Next Article in Journal
Age-Related Changes in EEG Signal Complexity and Behavioral Variability from Childhood to Adulthood: A Multiscale Entropy Approach
Previous Article in Journal
Superdense Coding Using Higher Dimensional Embedding
Previous Article in Special Issue
Exploring Non-Gaussianity Reduction in Quantum Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Role of Averages in CV-QKD over Fast Fading Channels

by
Miguel Castillo-Celeita
1 and
Matteo Schiavon
2,3,*
1
Departamento de Física Teórica, Atómica y Óptica, Universidad de Valladolid, E-47071 Valladolid, Spain
2
Laboratoire d’Informatique de Paris 6 (LIP6), Sorbonne Université, 4 Place Jussieu, 75252 Paris, France
3
Telecom Paris, Institut Polytechnique de Paris, 91120 Palaiseau, France
*
Author to whom correspondence should be addressed.
Entropy 2026, 28(4), 388; https://doi.org/10.3390/e28040388
Submission received: 18 November 2025 / Revised: 9 March 2026 / Accepted: 17 March 2026 / Published: 1 April 2026

Abstract

This work presents a study of continuous-variable quantum key distribution (CV-QKD) protocols over fast-fading channels, typically found in free-space communication links. Two eavesdropping models are considered to evaluate their security under collective attacks: Holevo bound average (HBA) and covariance matrix average (CMA). In the HBA approach, the Holevo bound is averaged over the channel transmittance. In contrast, the CMA method calculates the Holevo bound from the average covariance matrix. Analytical expressions are developed for both strategies. The two methods also differ in how they calculate the mutual information between the legitimate parties. The results demonstrate that the SKR is significantly influenced by how you treat channel fluctuations, highlighting the importance of choosing the model that best describes the actual implementation of the protocol.

1. Introduction

In recent decades, significant progress has been achieved in the field of quantum communications, enabled by the exchange of quantum states of light between different locations on Earth through either optical fiber [1,2,3,4] or free-space channels [5,6,7,8]. To extend communication distances, it is essential to integrate modern terrestrial infrastructure with space-based devices [9,10,11]. However, the effective deployment of such quantum communications setups requires preventing information leakage. Thus, quantum key distribution (QKD) and continuous variable quantum key distribution (CV-QKD) methods are regarded as solutions to the security challenges that may arise in communication between two parties [12,13,14]. Currently, the security of CV-QKD with stationary devices is extensively studied theoretically, in contrast to free-space configurations [15,16]. In this configuration, the transmission channel is described as a stochastic process in both the amplitude and the phase of the received signal [17], due to turbulence or other environmental factors [18,19,20,21]. Since phase fluctuations are common to the signal and the local oscillator in the transmitted local oscillator (TLO) configuration [22], and they must be corrected using pilot tones in the local local oscillator (LLO) configuration [23], their presence, despite being challenging from an experimental point of view, does not represent a particular problem from a theoretical point of view. Amplitude fluctuations, on the other hand, must be explicitly included in the security proof and have a direct impact on the secret key rate. Two situations can be identified in the literature [24]: the slow fading channel, in which the transmittance is stable long enough to allow an accurate estimation, and the fast fading channel, in which the rapid variations of the channel transmittance prevent the measurement of instantaneous values. In this situation, the secret key rate depends on the statistical distribution of the transmittance.
Two distinct statistical approaches for collective attacks in a fast-fading channel have been identified in the literature of CV-QKD [24,25]. The first approach [24] is based on the assumption that, similarly to the slow fading channel, the Holevo bound is averaged over the channel transmittance distribution, while the legitimate users are linked by a channel of minimal transmittance T m i n , meaning that the shared mutual information is I A B T m i n . For this reason, this model will be referred to as Holevo bound average (HBA). This model is the basis of many recent theoretical studies of free-space and satellite CV-QKD [26,27,28,29]. The alternative approach [30,31] assumes that the channel is a statistical mixture of fixed transmittance channels and, due to the optimality of Gaussian attacks [32], the state that maximizes the leaked information is the one characterized by a covariance matrix averaged over the channel transmittance distribution. For this reason, this approach will be referred to as covariance matrix average (CMA). In this model, the mutual information between the legitimate parties is evaluated as I A B , which represents the state of the art of channel coding for this particular channel [25,33].
Here, we present a comparison of the fast fading transmission channel in the previous approaches, considering an idealized uniform transmission channel [24] that does not take into account the diffraction, pointing, and tracking errors present in a real free-space or satellite channel [34,35]. The secret key rate is evaluated for both approaches for different uniform fluctuating channels in order to identify which method gives the most conservative result for the different configurations. To achieve the objectives outlined above, this article is organized as follows: Section 2 presents the protocol and shows the parameter estimation for a channel with fixed transmittance. Section 3 describes the equations for the secret key rate (SKR) for the HBA approach, while Section 4 develops the SKR for the CMA approach. The two methods are compared in Section 5. Finally, conclusions are provided in Section 6.

2. Gaussian Protocol for a Fixed Transmission Channel

In principle, the set of rules governing communication is established by the system parties, Alice and Bob. In this context, the Gaussian Modulated Coherent State (GMCS) CV-QKD protocol with reverse reconciliation is considered [36,37,38]. While this is a prepare-and-measure protocol, its theoretical study is easier considering the equivalent entanglement-based protocol that we will describe here.
The protocol, whose scheme is shown in Figure 1, can be modeled with the following steps:
  • Alice prepares a two-mode squeezed vacuum (TMSV) state of variance V and measures one mode using a heterodyne detector. This projects the other mode B into the coherent state | x q , p , whose average quadratures p ¯ , q ¯ are distributed according to a zero-centered Gaussian distribution of variance V A = V 1 .
  • Alice transmits the mode B through a quantum channel with transmittance T and noise χ .
  • Bob receives the mode B and applies homodyne detection on one of the quadratures q or p, randomly chosen with uniform distribution.
The quadratures of the state received by Bob have a variance which is affected by the transmittance T and the channel noise χ ,
V B = T ( V + χ ) , χ = 1 T 1 + ε ,
where the quantities are normalized to shot-noise units (SNU) and ε is the excess noise referred as the channel input. In this work, we chose to include detector efficiency and electronic noise into the channel parameters. While this gives worse results in terms of SKR, it allows us to directly compare our results with the relevant literature [24].
The SKR in the case of collective attacks is evaluated using the formula [39]
R = I A B I E ,
where I A B is the mutual information shared between Alice and Bob and I E represents the information leaked to the eavesdropper Eve. Since the random variables obtained by Alice and Bob after the measurement are Gaussian, the mutual information is derived as the difference between the differential entropy (the differential entropy, a continuous version of the Shannon entropy, has the form H ( X ) = d x P ( x ) log 2 P ( x ) , which is equal to 1 / 2 log 2 ( 2 π e ) + 1 / 2 log 2 V for a Gaussian random variable of variance V) of Bob H ( X B ) and the differential entropy of Bob conditioned on Alice’s variable H ( X B | A ) , with V B | A = T ( 1 + χ ) [40]. Consequently, the mutual information is given by
I A B = 1 2 log 2 V B V B | A = 1 2 log 2 V + χ 1 + χ .

Information Leaked to Eve Under Collective Attacks

In this work, it is assumed that the eavesdropper implements a collective attack, which is equivalent to the most general possible quantum attack in the asymptotic limit [41]. In this scenario, Eve interacts separately with each mode transmitted through the channel using ancillary modes stored in a quantum memory, which are then measured jointly at her will.
In the above scenario, the leaked information is bounded by the Holevo bound
I E χ BE = S ( E ) S ( E | B ) = S ( ρ E ) d m B p ( m B ) S ( ρ E m B ) ,
where S ( · ) is the Von Neumann entropy and m B represents the result of Bob measurement. Moreover, under the assumption that Eve owns a purification of the system, the Holevo quantity admits the following expression:
χ B E = S ( E ) S ( E | B ) = S ( A B ) S ( A | B ) .
The optimality of Gaussian attacks enables the computation of the entropies as [42]
χ B E = i = 1 2 G λ i 1 2 G λ 3 1 2 ,
where G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x . In this case, the λ 1 , 2 represent the symplectic eigenvalues of the covariance matrix γ A B , described as the state jointly shared between Alice and Bob, while λ 3 represents the symplectic eigenvalue of the covariance matrix γ A | B , which corresponds to the conditional covariance matrix after the Bob measurement. In this manner, the covariance matrix γ A B , corresponding to the bipartite state ρ A B , can be expressed as
γ A B = γ A σ A B T σ A B γ B = V 1 T ( V 2 1 ) σ z T ( V 2 1 ) σ z T ( V + χ ) 1 .
The symplectic eigenvalues correspond to the eigenvalues of the matrix γ ˜ A B , defined as
γ ˜ A B = i Ω γ A B , Ω = l = 1 2 0 1 1 0 .
They are given by
λ 1 , 2 = 1 2 A ± A 2 4 B ,
where
A = T 2 ( V + χ ) 2 + ( 1 2 T ) V 2 + 2 T , B = T 2 ( V χ + 1 ) 2 ,
which may equivalently be expressed as
A = A 0 2 + ( 1 2 T ) + 2 T V 2 V 2 , B = B 0 2 V 2 .
with A 0 = T 1 + χ / V and B 0 = T χ + 1 / V . The second term of Equation (5) is calculated from the state ρ A | B , whose covariance matrix can be written as [43]
γ A | B = γ A σ A B T H hom σ A B ,
where H hom = ( X γ B X ) 1 is the symplectic matrix that represents the homodyne measurement of the X quadrature. In this case, the inverse corresponds to the Moore–Penrose pseudoinverse, which, for a diagonal matrix, is obtained by inverting the elements along the diagonal diag ( a 1 , a n ) 1 = diag ( a 1 1 , a n 1 ) . With X = diag ( 1 , 0 ) and γ B = T ( V + χ ) 1 , the matrix is expressed as
H hom = T ( V + χ ) 0 0 0 1 = 1 T ( V + χ ) 0 0 0 .
Developing the second term on the right-hand side of Equation (11), it is possible to obtain
σ A B T H hom σ A B = T ( V 2 1 ) T ( V + χ ) 1 0 0 0 .
The explicit covariance matrix conditioned on the homodyne measurement is given by
γ A | B = V 1 0 0 1 V 2 1 V + χ 1 0 0 0 ,
whose sympletic eigenvalue is
λ 3 = V ( 1 + V χ ) V + χ = B 0 A 0 V 1 / 2 .
A similar calculation shows that the same eigenvalue λ 3 is also obtained for a measurement of the quadrature P.

3. Secret Key Rate with Holevo Bound Average

The fast fading channel is characterized by the fact that the users can only estimate the probability distribution of the transmission efficiency and not its instantaneous value. The relevant channel statistics are inferred in the standard CV-QKD parameter-estimation step by publicly revealing over an authenticated classical channel a randomly chosen subset of the correlated classical data, from which the fading distribution is estimated [24]. An approach to deal with this problem consists of having the two legitimate parties choose the worst value for the parameters compatible with the observed distribution, using a code of rate I A B T m i n . Since the distinction between slow and fast fading is irrelevant for the all powerful Eve, it is possible to assume that the leaked information is the same for the two cases [24]. These two assumptions represent the core of the HBA approach, which gives an SKR
R = I A B T m i n I B E ,
where the average is taken on the probability distribution of the transmission efficiency. These inferred statistics are treated as public and are incorporated through worst-case confidence bounds. Therefore, security is preserved under standard parameter estimation. Assuming T [ T m i n , T m a x ] with uniform distribution and T m a x = T m i n + Δ T , the SKR becomes
R ( T m i n ) = I A B T m i n 1 Δ T T m i n T m a x χ B E ( T ) d T .
This approach shows an interesting behavior in a high-variance regime V 1 . In this context, the approximation for the mutual information (3) is given by
I A B T = 1 2 log 2 T T + ( 1 T ) ω + 1 2 log 2 V ,
where the ω is the thermal variance [44],
ω = 1 + T ε 1 T , χ = ( 1 T ) T ω .
Before computing the Holevo bound (6), it is necessary to approximate the expression for the eigenvalues λ 1 , 2 , 3 (see Appendix A for deduction)
λ 1 V ( 1 T ) , λ 2 ω .
Finally, the approximation of λ 3 leads to the expression
λ 3 ( 1 T ) ω V T .
Therefore, the Holevo bound χ B E equation is reorganized as
χ B E ( T ) = 1 2 log 2 T ( 1 T ) V ω + h ω 1 2 ,
where h ( ω ) = ( ω + 1 ) log 2 ( ω + 1 ) ω log 2 ( ω ) .
In this manner, the average Holevo bound can be written in an analytic form as
I B E = 1 2 Δ T log 2 [ T max T max T min T min T ¯ min T ¯ min T ¯ max T ¯ max 2 ( 1 ε ¯ T max ) 1 ε ¯ T max ( 1 ε ¯ T min ) 1 ε ¯ T min 1 / ε ¯ ] + 1 2 log 2 ( V ) log 2 ( e ) + h ,
where T ¯ = 1 T , ε ¯ = 1 ε , and the function h is defined in Appendix B and is independent of V. It is worth noting that, in the asymptotic regime V 1 , the SKR given in Equation (16) is independent of the variance V.

4. Analysis of the SKR in the Covariance Matrix Average Approach

The approach defined in the previous section assumes that the legitimate parties adjust the rate of the code to the minimum transmittance compatible with the channel parameters. However, this is not the most efficient way to proceed in the case of a fluctuating channel. The channel outputs are modeled as Y k = T k X k + Z k , for the k-th channel use, where T k [ 0 , 1 ] denotes the ergodic fading and Z k N ( 0 , σ ) ergodic Gaussian noise of variance σ .
When fading is unknown, the receiver maps a sequence { y i } of received messages from a block of length N. This may lead to an overestimation of the channel capacity. To moderate this, the receiver incorporates noise information by mapping the pairs ( y i , τ i ) , which provides a more accurate representation of a free-space communication channel [33]. In this context, the receiver strategy must account for the random fluctuations introduced by fading, which otherwise may lead to an overestimation of the channel performance. To address this, the concept of ergodic capacity becomes a natural tool, as it captures the long-term average behavior of the channel under varying transmittance. By averaging over all possible realizations of the fading process, the ergodic capacity provides an appropriate characterization of the channel transmittance. Accordingly, the average mutual information shared between Alice and Bob is given by
I A B = 1 Δ T T m i n T m i n + Δ T 1 2 log 2 1 + T V A σ d T ,
where the denominator is defined as σ = 1 + ε T . As a result, the mutual information between them can be written in closed form as follows:
I A B = 1 2 Δ T [ 1 ε log 2 1 + ε T m i n 1 + ε T m a x + T m a x log 2 1 + T m a x ( ε + V A ) 1 + ε T m a x + 1 ε + V A log 2 1 + T m a x ( ε + V A ) 1 + T m i n ( ε + V A ) + T m i n log 2 1 + ε T m i n 1 + T m i n ( ε + V A ) ] .
The calculation of the Holevo bound in the CMA approach is based on the idea that, if the statistics over channels with transmittance fluctuations are characterized by a probability distribution P ( T ) , the channel is described by a classical mixture of different subchannels, each of which has approximately constant transmissivity T i with probability p i . Therefore i p i = 1 , or in the continuum 0 T m a x p ( T ) d T = 1 . Given a Gaussian input state ρ i n , the output state of each subchannel is the Gaussian state ρ i and the final mix state is the generally non-Gaussian state ρ = i p i ρ i (even if the output state is non-Gaussian, the optimality of the Gaussian attack [32] allows the use of the Gaussian state with identical moments for the calculation of the Holevo bound). Similarly, the Wigner function of the output state is constructed as a weighted sum of the Wigner functions corresponding to each subchannel W ( q ¯ , p ¯ ) = Σ i p i W i ( q ¯ , p ¯ ) , with probabilistic weights p i [45]. In this manner, the resulting function allows for the calculation of the second-order moments of the quadrature variables ( q ¯ , p ¯ ) . The covariance matrix of the output state is obtained as the average of the covariance matrices associated with each subchannel over the probability distribution P ( T ) [46]
γ A B = V 1 T ( V 2 1 ) σ z T ( V 2 1 ) σ z T ( V + χ ) 1 .
The average channel noise is given by χ = 1 / T 1 + ε , assuming that the excess noise ε is independent on the channel transmittance. Using this expression for the noise, we obtain the result presented in [25]:
γ A B = V 1 T ( V 2 1 ) σ z T ( V 2 1 ) σ z ( T ( V A + ε ) + 1 ) 1 .
The average conditional covariance matrix is derived in the same way of (11)
γ A | B = V 1 diag ( 1 , 0 ) T ( V 2 1 ) T ( V + χ ) .
The average covariance matrix is dependent on the two moments T and T of the probability distribution of the transmittance efficiency P ( T ) . Assuming T [ T m i n , T m a x ] , with uniform distribution, these moments can be calculated analytically as
T = 1 Δ T T m i n T m i n + Δ T T d T = 2 3 Δ T ( ( T m i n + Δ T ) 3 / 2 T m i n 3 / 2 ) , T = 1 Δ T T m i n T m i n + Δ T T d T = T m i n + Δ T 2 .
By defining the effective values of the channel parameters [47]
T e f f = T 2 , χ e f f = 1 T e f f 1 + ε e f f , ε e f f = ε 1 + Var ( T ) T e f f + Var ( T ) T e f f V A ,
where the variance is defined by Var ( T ) = ( T ) 2 T 2 and V A = V 1 , it is possible to write the average covariance matrices γ A B and γ A | B in the same form as the fixed transmission channel ones defined in Section Information Leaked to Eve Under Collective Attacks by making the substitution T T e f f and χ χ e f f .
Therefore, it is possible to use the same equations derived in that section for the calculation of the symplectic eigenvalues contributing to the Holevo bound (6). Thus, the eigenvalues of the covariance matrix (26) are given as follows:
λ ˜ 1 , 2 = 1 2 A ± A 2 4 B
where
A = V 2 ( 1 2 T e f f ) + 2 T e f f + T e f f 2 ( V + χ e f f ) 2 , B = T e f f 2 V χ e f f + 1 2 .
The last eigenvalue is given by
λ ˜ 3 = V 1 + V χ e f f V + χ e f f .
Using these eigenvalues, it is possible to calculate the secret key rate as
R = I A B χ B E ( λ ˜ 1 , λ ˜ 2 , λ ˜ 3 ) ,
where the Holevo bound is given by (6) with the respective considerations on the transmittance distribution.

5. Results and Discussion

This section compares the two approaches, focusing on their influence on the SKR. We assume for the channel transmittance a uniform distribution in the interval [ T m i n , T m a x ] and define Δ T : = T m a x T m i n , while the excess noise ε is independent of the transmittance. The formalism is not restricted to uniform fading. In the HBA treatment, the uniform measure can be replaced by a general P ( T ) in the averaging integrals, whereas in the CMA treatment, the effective parameters are determined by moments T and T , which can be evaluated for physically motivated distributions.
The results show that the achievable SKR is strongly affected by the statistical treatment of the Holevo bound, χ B E , during the key extraction process. Although the mutual information I A B plays a role, its influence is relatively minor under the conditions considered.
To evaluate the performance of both approaches under different fading regimes, the SKR behavior is evaluated across various parameter configurations (V, Δ T , and ε ). In Figure 2, it is shown that, for low modulation variance, the HBA approach (blue lines) allows the generation of a positive secret key down to a T m i n of 6– 8 dB , regardless of the width of the transmittance distribution Δ T . This result shows a relative stability of the HBA approach against channel fluctuations, which do not influence the mutual information between the legitimate parties and have a minor effect on the average Holevo bound.
In contrast, the CMA approach (Figure 2, green lines) exhibits a notable degradation in the SKR as the parameter Δ T increases from 0.2 to 0.6 . This behavior is attributed to the reduced average mutual information shared by the legitimate parties. For both approaches, an increase in excess noise ε leads to a reduction in SKR, a result that aligns with theoretical expectations and previous analyses. This trend persists across the whole range of variances and transmittance intervals.
Figure 3 further explores how the SKR depends on the modulation variance V. For the HBA approach (blue lines), the SKR increases with V and eventually reaches an asymptotic regime for V 1 (horizontal black lines), in line with the analytical result found in Section 3. Conversely, in the CMA approach, as evident from Figure 3, the SKR is higher in the low-variance regime but suffers a rapid decline as V increases. This effect is particularly strong for high attenuation channels and reflects the stronger influence of the modulation variance on the information leaked to the adversary than on the information shared by the legitimate parties.
Therefore, an important distinction between the two approaches in terms of the variance V lies in how they scale with system variance V. This is rooted in the structural differences in the components that determine the symplectic eigenvalues of the Holevo bound. Specifically, in the CMA approach, the factor B scales as V 4 (Equation (A8)), while in the HBA it scales as V 2 (Equation (10)). Similarly, the third symplectic eigenvalue scales as V in the CMA (Equation (A9)) and as V 1 / 2 in the HBA (Equation (14)). Consequently, the Holevo bound grows significantly faster in CMA than in HBA, preventing the system from reaching an asymptotic SKR for large V due to the rapid increase in the Holevo bound (for reference, see Figure 4).
For this reason, in the CMA, it is necessary to optimize the variance as a function of the channel statistics, V opt ( T min ) max V [ R ( V ; T m i n ) ] giving the results shown in Figure 5. Indeed, it is fair to assume that the legitimate parties know the statistical properties of the channel and work at the optimal modulation variance. In contrast, for the CMA, the optimal configuration naturally tends toward the high-variance limit, where the SKR becomes less sensitive to further increases in V.

6. Conclusions

This paper compares two different approaches for the evaluation of the secret key rate of CV-QKD on a fluctuating channel found in the literature.
The HBA approach is characterized by a slower growth of the Holevo bound with respect to the variance V, which allows the system to reach a stable asymptotic SKR for V 1 . The choice of a rate matching the minimum transmittance of the channel represents a strong limitation for high attenuation channels, only partly mitigated by the lower estimation of the Holevo bound.
The CMA approach, on the other hand, is characterized by the choice of an optimized rate between the legitimate parties, which justifies the improvement in the high attenuation regime. However, the increased excess noise introduced by the average of the covariance matrix is detrimental for a high level of fluctuations, requiring a fine-tuning of the modulation variance as well in order to obtain a positive key rate.
This work has studied—through numerical simulations—the difference in the obtained SKR for the two approaches. The CMA approach seems more in line with what has been performed for experimental CV-QKD, where the Holevo bound is calculated from the observed statistics of the state after passing through the channel. However, the simulations show that the HBA tends to underestimate the SKR for all the configurations examined, and does not require an optimization of the modulation variance, which still makes it a valuable alternative for the estimation of the performance of CV-QKD on the fluctuating channel.
In addition to this, the effects of the choice of a lower code rate in the HBA approach and its impact on the leaked information need to be further investigated.
Finally, it is reasonable to expect that the present analysis could be generalized to QKD systems affected by fading channels. In particular, recent demonstrations of heterogeneous, multi-node QKD networks indicate that deployed links may exhibit time-varying attenuation [48].

Author Contributions

Conceptualization, M.C.-C. and M.S.; Methodology, M.C.-C. and M.S.; Software, M.C.-C.; Validation, M.S.; Formal analysis, M.C.-C.; Investigation, M.C.-C. and M.S.; Resources, M.C.-C.; Writing—original draft, M.C.-C.; Writing—review & editing, M.S.; Supervision, M.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Q-CAYLE project, funded by the European Union-Next Generation UE/MCIU/Plan de Recuperacion, Transformacion y Resiliencia/Junta de Castilla y Leon (PRTRC17.11), and also by RED2022-134301-T and PID2023-148409NB-I00, financed by MI-CIU/AEI/10.13039/501100011033. The financial support of the Department of Education of the Junta de Castilla y León and FEDER Funds is also gratefully acknowledged (Reference: CLU-2023-1-05). M.S. acknowledges funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 101082596 (project QUDICE).

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Appendix A. Asymptotic Approximation

In this section, the eigenvalues used in Section 3 are developed in the limit V 1 . In this way, Equation (10) in terms of the noise variance ω is given by
A = V 2 ( 1 2 T ) + 2 T + T 2 V + ( 1 T ) ω T 2 , B = T 2 V ( 1 T ) ω T + 1 2 .
Taking into account the dominant terms of V
A = V 2 ( 1 2 T ) + T 2 V 2 = V 2 ( 1 T ) 2 , B = V 2 ( 1 T ) 2 ω 2 .
Therefore, the expression for the eigenvalues has the form
λ 1 , 2 = 1 2 V 2 ( 1 T ) 2 ± V 2 ( 1 T ) 2 1 4 ω 2 V 2 ( 1 T ) 2 1 / 2 .
Using the approximation 1 ± a x 2 1 ± a x 2 / 2 for x 1 , where a 4 ω 2 / ( 1 T ) 2 and x 1 / V , and substituting into the above equation, the result is obtained:
λ 1 , 2 1 2 V 2 ( 1 T ) 2 ± V 2 ( 1 T ) 2 1 2 ω 2 V 2 ( 1 T ) 2 1 / 2 .
Considering that V 1 again, the eigenvalues λ 1 , 2 are given by
λ 1 = 1 2 2 V 2 ( 1 T ) 2 2 ω 2 1 / 2 V ( 1 T ) , λ 2 = 1 2 ( 2 ω 2 ) 1 / 2 = ω .
Based on the preceding development, the third eigenvalue for V 1 is expressed as
λ 3 ( 1 T ) ω V T .

Appendix B. Asymptotic Holevo-Bound Function

This appendix presents the derivation of the Holevo bound corresponding to the HBA approach. Within this framework, the Holevo bound is expressed as the mean value of the χ B E function
I B E = 1 Δ T T m i n T m i n + Δ T χ B E d T .
The indefinite integral has the following form:
χ B E = 1 2 Δ T log 2 ( T ¯ + ε T ) 1 ε + T log 2 T ¯ 2 T V T ¯ + ε T 2 log 2 ( e ) log 2 T ¯ 2 + h ,
where the function h is defined as
h ω 1 2 = ω + 1 2 log 2 ω + 1 2 ω 1 2 log 2 ω 1 2 ,
and ω denotes the thermal variance introduced in Equation (18). Consequently, the mean value of this term can be written as
h ω 1 2 = 1 2 Δ T [ 2 log 2 T ¯ 2 ( ε 1 ) ε 2 log 2 T + 2 ε 2 log 2 2 T ¯ + ε T + T log 2 ε T 4 T ¯ 2 ( 2 T ¯ + ε T ) ε 1 ε 2 ( 2 T ¯ + ε T ) log 2 2 T ¯ + ε T ε T ε ln ( 2 ) Li 2 ( T ¯ ) Li 2 ( ε 2 ) T ¯ ε ] .
The evaluation of χ B E over the transmittance interval yields the Holevo bound for the HBA approach
I B E = χ B E | Δ T + T m i n χ B E | T m i n .
Finally, the auxiliary function h , which completes the integral, corresponds to the evaluation of Equation (A5) at the extremes of the transmittance interval. Its explicit form is given by
h = 1 2 Δ T [ 2 log 2 T ¯ m a x T ¯ m i n 2 ( ε 1 ) ε 2 log 2 T m a x T m i n + 2 ε 2 log 2 2 T ¯ m a x + ε T m a x 2 T ¯ m i n + ε T m i n + T m a x log 2 ε T m a x 4 T ¯ m a x 2 ( 2 T ¯ m a x + ε T m a x ) ε 1 ε 2 ( 2 T ¯ m a x + ε T m a x ) log 2 2 T ¯ m a x + ε T m a x ε T m a x T m i n log 2 ε T m i n 4 T ¯ m i n 2 ( 2 T ¯ m i n + ε T m i n ) + ε 1 ε 2 ( 2 T ¯ m i n + ε T m i n ) log 2 2 T ¯ m i n + ε T m i n ε T m i n ε ln ( 2 ) Li 2 ( T ¯ m a x ) Li 2 ( ε 2 ) T ¯ m a x ε Li 2 ( T ¯ m i n ) + Li 2 ( ε 2 ) T ¯ m i n ε ] ;
in this case, the dilogarithm function Li 2 ( z ) = z 0 ln ( 1 t ) / t d t . In the limit of low excess noise ε 0 , or equivalently ω 1 , the h function vanishes,
lim ε 0 h ω 1 2 = 0 ,
which corresponds to the case of a passive eavesdropper.

Appendix C. Holevo Bound in the CMA Approach

In the CMA approach, the Holevo bound (33) depends to the symplectic eigenvalues of the covariance matrix (26), which are given by
λ ˜ 1 , 2 = 1 2 A ± A 2 4 B , A = V 2 ( 1 2 T e f f ) + 2 T e f f + T e f f 2 ( V + χ e f f ) 2 , B = T e f f 2 V χ e f f + 1 2 , λ ˜ 3 = V 1 + V χ e f f V + χ e f f .
In this manner, if the highest power of the variance is factorized on the A and B terms, the following expressions are obtained:
A = ( 1 2 T e f f ) + 2 T e f f V 2 + A 0 2 V 2 , A 0 = T e f f 1 + a + b V , B = T e f f 2 a ( T e f f ) + b ( T e f f ) V + 1 V 2 2 V 4 B 0 2 V 4 .
where a, b are given by
a ( T e f f ) = Var ( T ) T e f f + ε 1 + Var ( T ) T e f f , b ( T e f f ) = 1 T T e f f .
The factorization of V 2 into the expression for B is possible only because of the linear dependence of the effective noise χ e f f of variance V in Equation (29),
χ e f f = a ( T e f f ) V + b ( T e f f ) .
Considering the above, together with the symplectic eigenvalues, the resulting expressions can be written as follows:
λ ˜ 1 , 2 = 1 2 A 0 ± A 0 2 4 B 0 2 V λ ˜ 3 = B 0 A 0 V .

References

  1. Yin, H.L.; Chen, T.Y.; Yu, Z.W.; Liu, H.; You, L.X.; Zhou, Y.H.; Chen, S.J.; Mao, Y.; Huang, M.Q.; Zhang, W.J.; et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 2016, 117, 190501. [Google Scholar] [CrossRef]
  2. Huang, D.; Huang, P.; Lin, D.; Zeng, G. Long-distance continuous-variable quantum key distribution by controlling excess noise. Sci. Rep. 2016, 6, 19201. [Google Scholar] [CrossRef]
  3. Orieux, A.; Diamanti, E. Recent advances on integrated quantum communications. J. Opt. 2016, 18, 083002. [Google Scholar] [CrossRef]
  4. Zhuang, S.C.; Li, B.; Zheng, M.Y.; Zeng, Y.X.; Wu, H.N.; Li, G.B.; Yao, Q.; Xie, X.P.; Li, Y.H.; Qin, H.; et al. Ultrabright Entanglement Based Quantum Key Distribution over a 404 km Optical Fiber. Phys. Rev. Lett. 2025, 134, 230801. [Google Scholar] [CrossRef] [PubMed]
  5. Fedrizzi, A.; Ursin, R.; Herbst, T.; Nespoli, M.; Prevedel, R.; Scheidl, T.; Tiefenbacher, F.; Jennewein, T.; Zeilinger, A. High-fidelity transmission of entanglement over a high-loss free-space channel. Nat. Phys. 2009, 5, 389–392. [Google Scholar] [CrossRef]
  6. Jin, X.M.; Ren, J.G.; Yang, B.; Yi, Z.H.; Zhou, F.; Xu, X.F.; Wang, S.K.; Yang, D.; Hu, Y.F.; Jiang, S.; et al. Experimental free-space quantum teleportation. Nat. Photonics 2010, 4, 376–381. [Google Scholar] [CrossRef]
  7. Sidhu, J.S.; Joshi, S.K.; Gündoğan, M.; Brougham, T.; Lowndes, D.; Mazzarella, L.; Krutzik, M.; Mohapatra, S.; Dequal, D.; Vallone, G.; et al. Advances in space quantum communications. IET Quantum Commun. 2021, 2, 182–217. [Google Scholar] [CrossRef]
  8. Pan, D.; Song, X.T.; Long, G.L. Free-space quantum secure direct communication: Basics, progress, and outlook. Adv. Devices Instrum. 2023, 4, 0004. [Google Scholar] [CrossRef]
  9. Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Zhang, L.; Li, Y.; Ren, J.G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef]
  10. Chen, Y.A.; Zhang, Q.; Chen, T.Y.; Cai, W.Q.; Liao, S.K.; Zhang, J.; Chen, K.; Yin, J.; Ren, J.G.; Chen, Z.; et al. An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature 2021, 589, 214–219. [Google Scholar] [CrossRef]
  11. Xiang, X.; Shi, B.; Quan, R.; Liu, Y.; Xia, Z.; Hong, H.; Liu, T.; Wu, J.; Qiang, J.; Jia, J.; et al. Quantum two-way time transfer over a hybrid free-space and fiber link. Quantum Sci. Technol. 2023, 8, 045017. [Google Scholar] [CrossRef]
  12. Diamanti, E.; Leverrier, A. Distributing secret keys with quantum continuous variables: Principle, security and implementations. Entropy 2015, 17, 6072–6092. [Google Scholar] [CrossRef]
  13. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  14. Cao, Y.; Zhao, Y.; Wang, Q.; Zhang, J.; Ng, S.X.; Hanzo, L. The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Commun. Surv. Tutorials 2022, 24, 839–894. [Google Scholar] [CrossRef]
  15. Pirandola, S. Limits and security of free-space quantum communications. Phys. Rev. Res. 2021, 3, 013279. [Google Scholar] [CrossRef]
  16. Zhang, Y.; Bian, Y.; Li, Z.; Yu, S.; Guo, H. Continuous-variable quantum key distribution system: Past, present, and future. Appl. Phys. Rev. 2024, 11, 011318. [Google Scholar] [CrossRef]
  17. Klen, M.; Semenov, A. Numerical simulations of atmospheric quantum channels. Phys. Rev. A 2023, 108, 033718. [Google Scholar] [CrossRef]
  18. Li, L.; Huang, P.; Wang, T.; Zeng, G. Practical security of a chip-based continuous-variable quantum-key-distribution system. Phys. Rev. A 2021, 103, 032611. [Google Scholar] [CrossRef]
  19. Zuo, Z.; Wang, Y.; Mao, Y.; Ruan, X.; Guo, Y. Security of quantum communications in oceanic turbulence. Phys. Rev. A 2021, 104, 052613. [Google Scholar] [CrossRef]
  20. Hu, H.; Zhong, H.; Ye, W.; Guo, Y. Simultaneous two-way classical communication and measurement-device-independent quantum key distribution on oceanic quantum channels. Commun. Theor. Phys. 2022, 74, 125102. [Google Scholar] [CrossRef]
  21. Aman, W.; Al-Kuwari, S.; Muzzammil, M.; Rahman, M.M.U.; Kumar, A. Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook. Ad Hoc Netw. 2023, 142, 103114. [Google Scholar] [CrossRef]
  22. Zhang, Y.; Chen, Z.; Pirandola, S.; Wang, X.; Zhou, C.; Chu, B.; Zhao, Y.; Xu, B.; Yu, S.; Guo, H. Long-Distance Continuous-Variable Quantum Key Distribution over 202.81 km of Fiber. Phys. Rev. Lett. 2020, 125, 010502. [Google Scholar] [CrossRef]
  23. Qi, B.; Lougovski, P.; Pooser, R.; Grice, W.; Bobrek, M. Generating the Local Oscillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection. Phys. Rev. X 2015, 5, 041009. [Google Scholar] [CrossRef]
  24. Papanastasiou, P.; Weedbrook, C.; Pirandola, S. Continuous-variable quantum key distribution in uniform fast-fading channels. Phys. Rev. A 2018, 97, 032311. [Google Scholar] [CrossRef]
  25. Dequal, D.; Trigo Vidarte, L.; Roman Rodriguez, V.; Vallone, G.; Villoresi, P.; Leverrier, A.; Diamanti, E. Feasibility of satellite-to-ground continuous-variable quantum key distribution. Npj Quantum Inf. 2021, 7, 3. [Google Scholar] [CrossRef]
  26. Fan, L.; Bian, Y.; Zhang, Y.; Yu, S. Free-space continuous-variable quantum key distribution with imperfect detector against uniform fast-fading channels. Symmetry 2022, 14, 1271. [Google Scholar] [CrossRef]
  27. Yang, F.; Qiu, D.; Mateus, P. Continuous-variable quantum secret sharing in fast-fluctuating channels. IEEE Trans. Quantum Eng. 2023, 4, 4100809. [Google Scholar] [CrossRef]
  28. Zhao, R.; Zhou, J.; Shi, R.; Shi, J. Unidimensional continuous variable quantum key distribution under fast fading channel. Ann. Der Phys. 2024, 536, 2300401. [Google Scholar] [CrossRef]
  29. Zhao, R.; Zhou, J.; Shi, R.; Shi, J.; He, G. Continuous-variable measurement-device-independent multipartite quantum communication via a fast-fading channel. Phys. Rev. A 2025, 111, 012613. [Google Scholar] [CrossRef]
  30. Dong, R.; Lassen, M.; Heersink, J.; Marquardt, C.; Filip, R.; Leuchs, G.; Andersen, U.L. Continuous-variable entanglement distillation of non-Gaussian mixed states. Phys. Rev. A—Atomic Mol. Opt. Phys. 2010, 82, 012312. [Google Scholar] [CrossRef]
  31. Usenko, V.C.; Heim, B.; Peuntinger, C.; Wittmann, C.; Marquardt, C.; Leuchs, G.; Filip, R. Entanglement of Gaussian states and the applicability to quantum key distribution over fading channels. New J. Phys. 2012, 14, 093048. [Google Scholar] [CrossRef]
  32. Navascués, M.; Grosshans, F.; Acín, A. Optimality of Gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef]
  33. Lapidoth, A.; Shamai, S. Fading channels: How perfect need “perfect side information” be? IEEE Trans. Inf. Theory 2002, 48, 1118–1134. [Google Scholar] [CrossRef]
  34. Pirandola, S. Composable security for continuous variable quantum key distribution: Trust levels and practical key rates in wired and wireless networks. Phys. Rev. Res. 2021, 3, 043014. [Google Scholar] [CrossRef]
  35. Pirandola, S. Satellite quantum communications: Fundamental bounds and practical security. Phys. Rev. Res. 2021, 3, 023130. [Google Scholar] [CrossRef]
  36. Grosshans, F.; Grangier, P. Reverse reconciliation protocols for quantum cryptography with continuous variables. arXiv 2002, arXiv:quant-ph/0204127. [Google Scholar] [CrossRef]
  37. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A. Long-distance continuous-variable quantum key distribution with a Gaussian modulation. Phys. Rev. A—Atomic Mol. Opt. Phys. 2011, 84, 062317. [Google Scholar] [CrossRef]
  38. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  39. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef]
  40. Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B At. Mol. Opt. Phys. 2009, 42, 114014. [Google Scholar] [CrossRef]
  41. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A—Atomic Mol. Opt. Phys. 2010, 81, 062343. [Google Scholar] [CrossRef]
  42. Serafini, A. Quantum Continuous Variables: A Primer of Theoretical Methods; CRC Press: Boca Raton, FL, USA, 2017. [Google Scholar]
  43. Laudenbach, F.; Pacher, C.; Fung, C.H.F.; Poppe, A.; Peev, M.; Schrenk, B.; Hentschel, M.; Walther, P.; Hübel, H. Continuous-variable quantum key distribution with Gaussian modulation—The theory of practical implementations. Adv. Quantum Technol. 2018, 1, 1800011. [Google Scholar] [CrossRef]
  44. Garcia-Patron Sanchez, R. Quantum Information with Optical Continuous Variables: From Bell Tests to Key Distribution. Ph.D. Thesis, Université Libre de Bruxelles, Brussels, Belgium, 2007. [Google Scholar]
  45. Walschaers, M. Non-Gaussian quantum states and where to find them. PRX Quantum 2021, 2, 030204. [Google Scholar] [CrossRef]
  46. Hosseinidehaj, N.; Walk, N.; Ralph, T.C. Composable finite-size effects in free-space continuous-variable quantum-key-distribution systems. Phys. Rev. A 2021, 103, 012605. [Google Scholar] [CrossRef]
  47. Trigo Vidarte, L. Design and Implementation of High-Performance Devices for Continuous-Variable Quantum Key Distribution. Ph.D. Thesis, Université Paris Saclay (COmUE), Gif-sur-Yvette, France, 2019. [Google Scholar]
  48. Lu, F.Y.; Wang, Z.H.; Zhou, Y.; Fan, Y.X.; Wang, S.; Yin, Z.Q.; Li, J.; He, D.Y.; Wang, F.X.; Chen, W.; et al. Fully heterogeneous prepare-and-measure quantum network for the next stage of quantum internet. Nat. Commun. 2025, 16, 11487. [Google Scholar] [CrossRef] [PubMed]
Figure 1. This is the scheme of the system, where Alice prepares a two-mode coherent state and sends half through a quantum channel with transmittance T and noise variance χ . Eve can interact with this mode by injecting extra noise and storing the state information in a quantum memory (Q-M). Bob receives the output mode and measures one of the quadratures in a homodyne detector.
Figure 1. This is the scheme of the system, where Alice prepares a two-mode coherent state and sends half through a quantum channel with transmittance T and noise variance χ . Eve can interact with this mode by injecting extra noise and storing the state information in a quantum memory (Q-M). Bob receives the output mode and measures one of the quadratures in a homodyne detector.
Entropy 28 00388 g001
Figure 2. This graph presents four panels that evaluate the performance of two distinct approaches in the low-variance regime, V = 10 . The HBA approach is shown in blue, while the CMA approach is shown in green. The figure compares the SKR for both approaches under three different excess noise levels: 0 % (solid lines), 0.5 % (dashed lines), and 3 % (dotted lines). Results are displayed for two transmittance ranges: Δ T = 0.2 (left panels) and Δ T = 0.6 (right panels). The top row displays the SKR as a function of the minimum transmittance value and the bottom row as a function of the mean transmittance.
Figure 2. This graph presents four panels that evaluate the performance of two distinct approaches in the low-variance regime, V = 10 . The HBA approach is shown in blue, while the CMA approach is shown in green. The figure compares the SKR for both approaches under three different excess noise levels: 0 % (solid lines), 0.5 % (dashed lines), and 3 % (dotted lines). Results are displayed for two transmittance ranges: Δ T = 0.2 (left panels) and Δ T = 0.6 (right panels). The top row displays the SKR as a function of the minimum transmittance value and the bottom row as a function of the mean transmittance.
Entropy 28 00388 g002
Figure 3. Secret key rate as a function of the modulation variance for different values of T m i n . (right) The blue lines represent the HBA approach, while the horizontal black lines correspond to the SKR calculated in the high variance regime V 1 . This confirms that the optimal SKR is obtained for V . (left) The green lines show the CMA approach. In this case, the optimal variance varies depending on the transmittance value and must be reduced as T m i n approaches 0. The SKR is computed considering Δ T = 0.2 .
Figure 3. Secret key rate as a function of the modulation variance for different values of T m i n . (right) The blue lines represent the HBA approach, while the horizontal black lines correspond to the SKR calculated in the high variance regime V 1 . This confirms that the optimal SKR is obtained for V . (left) The green lines show the CMA approach. In this case, the optimal variance varies depending on the transmittance value and must be reduced as T m i n approaches 0. The SKR is computed considering Δ T = 0.2 .
Entropy 28 00388 g003
Figure 4. (left) Holevo bound for the HBA (Equation (22)), plotted in blue with variance fixed at V = 10 3 . CMA results are shown in green: the lower curves correspond to the optimal variance V = V opt (Equation (33)), while the upper curves use V = 10 3 . (right) Mutual information for the HBA (Equation (17)) and CMA (Equation (24)), using the same color scheme (blue for HBA; green for CMA).
Figure 4. (left) Holevo bound for the HBA (Equation (22)), plotted in blue with variance fixed at V = 10 3 . CMA results are shown in green: the lower curves correspond to the optimal variance V = V opt (Equation (33)), while the upper curves use V = 10 3 . (right) Mutual information for the HBA (Equation (17)) and CMA (Equation (24)), using the same color scheme (blue for HBA; green for CMA).
Entropy 28 00388 g004
Figure 5. This figure presents the key distribution as a function of the average transmittance T , at the optimal variance for the CMA approach (green lines) and at a fixed variance of V = 10 3 for the HBA (blue lines). The widths of the probability distribution are Δ T = 0.2 (left) and Δ T = 0.6 (right).
Figure 5. This figure presents the key distribution as a function of the average transmittance T , at the optimal variance for the CMA approach (green lines) and at a fixed variance of V = 10 3 for the HBA (blue lines). The widths of the probability distribution are Δ T = 0.2 (left) and Δ T = 0.6 (right).
Entropy 28 00388 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Castillo-Celeita, M.; Schiavon, M. The Role of Averages in CV-QKD over Fast Fading Channels. Entropy 2026, 28, 388. https://doi.org/10.3390/e28040388

AMA Style

Castillo-Celeita M, Schiavon M. The Role of Averages in CV-QKD over Fast Fading Channels. Entropy. 2026; 28(4):388. https://doi.org/10.3390/e28040388

Chicago/Turabian Style

Castillo-Celeita, Miguel, and Matteo Schiavon. 2026. "The Role of Averages in CV-QKD over Fast Fading Channels" Entropy 28, no. 4: 388. https://doi.org/10.3390/e28040388

APA Style

Castillo-Celeita, M., & Schiavon, M. (2026). The Role of Averages in CV-QKD over Fast Fading Channels. Entropy, 28(4), 388. https://doi.org/10.3390/e28040388

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop