1. Introduction
Quantum key distribution (QKD) [
1,
2,
3,
4,
5,
6] enables two legitimate communicating parties (commonly referred to as Alice and Bob) to establish information-theoretically [
7] secure keys, effectively addressing the potential threats posed by quantum computing [
8] to classical cryptographic systems. Among various QKD implementations, continuous-variable QKD (CV-QKD) [
9,
10] is naturally compatible with coherent optical communication technologies, making it well suited for large-scale deployment over metropolitan distances. As a result, CV-QKD has attracted significant research interest and has achieved substantial progress in theory [
11,
12,
13,
14,
15,
16,
17], experimental demonstrations [
18,
19,
20,
21,
22,
23,
24,
25], network deployment [
26,
27,
28,
29], and post-processing techniques [
30,
31,
32,
33].
The maximum transmission distance of CV-QKD is highly sensitive to excess noise [
34]. To enhance the noise tolerance of CV-QKD systems, a two-way protocol has been proposed [
35]. In order to guarantee security, the original two-way protocol requires implementing the tomography of the quantum channels, which is complicated in practice. Subsequently, an improved two-way protocol was introduced [
36]. By considering the purification of the system held by an eavesdropper (Eve), its security can be analyzed using the optimality of Gaussian attacks, which significantly simplifies the security analysis and makes the protocol more feasible for implementation.
However, as CV-QKD increasingly incorporates digital signal processing techniques from coherent optical communication systems [
37,
38,
39], device nonidealities drive the conventional single-mode optical-field assumption toward a continuous-mode description [
40,
41]. Meanwhile, existing security analyses of the improved two-way protocol still rely on the asymptotic scheme [
42] that the communicating parties exchange infinitely many signals. To address the practical security of the improved two-way protocol, a new analysis framework is required.
In this work, we introduce temporal modes (TMs) [
17,
43,
44,
45] to characterize the evolution of optical fields in the improved two-way protocol and establish a security analysis framework for the continuous-mode scenario based on adaptive normalization with properly calibrated shot-noise unit (SNU). This framework enables a consistent description of continuous-mode interference and detection processes in the improved two-way protocol. The security analysis presented in this work is established within the standard Gaussian security framework.
In addition, by invoking the central limit theorem and the maximum likelihood estimation theorem, we analyze the impact of finite-size effects on statistical fluctuations in parameter estimation, leading to a tighter secret key rate under practical conditions.
Numerical simulations for the considered parameter settings show that the performance of the improved two-way protocol remains superior to that of the one-way protocol. Specifically, the maximum transmission distance is increased by about 50%, and at a transmission distance of 50 km, the maximum tolerable excess noise is approximately three times higher than that of the one-way protocol. As the transmission distance increases, the system becomes more sensitive to excess noise, which further highlights the advantage of the improved two-way protocol in long-distance transmission. Overall, our work provides a more practical security and performance analysis of the improved two-way protocol and offers guidance for its implementation and performance optimization.
This paper is organized as follows: In
Section 2, we introduce the protocol in the continuous-mode scenario. In
Section 3, we analyze the impact of finite-size effects on the secret key rate of the protocol. In
Section 4, numerical simulations are performed and analyzed. Finally, our conclusions are summarized in
Section 5.
2. Continuous-Mode Analysis of Improved Two-Way QKD
In this section, we introduce the improved two-way quantum key distribution protocol in the continuous-mode scenario. We will first introduce the structural characteristics of the improved two-way protocol [
36] in comparison with the original two-way protocol [
35]. To ensure security against general collective attacks, the original two-way protocol must be implemented as a hybrid scheme combining the two-way protocol with a one-way protocol. In such a hybrid scheme, an optical switch is required at Alice’s side to randomly select between one-way and two-way operations. In contrast, the improved two-way protocol replaces this active optical switch with a beam splitter of transmittance
, thereby transforming an active operation into a passive one and significantly simplifying the experimental implementation [
36].
2.1. Prepare-And-Measure Scheme of the Protocol
We first present the prepare-and-measure (PM) scheme of the protocol in the continuous-mode scenario, as illustrated in
Figure 1.
Taking the coherent-state protocol with heterodyne detection as an example, the main steps of the protocol are summarized as follows:
1. State preparation. In the improved two-way protocol, both legitimate parties prepare coherent states. Under the ideal single-mode assumption, the quantum states prepared by an ideal laser are single-mode coherent states. However, due to the nonidealities of practical laser sources, the states generated by Alice and Bob in realistic systems are no longer single-mode coherent states, but rather continuous-mode coherent states carrying temporal and spectral information. Realistic lasers have finite linewidths, and practical modulation inevitably introduces additional frequency components, which manifest in the time domain as non-uniform wavepackets. Therefore, we use to denote the temporal/spectral information contained in the photon-wavepacket of the coherent state prepared by Alice, and to denote the corresponding temporal/spectral information of the coherent state prepared by Bob. Bob encodes his information and onto a continuous-mode coherent state and sends it to Alice, while Alice also prepares a continuous-mode coherent state .
2. State interference. After receiving the continuous-mode coherent state sent by Bob, Alice interferes it with the continuous-mode coherent state prepared by herself using a beam splitter with transmittance .
3. State measurement. Alice performs homodyne detection on one output of the interference between the two continuous-mode coherent states, while the other output is sent to Bob. Bob performs heterodyne detection on the received state () and obtains and . Due to the finite bandwidth of practical detectors, Alice and Bob cannot access the full temporal and spectral information of the quantum states. Consequently, both the modulation rate and the format of the modulation signal employed by the transmitter influence the final detection performance.
4. Data processing. Bob computes
and
to obtain the final processed data. The parameter
k is discussed in
Section 2.3. Bob processes his measurement data to estimate Alice’s data, after which Bob and Alice perform classical post-processing procedures such as error correction and privacy amplification.
From the above description, it can be observed that if the security analysis of practical systems is still based on the conventional single-mode model, it does not fully capture the mode mismatch between the transmitter and receiver arising from laser nonidealities, modulation imperfections, and detector nonidealities. Moreover, when Alice interferes with the continuous-mode coherent state prepared by herself and the continuous-mode coherent state prepared by Bob, the interference process inherently involves continuous-mode optical fields, which are also difficult to describe within the single-mode framework. Therefore, to analyze the improved two-way protocol under practical scenarios, it is necessary to introduce new analytical tools.
2.2. Temporal Modes of Continuous States
In conventional security analysis, the ideal single-mode coherent state can be represented by the annihilation and creation operators of a single-mode field,
and
. However, in practical systems, modulation at the transmitter inevitably introduces additional frequency components, which manifest as a nonuniform temporal waveform in the time domain. In this case, it is necessary to replace the single-mode operators with continuous-mode operators, defined as [
40]
and
, where
denotes the mode spacing. The continuous-mode field operators [
40,
43,
45] satisfy the commutation relation
. Moreover, by applying the Fourier transform, the operator in the time domain can be expressed as
.
To introduce TMs for the security analysis, we first define a wavepacket function
. If
meets the orthonormalization that
, for different
i and
j, the TM field creation operator can be defined as [
40,
41,
45]
The annihilation operator
follows a similar definition.
The TM field operators also obey the commutation relation, which reads
. Then we can define the photon-wavepacket coherent state
on
as [
40]
The photon-wavepacket coherent state obeys the eigenvalue equation
. Under this notation, the quadrature operator with the phase angle
can be defined as [
17]
After describing the continuous-mode states prepared at the transmitter using TM, the receiver of the system that incorporates continuous-mode effects can likewise be characterized within the TM framework. The finite detector bandwidth can be modeled as a filter characterized by an impulse response function (IRF)
, and the photocurrent flux operator of a homodyne detector is given by [
40,
46]
where ∗ denotes the convolution. The photocurrent flux after taking the average over local oscillator (LO) is given by
Considering the analog-to-digital converter (ADC) as the integral sampling process with integral time
, the sampled data at time
is
For a digital signal processing (DSP) algorithm involving
N sampled data, the output data at the time corresponding to the
sampling time could be [
17]
where
denotes the coefficients determined by the specific DSP algorithm.
As the continuous-mode coherent states sent by the transmitter carry temporal and spectral information, the nonideal detectors at the receiver are unable to extract all the information from an arbitrary and unknown temporal wavepacket. In addition, the DSP algorithm employed at the receiver involves sampling and processing of multi-point measurement outcomes. To properly describe the final output of the receiver, it is necessary to perform adaptive SNU normalization according to the specific configuration. By configuring the LO, IRF, and DSP algorithms in practical systems, the SNU normalization factor of the receiver output can be obtained as [
17]
where
denotes the average number of photons contained in an envelope
for a pulsed LO.
After performing adaptive normalization on the receiver output, the sampled data
are divided by
, which gives [
17]
where h.c. denotes the Hermitian conjugate, and
is the rescaled factor when calibrating output data by SNU.
The normalized photon-wavepacket function is defined as
with the normalization condition
. This introduces
, which is jointly defined by the LO, IRF, and DSP algorithms. Then, we can further define its operator as
Therefore, the normalized receiver output
shown in Equation (
9) can be expressed in terms of the
operators and rewritten as
which takes the same form as Equation (
2) for the transmitter output.
The analysis adopted in this work does not alter the Gaussian nature of the protocol. Instead, it reformulates the description of the optical field under device nonidealities within the continuous-mode framework in terms of TMs. The final data (output from DSP and being normalized) can be treated as a quadrature measurement of
. As long as the data represent a quadrature measurement result, they can be used to construct the covariance matrix and are thus compatible with traditional security analysis methods [
17]. Under these conditions, Gaussian optimality remains valid, and the optimal attack can still be restricted to Gaussian collective attacks.
The constructed covariance matrix remains defined in a canonical operator space, and both its symplectic eigenvalues and the mathematical structure underlying Gaussian security analysis remain unchanged. The normalization procedure in the continuous-mode scenario does not modify the symplectic structure of the system. The covariance-matrix-based Gaussian security proof and the associated symplectic eigenvalue analysis therefore remain fully applicable.
In the TM framework, the TM associated with the measured quantum state is denoted as
, while the effective TM defined by the receiver is denoted as
. The continuous-mode measurement can be regarded as a mode projection process [
17]. A third mode
can be constructed via Gram–Schmidt orthogonalization, which is derived from
and orthogonal to
. The corresponding decomposition of the creation operator is then given by
where
denotes the mode-matching coefficient,
It can be seen that the decomposition of the creation operator is obtained through the standard Gram–Schmidt orthogonalization procedure in the continuous-mode Hilbert space. The above decomposition therefore originates from a change of orthonormal basis in the Hilbert space at the mathematical level.
At the physical level, the validity of the mode-matching decomposition relies on the following assumptions [
17]: (1) The DSP algorithm applied at the receiver is linear. (2) The TM functions are properly normalized and satisfy orthogonality conditions.
2.3. Entanglement-Based Scheme of the Protocol
To analyze the security of the PM scheme, we construct an entanglement-based (EB) scheme that is equivalent to it. The equivalence is established in two aspects. First is state-preparation equivalence: performing heterodyne detection on one mode of a two-continuous-mode squeezed vacuum (TCMSV) state is equivalent to preparing a Gaussian-modulated continuous-mode coherent state. Second is measurement equivalence: the effect of transmitter–receiver mode mismatch can be equivalently modeled as a reduction in detection efficiency, which can be represented by a beam splitter with transmittance
. The key steps establishing the equivalence between the EB and PM schemes of the protocol are illustrated in
Figure 2.
The EB scheme of the protocol is described as follows:
1. State preparation. Bob prepares a TCMSV with variance , keeps one mode , and sends the other mode to Alice through the quantum channel. Alice prepares a TCMSV with variance , performs heterodyne detection on one of the modes , and keeps the other mode .
2. State interference. The mode sent by Bob evolves through the quantum channel into . Alice interferes with the previously retained mode using a beam splitter with transmittance , resulting in the output modes and . Alice keeps the mode and sends the mode back to Bob. The mode sent by Alice evolves through the channel into .
3. State measurement. Alice performs homodyne detection on the mode . At this stage, due to the interference of continuous-mode optical fields, it is necessary to separately consider the mode-matching coefficients between the detection mode at Alice and the modes originating from Bob and Alice, denoted by and , respectively. Bob performs heterodyne detection on both the mode and the mode originally retained by himself. Similarly, owing to the interference of continuous-mode optical fields, the mode-matching coefficients between Bob’s detection mode and the modes originating from Bob and Alice, denoted by and , respectively, must be taken into account.
4. Data processing. Bob processes his measurement data to obtain and , where . Bob then uses his measurement results to estimate Alice’s values. After completing data reconciliation, Bob and Alice perform classical post-processing procedures such as error correction and privacy amplification.
From the above description of the EB scheme, it can be seen that, compared with the single-mode case, the continuous-mode model requires careful consideration of the mode-matching process between the transmitter and receiver. In particular, owing to the interference of continuous-mode optical fields, four mode-matching coefficients between the transmitter and receiver must be taken into account simultaneously. In
Section 3.2, we will present the final covariance matrix between Alice and Bob by incorporating the effects of finite-size statistics.
4. Simulation and Analysis
In this section, we present the simulation results of the improved two-way protocol and compare them with the one-way coherent-state heterodyne protocol.
First, we compare the performance of the two-way protocol in the ideal scenario with the protocol in the practical scenario. In the ideal case, the mode-matching coefficient is set to 1. Moreover, the analysis is carried out in the asymptotic regime. In contrast, in the practical scenario, the four matching coefficients listed in
Table 1 must be taken into account simultaneously.
The detection processes in the two-way protocol can be categorized into two types. One corresponds to the detection of quantum states prepared at one side and transmitted through the optical fiber channel to the remote receiver. The other corresponds to the detection of quantum states prepared and measured locally at the same station. Optical signals propagating over long-distance quantum channels (Bob-to-Alice and Alice-to-Bob) typically suffer significantly higher wavefront distortion and temporal broadening compared to the local paths (Alice-to-Alice or Bob-to-Bob).
To avoid the increased complexity arising from the variation of multiple matching coefficients, we assume that Alice and Bob employ the same types of lasers and detectors, and that the modulation format is pre-agreed to maintain TM consistency as much as possible. Under these conditions, the relationships among the four mode-matching coefficients can be expressed as , .
Regarding the specific parameter values, besides the method discussed in
Section 3.1.3, we also draw on the results of a previously conducted calibration experiment on the mode-matching coefficients [
48]. In that study, in a 30 km fiber experiment, for a 50% duty-cycle square-wave signal with a repetition rate of 5 MHz prepared at the transmitter, the maximum mode-matching coefficient obtained under single-point sampling was 0.97. By applying the DSP algorithm to the sampled data, the mode-matching coefficient could be further improved to 0.995.
We consider the experimentally obtained parameters [
48] to provide meaningful reference values for practical systems. Based on these results, the mode-matching coefficients corresponding to transmission over long-distance quantum channels (
and
) are set to 0.97, whereas the coefficients associated with local detection (
and
) are set to 0.995.
The simulation results are shown in
Figure 3. The channel transmittance is given by
, where a channel loss of
is assumed and
L denotes the transmission distance. The variance of Bob’s TCMSV state is
, and that of Alice’s TCMSV state is
. The transmittance of the beam splitter used by Alice for interference is
. The excess noise of the system is set to
, and the reconciliation efficiency is
.
In
Figure 3, the black solid line represents the secret key rate of the improved two-way coherent-state heterodyne protocol as a function of transmission distance in the ideal scenario. The red dashed line represents the protocol performance when finite-size effects are taken into account and mode mismatch between the transmitter and the receiver is considered. It can be observed that the maximum transmission distance decreases from 48.27 km in the ideal scenario to 38.04 km, corresponding to a reduction of nearly 10 km. Therefore, when implementing the improved two-way protocol in a practical scenario, the combined impact of finite-size effects and mode mismatch should be carefully considered.
Although the performance of the improved two-way protocol degrades compared with that in the ideal scenario due to practical device nonidealities, it still outperforms the one-way protocol under the same parameter settings. To illustrate the performance advantage of the improved two-way protocol, we perform a comparative simulation analysis between the improved two-way and one-way protocols, and the results are shown in
Figure 4.
In the continuous-mode scenario, finite-size effects are taken into account by setting the total number of exchanged signals to
. The mode-matching coefficient between the transmitter and the receiver in one-way protocol is set to 0.97. In addition, coherent states are prepared at the transmitter and heterodyne detection is performed at the receiver. Under these conditions, the red dashed line in
Figure 4 represents the improved two-way protocol, while the blue dash-dotted line represents the one-way protocol. It can be observed that the maximum transmission distance of the improved two-way protocol reaches 38.04 km, which is approximately 50% higher than the one-way protocol, whose maximum transmission distance is 25.27 km. Moreover, by further reducing the excess noise or improving the mode matching between the transmitter and the receiver through digital signal processing techniques, the performance advantage of the improved two-way protocol over the one-way protocol can be further enhanced.
To further illustrate the advantage of the improved two-way protocol in tolerating excess noise, we compare the most tolerable excess noise of the improved two-way and one-way protocols. The simulation results are shown in
Figure 5, where the red dashed line represents the improved two-way protocol and the blue dash-dotted line represents the one-way protocol.
In the simulations shown in
Figure 3 and
Figure 4, asymmetric mode-matching coefficients are employed. However, for the evaluation of the maximum tolerable excess noise presented in
Figure 5, we retain a uniform value of 0.97 for all four mode-matching coefficients. This choice is made to ensure a fair comparison between the improved two-way protocol and the one-way protocol under identical mode-mismatch conditions. In this way, the superior tolerance to excess noise exhibited by the two-way protocol does not arise from a higher value of any particular mode-matching coefficient, but reflects its intrinsic robustness under the same nonideal conditions.
The simulation results show that the improved two-way protocol exhibits a higher tolerance to excess noise than the one-way protocol over the entire transmission distance range. When the transmission distance is set to 30 km, the improved two-way protocol can tolerate an excess noise exceeding 0.1, whereas the maximum tolerable excess noise for the one-way protocol is only 0.08. As also observed in the simulation results shown in
Figure 4, the one-way protocol is no longer feasible under these conditions. At a metropolitan-scale distance of 50 km, the maximum tolerable excess noise of the improved two-way protocol exceeds 0.05, while that of the one-way protocol is only 0.0182. In this case, the improved two-way protocol can tolerate approximately three times more excess noise than the one-way protocol. Moreover, as the transmission distance increases, system performance becomes increasingly sensitive to excess noise, making the advantages of the two-way protocol more pronounced.
In addition, appropriately designed DSP algorithms, such as time-domain window optimization, matched-filter design, and multi-point weighted sampling, have the potential to enhance the mode-matching coefficient and thereby further improve overall system performance. For example, optimizing the transmitter modulation format by replacing square pulses with raised-cosine pulses can increase the mode-matching efficiency, since raised-cosine pulses exhibit lower spectral sidelobes and concentrate more energy in the main lobe, thereby achieving higher waveform fidelity.
5. Conclusions
In this work, we characterize the continuous-mode optical fields in the improved two-way protocol by introducing TMs and establish a security analysis framework for the continuous-mode scenario based on adaptive normalization with calibrated SNU. In addition, finite-size effects on statistical fluctuations in parameter estimation were analyzed based on the central limit theorem and the maximum likelihood estimation method, leading to a tighter secret key rate for the improved two-way protocol. We have analyzed the potential advantages of performing mode-matching coefficient calibration in the two-way protocol. By employing DSP algorithms, it is possible not only to enhance overall system performance but also to mitigate the impact of Rayleigh backscattering.
Our numerical simulations indicate that, in practical scenarios, improving the mode matching between the transmitter and the receiver is essential for enhancing system performance. Under the same parameter settings, the improved two-way protocol consistently outperforms its one-way counterpart. As the transmission distance increases, the impact of excess noise on system performance becomes more pronounced, further highlighting the advantage of the improved two-way protocol in long-distance transmission.
This work provides a more realistic security and performance analysis for the improved two-way protocol, offering useful guidance for its practical implementation and performance optimization. In future digitalized systems, further performance improvements can be achieved by enhancing the mode-matching coefficient through optimized modulation formats and the incorporation of appropriate digital signal processing algorithms.