Next Article in Journal
Autonomous Driving Optimization for Autonomous Robot Vehicles Based on FAST-LIO2 Algorithm Improvement
Previous Article in Journal
Time-Domain Oversampling-Enabled Multi-NS Reception for MoCDMA
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Continuous-Mode Analysis of Improved Two-Way CV-QKD

1
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Beijing Key Laboratory of Quantum Sensing and Precision Measurement, Center for Quantum Information Technology, and Institute of Quantum Electronics, Peking University, Beijing 100871, China
*
Authors to whom correspondence should be addressed.
Symmetry 2026, 18(2), 382; https://doi.org/10.3390/sym18020382
Submission received: 26 January 2026 / Revised: 15 February 2026 / Accepted: 18 February 2026 / Published: 20 February 2026
(This article belongs to the Section Physics)

Abstract

Continuous-variable quantum key distribution (CV-QKD) enables information-theoretically secure key generation between legitimate parties. To further enhance system performance, an improved two-way CV-QKD protocol has been proposed, which is accessible in practice and exhibits increased robustness against excess noise. However, in practical implementations, device nonidealities inevitably drive the optical field from the single-mode regime into the continuous-mode regime. In this work, we introduce temporal modes to characterize the evolution of optical fields in the improved two-way protocol and establish a security analysis framework for the continuous-mode scenario based on adaptive normalization with calibrated shot-noise unit. In addition, finite-size effects are taken into account in the analysis. Our results demonstrate that the improved two-way protocol retains a performance advantage over its one-way counterpart. The analysis provides useful guidance for the practical implementation and performance optimization of improved two-way CV-QKD systems.

1. Introduction

Quantum key distribution (QKD) [1,2,3,4,5,6] enables two legitimate communicating parties (commonly referred to as Alice and Bob) to establish information-theoretically [7] secure keys, effectively addressing the potential threats posed by quantum computing [8] to classical cryptographic systems. Among various QKD implementations, continuous-variable QKD (CV-QKD) [9,10] is naturally compatible with coherent optical communication technologies, making it well suited for large-scale deployment over metropolitan distances. As a result, CV-QKD has attracted significant research interest and has achieved substantial progress in theory [11,12,13,14,15,16,17], experimental demonstrations [18,19,20,21,22,23,24,25], network deployment [26,27,28,29], and post-processing techniques [30,31,32,33].
The maximum transmission distance of CV-QKD is highly sensitive to excess noise [34]. To enhance the noise tolerance of CV-QKD systems, a two-way protocol has been proposed [35]. In order to guarantee security, the original two-way protocol requires implementing the tomography of the quantum channels, which is complicated in practice. Subsequently, an improved two-way protocol was introduced [36]. By considering the purification of the system held by an eavesdropper (Eve), its security can be analyzed using the optimality of Gaussian attacks, which significantly simplifies the security analysis and makes the protocol more feasible for implementation.
However, as CV-QKD increasingly incorporates digital signal processing techniques from coherent optical communication systems [37,38,39], device nonidealities drive the conventional single-mode optical-field assumption toward a continuous-mode description [40,41]. Meanwhile, existing security analyses of the improved two-way protocol still rely on the asymptotic scheme [42] that the communicating parties exchange infinitely many signals. To address the practical security of the improved two-way protocol, a new analysis framework is required.
In this work, we introduce temporal modes (TMs) [17,43,44,45] to characterize the evolution of optical fields in the improved two-way protocol and establish a security analysis framework for the continuous-mode scenario based on adaptive normalization with properly calibrated shot-noise unit (SNU). This framework enables a consistent description of continuous-mode interference and detection processes in the improved two-way protocol. The security analysis presented in this work is established within the standard Gaussian security framework.
In addition, by invoking the central limit theorem and the maximum likelihood estimation theorem, we analyze the impact of finite-size effects on statistical fluctuations in parameter estimation, leading to a tighter secret key rate under practical conditions.
Numerical simulations for the considered parameter settings show that the performance of the improved two-way protocol remains superior to that of the one-way protocol. Specifically, the maximum transmission distance is increased by about 50%, and at a transmission distance of 50 km, the maximum tolerable excess noise is approximately three times higher than that of the one-way protocol. As the transmission distance increases, the system becomes more sensitive to excess noise, which further highlights the advantage of the improved two-way protocol in long-distance transmission. Overall, our work provides a more practical security and performance analysis of the improved two-way protocol and offers guidance for its implementation and performance optimization.
This paper is organized as follows: In Section 2, we introduce the protocol in the continuous-mode scenario. In Section 3, we analyze the impact of finite-size effects on the secret key rate of the protocol. In Section 4, numerical simulations are performed and analyzed. Finally, our conclusions are summarized in Section 5.

2. Continuous-Mode Analysis of Improved Two-Way QKD

In this section, we introduce the improved two-way quantum key distribution protocol in the continuous-mode scenario. We will first introduce the structural characteristics of the improved two-way protocol [36] in comparison with the original two-way protocol [35]. To ensure security against general collective attacks, the original two-way protocol must be implemented as a hybrid scheme combining the two-way protocol with a one-way protocol. In such a hybrid scheme, an optical switch is required at Alice’s side to randomly select between one-way and two-way operations. In contrast, the improved two-way protocol replaces this active optical switch with a beam splitter of transmittance T A , thereby transforming an active operation into a passive one and significantly simplifying the experimental implementation [36].

2.1. Prepare-And-Measure Scheme of the Protocol

We first present the prepare-and-measure (PM) scheme of the protocol in the continuous-mode scenario, as illustrated in Figure 1.
Taking the coherent-state protocol with heterodyne detection as an example, the main steps of the protocol are summarized as follows:
1. State preparation. In the improved two-way protocol, both legitimate parties prepare coherent states. Under the ideal single-mode assumption, the quantum states prepared by an ideal laser are single-mode coherent states. However, due to the nonidealities of practical laser sources, the states generated by Alice and Bob in realistic systems are no longer single-mode coherent states, but rather continuous-mode coherent states carrying temporal and spectral information. Realistic lasers have finite linewidths, and practical modulation inevitably introduces additional frequency components, which manifest in the time domain as non-uniform wavepackets. Therefore, we use ξ A to denote the temporal/spectral information contained in the photon-wavepacket of the coherent state prepared by Alice, and ξ B to denote the corresponding temporal/spectral information of the coherent state prepared by Bob. Bob encodes his information x B 1 ξ B and p B 1 ξ B onto a continuous-mode coherent state x B 1 ξ B + i p B 1 ξ B ξ B and sends it to Alice, while Alice also prepares a continuous-mode coherent state x A + i p A ξ A .
2. State interference. After receiving the continuous-mode coherent state x B + i p B ξ B sent by Bob, Alice interferes it with the continuous-mode coherent state x A + i p A ξ A prepared by herself using a beam splitter with transmittance T A .
3. State measurement. Alice performs homodyne detection on one output of the interference between the two continuous-mode coherent states, while the other output is sent to Bob. Bob performs heterodyne detection on the received state ( T B = 1 / 2 ) and obtains x B 2 ξ and p B 2 ξ . Due to the finite bandwidth of practical detectors, Alice and Bob cannot access the full temporal and spectral information of the quantum states. Consequently, both the modulation rate and the format of the modulation signal employed by the transmitter influence the final detection performance.
4. Data processing. Bob computes x B = x B 2 ξ k x B 1 ξ B and p B = p B 2 ξ + k p B 1 ξ B to obtain the final processed data. The parameter k is discussed in Section 2.3. Bob processes his measurement data to estimate Alice’s data, after which Bob and Alice perform classical post-processing procedures such as error correction and privacy amplification.
From the above description, it can be observed that if the security analysis of practical systems is still based on the conventional single-mode model, it does not fully capture the mode mismatch between the transmitter and receiver arising from laser nonidealities, modulation imperfections, and detector nonidealities. Moreover, when Alice interferes with the continuous-mode coherent state x A + i p A ξ A prepared by herself and the continuous-mode coherent state x B + i p B ξ B prepared by Bob, the interference process inherently involves continuous-mode optical fields, which are also difficult to describe within the single-mode framework. Therefore, to analyze the improved two-way protocol under practical scenarios, it is necessary to introduce new analytical tools.

2.2. Temporal Modes of Continuous States

In conventional security analysis, the ideal single-mode coherent state can be represented by the annihilation and creation operators of a single-mode field, a ^ i and a ^ i . However, in practical systems, modulation at the transmitter inevitably introduces additional frequency components, which manifest as a nonuniform temporal waveform in the time domain. In this case, it is necessary to replace the single-mode operators with continuous-mode operators, defined as [40 a ^ i Δ ω a ^ ( ω ) and a ^ i Δ ω a ^ ( ω ) , where Δ ω denotes the mode spacing. The continuous-mode field operators [40,43,45] satisfy the commutation relation a ^ ( ω ) , a ^ ω = δ ω ω . Moreover, by applying the Fourier transform, the operator in the time domain can be expressed as a ^ ( t ) = ( 1 / 2 π ) d ω a ^ ( ω ) exp ( i ω t ) .
To introduce TMs for the security analysis, we first define a wavepacket function ξ i ( t ) . If ξ i ( t ) meets the orthonormalization that d t ξ i * ( t ) ξ j ( t ) = δ i j , for different i and j, the TM field creation operator can be defined as [40,41,45] A ^ ξ i = d t ξ i ( t ) a ^ ( t ) . The annihilation operator A ^ ξ i follows a similar definition.
The TM field operators also obey the commutation relation, which reads A ^ ξ i , A ^ ξ j = δ i j . Then we can define the photon-wavepacket coherent state γ i ξ i on ξ i TM as [40]
γ i ξ i = D ^ ξ i γ i | 0 = exp γ i A ^ ξ i γ i * A ^ ξ i | 0 .
The photon-wavepacket coherent state obeys the eigenvalue equation A ^ ξ i γ i ξ i = γ i γ i ξ i . Under this notation, the quadrature operator with the phase angle θ can be defined as [17]
X ^ ξ i θ = A ^ ξ i exp ( i θ ) + A ^ ξ i exp ( i θ ) .
After describing the continuous-mode states prepared at the transmitter using TM, the receiver of the system that incorporates continuous-mode effects can likewise be characterized within the TM framework. The finite detector bandwidth can be modeled as a filter characterized by an impulse response function (IRF) g ( t ) , and the photocurrent flux operator of a homodyne detector is given by [40,46]
f ^ ( t ) = a ^ ( t ) a ^ LO ( t ) + a ^ LO ( t ) a ^ ( t ) g ( t ) ,
where ∗ denotes the convolution. The photocurrent flux after taking the average over local oscillator (LO) is given by
f ^ LO ( t ) = a LO ( t ) f ^ ( t ) a LO ( t ) .
Considering the analog-to-digital converter (ADC) as the integral sampling process with integral time Δ t s , the sampled data at time t k is
D ^ t k = 1 Δ t s t k t k + Δ t s d t f ^ LO ( t ) .
For a digital signal processing (DSP) algorithm involving N sampled data, the output data at the time corresponding to the t j sampling time could be [17]
D ^ t j = μ LO 1 2 Δ t s G DSP t j ( τ ) X ^ a LO ( τ ) d τ ,
where
G DSP ( τ ) = k = 1 N f DSP k g t k τ .
f DSP k denotes the coefficients determined by the specific DSP algorithm.
As the continuous-mode coherent states sent by the transmitter carry temporal and spectral information, the nonideal detectors at the receiver are unable to extract all the information from an arbitrary and unknown temporal wavepacket. In addition, the DSP algorithm employed at the receiver involves sampling and processing of multi-point measurement outcomes. To properly describe the final output of the receiver, it is necessary to perform adaptive SNU normalization according to the specific configuration. By configuring the LO, IRF, and DSP algorithms in practical systems, the SNU normalization factor of the receiver output can be obtained as [17]
σ SNU = μ LO Δ t s 2 ξ LO ( τ ) 2 G DSP t j ( τ ) 2 d τ ,
where μ LO denotes the average number of photons contained in an envelope ξ LO ( t ) for a pulsed LO.
After performing adaptive normalization on the receiver output, the sampled data D ^ t j SNU are divided by σ SNU , which gives [17]
D ^ t j SNU = e i θ d τ G dsp t j ( τ ) ξ LO ( τ ) e i ω LO τ σ cal a ^ ( τ ) + h . c . ,
where h.c. denotes the Hermitian conjugate, and σ cal = d τ ξ LO ( τ ) 2 G dsp t j ( τ ) 2 is the rescaled factor when calibrating output data by SNU.
The normalized photon-wavepacket function is defined as
Ξ DSP t j ( τ ) = ξ LO ( τ ) G dsp t j ( τ ) exp i ω LO τ d τ ξ LO ( τ ) 2 G dsp t j ( τ ) 2 ,
with the normalization condition d τ Ξ DSP t j ( τ ) 2 = 1 . This introduces Ξ DSP t j TM , which is jointly defined by the LO, IRF, and DSP algorithms. Then, we can further define its operator as
A ^ Ξ DSP t j = d τ Ξ DSP t j ( τ ) a ^ ( τ ) ,
A ^ Ξ DSP t j = d τ Ξ DSP t j ( τ ) a ^ ( τ ) .
Therefore, the normalized receiver output D ^ t j SNU shown in Equation (9) can be expressed in terms of the Ξ D S P t j TM operators and rewritten as
D ^ t j SNU = A ^ Ξ DSP t j exp ( i θ ) + A ^ Ξ DSP t j exp ( i θ ) = X ^ Ξ DSP t j θ ,
which takes the same form as Equation (2) for the transmitter output.
The analysis adopted in this work does not alter the Gaussian nature of the protocol. Instead, it reformulates the description of the optical field under device nonidealities within the continuous-mode framework in terms of TMs. The final data (output from DSP and being normalized) can be treated as a quadrature measurement of Ξ DSP t j TM . As long as the data represent a quadrature measurement result, they can be used to construct the covariance matrix and are thus compatible with traditional security analysis methods [17]. Under these conditions, Gaussian optimality remains valid, and the optimal attack can still be restricted to Gaussian collective attacks.
The constructed covariance matrix remains defined in a canonical operator space, and both its symplectic eigenvalues and the mathematical structure underlying Gaussian security analysis remain unchanged. The normalization procedure in the continuous-mode scenario does not modify the symplectic structure of the system. The covariance-matrix-based Gaussian security proof and the associated symplectic eigenvalue analysis therefore remain fully applicable.
In the TM framework, the TM associated with the measured quantum state is denoted as ξ - TM , while the effective TM defined by the receiver is denoted as Ξ DSP - TM . The continuous-mode measurement can be regarded as a mode projection process [17]. A third mode Ψ - TM can be constructed via Gram–Schmidt orthogonalization, which is derived from Ξ DSP - TM and orthogonal to ξ - TM . The corresponding decomposition of the creation operator is then given by
A ^ Ξ DSP = η m A ^ ξ + 1 η m A ^ Ψ ,
where η m denotes the mode-matching coefficient,
η m = d t Ξ DSP ( t ) ξ ( t ) 2 .
It can be seen that the decomposition of the creation operator is obtained through the standard Gram–Schmidt orthogonalization procedure in the continuous-mode Hilbert space. The above decomposition therefore originates from a change of orthonormal basis in the Hilbert space at the mathematical level.
At the physical level, the validity of the mode-matching decomposition relies on the following assumptions [17]: (1) The DSP algorithm applied at the receiver is linear. (2) The TM functions are properly normalized and satisfy orthogonality conditions.

2.3. Entanglement-Based Scheme of the Protocol

To analyze the security of the PM scheme, we construct an entanglement-based (EB) scheme that is equivalent to it. The equivalence is established in two aspects. First is state-preparation equivalence: performing heterodyne detection on one mode of a two-continuous-mode squeezed vacuum (TCMSV) state is equivalent to preparing a Gaussian-modulated continuous-mode coherent state. Second is measurement equivalence: the effect of transmitter–receiver mode mismatch can be equivalently modeled as a reduction in detection efficiency, which can be represented by a beam splitter with transmittance η m . The key steps establishing the equivalence between the EB and PM schemes of the protocol are illustrated in Figure 2.
The EB scheme of the protocol is described as follows:
1. State preparation. Bob prepares a TCMSV with variance V B , keeps one mode B 1 ξ B , and sends the other mode B o u t ξ B to Alice through the quantum channel. Alice prepares a TCMSV with variance V A , performs heterodyne detection on one of the modes A 1 ξ A , and keeps the other mode A ξ A .
2. State interference. The mode B out ξ B sent by Bob evolves through the quantum channel into A i n ξ B . Alice interferes A i n ξ B with the previously retained mode A ξ A using a beam splitter with transmittance T A , resulting in the output modes A 2 ξ and A o u t ξ . Alice keeps the mode A 2 ξ and sends the mode A o u t ξ back to Bob. The mode A o u t ξ sent by Alice evolves through the channel into B 2 ξ .
3. State measurement. Alice performs homodyne detection on the mode A 2 ξ . At this stage, due to the interference of continuous-mode optical fields, it is necessary to separately consider the mode-matching coefficients between the detection mode at Alice and the modes originating from Bob and Alice, denoted by η m BA and η m AA , respectively. Bob performs heterodyne detection on both the mode B 2 ξ and the mode B 1 ξ B originally retained by himself. Similarly, owing to the interference of continuous-mode optical fields, the mode-matching coefficients between Bob’s detection mode and the modes originating from Bob and Alice, denoted by η m BB and η m AB , respectively, must be taken into account.
4. Data processing. Bob processes his measurement data to obtain x B = x B 2 ξ k x B 1 ξ B and p B = p B 2 ξ + k p B 1 ξ B , where k = T T A η m BB V B 1 / V B + 1 . Bob then uses his measurement results to estimate Alice’s values. After completing data reconciliation, Bob and Alice perform classical post-processing procedures such as error correction and privacy amplification.
From the above description of the EB scheme, it can be seen that, compared with the single-mode case, the continuous-mode model requires careful consideration of the mode-matching process between the transmitter and receiver. In particular, owing to the interference of continuous-mode optical fields, four mode-matching coefficients between the transmitter and receiver must be taken into account simultaneously. In Section 3.2, we will present the final covariance matrix between Alice and Bob by incorporating the effects of finite-size statistics.

3. Finite-Size Effects in the Improved Two-Way Protocol

In practical implementations of the protocol, the two legitimate parties can exchange only a finite amount of data for the post-processing procedure, which leads to increased statistical fluctuations in sampling-based estimations and prevents them from accurately estimating the channel parameters. In this section, we analyze the impact of finite-size effects on parameter estimation and present the secret key rate formula of the improved two-way protocol when finite-size effects are taken into account.

3.1. Theoretical Analysis of Finite-Size Effects

3.1.1. Finite-Size Statistical Fluctuations

When finite-size effects are taken into account, Alice and Bob cannot precisely characterize the properties of the quantum channel. They need to select m signals from the exchanged N signals for parameter estimation, leaving n = N m signals for key generation. In this case, the secret key rate of the protocol should be modified as [47]
K finite = n N β R I AB S BE ϵ PE Δ ( n ) ,
where I AB denotes the mutual information between Alice and Bob, and S BE denotes the information leaked from Bob to Eve. The parameter ϵ PE denotes the probability of failure in parameter estimation, and the true channel parameters lie within a certain confidence interval around the estimated values with probability 1 ϵ PE . The parameter Δ ( n ) is related to the security of privacy amplification, and its value is given by
Δ ( n ) 2 dim H X + 3 log 2 ( 2 / ϵ ¯ ) n + 2 n log 2 1 / ϵ P A ,
where H X represents the Hilbert space dimension of the variable x in the raw key, in the CV protocol, the dim H X is set to 2. The smoothing parameter ϵ ¯ and the privacy amplification parameter ϵ PA are intermediate variables, with their optimal values set to ϵ ¯ = ϵ PA = 10 10 .
For a general linear channel, the relationship between the data held by Alice and Bob can be expressed as
y = t x + z ,
where t denotes the channel transmittance, with t = T . The variable z represents the equivalent noise and follows a normal distribution with unknown variance of the form σ 2 = 1 + T ε . The relationships between t and S BE , as well as between σ 2 and S BE , are given by
S BE t σ 2 < 0 , S BE σ 2 t > 0 .
Due to finite-size effects, the accuracy with which the legitimate parties can assess Eve’s eavesdropping behavior in the channel is reduced. To achieve a high level of security, a worst-case estimation of the eavesdropping must therefore be adopted. Specifically, Alice and Bob infer the minimum value of t, denoted as t min , and the maximum value of σ 2 , denoted as σ max 2 , from the sample data.
By invoking the law of large numbers, the estimators t ^ and σ ^ 2 can be approximated as following the distributions:
t ^ N t , σ 2 i = 1 m x i 2 , m σ ^ 2 σ 2 χ 2 ( m 1 ) ,
where N denotes the normal distribution and χ 2 denotes the chi-square distribution. Let t real and σ real 2 denote the real (unknown but fixed) values of the channel parameters. Let ϵ PE be the total failure probability of parameter estimation, which is equally allocated to the construction of the one-sided confidence bounds for t and σ 2 ; i.e., each one-sided failure probability is taken as ( ϵ PE ) / 2 . As a result, P ( t real < t min ) ( ϵ PE ) / 2 and P ( σ real 2 > σ max 2 ) ( ϵ PE ) / 2 . By applying the union bound, we obtain:
P t real t min , σ real 2 σ max 2 1 ϵ PE .
We then obtain the one-sided lower confidence bound t min for t and the one-sided upper confidence bound σ max 2 for σ 2 :
t min t ^ z ϵ PE / 2 σ ^ 2 m V mod ,
σ max 2 σ ^ 2 + z ϵ PE / 2 σ ^ 2 2 m ,
where z ϵ PE / 2 satisfies
1 2 1 erf z ϵ PE ) / 2 2 = ϵ PE 2 ,
where erf denotes the error function, which is defined as
erf ( x ) = 2 π 0 x e t 2 d t .
By replacing the maximum likelihood estimators with their expectation values, t min and σ max 2 are obtained with probability 1 ϵ PE , yielding the covariance matrix corresponding to the worst-case secret key rate.

3.1.2. Covariance Matrix in the Ideal Scenario

To evaluate the secret key rate under finite-size effects using Equation (16), it is necessary to construct the covariance matrix between Alice and Bob for the calculation of I AB and S BE e PE . As described in the EB scheme in Section 2.2, after the transmission and measurement of the quantum states, Alice and Bob construct the covariance matrix γ B 2 B 1 A 2 A 1 from the four modes retained in the protocol. In the ideal scenario, the two parties can exchange an infinite amount of data for parameter estimation, and perfect mode matching is achieved between them. Under these conditions, the corresponding covariance matrix can be expressed as
γ B 2 B 1 A 2 A 1 = V B 2 I C B 2 B 1 σ Z C B 2 A 2 I C B 2 A 1 σ Z C B 2 B 1 σ Z V B 1 I C B 1 A 2 σ Z 0 C B 2 A 2 I C B 1 A 2 σ Z V A 2 I C A 2 A 1 σ Z C B 2 A 1 σ Z 0 C A 2 A 1 σ Z V A 1 I ,
where the individual elements are given by [36]
V B 1 = V B V B 2 = T 1 T A V A + χ + T T A V B + χ V A 2 = T A V A + T 1 T A V B + χ V A 1 = V A C B 2 B 1 = T T A V B 2 1 C B 1 A 2 = T 1 T A V B 2 1 C B 2 A 2 = T 1 T A T A V A T V B + χ C B 2 A 1 = T 1 T A V A 2 1 C A 2 A 1 = T A V A 2 1 ,
χ = 1 T T + ε .
In the ideal scenario, the secret key rate can be evaluated using the matrix in Equation (26) together with subsequent matrix transformations. Based on the analyses in Section 2.2 and Section 3.1.1, we will subsequently present the method for calculating the secret key rate in practical systems when both continuous-mode effects and finite-size effects are taken into account.

3.1.3. Finite-Size Adaptive Normalization

In Section 3.1.2, the covariance matrix of Alice and Bob in the ideal scenario has been presented. In practical systems, after adaptive normalization, the transmitted and received signals can be described in terms of TMs, and the mode-matching coefficients between the transmitter and receiver must be taken into account, as listed in Table 1.
In a realistic scenario that accounts for device nonidealities, the measured state at Bob’s input can be described as a wavepacket coherent state | γ ξ A associated with the wavepacket ξ A ( t ) . Therefore, during the calibration stage prior to key distribution, Alice sends Bob a predefined test signal that is agreed upon in advance. Bob then performs multi-point sampling of this signal, from which the corresponding wavepacket is reconstructed and subsequently normalized to obtain ξ A ( t ) . After completing the SNU normalization at the receiver (see Equations (3)–(13)), Bob obtains Ξ DSP ( t ) ; by substituting the relevant parameters into Equation (15), the mode-matching coefficient η m can then be obtained. The calibration procedures for the four mode-matching coefficients follow similar steps.
Pre-calibrating the mode-matching coefficients offers an additional practical advantage for the implementation of the two-way protocol. The pre-calibration of the mode-matching coefficients is performed in an independent unidirectional configuration, in which Rayleigh backscattering is effectively avoided. This allows the receiver to optimize the DSP algorithm in advance so as to achieve improved mode-matching coefficients and mitigate the impact of Rayleigh backscattering during the subsequent two-way operation.
At the same time, when finite-size effects are taken into account, worst-case estimations of T and ϵ in the covariance matrix of Alice and Bob are required. Combined with the theoretical analysis in Section 3.1.1, after introducing the four mode-matching coefficients into the matrix in Equation (26), the covariance matrix corrected by finite-size adaptive normalization (FAN) is given by
γ B 2 B 1 A 2 A 1 FAN = V B 2 I C B 2 B 1 σ Z C B 2 A 2 I C B 2 A 1 σ Z C B 2 B 1 σ Z V B 1 I C B 1 A 2 σ Z 0 C B 2 A 2 I C B 1 A 2 σ Z V A 2 I C A 2 A 1 σ Z C B 2 A 1 σ Z 0 C A 2 A 1 σ Z V A 1 I FAN .
The relations between the quadratures can be derived based on the mode-matching coefficients summarized in Table 1. The TCMSV prepared by Bob comprises two modes, namely the transmitted mode B o u t and the locally measured mode B 1 . According to Equation (15), the Gram–Schmidt orthogonalization can be applied to obtain
B o u t BA = η m BA B o u t + 1 η m BA B o u t ,
B o u t BB = η m BB B o u t + 1 η m BB B o u t .
The mode B o u t is transmitted through the channel and evolves into the mode A i n .
A i n BA = T B o u t BA + 1 T E 1 ,
A i n BB = T B o u t BB + 1 T E 1 .
E denotes Eve’s mode. Its variance is given by V E = 1 + ( T ε ) / ( 1 T ) .
The TCMSV prepared by Alice consists of two modes: the mode A used for optical interference and the retained mode A 1 measured locally.
A AA = η m AA A + 1 η m AA A ,
A AB = η m AB A + 1 η m AB A .
The modes A and A i n interfere at a beam splitter with transmittance T A , resulting in the mode A 2 for Alice’s local measurement and the mode A o u t sent back into the channel.
A 2 = T A A AA 1 T A A i n BA ,
A o u t = T A A i n BB + 1 T A A AB .
The mode A o u t is transmitted through the channel and evolves into the mode B 2 .
B 2 = T A o u t + 1 T E 2 .
We have now identified all the modes associated with the elements of matrix γ B 2 B 1 Λ 2 Λ 1 . Combining the above results, all elements of the covariance matrix in Equation (29) can be obtained.
FAN V B 1 = V B V B 2 = T min 1 T A η m AB V A + 1 η m AB + σ max 2 T min + T min T A T min η m BB V B + T min 1 η m BB + σ max 2 T min V A 2 = T A η m AA V A + 1 η m AA + 1 T A T min η m BA V B + T min 1 η m BA + σ max 2 T min V A 1 = V A C B 2 B 1 = T min T A η m BB V B 2 1 C B 1 A 2 = T min 1 T A η m BA V B 2 1 C B 2 A 2 = T min 1 T A T A η m AB η m AA V A + 1 η m AB 1 η m AA T min η m BB η m BA V B + T min 1 η m BB 1 η m BA + σ max 2 T min C B 2 A 1 = T min 1 T A η m AB V A 2 1 C A 2 A 1 = T A η m AA V A 2 1 ,
where T min = t min 2 . The calculations of t min and σ max 2 can be found in Equations (22) and (23), respectively. By replacing the maximum likelihood estimators with their expectation values, t ^ = T and σ ^ 2 = 1 + T ε .

3.2. Method for Calculating the Secret Key Rate

After obtaining the covariance matrices γ B 2 B 1 A 2 A 1 and γ B 2 B 1 A 2 A 1 FAN , we can calculate I AB and S BE ϵ PE , and then evaluate the secret key rate using Equation (16). For the coherent-state heterodyne protocol with reverse reconciliation,
I AB = log 2 V A M V A M B ,
where V A M and V A M B denote the variance of Alice’s measurement outcomes and the conditional variance given Bob’s measurement outcomes, respectively. From the covariance matrix shared by the two parties, we can obtain
I AB = log 2 T 2 T A ( χ + 1 ) + T χ + 1 + T 1 T A η m AB V A + 1 η m AB T 2 T A ( χ + 1 ) + T χ + 1 + T 1 T A .
The information leaked from Bob to Eve, S BE ϵ PE , can be evaluated using the Holevo bound,
S BE ϵ PE = [ S ( E ) ] ϵ PE S E x B , p B ϵ PE ,
where [ S ( E ) ] ϵ PE denotes Eve’s von Neumann entropy, and S E x B , p B ϵ PE denotes Eve’s conditional von Neumann entropy given Bob’s measurement outcomes.
After Eve purifies the entire system, we have [ S ( E ) ] ϵ PE = [ S ( AB ) ] ϵ PE . The entropy of the Gaussian state AB can then be calculated from its corresponding covariance matrix γ B 2 B 1 A 2 A 1 FAN ,
[ S ( E ) ] ϵ PE = i = 1 7 G λ i ,
G λ i = λ i + 1 2 log λ i + 1 2 λ i 1 2 log λ i 1 2 ,
where λ i denotes the symplectic eigenvalues of the matrix γ B 2 B 1 A 2 A 1 FAN .
The evaluation of Eve’s conditional entropy given Bob’s measurement outcomes, S E x B , p B ϵ PE , requires Bob’s measurement results. When Bob performs the data processing x B = x B 2 ξ B k x B 1 ξ B and p B = p B 2 ξ B + k p B 1 ξ B , the corresponding operations can be equivalently described by applying a symplectic transformation γ k to obtain a new covariance matrix,
γ B 4 B 3 B 5 B 6 A 2 A 1 FAN = γ k γ k I 2 γ B 2 X B 1 X B 1 p B 2 P A 2 A 1 FAN γ k γ k I 2 T ,
γ k = 1 0 k 0 0 1 0 0 0 0 1 0 0 k 0 1 ,
k = T T A η m BB V B 1 V B + 1 .
After Eve purifies the system, S E x B , p B ϵ PE = S B 3 B 5 A 2 A 1 X A 1 P x B , p B ϵ PE . By performing heterodyne detection on the matrix γ B 4 B 3 B 5 B 6 A 2 A 1 FAN ,
γ B 3 B 5 A 2 A 1 X B , P B FAN = γ B 3 B 5 A 2 A 1 C B 4 X γ B 4 X M P C B 4 T C B 6 P γ B 6 P M P C B 6 T FAN ,
we can then calculate
S E x B , p B ϵ PE = i = 1 5 G λ i ,
where λ i denotes the symplectic eigenvalues of the matrix γ B 3 B 5 A 2 A 1 X B , P B FAN .
By substituting Equations (41), (43), and (49) into Equation (16), the secret key rate formula can be obtained.

4. Simulation and Analysis

In this section, we present the simulation results of the improved two-way protocol and compare them with the one-way coherent-state heterodyne protocol.
First, we compare the performance of the two-way protocol in the ideal scenario with the protocol in the practical scenario. In the ideal case, the mode-matching coefficient is set to 1. Moreover, the analysis is carried out in the asymptotic regime. In contrast, in the practical scenario, the four matching coefficients listed in Table 1 must be taken into account simultaneously.
The detection processes in the two-way protocol can be categorized into two types. One corresponds to the detection of quantum states prepared at one side and transmitted through the optical fiber channel to the remote receiver. The other corresponds to the detection of quantum states prepared and measured locally at the same station. Optical signals propagating over long-distance quantum channels (Bob-to-Alice and Alice-to-Bob) typically suffer significantly higher wavefront distortion and temporal broadening compared to the local paths (Alice-to-Alice or Bob-to-Bob).
To avoid the increased complexity arising from the variation of multiple matching coefficients, we assume that Alice and Bob employ the same types of lasers and detectors, and that the modulation format is pre-agreed to maintain TM consistency as much as possible. Under these conditions, the relationships among the four mode-matching coefficients can be expressed as η m AA = η m BB , η m AB = η m BA .
Regarding the specific parameter values, besides the method discussed in Section 3.1.3, we also draw on the results of a previously conducted calibration experiment on the mode-matching coefficients [48]. In that study, in a 30 km fiber experiment, for a 50% duty-cycle square-wave signal with a repetition rate of 5 MHz prepared at the transmitter, the maximum mode-matching coefficient obtained under single-point sampling was 0.97. By applying the DSP algorithm to the sampled data, the mode-matching coefficient could be further improved to 0.995.
We consider the experimentally obtained parameters [48] to provide meaningful reference values for practical systems. Based on these results, the mode-matching coefficients corresponding to transmission over long-distance quantum channels ( η m AB and η m BA ) are set to 0.97, whereas the coefficients associated with local detection ( η m AA and η m BB ) are set to 0.995.
The simulation results are shown in Figure 3. The channel transmittance is given by T = 10 α L / 10 , where a channel loss of α = 0.2   dB / km is assumed and L denotes the transmission distance. The variance of Bob’s TCMSV state is V B = 20 , and that of Alice’s TCMSV state is V A = 20 . The transmittance of the beam splitter used by Alice for interference is T A = 0.8 . The excess noise of the system is set to ε = 0.1 , and the reconciliation efficiency is β R = 0.95 .
In Figure 3, the black solid line represents the secret key rate of the improved two-way coherent-state heterodyne protocol as a function of transmission distance in the ideal scenario. The red dashed line represents the protocol performance when finite-size effects are taken into account and mode mismatch between the transmitter and the receiver is considered. It can be observed that the maximum transmission distance decreases from 48.27 km in the ideal scenario to 38.04 km, corresponding to a reduction of nearly 10 km. Therefore, when implementing the improved two-way protocol in a practical scenario, the combined impact of finite-size effects and mode mismatch should be carefully considered.
Although the performance of the improved two-way protocol degrades compared with that in the ideal scenario due to practical device nonidealities, it still outperforms the one-way protocol under the same parameter settings. To illustrate the performance advantage of the improved two-way protocol, we perform a comparative simulation analysis between the improved two-way and one-way protocols, and the results are shown in Figure 4.
In the continuous-mode scenario, finite-size effects are taken into account by setting the total number of exchanged signals to N = 10 8 . The mode-matching coefficient between the transmitter and the receiver in one-way protocol is set to 0.97. In addition, coherent states are prepared at the transmitter and heterodyne detection is performed at the receiver. Under these conditions, the red dashed line in Figure 4 represents the improved two-way protocol, while the blue dash-dotted line represents the one-way protocol. It can be observed that the maximum transmission distance of the improved two-way protocol reaches 38.04 km, which is approximately 50% higher than the one-way protocol, whose maximum transmission distance is 25.27 km. Moreover, by further reducing the excess noise or improving the mode matching between the transmitter and the receiver through digital signal processing techniques, the performance advantage of the improved two-way protocol over the one-way protocol can be further enhanced.
To further illustrate the advantage of the improved two-way protocol in tolerating excess noise, we compare the most tolerable excess noise of the improved two-way and one-way protocols. The simulation results are shown in Figure 5, where the red dashed line represents the improved two-way protocol and the blue dash-dotted line represents the one-way protocol.
In the simulations shown in Figure 3 and Figure 4, asymmetric mode-matching coefficients are employed. However, for the evaluation of the maximum tolerable excess noise presented in Figure 5, we retain a uniform value of 0.97 for all four mode-matching coefficients. This choice is made to ensure a fair comparison between the improved two-way protocol and the one-way protocol under identical mode-mismatch conditions. In this way, the superior tolerance to excess noise exhibited by the two-way protocol does not arise from a higher value of any particular mode-matching coefficient, but reflects its intrinsic robustness under the same nonideal conditions.
The simulation results show that the improved two-way protocol exhibits a higher tolerance to excess noise than the one-way protocol over the entire transmission distance range. When the transmission distance is set to 30 km, the improved two-way protocol can tolerate an excess noise exceeding 0.1, whereas the maximum tolerable excess noise for the one-way protocol is only 0.08. As also observed in the simulation results shown in Figure 4, the one-way protocol is no longer feasible under these conditions. At a metropolitan-scale distance of 50 km, the maximum tolerable excess noise of the improved two-way protocol exceeds 0.05, while that of the one-way protocol is only 0.0182. In this case, the improved two-way protocol can tolerate approximately three times more excess noise than the one-way protocol. Moreover, as the transmission distance increases, system performance becomes increasingly sensitive to excess noise, making the advantages of the two-way protocol more pronounced.
In addition, appropriately designed DSP algorithms, such as time-domain window optimization, matched-filter design, and multi-point weighted sampling, have the potential to enhance the mode-matching coefficient and thereby further improve overall system performance. For example, optimizing the transmitter modulation format by replacing square pulses with raised-cosine pulses can increase the mode-matching efficiency, since raised-cosine pulses exhibit lower spectral sidelobes and concentrate more energy in the main lobe, thereby achieving higher waveform fidelity.

5. Conclusions

In this work, we characterize the continuous-mode optical fields in the improved two-way protocol by introducing TMs and establish a security analysis framework for the continuous-mode scenario based on adaptive normalization with calibrated SNU. In addition, finite-size effects on statistical fluctuations in parameter estimation were analyzed based on the central limit theorem and the maximum likelihood estimation method, leading to a tighter secret key rate for the improved two-way protocol. We have analyzed the potential advantages of performing mode-matching coefficient calibration in the two-way protocol. By employing DSP algorithms, it is possible not only to enhance overall system performance but also to mitigate the impact of Rayleigh backscattering.
Our numerical simulations indicate that, in practical scenarios, improving the mode matching between the transmitter and the receiver is essential for enhancing system performance. Under the same parameter settings, the improved two-way protocol consistently outperforms its one-way counterpart. As the transmission distance increases, the impact of excess noise on system performance becomes more pronounced, further highlighting the advantage of the improved two-way protocol in long-distance transmission.
This work provides a more realistic security and performance analysis for the improved two-way protocol, offering useful guidance for its practical implementation and performance optimization. In future digitalized systems, further performance improvements can be achieved by enhancing the mode-matching coefficient through optimized modulation formats and the incorporation of appropriate digital signal processing algorithms.

Author Contributions

Conceptualization, Y.S., J.M., X.W. and Z.C.; Methodology, Y.S.; Software, Y.S.; Formal analysis, Y.S., X.W. and Z.C.; Investigation, Y.S.; Resources, X.W., Z.C., S.Y. and H.G.; Writing—original draft preparation, Y.S.; Writing—review and editing, X.W., Z.C. and S.Y.; Visualization, Y.S. and J.M.; Supervision, X.W., Z.C., S.Y. and H.G.; Project administration, X.W. and Z.C.; Funding acquisition, X.W., Z.C., S.Y. and H.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the National Natural Science Foundation of China, grant numbers 62371060, 62201012, 62001041 and 62571006, and by the Fund of State Key Laboratory of Information Photonics and Optical Communications, grant number IPOC2022ZT09.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  2. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661. [Google Scholar] [CrossRef]
  3. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef]
  4. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 15043. [Google Scholar] [CrossRef]
  5. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  6. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.-K.; Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  7. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  8. Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In 35th Annual Symposium on Foundations of Computer Science (FOCS); IEEE: New York, NY, USA, 1994; pp. 124–134. [Google Scholar]
  9. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  10. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum cryptography without switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef]
  11. Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef]
  12. Leverrier, A. Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction. Phys. Rev. Lett. 2017, 118, 200501. [Google Scholar] [CrossRef]
  13. Lupo, C.; Ottaviani, C.; Papanastasiou, P.; Pirandola, S. Parameter estimation with almost no public communication for continuous-variable quantum key distribution. Phys. Rev. Lett. 2018, 120, 220505. [Google Scholar] [CrossRef]
  14. Ghorai, S.; Grangier, P.; Diamanti, E.; Leverrier, A. Asymptotic security of continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. X 2019, 9, 021059. [Google Scholar] [CrossRef]
  15. Lin, J.; Upadhyaya, T.; Lütkenhaus, N. Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution. Phys. Rev. X 2019, 9, 041064. [Google Scholar] [CrossRef]
  16. Denys, A.; Brown, P.; Leverrier, A. Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation. Quantum 2021, 5, 540. [Google Scholar] [CrossRef]
  17. Chen, Z.; Wang, X.; Yu, S.; Li, Z.; Guo, H. Continuous-mode quantum key distribution with digital signal processing. npj Quantum Inf. 2023, 9, 28. [Google Scholar] [CrossRef]
  18. Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378–381. [Google Scholar] [CrossRef]
  19. Qi, B.; Lougovski, P.; Pooser, R.; Grice, W.; Bobrek, M. Generating the local oscillator “locally” in continuous-variable quantum key distribution based on coherent detection. Phys. Rev. X 2015, 5, 041009. [Google Scholar] [CrossRef]
  20. Soh, D.B.S.; Brif, C.; Coles, P.J.; Lütkenhaus, N.; Camacho, R.M.; Urayama, J.; Sarovar, M. Self-referenced continuous-variable quantum key distribution protocol. Phys. Rev. X 2015, 5, 041010. [Google Scholar] [CrossRef]
  21. Huang, D.; Huang, P.; Lin, D.; Zeng, G. Long-distance continuous-variable quantum key distribution by controlling excess noise. Sci. Rep. 2016, 6, 19201. [Google Scholar] [CrossRef]
  22. Tian, Y.; Wang, P.; Liu, J.; Du, S.; Liu, W.; Lu, Z.; Wang, X.; Li, Y. Experimental demonstration of continuous-variable measurement-device-independent quantum key distribution over optical fiber. Optica 2022, 9, 492–500. [Google Scholar] [CrossRef]
  23. Tian, Y.; Zhang, Y.; Liu, S.; Wang, P.; Lu, Z.; Wang, X.; Li, Y. High-performance long-distance discrete-modulation continuous-variable quantum key distribution. Opt. Lett. 2023, 48, 2953–2956. [Google Scholar] [CrossRef]
  24. Wang, T.; Huang, P.; Li, L.; Zhou, Y.; Zeng, G. High key rate continuous-variable quantum key distribution using telecom optical components. New J. Phys. 2024, 26, 023002. [Google Scholar] [CrossRef]
  25. Liao, X.; Xu, Y.; Zhang, Q.; Huang, P.; Wang, T.; Wang, K.; Zeng, G. High-rate self-referenced continuous-variable quantum key distribution over a high-loss free-space channel. Photonics Res. 2025, 13, 2603–2617. [Google Scholar] [CrossRef]
  26. Wang, X.; Chen, Z.; Li, Z.; Qi, D.; Yu, S.; Guo, H. Experimental upstream transmission of continuous variable quantum key distribution access network. Opt. Lett. 2023, 48, 3327–3330. [Google Scholar] [CrossRef]
  27. Xu, Y.; Wang, T.; Zhao, H.; Huang, P.; Zeng, G. Round-trip multi-band quantum access network. Photonics Res. 2023, 11, 1449–1464. [Google Scholar] [CrossRef]
  28. Qi, D.; Wang, X.; Li, Z.; Ma, J.; Chen, Z.; Lu, Y.; Yu, S. Experimental demonstration of a quantum downstream access network in continuous variable quantum key distribution with a local local oscillator. Photonics Res. 2024, 12, 1262–1273. [Google Scholar] [CrossRef]
  29. Li, Z.; Wang, X.; Qi, D.; Chen, Z.; Yu, S. Experimental implementation of four-user downstream access network continuous-variable quantum key distribution. J. Lightwave Technol. 2024, 42, 6662–6670. [Google Scholar] [CrossRef]
  30. Wang, X.; Wang, H.; Zhou, C.; Chen, Z.; Yu, S.; Guo, H. Continuous-variable quantum key distribution with low-complexity information reconciliation. Opt. Express 2022, 30, 30455–30465. [Google Scholar] [CrossRef]
  31. Cao, Z.; Chen, X.; Chai, G.; Liang, K.; Yuan, Y. Rate-adaptive polar-coding-based reconciliation for continuous-variable quantum key distribution at low signal-to-noise ratio. Phys. Rev. Appl. 2023, 19, 044023. [Google Scholar] [CrossRef]
  32. Xing, L.; Zhou, C.; Ma, J.; Chen, Z.; Yu, S.; Wang, X. Information reconciliation with extremely low signal-to-noise ratio for continuous-variable quantum key distribution with LDPC-Hadamard codes. Phys. Rev. Appl. 2025, 24, 014018. [Google Scholar] [CrossRef]
  33. Wang, D.; Liu, X.; Xu, C.; Ng, S.X.; Hanzo, L. Short-block polar-coded reverse and direct reconciliation in CV-QKD. IEEE Open J. Veh. Technol. 2025, 6, 2195–2209. [Google Scholar] [CrossRef]
  34. Mele, F.A.; Lami, L.; Giovannetti, V. Maximum tolerable excess noise in continuous-variable quantum key distribution and improved lower bound on two-way capacities. Nat. Photonics 2025, 19, 329–334. [Google Scholar] [CrossRef]
  35. Pirandola, S.; Mancini, S.; Lloyd, S.; Braunstein, S.L. Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 2008, 4, 726–730. [Google Scholar] [CrossRef]
  36. Sun, M.; Peng, X.; Shen, Y.; Guo, H. Security of a new two-way continuous-variable quantum key distribution protocol. Int. J. Quantum Inf. 2012, 10, 1250059. [Google Scholar] [CrossRef]
  37. Karinou, F.; Brunner, H.H.; Fung, C.-H.F.; Comandar, L.C.; Bettelli, S.; Hillerkuss, D.; Kuschnerov, M.; Mikroulis, S.; Wang, D.; Xie, C.; et al. Toward the integration of CV quantum key distribution in deployed optical networks. IEEE Photonics Technol. Lett. 2018, 30, 650–653. [Google Scholar] [CrossRef]
  38. Eriksson, T.A.; Hirano, T.; Puttnam, B.J.; Rademacher, G.; Luís, R.S.; Fujiwara, M.; Namiki, R.; Awaji, Y.; Takeoka, M.; Wada, N.; et al. Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels. Commun. Phys. 2019, 2, 9. [Google Scholar] [CrossRef]
  39. Eriksson, T.A.; Luis, R.S.; Puttnam, B.J.; Rademacher, G.; Fujiwara, M.; Awaji, Y.; Furukawa, H.; Wada, N.; Takeoka, M.; Sasaki, M. Wavelength division multiplexing of 194 continuous variable quantum key distribution channels. J. Lightwave Technol. 2020, 38, 2214–2218. [Google Scholar] [CrossRef]
  40. Blow, K.J.; Loudon, R.; Phoenix, S.J.D.; Shepherd, T.J. Continuum fields in quantum optics. Phys. Rev. A 1990, 42, 4102. [Google Scholar] [CrossRef]
  41. Fabre, C.; Treps, N. Modes and states in quantum optics. Rev. Mod. Phys. 2020, 92, 035005. [Google Scholar] [CrossRef]
  42. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef]
  43. Raymer, M.G.; Li, Z.W.; Walmsley, I.A. Temporal quantum fluctuations in stimulated Raman scattering: Coherent-modes description. Phys. Rev. Lett. 1989, 63, 1586. [Google Scholar] [CrossRef]
  44. Brecht, B.; Reddy, D.V.; Silberhorn, C.; Raymer, M.G. Photon temporal modes: A complete framework for quantum information science. Phys. Rev. X 2015, 5, 041017. [Google Scholar] [CrossRef]
  45. Raymer, M.G.; Walmsley, I.A. Temporal modes in quantum optics: Then and now. Phys. Scr. 2020, 95, 064002. [Google Scholar] [CrossRef]
  46. Loudon, R. The Quantum Theory of Light; Oxford University Press: Oxford, UK, 2000. [Google Scholar]
  47. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef]
  48. Sun, Y.; Ma, J.; Wang, X.; Yu, S.; Chen, Z.; Guo, H. Continuous-mode analysis for practical continuous-variable quantum key distribution. arXiv 2025, arXiv:2512.15301. [Google Scholar]
Figure 1. PM scheme of the improved two-way protocol in the continuous-mode scenario. ξ denotes a wavepacket that contains the temporal and spectral information.
Figure 1. PM scheme of the improved two-way protocol in the continuous-mode scenario. ξ denotes a wavepacket that contains the temporal and spectral information.
Symmetry 18 00382 g001
Figure 2. Key equivalence steps between the EB and PM schemes of the protocol. (a) Equivalence at the transmitter. (b) Equivalence at the receiver.
Figure 2. Key equivalence steps between the EB and PM schemes of the protocol. (a) Equivalence at the transmitter. (b) Equivalence at the receiver.
Symmetry 18 00382 g002
Figure 3. Comparison of the protocol performance between the ideal and practical scenarios. The black solid line represents the ideal scenario, while the red dashed line represents the practical scenario.
Figure 3. Comparison of the protocol performance between the ideal and practical scenarios. The black solid line represents the ideal scenario, while the red dashed line represents the practical scenario.
Symmetry 18 00382 g003
Figure 4. Comparison of the protocol performance between the improved two-way and one-way protocols. The red dashed line represents the improved two-way protocol, while the blue dash-dotted line represents the one-way protocol.
Figure 4. Comparison of the protocol performance between the improved two-way and one-way protocols. The red dashed line represents the improved two-way protocol, while the blue dash-dotted line represents the one-way protocol.
Symmetry 18 00382 g004
Figure 5. Comparison of the most tolerable excess noise between the improved two-way and one-way protocols. The red dashed line represents the improved two-way protocol, while the blue dash-dotted line represents the one-way protocol.
Figure 5. Comparison of the most tolerable excess noise between the improved two-way and one-way protocols. The red dashed line represents the improved two-way protocol, while the blue dash-dotted line represents the one-way protocol.
Symmetry 18 00382 g005
Table 1. The mode-matching coefficients between the transmitter and receiver in the improved two-way protocol.
Table 1. The mode-matching coefficients between the transmitter and receiver in the improved two-way protocol.
CoefficientDescription
η m AA Alice’s ξ A -TM vs. Alice’s detector’s Ξ A -TM
η m AB Alice’s ξ A -TM vs. Bob’s detector’s Ξ B -TM
η m BA Bob’s ξ B -TM vs. Alice’s detector’s Ξ A -TM
η m BB Bob’s ξ B -TM vs. Bob’s detector’s Ξ B -TM
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sun, Y.; Ma, J.; Wang, X.; Yu, S.; Chen, Z.; Guo, H. Continuous-Mode Analysis of Improved Two-Way CV-QKD. Symmetry 2026, 18, 382. https://doi.org/10.3390/sym18020382

AMA Style

Sun Y, Ma J, Wang X, Yu S, Chen Z, Guo H. Continuous-Mode Analysis of Improved Two-Way CV-QKD. Symmetry. 2026; 18(2):382. https://doi.org/10.3390/sym18020382

Chicago/Turabian Style

Sun, Yanhao, Jiayu Ma, Xiangyu Wang, Song Yu, Ziyang Chen, and Hong Guo. 2026. "Continuous-Mode Analysis of Improved Two-Way CV-QKD" Symmetry 18, no. 2: 382. https://doi.org/10.3390/sym18020382

APA Style

Sun, Y., Ma, J., Wang, X., Yu, S., Chen, Z., & Guo, H. (2026). Continuous-Mode Analysis of Improved Two-Way CV-QKD. Symmetry, 18(2), 382. https://doi.org/10.3390/sym18020382

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop