reduced after undergoing an nG evolution? Alternatively, is there any nG channel that makes quantum states “more Gaussian”? By non-Gaussianity of an arbitrary quantum state, the literature often refers to a quantity informing “how much” an nG state fails to pass as a Gaussian state. Operationally, it may be defined as the distance from a Gaussian reference state [4]. Here, we use the QRE as a quantifying function of non-Gaussianity, having in mind that, even though it is not a metric, it satisfies all axioms for a resource quantifying function [1].
Definition 1
([6]). Let σ ^ be an arbitrary quantum state and σ ^ G be the Gaussian quantum state with the same mean vector and covariance matrix as σ ^ . The state σ ^ G is said to be the Gaussian equivalent to σ ^ . The QRE-based nG measure of σ ^ is defined as
δ v N ( σ ^ ) = S ( σ ^ | | σ ^ G ) .
Among the many properties of δ v N , two of them are of special interest:
(i)
Non-negativity ( δ v N ( σ ^ ) 0 , with equality if and only if σ ^ G s );
(ii)
Contractivity under Gaussian quantum channels, δ v N ( σ ^ ) δ v N ( N ( σ ^ ) ) for any σ ^ D ( H ) and N G c .
In an nG-QRT, the QRE-based non-Gaussianity measure is a resource quantifying function and carries some operational meaning in its properties. In such a resource theory, Gaussian states and Gaussian operations are free [11]. Property (ii) implies that no free operation should increase the amount or resource of a quantum state. Then, one way of looking at the questioning about whether an nG quantum channel can reduce the non-Gaussianity of nG states can be rephrased as “can property (ii) be extended to nG quantum channels?”. This idea is illustrated in Figure 1, where N 1 is a Gaussian channel and, as such, maps Gaussian states into Gaussian states ( ρ ^ and ρ ^ ) and reduces the non-Gaussianity of σ ^ G s . For the sake of simplicity, the non-Gaussianity of a quantum state is illustrated as the distance from the set G s and should not be taken formally. The question remaining is whether there is any nG channel N 2 still bringing states closer to the Gaussian sector.
Now, consider the following setup: Let { X n } be a sequence of random variables (with corresponding alphabet X n and probability mass function p X n ( x ) ) such that it converges in distribution to a complex Gaussian density, that is, X n D X G N C ( 0 , m ¯ ) . For this work, we consider X n to be distributed symmetrically on the complex plane, i.e., p X n ( x ) = p X n ( x ) for any x X n . For each X n , define the ensemble of coherent states { | x , p X n ( x ) } and the corresponding mixed state ρ ^ X n = x X n p X n ( x ) | x x | . Such an ensemble can represent what a transmitter (Alice) can send to the receiver (Bob) through a quantum channel N A B in a CV-QKD protocol with discrete modulation (DM), where the modulation format is represented by the random variable X n .
By considering a mixture of coherent states that is induced by a random variable taken from a sequence that converges to a Gaussian distribution, one can prove the following statements [15]:
lim n δ v N ( ρ ^ X n ) = 0
lim n inf N A B { δ v N ( N A B ( ρ ^ X n ) ) } = 0 ,
where the infimum must be computed for all quantum channels N A B compatible with the statistics observed at the output up to the second moment (We point out that in [15], the main problem was the analysis of the role of non-Gaussianity in security proofs of continuous-variable quantum key distribution protocols using discrete modulation of coherent states. That is why it is relevant to restrict the quantum channels to the ones matching the first and second statistical moments at the reception when defining the infimum in Equation (3)). It is important to note that the quantum channel that minimizes the QRE-nG function in Equation (3) does not need to be Gaussian. Consider an arbitrary N G c and let N * Q be the quantum channel for which the infimum in Equation (3) is achieved for some n. Then, using the monotonicity of δ v N , the following inequality holds:
δ v N ( ρ ^ X n ) δ v N ( N ( ρ ^ X n ) ) δ v N ( N * ( ρ ^ X n ) ) ,
and by adding the convergence X n D X G N C ( 0 , m ¯ ) , one has that
lim n δ v N ( N * ( ρ ^ X n ) ) lim n δ v N ( ρ ^ X n ) = 0 .
Besides the guarantee of small non-Gaussianity before and after the quantum channel for sufficiently large n whenever X n X G , there is no constraint for N * to be Gaussian. The question of extending property (ii) of δ v N gains operational importance in understanding which conditions a quantum channel has to satisfy for one to be able to compute the minimal output non-Gaussianity, given the input state and the data statistics up to the second moment. As will be discussed in the following sections, this minimal non-Gaussianity quantity can be directly linked to the problem of accessing the security of CV-QKD protocols with discrete (nG) modulation.

3. Quantum Relative Entropy Monotonicity Under Non-Gaussian Quantum Channels

In this section, we will develop the conditions under which an nG quantum channel maintains the monotonic property of the QRE non-Gaussianity and provide numerical results for a class of mixtures of quantum states that are of practical interest for CV-QKD protocols. The first step is to prove the following lemma:
Lemma 1.
Let N be a quantum channel, let ρ ^ be an arbitrary quantum state, and define
Δ ( N , ρ ^ ) = tr [ N ( ρ ^ ) ( log N ( ρ ^ ) G log N ( ρ ^ G ) ) ] .
If N G c then Δ ( N , ρ ^ ) = 0 for any quantum state ρ ^
Proof. 
If N is a Gaussian channel and Γ is the covariance matrix of an arbitrary quantum state ρ ^ , then Γ ( ρ ^ ) = Γ ( ρ ^ G ) and Γ N Γ . This means that Γ ( N ( ρ ^ ) G ) = Γ ( N ( ρ ^ G ) ) = Γ . Since the first moment will follow in the same way, N ( ρ ^ G ) = N ( ρ ^ ) G for any ρ ^ D ( H ) , and then Δ ( N , ρ ^ ) = 0 for arbitrary ρ ^ . □
This result gives a sufficient condition to classify a quantum channel concerning its non-Gaussianity: if it is verified that Δ ( N , ρ ^ ) 0 for some quantum state ρ ^ , then N is nG. Now, define the set of quantum channels for which Δ 0 , F = { N Q : Δ ( N , ρ ^ ) 0 ρ ^ D ( H ) } . Then, G c F and this allows us to propose the following statement:
Theorem 1.
If N F , then δ v N ( N ( ρ ^ ) ) δ v N ( ρ ^ ) for any ρ ^ D ( H ) .
Proof. 
Let ρ ^ and N be as in the setup. From quantum relative entropy contractivity under quantum channels, one gets
δ v N ( ρ ^ ) = ( a ) S ( ρ ^ | | ρ ^ G )
( b ) S ( N ( ρ ^ ) | | N ( ρ ^ G ) )
= ( c ) tr [ N ( ρ ^ ) ( log N ( ρ ^ ) log N ( ρ ^ G ) ) ] + tr [ ( N ( ρ ^ ) N ( ρ ^ ) G ) log N ( ρ ^ ) G ]
= ( d ) S ( N ( ρ ^ ) G ) S ( N ( ρ ^ ) ) + Δ ( N , ρ ^ )
= ( e ) S ( N ( ρ ^ ) | | N ( ρ ^ ) G ) + Δ ( N , ρ ^ )
( f ) δ v N ( N ( ρ ^ ) ) ,
where (a) comes from the definition of δ v N , (b) from the monotonicity of quantum relative entropy [16], (c) uses the fact that tr [ ( σ ^ σ ^ G ) log ( σ ^ G ) ] = 0 for arbitrary σ ^ [17], (d) applies the definition in Lemma 1, (e) follows from Definition 1, and (f) holds because N and ρ ^ were chosen such that Δ ( N , ρ ^ ) 0 . □
Theorem 1 provides an interpretation to the quantity Δ ( N , ρ ^ ) , with its non-negativity being a necessary condition for a channel to reduce the non-Gaussianity character of a quantum state. In other words, the δ v N non-increasing property was extended to nG quantum channels satisfying the conditions of Theorem 1.
However, the specification of F may have been too broad by demanding Δ ( N , ρ ^ ) to be non-negative for all quantum states in the system, and we cannot affirm whether F G = { } or not. A relaxation in this condition can be achieved by considering only a specific set of quantum states, which we chose to be the states relevant to DM-CVQKD protocols, and can help describe a set of QRE-nG non-increasing quantum channels.
Let S n ¯ = { σ ^ D ( H ) : σ ^ = x X n p ( x ) ρ ^ t h ( x , n ¯ ) } with X n being a discrete symmetric random variable and ρ ^ t h ( x , n ¯ ) be the displaced thermal state with n ¯ average photons and the first moment x ¯ = 2 · ( Re { x } , Im { x } ) T . Constellations of coherent states are represented by the set S 0 , and any state in S n ¯ has a diagonal covariance matrix for any value of n ¯ , which means that its equivalent Gaussian quantum state is a thermal state with the appropriate mean photon number. Then, we can define a relaxed set F n ¯ = { N Q : Δ ( N , ρ ^ ) 0 ρ ^ S n ¯ } such that the QRE-nG of any quantum state in S n ¯ is non-increasing under the action of any channel in F n ¯ . Also, we have G c F F n ¯ for any n ¯ . The states in S n ¯ are relevant for the QKD setup because they represent the mixed states output by a noisy modulation device with modulation noise n ¯ . We can affirm the following proposition:
Proposition 1.
F 0 G { } .
Proof. 
Take the phase diffusion process described in Appendix A and represent it by N κ , which is the model of a non-Gaussian evolution of a quantum system. It is known that the QRE-nG of coherent states under phase diffusion increases with the diffusion parameter κ . In Appendix A, it is shown that for any ρ ^ S 0 , x ¯ ( ρ ^ ) = x ¯ ( N κ ( ρ ^ ) ) = 0 and Γ ( ρ ^ ) = Γ ( N κ ( ρ ^ ) ) , which implies that ρ ^ G = N κ ( ρ ^ ) G . That is, the phase diffusion process does not modify the first and second statistical moments of appropriate mixtures of coherent states. In addition, it does not affect thermal states, meaning that N κ ( ρ ^ G ) = ρ ^ G . We conclude that N κ ( ρ ^ G ) = N κ ( ρ ^ ) G , which results in Δ ( N κ , ρ ^ ) = 0 for any state in S 0 and then N κ F 0 G { } . □
We conjecture that Proposition 1 can be extended to other values of n ¯ different from zero, although we have not yet worked out the proof. A graphical representation of the action of the phase diffusion channel is given in Figure 2a. The states in S 0 are convex mixtures of Gaussian states which, by linearity of the quantum channel, are mapped to a convex mixture of nG states ρ ^ = N κ ( ρ ^ ) . Since the phase diffusion process does not modify the covariance matrix of the states in S 0 , both ρ ^ and ρ ^ have the same covariance matrix and the same Gaussian equivalent state, represented by σ ^ in Figure 2a. The consequence of Proposition 1 is that ρ ^ is closer to σ ^ than ρ ^ in the sense of QRE.
To illustrate how an nG channel can reduce the non-Gaussianity of an ensemble of coherent states, consider QAM-like (Quadrature Amplitude Modulation) constellations of coherent states, where each quadrature follows a Gauss–Hermite distribution. Such constellations are known to converge exponentially to the capacity of the additive white Gaussian noise (AWGN) channel in classical communication scenarios [18].
The Gauss–Hermite constellation is constructed by taking the n-th Hermite polynomial, defined via the derivatives of the standard Gaussian probability density function p X ( x ) :
H n ( x ) = ( 1 ) n p X ( x ) d n p X ( x ) d x n .
This polynomial has n distinct real roots, denoted by the set X n , which determine the constellation points. Each root x i , n is associated with a weight (interpreted as a probability) given by the following:
w i , n = ( n 1 ) ! n H n 1 2 x i , n .
Examples of these constellations are shown in Figure 3. The top row displays the roots and associated weights of H n ( x ) for n = 2 , 4 , 6 , 8 , representing one-dimensional constellations along a single quadrature. As n increases, the point distribution increasingly resembles a Gaussian profile. The bottom row shows the resulting QAM-like two-dimensional constellations formed by taking the Cartesian product of two independent one-dimensional Gauss–Hermite constellations, corresponding to statistically independent quadratures.
Figure 2b shows the numerical results for the computation of the QRE-based non-Gaussianity of QAM-like constellations, with each axis following a Gauss–Hermite distribution and undergoing a phase diffusion process. The upper blue line corresponds to the QRE-nG measure for the constellations before the phase diffusion process takes place. The lines below represent the calculated δ v N ( N κ ( ρ ^ X n ) ) for κ = 0.15 (red line) and κ = (green line), the latter having the effect of total decoherence in the mixture of coherent states, which destroys the off-diagonal elements in the density matrix. The occasional observed fluctuations near the left end of the plot (low values of n) for the red and green lines can be attributed to the action of the non-Gaussian process, which can map the ensemble of input states to output states with a slightly varying non-Gaussianity reducing rate when the constellation size is still small. After approximately seven states per quadrature, the output-state non-Gaussianity transitions to a clear exponential decay as expected.
As expected, since the Gauss–Hermite distribution converges exponentially to a Gaussian shape, the QRE-based non-Gaussianity also decreases exponentially as the constellation grows. Concerning the action of N κ , two points can be highlighted: First, the bigger the diffusion parameter κ gets, the lower the constellation non-Gaussianity after the channel is, which is related to the counterintuitive fact that N κ maps to a convex mixture of nG states that is more Gaussian than the mixed state before it. The second is that the effect of undergoing the nG evolution becomes less significant (in the sense of reducing the state non-Gaussianity) as the mixture becomes more Gaussian-like. For example, if we compute the input–output non-Gaussianity difference δ v N ( ρ ^ X n ) δ v N ( N κ ( ρ ^ X n ) ) , with κ = 0.15 , one has that it is 2.4 × 10 3 for n = 10 and goes to 4.8 × 10 6 for n = 20 . This is somehow expected because thermal states commute with the Krauss operators representing the phase diffusion evolution, meaning that as ρ ^ X n becomes “more Gaussian”, N κ has less effect on it.

4. Discussion: Application to QKD Protocols

The basic operation of a QKD protocol can be divided into four main stages: (i) quantum state preparation, transmission, and detection; (ii) classical parameter estimation; (iii) information reconciliation; and (iv) privacy amplification. A QKD protocol that applies discrete modulation—i.e., uses a constellation of symbols—to the quadratures of continuous-variable quantum systems, such as coherent states, is referred to as a DM-CVQKD protocol. The coherent states are prepared with amplitudes drawn from a random variable, transmitted and detected by either a single- or a double-homodyne receiver. The resulting shared sequences—the input data used to modulate the coherent states and the detection outcomes—are called the raw key and should be used to distill a secret random sequence given that they present enough correlation, which is evaluated by the parameter estimation stage under a specific security model. After that, error correction is performed by some information reconciliation protocol, and the eavesdropper information is removed by privacy amplification.
Finding the worst-case eavesdropping strategy is a crucial step towards proving the security of a QKD protocol. For the class of Gaussian-modulated protocols with continuous variables, such as the GG02, the no-switching, and the unidimensional protocols [19,20,21], the optimality of Gaussian attacks is a pivotal result simplifying the security analysis: if the protocol is based on a Gaussian modulation of coherent states (this means that Alice will transmit coherent states whose amplitudes are drawn from a circular Gaussian distribution, or equivalently, the amplitude on each quadrature is drawn from independent and equally distributed Gaussian random variables), the best Eve can do is to perform the “entangling cloner attack”, which is equivalent to a Gaussian quantum channel with transmittance τ and excess noise ξ [22,23,24,25]. The consequence is that Alice and Bob can safely assume the Gaussian channel model in the security analysis.
The problem completely changes when Alice applies a discrete modulation. In this case, it is not guaranteed that Gaussian attacks are optimal, and the security analysis must include nG quantum channels compatible with the parameters observed in the classical data for computing the eavesdropper’s information [12]. This means that Alice and Bob must estimate the channel parameters τ and ξ using their classical data and compute the eavesdropper information for the worst-case scenario, considering any type of quantum channel resulting in the estimated parameters. This reduces to the known Devetak–Winter formula for the secret key rate in the asymptotic scenario:
K = β I ( A ; B ) sup N Q χ ( B ; E ) ,
where β is the efficiency of information reconciliation, I ( A ; B ) is the classical mutual information of Alice and Bob’s raw keys, and χ ( E , B ) is the eavesdropper’s accessible information during quantum communication considering reverse reconciliation. In this type of reconciliation, error correction is performed by taking as reference the receiver’s sequence so that Alice has to modify her sequence towards Bob’s one, differently from a classical communication task. This maneuver allows the protocol to be able to establish secret keys beyond the 3 dB loss limit.
In Section 3, it was shown that the phase diffusion process preserves the monotone property of the QRE-nG when restricted to an appropriate set of quantum states. Additionally, it does not modify the covariance matrix of the input state. Both statements can be used in the analysis of DM-CVQKD protocols by proposing the following arrangement to decompose the quantum channels considered in the security analysis. Denote by T the set of quantum channels that preserve the first and second moments of any quantum state in S 0 ¯ . Without loss of generality, assume that Alice and Bob are linked by N = N 2 N 1 , as depicted in Figure 4, where N 1 T and N 2 G s is a thermal-loss channel with transmittance τ and excess noise ξ .
The idea here is to decompose the quantum channel into two parts, the Gaussian N 2 yielding physical parameters in a practical deployment of a QKD protocol, raising the observed parameters τ and ξ , and N 1 , which does not modify the covariance matrix (and then does not affect the parameter estimation) but is responsible for non-Gaussian interactions giving more information to the eavesdropper. Such decomposition may allow more accurate lower bounds to the secret key rate by performing a more efficient computation of the eavesdropper’s information in security analysis.
Take as an example the security analysis of [12]. Its main objective was to analytically deduce a correction factor for the covariance matrix describing the bipartite state on a DM-CVQKD protocol. When restricting the problem to a linear Gaussian channel, the corrected off-diagonal therm Z ( τ , ξ ) of Γ is
Z ( τ , ξ ) = 2 T tr ρ ^ 1 / 2 a ^ ρ ^ 1 / 2 a 2 T ξ w ,
with a ^ and a ^ being the field annihilation and creation operators, respectively; w : = k p k ( α k | a ^ ρ a ^ ρ | α k | α k | a ^ ρ | α k | 2 ) and a ^ ρ = ρ ^ 1 / 2 a ^ ρ ^ 1 / 2 a . Such a correction factor works as a penalty for describing an nG state with just its second moment. One could extend the analysis by relating its results for arbitrary channels to the minimization of the output-state QRE non-Gaussianity measure, which is also related to a penalty due to nG modulation [15], subject to the empirical constraints estimated on a practical protocol: channel parameters and the expected covariance. This yields a rigorous lower bound on the protocol by estimating the effects of the channel’s non-Gaussianity, without the need for knowing upfront which nG quantum channel connects Alice and Bob. The resulting operational framework fits naturally into DM-CVQKD protocols where these quantities are already monitored, enabling practical application of our theoretical results and facilitating tighter security bounds when non-Gaussianity is empirically small.

5. Conclusions

We explored the conditions under which a non-Gaussian quantum channel reduces the amount of non-Gaussianity of a quantum channel using the quantum relative entropy as a quantifying function. We proposed the functional Δ ( N , ρ ^ ) that can be used to classify the channel N as Gaussian or non-Gaussian. Based on Δ ( N , ρ ^ ) , we developed a condition under which a non-Gaussian channel reduces the non-Gaussianity of its input states. This result extends the monotone decreasing property of the quantum relative entropy-based non-Gaussianity measure to outside the Gaussian sector of quantum operations.
The characterization of non-Gaussian channels that reduce the non-Gaussianity of input states was used to establish a link between the security analysis of CVQKD protocols and the class of non-Gaussianity-reducing quantum channels. A decomposition of the general channels considered in the security analysis of CVQKD was proposed, with operational implications. It is still an open problem how this decomposition can improve the secret key rate bounds computed with today’s security analysis framework. In addition, it may be possible that this decomposition can be used to improve parameter estimation procedures.
Future work can also be concentrated on generalizing Proposition 1 and developing the properties of Δ ( N , ρ ^ ) . In addition, it should be noted that the difference S ( ρ ^ | | ρ ^ G ) S ( N ( ρ ^ ) | | N ( ρ ^ G ) ) (see the proof of Theorem 1) is related to state recovery maps (Petz recovery maps), which are maps that can recover the state that suffered some physical evolution. Such recovery maps can be extended to quantum systems in infinite dimensions [26] and may have connections with the “production of non-Gaussianity” and with CVQKD security analysis.

Author Contributions

Writing—original draft preparation, M.A.D.; writing—review and editing, M.A.D. and F.M.d.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been partially funded by the project QIN-AFCCT-2025-4-16-3 “Analysis and development of distribution matching algorithms for CV-QKD” supported by QuIIN—Quantum Industrial Innovation, EMBRAPII CIMATEC Competence Center in Quantum Technologies, with financial resources from the PPI IoT/Manufatura 4.0 of the MCTI grant number 053/2023, signed with EMBRAPII; the National Council for Scientific and Technological Development (CNPq) under research Grant No. 311680/2022-4; the Coordination of Superior Level Staff Improvement (CAPES/PROEX) under research Grant No. 88887.014949/2024-00; and by EU HORIZON 2023 Marie Skłodowska-Curie Actions Postdoctoral Fellowships under project number 101153602 (COCoVaQ).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. The Phase Diffusion Process

One of the most harmful noisy processes in quantum information is one that provokes decoherence, where quantum states lose their “quantumness”—full decohered states reduce to mixtures of orthogonal states which can be perfectly distinguished. Some open-system processes result in random changes in the relative phase of the states that are in superposition in the main quantum system. Such a relative phase fluctuation results in a loss of coherence and is called phase damping or phase diffusion [27].
The single-mode evolution of the system under such a process can be described by the master equation [11,28]:
d d t ρ ^ = Γ L [ a ^ a ^ ] ρ ^ ,
where L [ O ^ ] ρ ^ = 2 O ^ ρ ^ O ^ O ^ O ^ ρ ^ ρ ^ O ^ O ^ , or as the Hamiltonian of a harmonic oscillator open to an N mode environment [27]:
H = ħ ω a ^ a ^ + ħ i = 1 N ω i a ^ i a ^ i + ħ i = 1 N χ i a ^ a ^ ( a ^ i + a ^ i ) ,
where a ^ and a ^ are the annihilation and creation operators of the main system with frequency ω , and a ^ i and a ^ i refer to the ith environment system with frequency ω i . The quantity χ i represents a coupling parameter between the main system and the ith environment mode.
This non-Gaussian evolution of a quantum state is an important source of noise in optical communication links. Its Krauss operator set { P k ( t ) } , 0 k has elements
P k ( t ) = n = 0 e 1 2 n 2 λ 2 ( n 2 λ 2 ) k k ! | n n |
where λ = t Λ and Λ = i χ i 2 1 e n 2 λ 2 .
Regarding the effect of phase diffusion on Gaussian states, the thermal state with average photon number n ¯ , ρ ^ t h ( n ¯ ) , is invariant under the phase diffusion process state, since both n ¯ and P k ( t ) are diagonal in the same basis. For coherent states, it is well known that they are sensitive to relative phase fluctuations: for a coherent state | α with arbitrary α , one has
N κ ( | α α | ) = e | α | 2 m , n = 0 exp { κ 2 ( n m ) 2 } × α n α m n ! m ! | n m | ,
which is a non-Gaussian mixed state with κ = λ 2 / 2 .
In contrast to thermal states, coherent states suffer from decoherence in a phase diffusion evolution, with the off-diagonal elements of the density operator being more affected as the noise parameter κ becomes larger.
Now, consider the mixtures of coherent states as defined in Section 3 by the set S 0 . Denote a constellation by the set of complex amplitudes { α i } with associated probabilities { p i } . Also, by symmetry, p i α i = 0 , and let m ¯ = p i | α i | 2 be the modulation variance. Represent the constellation of coherent state by ρ ^ = i p i | α i α i | , and denote ρ ^ κ = N κ ( ρ ^ ) . Due to the linearity of the channel, we use (A4) directly and have
ρ ^ κ = m , n = 0 e κ 2 ( n m ) 2 i = 0 N p i e | α i | 2 α i n α i m n ! m ! | n m | .
Clearly, as each coherent state is transformed into an nG mixed state, the resultant mixture will also be nG, although in contrast to a single coherent state, a symmetric convex mixture has the first and second moments invariant under phase diffusion, that is,
tr ( q ^ ρ ^ κ ) = tr ( p ^ ρ ^ κ ) = 0 ,
and
Γ = 1 + 2 m ¯ 0 0 1 + 2 m ¯
so that Γ ( ρ ^ κ ) = Γ ( ρ ^ ) .

References

  1. Chitambar, E.; Gour, G. Quantum Resource Theories. Rev. Mod. Phys. 2019, 91, 025001. [Google Scholar] [CrossRef]
  2. Zhuang, Q.; Shor, P.W.; Shapiro, J.H. Resource Theory of Non-Gaussian Operations. Phys. Rev. A 2018, 97, 052317. [Google Scholar] [CrossRef]
  3. Takagi, R.; Zhuang, Q. Convex Resource Theory of Non-Gaussianity. Phys. Rev. A 2018, 97, 062337. [Google Scholar] [CrossRef]
  4. Marian, P.; Marian, T.A. Relative Entropy Is an Exact Measure of Non-Gaussianity. Phys. Rev. A 2013, 88, 012322. [Google Scholar] [CrossRef]
  5. Genoni, M.G.; Paris, M.G.A.; Banaszek, K. Measure of the Non-Gaussian Character of a Quantum State. Phys. Rev. A 2007, 76, 042327. [Google Scholar] [CrossRef]
  6. Genoni, M.G.; Paris, M.G.A.; Banaszek, K. Quantifying the Non-Gaussian Character of a Quantum State by Quantum Relative Entropy. Phys. Rev. A 2008, 78, 060303. [Google Scholar] [CrossRef]
  7. Fiurášek, J. Gaussian Transformations and Distillation of Entangled Gaussian States. Phys. Rev. Lett. 2002, 89, 137904. [Google Scholar] [CrossRef]
  8. Giedke, G.; Ignacio Cirac, J. Characterization of Gaussian Operations and Distillation of Gaussian States. Phys. Rev. A 2002, 66, 032316. [Google Scholar] [CrossRef]
  9. Niset, J.; Fiurášek, J.; Cerf, N.J. No-Go Theorem for Gaussian Quantum Error Correction. Phys. Rev. Lett. 2009, 102, 120501. [Google Scholar] [CrossRef]
  10. Ralph, T.C.; Gilchrist, A.; Milburn, G.J.; Munro, W.J.; Glancy, S. Quantum Computation with Optical Coherent States. Phys. Rev. A 2003, 68, 042319. [Google Scholar] [CrossRef]
  11. Genoni, M.G.; Paris, M.G.A. Quantifying Non-Gaussianity for Quantum Information. Phys. Rev. A 2010, 82, 052341. [Google Scholar] [CrossRef]
  12. Denys, A.; Brown, P.; Leverrier, A. Explicit Asymptotic Secret Key Rate of Continuous-Variable Quantum Key Distribution with an Arbitrary Modulation. Quantum 2021, 5, 540. [Google Scholar] [CrossRef]
  13. Lin, J.; Upadhyaya, T.; Lütkenhaus, N. Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution. Phys. Rev. X 2019, 9, 041064. [Google Scholar] [CrossRef]
  14. Liu, W.B.; Li, C.L.; Xie, Y.M.; Weng, C.X.; Gu, J.; Cao, X.Y.; Lu, Y.S.; Li, B.H.; Yin, H.L.; Chen, Z.B. Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable Quantum Key Distribution with High Excess Noise Tolerance. PRX Quantum 2021, 2, 040334. [Google Scholar] [CrossRef]
  15. Dias, M.A.; Assis, F.M. Converging State Distributions for Discrete Modulated CVQKD Protocols. arXiv 2023, arXiv:2305.06484. [Google Scholar]
  16. Wilde, M.M. Quantum Information Theory, 2nd ed.; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
  17. Holevo, A.S.; Sohma, M.; Hirota, O. Capacity of Quantum Gaussian Channels. Phys. Rev. A 1999, 59, 1820–1828. [Google Scholar] [CrossRef]
  18. Wu, Y.; Verdú, S. The Impact of Constellation Cardinality on Gaussian Channel Capacity. In Proceedings of the 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2010), Monticello, IL, USA, 29 September–1 October 2010; pp. 620–628. [Google Scholar] [CrossRef]
  19. Grosshans, F.; Grangier, P. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett. 2002, 88, 57902. [Google Scholar] [CrossRef]
  20. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum Cryptography without Switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef]
  21. Usenko, V.C.; Grosshans, F. Unidimensional Continuous-Variable Quantum Key Distribution. Phys. Rev. A 2015, 92, 062337. [Google Scholar] [CrossRef]
  22. Cerf, N.J.; Leuchs, G.; Polzik, E.S. Quantum Information with Continuous Variables of Atoms and Light; Imperial College Press (ICP): London, UK, 2007. [Google Scholar] [CrossRef]
  23. Wolf, M.M.; Giedke, G.; Cirac, J.I. Extremality of Gaussian Quantum States. Phys. Rev. Lett. 2006, 96, 080502. [Google Scholar] [CrossRef]
  24. García-Patrón, R.; Cerf, N.J. Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef] [PubMed]
  25. Navascués, M.; Grosshans, F.; Acín, A. Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef] [PubMed]
  26. Junge, M.; Renner, R.; Sutter, D.; Wilde, M.M.; Winter, A. Universal Recovery Maps and Approximate Sufficiency of Quantum Relative Entropy. Ann. Henri Poincaré 2018, 19, 2955–2978. [Google Scholar] [CrossRef]
  27. Liu, Y.x.; Özdemir, S.K.; Miranowicz, A.; Imoto, N. Kraus Representation of a Damped Harmonic Oscillator and Its Application. Phys. Rev. A 2004, 70, 042308. [Google Scholar] [CrossRef]
  28. Memarzadeh, L.; Mancini, S. Minimum Output Entropy of a Non-Gaussian Quantum Channel. Phys. Rev. A 2016, 94, 022341. [Google Scholar] [CrossRef]
Figure 1. Visual representation of the set of Gaussian states and the action of Gaussian and nG quantum channels relative to reducing the state nG. Every state in G s has δ n G = 0 , and the action of a Gaussian channel for any state outside G s reduces its nG. The same is not necessarily true for nG channels.
Figure 1. Visual representation of the set of Gaussian states and the action of Gaussian and nG quantum channels relative to reducing the state nG. Every state in G s has δ n G = 0 , and the action of a Gaussian channel for any state outside G s reduces its nG. The same is not necessarily true for nG channels.
Entropy 27 00768 g001
Figure 2. (a) Visual representation of the action of an nG quantum channel on an nG quantum state according to Proposition 1. The set C o n v ( G s ) is the convex hull of G s . (b) Values of the QRE-nG for the GH-QAM constellation with m points per quadrature under a phase diffusion process with fixed modulation variance m ¯ = 2.5 and increasing constellation size. The upper line (blue) corresponds to the constellation nG before the channel and in the constellation under the process with parameters κ = 0.15 and κ = , respectively.
Figure 2. (a) Visual representation of the action of an nG quantum channel on an nG quantum state according to Proposition 1. The set C o n v ( G s ) is the convex hull of G s . (b) Values of the QRE-nG for the GH-QAM constellation with m points per quadrature under a phase diffusion process with fixed modulation variance m ¯ = 2.5 and increasing constellation size. The upper line (blue) corresponds to the constellation nG before the channel and in the constellation under the process with parameters κ = 0.15 and κ = , respectively.
Entropy 27 00768 g002
Figure 3. Constellations resulting from the Hermite polynomials of Equation (13) with n { 2 , 4 , 6 , 8 } . On top, the roots and weights of H n ( x ) form the probability distribution p X ( x ) . At the bottom, the corresponding QAM-like constellations obtained by the Cartesian product are shown.
Figure 3. Constellations resulting from the Hermite polynomials of Equation (13) with n { 2 , 4 , 6 , 8 } . On top, the roots and weights of H n ( x ) form the probability distribution p X ( x ) . At the bottom, the corresponding QAM-like constellations obtained by the Cartesian product are shown.
Entropy 27 00768 g003
Figure 4. Representation of the proposed quantum channel decomposition. The channel N connecting Alice and Bob is split into a thermal-loss part N 1 and a non-Gaussian evolution N 2 . Alice and Bob reconstruct the covariance matrix by estimating the parameters yielded by N 1 . Any security analysis that goes beyond considering Gaussian channels should then quantify the effect of N 2 during quantum communication.
Figure 4. Representation of the proposed quantum channel decomposition. The channel N connecting Alice and Bob is split into a thermal-loss part N 1 and a non-Gaussian evolution N 2 . Alice and Bob reconstruct the covariance matrix by estimating the parameters yielded by N 1 . Any security analysis that goes beyond considering Gaussian channels should then quantify the effect of N 2 during quantum communication.
Entropy 27 00768 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dias, M.A.; Assis, F.M.d. Exploring Non-Gaussianity Reduction in Quantum Channels. Entropy 2025, 27, 768. https://doi.org/10.3390/e27070768

AMA Style

Dias MA, Assis FMd. Exploring Non-Gaussianity Reduction in Quantum Channels. Entropy. 2025; 27(7):768. https://doi.org/10.3390/e27070768

Chicago/Turabian Style

Dias, Micael Andrade, and Francisco Marcos de Assis. 2025. "Exploring Non-Gaussianity Reduction in Quantum Channels" Entropy 27, no. 7: 768. https://doi.org/10.3390/e27070768

APA Style

Dias, M. A., & Assis, F. M. d. (2025). Exploring Non-Gaussianity Reduction in Quantum Channels. Entropy, 27(7), 768. https://doi.org/10.3390/e27070768

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop