Next Article in Journal
Quantum-Chemical Investigations on the Structure and Stability of Mixed Trimers Containing HC3N in Combination with H2C2 and/or HCN Analyzed by QTAIM, NBO and SAPT Methods
Previous Article in Journal
On Symmetrically Stochastic System of Fractional Differential Equations and Variational Inequalities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

High-Performance Carrier Phase Recovery for Local Local Oscillator Continuous-Variable Quantum Key Distribution

1
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
3
Science and Technology on Metrology and Calibration Laboratory, Beijing Institute of Radio Metrology and Measurement, Beijing 100854, China
4
State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Electronics, and Center for Quantum Information Technology, Peking University, Beijing 100871, China
*
Authors to whom correspondence should be addressed.
Symmetry 2025, 17(1), 139; https://doi.org/10.3390/sym17010139
Submission received: 4 January 2025 / Revised: 15 January 2025 / Accepted: 16 January 2025 / Published: 18 January 2025
(This article belongs to the Section Physics)

Abstract

:
Continuous-variable quantum key distribution (CV-QKD) has been increasingly studied, which offers the advantage of compatibility with modern coherent optical communication systems. In contrast to CV-QKD with a transmitting local oscillator, the local local oscillator CV-QKD avoids the security vulnerabilities of a local oscillator by generating a local oscillator at the receiver. In practice, the frequency offset of the two lasers introduces extra phase noise, which is generally suppressed by various carrier phase recovery algorithms. However, the accuracy of carrier phase recovery can be influenced by the power of the pilot tone, particularly as the transmission distance increases. To further improve accuracy, we propose a method based on the unscented particle filter algorithm, to increase the accuracy of phase estimation, effectively restore the quantum signal and reduce excess noise. In our work, we demonstrated a local local oscillator CV-QKD experiment with a finite-size block of 1 × 10 8 under a transmission distance of 50 km. Through our method, we achieved a secret key rate of 525 kbps, which represents a 28% improvement. These results confirm that our proposed method not only improves the accuracy of carrier phase recovery, but also provides a new approach for future research on algorithms for long-distance CV-QKD. Furthermore, our study improves the phase compensation performance, enabling the orthogonal components of the quantum signal to exhibit enhanced symmetry in phase space.

1. Introduction

Quantum key distribution (QKD) is a technology based on the principles of quantum mechanics that ensures secure key distribution between two parties [1,2,3]. Quantum key distribution can be achieved through two approaches: discrete-variable QKD and continuous-variable QKD (CV-QKD). Among them, the CV-QKD protocol has garnered significant attention due to its low implementation cost and superior compatibility with modern optical communication systems. CV-QKDs have been extensively studied, encompassing in-depth theoretical analysis [4,5,6,7,8,9,10,11,12,13] and extensive experimental validation [14,15,16,17,18,19,20,21,22,23,24]. According to the modulation methods of the coherent state, two practical CV-QKD schemes have been proposed: one is based on Gaussian modulation coherent state (GMCS) and the other is based on the discrete modulation coherent state (DMCS) [5,6,8]. The GMCS CV-QKD protocol, which was proposed earlier, already has a relatively mature composable security proof [7]. Due to its ability to carry more information, enabling a higher secret key rate in the same distance, compared to the DMCS protocol, the Gaussian modulation has become the most widely used modulation scheme in CV-QKD.
CV-QKD experimental systems can be classified into two types based on the location of the local oscillator (LO): the transmitting local oscillator (TLO) scheme and the local local oscillator (LLO) scheme. In the TLO scheme, the LO is generated at the transmitter and transmitted along with the signal, but the TLO scheme faced challenges such as LO power attenuation over long distances and security vulnerabilities [25,26], prompting extensive research. Since the proposal of the LLO scheme in 2015 [27,28], the LLO scheme, which generates the LO at the receiver, has gained significant attention, enhancing security and simplifying system implementation, compared to the TLO scheme. The LLO scheme allows the application of advanced digital signal processing (DSP) techniques [29,30,31] from modern coherent optical communication systems to address issues such as phase drift and device imperfections. Although this introduces the complexity of security analysis [32], a new digital signal processing analysis method has recently been proposed to address this issue, providing a solid foundation for the design and security evaluation of DSP systems [10].
In LLO CV-QKD, researchers have explored the use of high-power pilot tone [15], transmitted alongside the quantum signal, to assist in carrier phase recovery. These methods typically multiplex the pilot tone and quantum signal using techniques such as time, polarization, or frequency division [33,34,35]. In summary, regardless of the multiplexing method used, the effectiveness of all these techniques heavily relies on the accuracy of phase estimation for the pilot tone [36], highlighting the necessity for further advancements in carrier recovery methods. Given the critical role of accurate phase estimation for pilot tone, current research has increasingly focused on Bayesian filtering algorithms. A long-distance CV-QKD experiment based on a locally generated LO was successfully conducted over a 100 km fiber channel by using the Kalman filter (KF) [22]. Additionally, KF was employed to estimate the misalignment of the quantum signal’s polarization state, compensating for dynamic changes caused by random birefringence effects, significantly improving the accuracy of polarization error estimation [30]. In another study, the application of the unscented Kalman filter (UKF) over a 20 km fiber-optic link demonstrated that UKF could maintain very low excess noise even under low pilot power conditions [37]. Meanwhile, a particle filter (PF) was also applied in a four-user quantum downstream access network, demonstrating that, over a transmission distance of 10 km, the four users achieved secret key rates of 546 kbps, 535 kbps, 522.5 kbps, and 512.5 kbps, respectively, while successfully maintaining low levels of excess noise [21]. But they all have certain limitations. KF struggles in nonlinear and high-noise environments, the computational complexity of PF grows with particle numbers, and UKF, while addressing nonlinearity, remains computationally intensive and sensitive to parameter tuning. Therefore, investigating more effective phase recovery algorithms is crucial to further enhancing the accuracy of phase estimation in practical LLO CV-QKD.
In this paper, we proposed a high-performance carrier phase recovery method based on the unscented particle filter (UPF) algorithm to improve the accuracy of phase estimation in LLO CV-QKD. The UPF algorithm enhances phase estimation accuracy by combining the UKF and PF algorithms. By utilizing the unscented transformation (UT) [38], the UPF improves the prediction of the prior probability distribution, which aids the particle filter in addressing high-dimensional, nonlinear and non-Gaussian problems. This method also optimized particle weight distribution, mitigated weight degradation, and reduced the need for resampling. Based on this algorithm, we demonstrated a LLO CV-QKD experiment with a transmission distance of 50 km, where the UPF algorithm was employed to estimate the pilot tone’s phase. In contrast, we successfully reduced excess noise to 0.0048 SNU, achieving a secret key rate of 525 kbps, which represents a 28% improvement. These results confirm that the method we proposed improves the accuracy of carrier phase recovery and provides a solution for more effective and precise carrier phase recovery algorithms in future research on long-distance CV-QKD.
The rest of the paper is organized as follows: In Section 2, we model the phase prediction in LLO CV-QKD, providing a detailed description of the UPF algorithm’s process and principles. In Section 3, we present a point-to-point 50km LLO CV-QKD experiment, including the digital signal processing. In Section 4, we demonstrate the performance of the UPF algorithm from the perspective of security parameters. Finally, we draw conclusions in Section 5.

2. A Phase Prediction Model Based on Unscented Particle Filter

In the UPF algorithm, the state-space model is commonly used to represent real-world systems. The state-space model is a time-domain framework for describing the characteristics of dynamic systems, where time acts as an implicit independent variable. It consists of two key equations, the mathematical representation of a state-space model is typically expressed as follows:
x t = f ( x t 1 , w t ) ,
where x t denotes the system state at time t, w t is the process noise, accounting for uncertainties in the state dynamics, the input to the state model is typically the phase of the pilot tone, f ( · ) is the state function.
z t = g ( x t , v t ) ,
where z t denotes the observation or measurement at time t, v t represent the observation noise, capturing measurement uncertainties, g ( · ) is the observed function. Since the recursive from of Bayesian filter is based on the posterior probability density of nonlinear systems, it does not require the assumption that w t and v t are zero-mean Gaussian white noise. This framework provides a robust foundation for modeling and analyzing dynamic systems.
In the practical LLO CV-QKD, we need to model the state equations and observation equations to conduct better analysis. We record the cosine or sine value of the pilot tone’s phase observed at time 1 t as z 1 : t , where the state variable x t represents the value of the pilot tone’s phase, and the corresponding expression is as follows:
x 1 : t = [ θ f a s t 0 , θ f a s t 1 , , θ f a s t t 1 ] ,
z 1 : t = [ c o s ( θ f a s t 1 ) , c o s ( θ f a s t 2 ) , , c o s ( θ f a s t t ) ] ,
where θ f a s t t represents the pilot tone’s phase at the t time, which is used to compensate for rapid frequency drift, and the c o s ( θ f a s t t ) as the observed value, corresponding to the cosine and sine components of the pilot tone’s phase in practical LLO CV-QKD. When considering process noise, the model update is as follows:
x t = θ f a s t t 1 + w t , z t = c o s ( θ f a s t t ) + v t .
After introducing the phase prediction model of LLO CV-QKD, we now focus on the key steps of the UPF:
Prediction: In the case, assuming the probability density function at time t 1 is known, as p ( x t 1 | z 1 : t 1 ) , the prior probability density function of the state at time t can be predicted based on the dynamic Equation (2). The prior probability density function at time k can be expressed as follows:
p ( x t | z 1 : t 1 ) = p ( x t , x t 1 | z 1 : t 1 ) p ( x t 1 | z 1 : t 1 ) d x t 1 = p ( x t | x t 1 ) p ( x t 1 | z 1 : t 1 ) d x t 1 ,
where z 1 : t 1 represents the observed quantities, and x t is the unknown system variable, which follows a first-order Markov process, corresponding to the pilot tone’s phase to be predicted, this implicitly assumes p ( x t | x t 1 ) = p ( x t | x t 1 , z 1 : t 1 ) . p ( x t | x t 1 ) is the state transition probability density function of the system.
Update: Once new observations become available, the update step adjusts the predicted state by incorporation the observed date. At the current time t, the observation z t is obtained using the system measurement model. Base on this observation, the prior probability density function p ( x t | z 1 : t 1 ) is updated to derive the posterior probability density function p ( x t | z 1 : t ) at time t. Based on Bayes’theorem, the calculation of the posterior probability can be expressed as
p ( x t | z 1 : t ) = p ( z t | x t ) p ( x t | z 1 : t 1 ) p ( z t | z 1 : t 1 ) ,
where p ( z t | z 1 : t 1 ) can be obtained using the following formula:
p ( x t | z 1 : t 1 ) = p ( z t | x t ) p ( x t | z 1 : t 1 ) d x t .
The particle filter approximates the posterior state distribution using weighted random particles [39]. These particles are drawn from an importance density function, adjusted based on state observation, and used to estimate the posterior distribution. The state estimate is obtained by the weighted sum of these particles.
Typically, according to the known prior probability p ( x t ) , the initialization generates N particles, and the initial set of particles x t ( i ) , and then the new particles are generated based on the state transition function as x t + 1 ( i ) p ( x t | x t 1 ( i ) ) , the weight of each particle ω ( i ) i = 1 N is 1 N . Next, the weights are updated based on the importance density function, denoting the importance density function as q ( x 0 : t | z 1 : t ) , the weight update formula is given by
ω t ( i ) p ( x 0 : t ( i ) | z 1 : t ) q ( x 0 : t ( i ) | z 1 : t ) , = p ( z t | x t ( i ) ) p ( x t ( i ) | x t 1 ( i ) ) p ( x 0 : t 1 ( i ) | z 1 : t 1 ) q ( x t ( i ) | x 0 : t 1 ( i ) , z 1 : t ) q ( x 0 : t 1 ( i ) | z 1 : t 1 ) = ω t 1 ( i ) p ( z t | x t ( i ) ) p ( x t ( i ) | x t 1 ( i ) ) q ( x t ( i ) | x 0 : t 1 ( i ) , z 1 : t ) ,
where q ( x 0 : t ( i ) | z 1 : t ) represents the importance density function, which can be decomposed as q ( x t ( i ) | x 0 : t 1 ( i ) , z 1 : t ) q ( x 0 : t 1 ( i ) | z 1 : t 1 ) , and p ( x 0 : t ( i ) | z 1 : t ) represents the posterior probability density function, expressed as p ( z t | x t ( i ) ) p ( x t ( i ) | x t 1 ( i ) ) p ( x 0 : t 1 ( i ) | z 1 : t 1 ) , then to normalize the weights, the formula is as follows:
ω ^ t ( i ) = ω t ( i ) i = 0 N ω t ( i ) .
Then, we apply the unscented transformation to each particle set, after resampling, the posterior probability estimate is obtained:
x ^ t = i = 0 N χ t ( i ) σ ω ^ t ( i ) ,
where the χ t ( i ) σ denotes the set of sigma points generated by the particle set x t ( i ) . The UPF extends the standard particle filter by incorporating the unscented Kalman filter [40], which better approximates the state distribution in highly nonlinear systems. The flowchart of the UPF algorithm is shown in Figure 1, see further details in Appendix A.

3. Local Local Oscillator CV-QKD Experimental Scheme

3.1. Experimental Setup

In our work, we successfully implemented a LLO CV-QKD experiment, the experimental setup is depicted in Figure 2. A continuous laser with a narrow linewidth is employed at Alice’s side to generate coherent light, which has a wavelength of 1550.12 nm. Then, the GMCS signals, operating at a repetition frequency of 100 MHz , are generated as the continuous-wave light passes through an IQ modulator. The modulation process is driven by a self-developed 16bit DAC board integrated into the FPGA. It is worth noting that during this process, a bias controller was used to ensure the IQ modulator operates stably at an optimal operating point over an extended period. Additionally, we employed an implementation of pilot-sequential LLO structure, we controlled the IQ modulator using electrical signals output by the FPGA to achieve the alternate transmission of the pilot tone and quantum signal. In this process, the quantum signal follows a Rayleigh distribution for its amplitude and a uniform distribution for its phase. Subsequently, the signal is directed through a variable optical attenuator (VOA) positioned after the IQ modulator, this step ensures the quantum signal is attenuated to achieve the optimal modulation variance V A , ensuring the GMCS signals are attenuated to the quantum signal level, thereby exhibiting quantum characteristics. Finally, in our experiment, a quantum channel consists of standard optical fibers with a total length of 50 km .
At Bob’s side, the signal is first directed into a manual polarization controller (MPC), which compensates for polarization loss during channel transmission, ensuring optimal polarization state alignment. Another laser generates the LO, with sufficient power to meet the limit of shot-noise-limited detection requirements of quantum signal, and its operating wavelength is also stabilized at 1550.12 nm. Subsequently, the signal and LO interfere stably within a beam splitter (BS) equipped with a fast-axis cut off. The outputs from the BS are individually connected to VOAs, which are finely adjusted to achieve optical path and intensity balance for the signals entering the detector. Notably, we employ a balanced homodyne detector (BHD) with a 1.6 GHz bandwidth for detection. Finally, the output electrical signals are collected using a real-time oscilloscope operating at 1 GSa / s for data acquisition.

3.2. Digital Signal Processing Based on UPF Algorithm

After acquiring the data, the quantum signal cannot be directly obtained. To address this, signal processing is required based on the frequency difference between the two lasers. Before initiating the processing, we define several variables to facilitate a clear explanation of the procedure. The quantum signal and pilot tone before the BHD can be expressed as follows:
E s i g = A s i g c o s ( 2 π f A t + ϕ s i g + φ s i g + φ c h a n n e l , s i g ) ,
E r e f = A r e f c o s ( 2 π f A t + φ r e f + φ c h a n n e l , r e f ) ,
where f A denotes the center frequency of Alice’s laser, and ϕ s i g refers to the Gaussian modulated phase. Additionally, A s i g and A r e f represent the amplitude values of the quantum signal and reference signal, respectively. φ s i g and φ r e f represent initial phase of the laser. φ c h a n n e l , s i g and φ c h a n n e l , r e f denote the phase difference between the quantum signal and pilot tone when they meet in the channel. Then the LO can be expressed as follows:
E L O = A L O c o s ( 2 π f B t + φ L O ) ,
where A L O represents the amplitude values of the LO, f B denotes the center frequency of Bob’s laser, and φ L O represents initial phase. Therefore, we can obtain the expression for the photocurrent:
I s i g = R η ( | E s i g + E L O | 2 | E s i g E L O | 2 ) = 2 R η A s i g A L O c o s ( 2 π Δ f A B t + ϕ s i g + Δ φ f a s t + Δ φ s l o w ) ,
I r e f = R η ( | E r e f + E L O | 2 | E r e f E L O | 2 ) = 2 R η A r e f A L O c o s ( 2 π Δ f A B t + Δ φ f a s t ) ,
where R and η represent the responsiveness and detection efficiency of the BHD, the Δ f A B is caused by the frequency difference between the two lasers. Δ φ f a s t is defined as the phase variation caused by rapid frequency drift, while the initial phase difference between the reference signal and the quantum signal is defined as Δ φ s l o w .
Then, we first perform a frequency offset estimation on the collected electrical signals using Fourier transform to determine the value of Δ f A B , which is approximately 248 MHz . After that, we utilize the frequency Δ f A B to obtain the X and P orthogonal components by the exponential function e 2 π Δ f A B t , both the quantum and pilot tone. Additionally, a low-pass filter is applied with carefully chosen parameters. Finally, the process can be shown as follows:
X s i g = L P F ( r e a l ( I s i g e 2 π Δ f A B t ) ) = R η A L O A s i g c o s ( ϕ s i g + Δ φ f a s t + Δ φ s l o w ) ,
P s i g = L P F ( i m a g ( I s i g e 2 π Δ f A B t ) ) = R η A L O A s i g s i n ( ϕ s i g + Δ φ f a s t + Δ φ s l o w ) ,
X r e f = L P F ( r e a l ( I r e f e 2 π Δ f A B t ) ) = R η A L O A r e f c o s ( Δ φ f a s t ) ,
P r e f = L P F ( i m a g ( I r e f e 2 π Δ f A B t ) ) = R η A L O A r e f s i n ( Δ φ f a s t ) ,
where L P F ( · ) denotes the low-pass filter function, and we used a third-order bandpass Butterworth filter with a band width of approximately 50 MHz. r e a l ( · ) represents the real part extraction of the orthogonal components, and i m a g ( · ) represents the imaginary part extraction of the orthogonal components. After this, we can calculate the Δ φ f a s t using the pilot tone.
θ f a s t = t a n 1 ( P r e f / X r e f ) .
Based on the Equation (21), the phase information carried by the pilot tone can be obtained, allowing us to compensate for the quantum signal. In theory, by using θ f a s t , the Δ φ f a s t component in the quantum signal can be compensated for. However, due to the influence of the additive noises, they do not match exactly. Consequently, direct compensation introduces errors, which in turn increase the excess noise. To address the issue of inaccurate estimation of the θ f a s t , we propose the UPF algorithm to improve the accuracy of the phase estimation, the specific UPF prediction model has be introduced in the Section 2. In this process, the θ f a s t is taken as the state variable of the UPF, where the state function f ( θ f a s t ) is equal to the current value of the θ f a s t , and the X r e f and P r e f are used as the observations. The process is expressed as follows:
θ ^ f a s t = U P F ( θ f a s t | X r e f , P r e f ) .
Afterwards, the calculated angle is used to perform the corresponding phase compensation as follows:
X s i g = X s i g c o s ( θ ^ f a s t ) P s i g s i n ( θ ^ f a s t ) = R η A L O A s i g c o s ( ϕ s i g + Δ φ s l o w ) ,
P s i g = X s i g s i n ( θ ^ f a s t ) P s i g c o s ( θ ^ f a s t ) = R η A L O A s i g s i n ( ϕ s i g + Δ φ s l o w ) .
In the final stage of the DSP, a segmented compensation approach is used. For each segment of data, Alice shares a portion of the initial data with Bob, then Bob searches for compensation values within the range of 0 2 π , and calculates the correlation between the compensated results and the shared data. The Δ φ s l o w is compensated through the selection of the θ s l o w corresponding to the moment with the maximum correlation. Since the Δ φ s l o w is generally a constant with minimal fluctuation, an appropriate compensation segment length can ensure effective compensation. The received components X B and P B can be represented as follows:
X B = X s i g c o s ( θ s l o w ) P s i g s i n ( θ s l o w ) = R η A L O A s i g c o s ( ϕ s i g ) ,
P B = X s i g s i n ( θ s l o w ) P B c o s ( θ s l o w ) = R η A L O A s i g s i n ( ϕ s i g ) .

4. Experimental Results and Analysis

Upon establishing the experimental system and processing the data, we successfully acquired the processed Gaussian-modulated signals. Initially, we performed the calibration of certain parameters, normalizing them to SNU units, as these parameters are critical for subsequent parameter estimation. After completing the parameter estimation, we derived key system performance metrics, including excess noise, and the secret key rates for the practical implementation of this scheme. The calibrated parameters are summarized in Table 1.
Here, we consider the finite-size block effect, the secret key rates (SKR) can be expressed as follows:
K = f · n N ( β I A B χ B E Δ ( n ) ) ,
where f indicates the repetition frequency of the quantum signal, N represents the total length of the raw data, and n specifies the data length allocated for key extraction. The reconciliation efficiency is denoted by β , while I A B quantifies the Shannon mutual information between Alice and Bob, and χ B E is the Holevo bound, representing the maximum information available to Eve, the eavesdropper, about Bob’s key. Δ ( n ) is a parameter representing the impact of the finite-size block effect on the system security during the process of the privacy amplification. See the further details of the calculations in Appendix B.
Immediately after, we can provide the experimental excess noise and the corresponding secret key rates under different parameters of the UPF filter. We define w t as independent and identically distributed system noise with variance Q, and v t as independent and identically distributed measurement noise with Gaussian distribution and variance R. We compare the excess noise under different parameters Q and R, and finally determine the most optimal parameters. We investigated the variation of excess noise under different parameters Q and R, as shown in Figure 3, with the same particle number N = 10. Figure 3a illustrates the curve of excess noise in the system for varying values of parameter Q. In the figure, three solid lines in different colors correspond to different values of parameter R. The range of Q values was chosen between 0.016 and 0.02, as smaller values of Q lead to an excessively small particle net, causing resampling failure. As observed, for parameter Q values below 0.018, the excess noise decreases gradually, eventually reaching a minimum. However, for values of Q exceeding 0.018, the excess noise increases sharply. This is due to the fact that with a fixed number of particles, excessively large values of Q introduce significant errors, resulting in inaccurate estimates. Figure 3b presents the variation of excess noise with parameter R. The three solid lines in different colors represent the results for different reference values of parameter Q. It can be observed that as parameter R increases, the change in excess noise is minimal. However, a closer inspection of the blue inset reveals that excess noise still exhibits a minimum value when R is equal to 0.01. Beyond this threshold, when the value of R exceeds 0.01, the excess noise increases. Notably, when parameter Q 1 is set to 0.018, the overall excess noise is lower than the values for Q 2 and Q 3 , which is consistent with the results shown in Figure 3a.
In addition, we also verified the relationship between the accuracy of the UPF and PF algorithms and the number of particles N, the results are shown in the Figure 4. Figure 4a illustrates the relationship between excess noise and particle number for the two algorithms. The red dashed line represents the variation in particle number and excess noise under the UPF algorithm. As shown in the figure, when the value of N is 10, the excess noise reaches around 0.005 SNU, and as N increases, the excess noise fluctuates within this range. The black dashed line indicates the change in particle number and excess noise under PF filtering. It is evident that when N reaches 20, the excess noise reaches around 0.01 SNU, with a slower convergence rate compared to the UPF algorithm. At the same time, Figure 4b illustrates the relationship between secret key rates and particle numbers. When the number of particles is the same, the UPF algorithm achieves a higher secret key rate. This demonstrates that the proposed UPF algorithm, utilizing fewer particles than PF, achieves lower excess noise and higher secret key rates, ensuring improved performance with reduced the number of particles.
Immediately following this, we describe the change in the secret key rates and excess noise in 10 h, and the results are shown in Figure 5. Lower marks represent excess noise, corresponding to the initial excess noise, the excess noise processed by PF with 20 particles, and the excess noise processed by UPF with 10 particles, from top to bottom. Meanwhile upper marks indicate the secret key rates, where are the initial secret key rates, the secret key rates after PF with 20 particles, and the secret key rates after UPF with 10 particles, from top to bottom. This also demonstrates the advantages of the proposed algorithm in terms of higher secret key rates and lower excess noise.
Subsequently, we examine the pilot tone’s phase results before and after filtering. As illustrated in Figure 6, the purple points denote the distribution of pilot tone’s phase variations within the range of π to π before UPF filtering, whereas the red points indicate the refined distribution after UPF filtering. Evidently, before UPF filtering, the phase variation exhibits a larger fluctuation range compared to after UPF filtering. The UPF algorithm demonstrates its effectiveness in compensating for pilot tone’s phase variations and substantially mitigating noise. We calculated the residual phase noise before and after UPF filtering, the results show that the excess noise caused by residual phase noise was 0.0118 SNU before UPF filtering and reduced to 0.00377 SNU after UPF filtering. This advanced filtering approach enhances the precision of the Δ φ f a s t filtering process, leading to a marked reduction in excess noise.
Therefore, we performed parameter estimation on the data before and after compensation, yielding the results shown in Figure 7. The secret key rates and excess noise before and after UPF compensation are illustrated, where parameter estimation was conducted on ten sets of data over a period of time. In the figure, the blue line represents the secret key rates, and the orange line represents the excess noise. From Figure 7a, it can be observed that before UPF compensation, the mean excess noise averages ε 1 around 0.0157 SNU, indicating that inaccurate phase estimation contributes to additional excess noise. In Figure 7b, it is clearly seen that after UPF compensation, the mean excess noise ε 2 drops to around 0.005 SNU, demonstrating the precise compensation provided by UPF. In addition, it can be seen in the figure that the mean of the secret key rates S K R 2 after UPF filtering is significantly higher than S K R 1 .
The experimental and simulated results of the secret key rates corresponding to different transmission distances are illustrated in Figure 8. The black line represents the PLOB bound [41] for the GMCS CV-QKD protocol. The red solid line shows the variation of the secret key rates with transmission distance after UPF filtering under the assumption of an infinite-size block. In contrast, the blue solid line represents the relationship between the secret key rates and transmission distance before UPF filtering under the same assumption. It is evident that the secret key rates after filtering are consistently higher than those before filtering. Furthermore, the red dashed line indicates the secret key rates as a function of transmission distance after UPF filtering with a finite-size block of 1 × 10 8 , while the blue dashed line depicts the same relationship without UPF filtering. Notably, the blue diamond and red star markers represent the calculated secret key rates at a transmission distance of 50 km. At a repetition frequency of 100 MHz, only 50 MHz of the quantum signal is effectively utilized. Therefore, the secret key rates are calculated to be 409 kbps and 525 kbps before and after applying the UPF filtering, respectively. This demonstrates a significant improvement in the secret key rates, with an increase of approximately 28%, rising from 409 kbps to 525 kbps, after UPF filtering.

5. Conclusions

In this paper, we propose a high-performance carrier phase recovery method for LLO CV-QKD based on the UPF algorithm. The UPF algorithm improves particle filtering by incorporating the unscented transformation, enhancing the accuracy of phase estimation for pilot tone. To evaluate the performance of the UPF algorithm, we demonstrate a pilot-sequential structure LLO CV-QKD experiment with a transmission distance of 50 km. The experimental results show that, with the implementation of the UPF algorithm, the excess noise is reduced from 0.0157 SNU to 0.0048 SNU, and the secret key rates increase by approximately 28%, from 409 kbps to 525 kbps. Additionally, we validate that the UPF algorithm outperforms the traditional particle filter method by achieving lower excess noise with fewer particles, significantly reducing computational complexity. These results highlight the significant advantages of the UPF algorithm in optimizing the performance of LLO CV-QKD and provide new insights for algorithmic optimization in future research on long-distance CV-QKD.

Author Contributions

Conceptualization, J.M., D.Q., X.W. and Z.C.; methodology, J.M. and D.Q.; formal analysis, J.M. and X.W.; investigation, J.M.; resources, X.W. and S.Y.; writing—original draft preparation, J.M.; writing—review and editing, D.Q., C.Z., X.W., Z.C., Y.S. and S.Y.; visualization, Z.C. and D.Q.; supervision, X.W., Y.S. and S.Y.; project administration, C.Z., X.W. and Z.C.; funding acquisition, C.Z., X.W. and Z.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Natural Science Foundation of China (62371060, 62201012, 62201013, 62350001, 62001041) and the Fund of State Key Laboratory of Information Photonics and Optical Communications (IPOC2022ZT09).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

In the UPF algorithm, the UKF is used to generate a proposal distribution via UT, which guides the PF sampling process [42]. The PF then predicts the state and estimates the system state by updating the particle weights. By applying UT to each particle, this way enhances the accuracy of the particle representation, particularly when the state evolution is nonlinear. Furthermore, this method improves the accuracy of the estimation, allowing for fewer particles to be used to achieve the same level of precision, thereby reducing the complexity. The specific implementation process is as follows:
  • Initialization
(1): Using the prior probability p ( x 0 ) , generate N particles to form the initial particle set x 0 ( i ) .
(2): Compute the initial covariance matrix p 0 ( i ) .
(3): Assign equal weights of 1 N to all N particles.
(4): Define the weights for the sigma points of each particle.
W m , j ( 0 ) = λ n + λ i f j = 0 1 2 ( n + λ ) i f j = 1 , , 2 n . ,
W c , j ( 0 ) = λ + 1 α 2 + β n + λ i f j = 0 1 2 ( n + λ ) i f j = 1 , , 2 n . ,
where j - t h represents the index of the sigma points, i - t h represents the index of the particle. W m , j ( 0 ) is the weights for the state variables, and W c , j ( 0 ) is the weight used for computing the covariance. n is the dimension of state variable, α is a proportional correction factor, for the β , we set the optimal number 2 for it. Finally, λ is derived from the expression λ = α 2 ( n + κ ) n .
  • Prediction and update
For each of the time steps, the following operations are performed on the particles.
(1) Compute the sigma point set for each particle x t 1 ( i ) σ .
χ t 1 ( i ) σ = [ x t 1 ( i ) x t 1 ( i ) ± ( n + λ ) p t 1 ( i ) ] .
(2) Perform the prediction for the 2 n + 1 sigma points set.
x t | t 1 ( i ) = h ( χ t 1 ( i ) σ ) + w t ,
where h ( a ) = a , representing an identity mapping function.
(3) Calculate the mean and covariance for each sigma point.
X ¯ t | t 1 ( i ) = j = 0 2 n W m , j ( t ) x t | t 1 , j ( i )
p ¯ t | t 1 ( i ) = j = 0 2 n [ W c , j ( t ) ( X ¯ t | t 1 ( i ) x t | t 1 , j ( i ) ) ( X ¯ t | t 1 ( i ) x t | t 1 , j ( i ) ) T ] + Q .
(4) Based on the predicted values, apply the unscented transformation to obtain the new set of sigma points.
χ ¯ t 1 ( i ) σ = [ X ¯ t | t 1 ( i ) X ¯ t | t 1 ( i ) ± ( n + λ ) p ¯ t | t 1 ( i ) ] .
(5) Send the newly obtained set of sigma points into the observation equation.
z t | t 1 ( i ) = k ( χ ¯ t | t 1 ( i ) σ ) + v t ,
where k ( a ) = c o s ( a ) o r s i n ( a ) , representing the cosine or sine of angle a, respectively.
(6) Based on the observed predicted values, compute the weighted average to obtain the system predicted mean and covariance.
z ¯ t | t 1 ( i ) = j = 0 2 n W m , j ( t ) z t | t 1 , j ( i ) ,
p z z ( i ) = j = 0 2 n [ W c , j ( t ) ( z ¯ t | t 1 ( i ) z t | t 1 , j ( i ) ) ( z ¯ t | t 1 ( i ) z t | t 1 , j ( i ) ) T ] + R .
(7) Calculate the cross-correlation function and the Kalman gain.
p x z ( i ) = j = 0 2 n [ W c , j ( t ) ( x ¯ t | t 1 ( i ) x t | t 1 , j ( i ) ) ( z ¯ t | t 1 ( i ) z t | t 1 , j ( i ) ) T ] ,
K ( i ) = p x z ( i ) ( p z z ( i ) ) 1 ,
where K ( i ) represents the Kalman gain at the t times.
(8) Update the system state and covariance.
X ¯ t ( i ) = X ¯ t | t 1 ( i ) + K ( i ) ( z t 0 z t | t 1 ( i ) ) ,
where z t 0 represents the observed true value, denoted as X r e f or P r e f .
p ¯ t ( i ) = p ¯ t | t 1 ( i ) K ( i ) p z z ( i ) ( K ( i ) ) T .
(9) Recompute the sample particles from the importance density function.
X ^ t ( i ) q ( x t ( i ) | x 0 : t 1 ( i ) , z 1 : t ) = N ( X ¯ t ( i ) , p ¯ t ( i ) ) .
(10) Recompute the weight of each particle and normalize them.
ω t ( i ) = ω t 1 ( i ) p ( z t | X ¯ t ( i ) ) p ( X ¯ t ( i ) X ¯ t 1 ( i ) ) q ( x t ( i ) | x 0 : t 1 ( i ) , z 1 : t ) ,
ω ^ t ( i ) = ω t ( i ) i = 1 N ω t ( i ) .
  • Resample and output the results as follows:
(1) Based on the normalized weights of ω ^ ( x 0 : t ( i ) ) , use the resampling algorithm to replicate and eliminate particles in the particle set X ¯ 0 : t ( i ) according to their weight values.
(2) Output the estimation results.
θ ^ f a s t , t = X ¯ t = i = 1 N ω ^ t ( i ) X ¯ t ( i ) .
Then, return to the first step of the update process and repeat the loop, applying the same operations to the data at each time step t. Ultimately, it is possible to obtain θ ^ f a s t .

Appendix B

The secret key rates are a critical metric for evaluating the performance. This section presents its calculation formula, taking into account the finite-size block effect, it can be expressed as follows [43]:
K = f · n N ( β I A B χ B E Δ ( n ) ) ,
where f indicates the repetition frequency of the quantum signal, N represents the total length of the raw data, and n specifies the data length allocated for key extraction. The reconciliation efficiency is denoted by β , while I A B quantifies the Shannon mutual information between Alice and Bob, and χ B E is the Holevo bound, representing the maximum information available to Eve, the eavesdropper, about Bob’s key. Δ ( n ) is a parameter representing the impact of finite-size block effect on the system security during the process of the privacy amplification. The I A B is calculated using the following formula:
I A B = l o g 2 ( V + χ t o t 1 + χ t o t ) ,
where V = V A + 1 , and V A represents the modulation variance, and χ t o t is a parameter related total additional noise, and is as follows:
χ t o t = χ l i n e + χ h e t T ,
where χ l i n e represents the channel additive noise, and χ l i n e = 1 / T 1 + ε , χ h e t denotes the detector-related noise, and χ h e t = [ 1 + ( 1 η ) + 2 v e l ] / η . Among them, ε represents the excess noise, and v e l denotes the electric noise of the detector. Then, χ B E is given by the following:
χ B E = i = 1 2 G ( λ i 1 2 ) i = 3 5 G ( λ i 1 2 ) ,
where G ( a ) = ( a + 1 ) l o g 2 ( a + 1 ) a l o g 2 a , the symplectic eigenvalues, debited as λ i , can be computed as follows [44]:
λ 1 , 2 2 = 1 2 [ A ± A 2 4 B ] , λ 3 , 4 2 = 1 2 [ C ± C 2 4 D ] , λ 5 = 1 ,
where
A = V 2 ( 1 2 T ) + 2 T + T 2 ( V + χ l i n e ) 2 B = T 2 ( V χ l i n e + 1 ) 2 C = 1 T 2 ( V + χ t o t ) 2 [ A χ h e t 2 + B + 1 + 2 χ h e t ( V B + T ( V + χ l i n e ) ) + 2 T ( V 2 1 ) ] D = ( V + B χ h e t T ( V + χ t o t ) ) 2 .
Before considering the impact of finite-size block effect, σ 2 was defined as the variance used to calibrate shot noise when no data is transmitted, as expressed by: σ 2 = 1 + v e l + η T ε , and m = N n was defined as the length of the parameter estimation data. ξ δ P E / 2 is the confidence coefficient. Due to the finite-size effect, the transmittance T is limited by a lower bound, while the excess noise ε is capped by an upper bound, denoted as follows:
T m i n = ( η T Δ T ) 2 η , ε m a x = ε + Δ σ 0 2 η T ,
where
Δ T = ξ δ P E / 2 σ 2 m V A , Δ σ 0 2 = ξ δ P E / 2 σ 2 2 m .

References

  1. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  2. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef]
  3. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  4. Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef] [PubMed]
  5. Ghorai, S.; Grangier, P.; Diamanti, E.; Leverrier, A. Asymptotic security of continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. X 2019, 9, 021059. [Google Scholar] [CrossRef]
  6. Lin, J.; Upadhyaya, T.; Lütkenhaus, N. Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution. Phys. Rev. X 2019, 9, 041064. [Google Scholar] [CrossRef]
  7. Pirandola, S. Composable security for continuous variable quantum key distribution: Trust levels and practical key rates in wired and wireless networks. Phys. Rev. Res. 2021, 3, 043014. [Google Scholar] [CrossRef]
  8. Denys, A.; Brown, P.; Leverrier, A. Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation. Quantum 2021, 5, 540. [Google Scholar] [CrossRef]
  9. Zhou, C.; Wang, X.; Zhang, Z.; Yu, S.; Chen, Z.; Guo, H. Rate compatible reconciliation for continuous-variable quantum key distribution using Raptor-like LDPC codes. Sci. China Phys. Mech. Astron. 2021, 64, 260311. [Google Scholar] [CrossRef]
  10. Chen, Z.; Wang, X.; Yu, S.; Li, Z.; Guo, H. Continuous-mode quantum key distribution with digital signal processing. NPJ Quantum Inf. 2023, 9, 28. [Google Scholar] [CrossRef]
  11. Yang, H.; Liu, S.; Yang, S.; Lu, Z.; Li, Y.; Li, Y. High-efficiency rate-adaptive reconciliation in continuous-variable quantum key distribution. Phys. Rev. A 2024, 109, 012604. [Google Scholar] [CrossRef]
  12. Zhang, J.; Wang, X.; Xia, F.; Yu, S.; Chen, Z. Multiple-quadrature-amplitude-modulation continuous-variable quantum key distribution realization with a downstream-access network. Phys. Rev. A 2024, 109, 052429. [Google Scholar] [CrossRef]
  13. Wang, X.; Xu, M.; Zhao, Y.; Chen, Z.; Yu, S.; Guo, H. Non-Gaussian reconciliation for continuous-variable quantum key distribution. Phys. Rev. Appl. 2023, 19, 054084. [Google Scholar] [CrossRef]
  14. Huang, D.; Huang, P.; Lin, D.; Zeng, G. Long-distance continuous-variable quantum key distribution by controlling excess noise. Sci. Rep. 2016, 6, 19201. [Google Scholar] [CrossRef] [PubMed]
  15. Laudenbach, F.; Schrenk, B.; Pacher, C.; Hentschel, M.; Fung, C.H.F.; Karinou, F.; Poppe, A.; Peev, M.; Hübel, H. Pilot-assisted intradyne reception for high-speed continuous-variable quantum key distribution with true local oscillator. Quantum 2019, 3, 193. [Google Scholar] [CrossRef]
  16. Liao, Q.; Liu, H.; Gong, Y.; Wang, Z.; Peng, Q.; Guo, Y. Practical continuous-variable quantum secret sharing using plug-and-play dual-phase modulation. Opt. Express 2022, 30, 3876–3892. [Google Scholar] [CrossRef]
  17. Wang, T.; Xu, Y.; Zhao, H.; Li, L.; Huang, P.; Zeng, G. Multi-rate and multi-protocol continuous-variable quantum key distribution. Opt. Lett. 2023, 48, 719–722. [Google Scholar] [CrossRef] [PubMed]
  18. Wang, X.; Chen, Z.; Li, Z.; Qi, D.; Yu, S.; Guo, H. Experimental upstream transmission of continuous variable quantum key distribution access network. Opt. Lett. 2023, 48, 3327–3330. [Google Scholar] [CrossRef]
  19. Pan, Y.; Wang, H.; Shao, Y.; Pi, Y.; Li, Y.; Liu, B.; Huang, W.; Xu, B. Experimental demonstration of high-rate discrete-modulated continuous-variable quantum key distribution system. Opt. Lett. 2022, 47, 3307–3310. [Google Scholar] [CrossRef]
  20. Shen, T.; Wang, X.; Chen, Z.; Tian, H.; Yu, S.; Guo, H. Experimental demonstration of LLO continuous-variable quantum key distribution with polarization loss compensation. IEEE Photonics J. 2023, 15, 7600109. [Google Scholar] [CrossRef]
  21. Qi, D.; Wang, X.; Li, Z.; Ma, J.; Chen, Z.; Lu, Y.; Yu, S. Experimental demonstration of a quantum downstream access network in continuous variable quantum key distribution with a local local oscillator. Photonics Res. 2024, 12, 1262–1273. [Google Scholar] [CrossRef]
  22. Hajomer, A.A.; Derkach, I.; Jain, N.; Chin, H.M.; Andersen, U.L.; Gehring, T. Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator. Sci. Adv. 2024, 10, eadi9474. [Google Scholar] [CrossRef] [PubMed]
  23. Li, Z.; Wang, X.; Qi, D.; Chen, Z.; Yu, S. Experimental Implementation of Four-User Downstream Access Network Continuous-Variable Quantum Key Distribution. J. Light. Technol. 2024, 42, 6662–6670. [Google Scholar] [CrossRef]
  24. Tian, Y.; Wang, P.; Liu, J.; Du, S.; Liu, W.; Lu, Z.; Wang, X.; Li, Y. Experimental demonstration of continuous-variable measurement-device-independent quantum key distribution over optical fiber. Optica 2022, 9, 492–500. [Google Scholar] [CrossRef]
  25. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems. Phys. Rev. A—At. Mol. Opt. Phys. 2013, 88, 022339. [Google Scholar] [CrossRef]
  26. Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A—At. Mol. Opt. Phys. 2013, 87, 062313. [Google Scholar] [CrossRef]
  27. Qi, B.; Lougovski, P.; Pooser, R.; Grice, W.; Bobrek, M. Generating the local oscillator “locally” in continuous-variable quantum key distribution based on coherent detection. Phys. Rev. X 2015, 5, 041009. [Google Scholar] [CrossRef]
  28. Soh, D.B.; Brif, C.; Coles, P.J.; Lütkenhaus, N.; Camacho, R.M.; Urayama, J.; Sarovar, M. Self-referenced continuous-variable quantum key distribution protocol. Phys. Rev. X 2015, 5, 041010. [Google Scholar] [CrossRef]
  29. Faruk, M.S.; Savory, S.J. Digital signal processing for coherent transceivers employing multilevel formats. J. Light. Technol. 2017, 35, 1125–1141. [Google Scholar] [CrossRef]
  30. Wang, T.; Huang, P.; Wang, S.; Zeng, G. Polarization-state tracking based on Kalman filter in continuous-variable quantum key distribution. Opt. Express 2019, 27, 26689–26700. [Google Scholar] [CrossRef]
  31. Eriksson, T.A.; Hirano, T.; Puttnam, B.J.; Rademacher, G.; Luís, R.S.; Fujiwara, M.; Namiki, R.; Awaji, Y.; Takeoka, M.; Wada, N.; et al. Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels. Commun. Phys. 2019, 2, 9. [Google Scholar] [CrossRef]
  32. Matsuura, T.; Maeda, K.; Sasaki, T.; Koashi, M. Finite-size security of continuous-variable quantum key distribution with digital signal processing. Nat. Commun. 2021, 12, 252. [Google Scholar] [CrossRef] [PubMed]
  33. Huang, D.; Huang, P.; Lin, D.; Wang, C.; Zeng, G. High-speed continuous-variable quantum key distribution without sending a local oscillator. Opt. Lett. 2015, 40, 3695–3698. [Google Scholar] [CrossRef] [PubMed]
  34. Marie, A.; Alléaume, R. Self-coherent phase reference sharing for continuous-variable quantum key distribution. Phys. Rev. A 2017, 95, 012316. [Google Scholar] [CrossRef]
  35. Wang, T.; Huang, P.; Zhou, Y.; Liu, W.; Ma, H.; Wang, S.; Zeng, G. High key rate continuous-variable quantum key distribution with a real local oscillator. Opt. Express 2018, 26, 2794–2806. [Google Scholar] [CrossRef] [PubMed]
  36. Kleis, S.; Rueckmann, M.; Schaeffer, C.G. Continuous variable quantum key distribution with a real local oscillator using simultaneous pilot signals. Opt. Lett. 2017, 42, 1588–1591. [Google Scholar] [CrossRef] [PubMed]
  37. Chin, H.M.; Jain, N.; Zibar, D.; Andersen, U.L.; Gehring, T. Machine learning aided carrier recovery in continuous-variable quantum key distribution. NPJ Quantum Inf. 2021, 7, 20. [Google Scholar] [CrossRef]
  38. Julier, S.J. The scaled unscented transformation. In Proceedings of the 2002 American Control Conference (IEEE Cat. No. CH37301), Anchorage, AK, USA, 8–10 May 2002; IEEE: Piscataway, NJ, USA, 2002; Volume 6, pp. 4555–4559. [Google Scholar]
  39. Carpenter, J.; Clifford, P.; Fearnhead, P. Improved particle filter for nonlinear problems. IEE Proc.-Radar Sonar Navig. 1999, 146, 2–7. [Google Scholar] [CrossRef]
  40. Wan, E.A.; Van Der Merwe, R. The unscented Kalman filter for nonlinear estimation. In Proceedings of the IEEE 2000 Adaptive Systems for Signal Processing, Communications, and Control Symposium (Cat. No. 00EX373), Lake Louise, AB, Canada, 4 October 2000; IEEE: Piscataway, NJ, USA, 2000; pp. 153–158. [Google Scholar]
  41. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 1–15. [Google Scholar] [CrossRef] [PubMed]
  42. Van Der Merwe, R.; Doucet, A.; De Freitas, N.; Wan, E. The unscented particle filter. Adv. Neural Inf. Process. Syst. 2000, 13, 563–569. [Google Scholar]
  43. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A—At. Mol. Opt. Phys. 2010, 81, 062343. [Google Scholar] [CrossRef]
  44. Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. At. Mol. Opt. Phys. 2009, 42, 114014. [Google Scholar] [CrossRef]
Figure 1. Process of the UPF algorithm.
Figure 1. Process of the UPF algorithm.
Symmetry 17 00139 g001
Figure 2. Experimental scheme of LLO CV-QKD with a 50 km fiber. DAC, digital-to-analog converter; IQ modulator, in phase/quadrature modulator; VOA, optical variable attenuator; MPC, manual polarization controller; BS, beam splitter; BHD, balanced homodyne detector.
Figure 2. Experimental scheme of LLO CV-QKD with a 50 km fiber. DAC, digital-to-analog converter; IQ modulator, in phase/quadrature modulator; VOA, optical variable attenuator; MPC, manual polarization controller; BS, beam splitter; BHD, balanced homodyne detector.
Symmetry 17 00139 g002
Figure 3. Functional relationship between excess noise and parameters Q and R. (a) Experimental excess noise (SNU) levels as a function of parameter Q. The blue solid line represents parameter R 1 = 0.01; The red solid line represents parameter R 2 = 0.02; The purple solid line represents parameter R 3 = 0.03. (b) Experimental excess noise (SNU) levels as a function of parameter R. The blue solid line represents parameter Q 1 = 0.018; The red solid line represents parameter Q 2 = 0.019; The purple solid line represents parameter Q 3 = 0.020.
Figure 3. Functional relationship between excess noise and parameters Q and R. (a) Experimental excess noise (SNU) levels as a function of parameter Q. The blue solid line represents parameter R 1 = 0.01; The red solid line represents parameter R 2 = 0.02; The purple solid line represents parameter R 3 = 0.03. (b) Experimental excess noise (SNU) levels as a function of parameter R. The blue solid line represents parameter Q 1 = 0.018; The red solid line represents parameter Q 2 = 0.019; The purple solid line represents parameter Q 3 = 0.020.
Symmetry 17 00139 g003
Figure 4. The relationship between excess noise, secret key rates, and particle numbers in UPF and PF. (a) Experimental excess noise as a function of particle number N. The black and red dashed lines represent the trend of excess noise with respect to particle number N under the PF and UPF algorithms, respectively. (b) Experimental secret key rates as a function of particle number N. The blue and orange dashed lines represent the trend of secret key rates with respect to particle number N under the PF and UPF algorithms, respectively.
Figure 4. The relationship between excess noise, secret key rates, and particle numbers in UPF and PF. (a) Experimental excess noise as a function of particle number N. The black and red dashed lines represent the trend of excess noise with respect to particle number N under the PF and UPF algorithms, respectively. (b) Experimental secret key rates as a function of particle number N. The blue and orange dashed lines represent the trend of secret key rates with respect to particle number N under the PF and UPF algorithms, respectively.
Symmetry 17 00139 g004
Figure 5. Comparison of experimental secret key rates and excess noise levels after UPF with particle number N = 10 and PF with particle number N = 20. The upper marks represent secret key rates, while the lower marks indicate excess noise levels. The initial mean excess noise is approximately 0.0157 SNU, the mean excess noise after PF with is about 0.010 SNU, and the mean excess noise after UPF with is about 0.005 SNU.
Figure 5. Comparison of experimental secret key rates and excess noise levels after UPF with particle number N = 10 and PF with particle number N = 20. The upper marks represent secret key rates, while the lower marks indicate excess noise levels. The initial mean excess noise is approximately 0.0157 SNU, the mean excess noise after PF with is about 0.010 SNU, and the mean excess noise after UPF with is about 0.005 SNU.
Symmetry 17 00139 g005
Figure 6. Pilot tone’s phase variation before and after UPF. The purple dots indicate the pilot tone’s phase before UPF, while the red dots represent the phase after UPF.
Figure 6. Pilot tone’s phase variation before and after UPF. The purple dots indicate the pilot tone’s phase before UPF, while the red dots represent the phase after UPF.
Symmetry 17 00139 g006
Figure 7. The secret key rates and excess noise before and after UPF compensation. (a) Before UPF compensation, the secret key rates and excess noise obtained through parameter estimation, denoted the means as S K R 1 and ε 1 . (b) After UPF compensation, the secret key rates and excess noise obtained through parameter estimation, denoted the means as S K R 2 and ε 2 .
Figure 7. The secret key rates and excess noise before and after UPF compensation. (a) Before UPF compensation, the secret key rates and excess noise obtained through parameter estimation, denoted the means as S K R 1 and ε 1 . (b) After UPF compensation, the secret key rates and excess noise obtained through parameter estimation, denoted the means as S K R 2 and ε 2 .
Symmetry 17 00139 g007
Figure 8. The secret key rates as a function of transmission distance. The solid lines of different colors represent the relationships under an infinite-size block, while the dashed lines correspond to a finite-size block. The red star-shaped markers indicate experimental results. The parameters used include the following: the modulation variance is V A = 4.01 SNU, the quantum efficiency η = 0.481, the reconciliation efficiency is β = 0.95, the electronic noise is v e l = 0.0272 SNU, the excess noise is 0.0048 SNU. For the blue diamond markers, all parameters remain the same except for the excess noise, which is 0.0157 SNU.
Figure 8. The secret key rates as a function of transmission distance. The solid lines of different colors represent the relationships under an infinite-size block, while the dashed lines correspond to a finite-size block. The red star-shaped markers indicate experimental results. The parameters used include the following: the modulation variance is V A = 4.01 SNU, the quantum efficiency η = 0.481, the reconciliation efficiency is β = 0.95, the electronic noise is v e l = 0.0272 SNU, the excess noise is 0.0048 SNU. For the blue diamond markers, all parameters remain the same except for the excess noise, which is 0.0157 SNU.
Symmetry 17 00139 g008
Table 1. The parameters calibrated for the experimental system.
Table 1. The parameters calibrated for the experimental system.
Transmission Distance (km)Modulation Variance (SNU)Detection EfficiencyElectric Noise (SNU)Reconciliation Efficiency
504.010.4810.02710.95
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ma, J.; Zhou, C.; Qi, D.; Chen, Z.; Sun, Y.; Yu, S.; Wang, X. High-Performance Carrier Phase Recovery for Local Local Oscillator Continuous-Variable Quantum Key Distribution. Symmetry 2025, 17, 139. https://doi.org/10.3390/sym17010139

AMA Style

Ma J, Zhou C, Qi D, Chen Z, Sun Y, Yu S, Wang X. High-Performance Carrier Phase Recovery for Local Local Oscillator Continuous-Variable Quantum Key Distribution. Symmetry. 2025; 17(1):139. https://doi.org/10.3390/sym17010139

Chicago/Turabian Style

Ma, Jiayu, Chao Zhou, Dengke Qi, Ziyang Chen, Yongmei Sun, Song Yu, and Xiangyu Wang. 2025. "High-Performance Carrier Phase Recovery for Local Local Oscillator Continuous-Variable Quantum Key Distribution" Symmetry 17, no. 1: 139. https://doi.org/10.3390/sym17010139

APA Style

Ma, J., Zhou, C., Qi, D., Chen, Z., Sun, Y., Yu, S., & Wang, X. (2025). High-Performance Carrier Phase Recovery for Local Local Oscillator Continuous-Variable Quantum Key Distribution. Symmetry, 17(1), 139. https://doi.org/10.3390/sym17010139

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop