Next Article in Journal
Existence of Generalized Maxwell–Einstein Metrics on Completions of Certain Line Bundles
Previous Article in Journal
A New Extended Weibull Distribution: Estimation Methods and Applications in Engineering, Physics, and Medicine
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Microwave-Enabled Two-Step Scheme for Continuous Variable Quantum Communications in Integrated Superconducting

1
College of Information Science and Engineering, Provincial Key Laboratory of Informational Service for Rural Area of Southwestern Hunan, Shaoyang University, Shaoyang 422000, China
2
School of Automation, Central South University, Changsha 410083, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2025, 13(20), 3263; https://doi.org/10.3390/math13203263
Submission received: 29 July 2025 / Revised: 11 September 2025 / Accepted: 8 October 2025 / Published: 12 October 2025
(This article belongs to the Special Issue Quantum Information, Cryptography and Computation)

Abstract

Quantum secure direct communication (QSDC) is convenient for the direct transmission of secure messages without requiring a prior key exchange by two participants, offering an elegant advantage in transmission security. The traditional implementations usually focus on the discrete-variable (DV) system, whereas its continuous-variable (CV) counterpart has attracted much attention due to its compatibility with existing optical infrastructure. In order to address its practical deployment in harsh environments, we propose a microwave-based scheme for the CV-QSDC that leverages entangled microwave quantum states through free-space channels in cryogenic environments. The two-step scheme is designed for the secure direct communication, where the classical messages can be encoded by using Gaussian modulation and then transmitted via displacement operations on microwave quantum states. The data processing procedures involve microwave entangled state generation, channel detection, parameter estimation, and so on. Simulation results demonstrate the feasibility of the microwave-based CV-QSDC, highlighting its potential for secure communication in integrated superconducting and solid-state quantum technologies.

1. Introduction

Quantum communication, which has the advantage of compatibility in signal preparations [1,2], has been proposed for secure communications with two participants. With the popularization of quantum communication, however, the demand for quantum secure direct communication (QSDC) has increased since it can directly transmit the deterministic messages, unlike quantum key distribution (QKD), which is usually used for key exchange between legal participants. This unique paradigm not only inherently mitigates the risk of information leakage during key management but also streamlines the overall communication architecture [3,4], presenting a novel pathway for highly secure information exchange.
The traditional QSDC was predominantly focused on discrete-variable (DV) systems, where theoretical frameworks and experimental validations advanced in parallel. The pioneering two-step scheme [5] and the one-time-pad scheme [6] established the fundamental QSDC. Subsequently, more sophisticated schemes emerged, such as high-dimensional QSDC based on quantum dense coding [7]. These schemes ensure security by encoding secret information directly onto quantum states, thereby restricting an eavesdropper’s ability to access multiple entangled states simultaneously. Furthermore, the measurement-device-independent (MDI) QSDC [8,9] suggested potential security vulnerabilities in physical devices. In addition, the device-independent (DI) QSDC offers a solution to photon loss and decoherence [10], providing a viable path toward secure communication over noisy and lossy quantum channels.
The traditional QSDC was the discrete variable (DV) QSDC [5,6] since it uses a single photon for the signal single-photon source and a single-photon detector for detection. In contrast to the DV systems, the continuous-variable (CV) counterparts exhibit an advantage for the practical deployment, primarily due to their high compatibility with existing optical communication infrastructure [11,12]. In 2008, Pirandola suggested the first CV-QSDC protocol using coherent states, pioneering the use of continuous variables for information encoding and performance analysis [13]. It employs continuous light for the signal source and uses either a homodyne detector or heterodyne detector for detection. It presents an advantage since it can be carried out by using the existing optical communication technology, resulting in good compatibility and usability. However, implementations of CV-QSDC have been concentrated almost exclusively within the optical frequency domain.
Fortunately, leveraging a natural synergy with superconducting quantum computing platforms, microwave quantum communication may hold immense potential, whereas research for QSDC within this domain has remained relatively unexplored. Motivated by structure characteristics of the CV-QSDC, we addresses this gap by proposing a microwave-based scheme designed for CV-QSDC with the microwave frequency band and operation in cryogenic environments. The feasibility of our approach is underscored by recent breakthroughs in CV-QKD [14] and quantum teleportation (QT) of microwave states [15]. These accomplishments provide the technological foundation for realizing the microwave-based CV-QSDC under the realized cryogenic conditions.
The CV-QSDC presented herein utilizes microwave quantum states as its resource and is tailored for cryogenic operation. We employ Gaussian mapping to represent secret information as a sequence of Gaussian random numbers, which are then encoded onto a microwave quantum state with a displacement operation. In order to establish an implementation of CV-QSDC with microwave states, we divide the initial messages into many pieces, which are then transmitted with the two-step scheme through free space in cryogenic environments, with the aim of performance demonstration with parameter estimation. The legal participants can recover the initial messages only if they cooperate together. The microwave-based CV-QSDC can provided compatibility with the traditional optical CV-QSDC infrastructure in terms of noise immunity and losses.
The remainder of this paper is organized as follows. Section 2 details our proposed CV-QSDC scheme, covering the generation of microwave entangled states and the protocol’s implementation. Section 3 presents the process of parameter estimation and provides a security analysis of the scheme. Finally, Section 4 offers a summary and conclusion of our work.

2. The Microwave-Based CV-QSDC

2.1. Two-Step CV-QSDC Protocol

As shown in Figure 1, the details of the two-step CV- QSDC protocol are demonstrated. Without loss of generality, the first and second free space channels have the same channel parameters in the cryogenic condition (e.g., transmittance and thermal noise). The sender, Alice, generates and sends the microwave-based Einstein–Podolsky–Rosen (M-EPR) states through the cryogenic free space, to the receiver, Bob. The microwave-based scheme for the CV-QSDC can be designed as follows.
Step 1 (S1): Preparation of M-EPR states. Alice prepares an ordered sequence of the M-EPR pairs, as shown in Figure 1, which includes two mode sequences as sources. One sequence is used for channel detection, called the mode D sequence. The other remaining sequence of the EPR partner modes is used for message transmission, called the mode M sequence.
Step 2 (S2): Transmission of the mode D sequence. The mode D sequence is sent from Alice to Bob through the first cryogenic channel that could be used for channel detection. Bob randomly selects modes and measures both quadratures with a heterodyne detector. After Bob informs Alice of the positions of the measured modes and his measurement results, Alice conducts the same measurement on the corresponding partner modes in the mode M sequence and estimates the channel parameters.
Step 3 (S3): Transmission of the mode M sequence. Alice encodes the mode M sequence corresponding to the divided messages, which are encoded and transmitted to Bob through the second cryogenic channel with the same channel parameters.
Step 4 (S4): Channel detection. After Bob receive the M sequence, he performs the Bell measurement while combining it with the corresponding mode D sequence. For the channel detection, Bob calculates the variances of the two related quadratures of the Bell measurement locally, and then determines the quantum correlations between the first and second channels in terms of the results of the first channel detection. Based on the results of both the first and second channel detections, they achieve the channel capacity of the QSDC.
Step 5 (S5): Message encoding with displacement. Assume Alice encodes two bits of message ( m k , m l ) into the message amplitude α m = x m k + i p m l , { k , l } Z n , where the variables x m k and p m l correspond to m k and m l , respectively. She picks a random signal amplitude α M = x M k + i p M l in the mode M sequence and performs the encoding operation while performing the operation as α ¯ = α m + α M . Subsequently, the signal amplitude α m is encoded as α ¯ on the mode M sequence. After Bob classically communicates the encoded state α ¯ , Alice can decode the signal amplitude α m from the resulting state α ¯ with α M , finally recovering the message amplitude, together with ( m k , m l ) .
Because of the displacement of each message ( x m k , p m l ) , the resulting signal at the receiver can be expressed as ( x d k , p d l ) with
x d k = 2 T x m k , p d l = 2 T p m l ,
where T is the channel transmittance established between Alice and Bob. Bob can select a random subset of remaining raw data while Alice announces her raw data. Consequently, the measurement results can be updated as follows
x r k = x d k 2 T x m k , p r l = p d l 2 T p m l .
When considering the noise characteristics of the CV-QSDC, as derived and shown in Appendix A, we consider the effect of the phase noise given by [13]
ξ phase = 2 V A 1 e V est 2 ,
where V A denotes the modulation variance and V est is the variance of the phase noise given by V est = var θ S θ ^ S with the real phase rotation value θ S and the estimated value θ ^ S . Therefore, the relations of the phase noise, the total channel added noise, and the total detection added noise can be achieved.

2.2. Generation of Two-Mode Squeezed Microwave States

The implementation of the CV-QSDC in the microwave regime is based on the specialized cryogenic components, as schematically illustrated in Figure 1, which includes the generation and manipulation of quantum microwave states.
In the proposed scheme, an M-EPR state is firstly generated by Alice. One of the entangled modes (the signal mode M) can be retained for subsequent information encoding, while the other mode (the idler mode D) is transmitted to Bob. The generation of the M-EPR state begins with two orthogonal microwave vacuum states, which are sourced from the 50 Ω resistor in a 50 mK environment [16,17]. This temperature is crucial for mitigating thermal noise and enabling the superconducting properties of the core components. Each vacuum state is then injected into a separate Josephson parametric amplifier (JPA), which performs a squeezing operation based on the degenerate parametric amplification.
By setting the JPA’s pump frequency to exactly twice that of the signal frequency, a phase-sensitive gain profile is created. This allows the JPA to amplify one quadrature of the input signal while de-amplifying, or squeezing, the orthogonal quadrature. The two resulting single-mode squeezed states are then interfered with using a microwave hybrid coupler, which functions as a 50:50 beam splitter, to produce the final entangled EPR state [18]. The resulting M-EPR state is described by the covariance matrix as follows:
EPR = V I V 2 1 σ ^ z V 2 1 σ ^ z V I ,
where I = diag 1 , 1 , σ ^ z = diag 1 , 1 , and V = cosh ( 2 r ) denotes the variance of the orthogonal components of each mode. Here, the parameter r denotes the squeezing perimeter for the state preparation.

2.3. Data Post-Processing for Messages Recovery

The successful completion of the displacement operation signifies that the secret information has been effectively encoded onto the M-EPR states. The signal mode M carrying this confidential information is then transmitted from Alice to Bob through a cryogenic channel. Bob combines the incoming signal mode from Alice with his locally retained idler mode at a microwave hybrid coupler, which functions as a balanced beam splitter. Subsequently, Bob performs heterodyne detection on both output modes of the coupler. Based on the measurement outcomes, Bob applies a Gaussian random sequence to estimate the transmission parameters of the quantum channel. Leveraging these estimated parameters, Bob then implements an appropriate information reconciliation protocol to decode the message sequence from the measurement data.
To extract the encoded message, Bob performs a joint measurement on the signal state in the mode M sequence received from Alice and the idler state he retains in the mode D sequence. Following this, a procedure for data post-processing is carried out, enabling him to ultimately retrieve the message originally sent by Alice. Upon receiving the signal state encoded in the mode M sequence, Bob conducts heterodyne detection in conjunction with his local idler state in the mode D sequence. Finally, Bob engages in a post-processing protocol with Alice via a publicly authenticated classical channel to distill a secure key. During this stage, Alice and Bob collaboratively implement either a direct reconciliation (DR) or reverse reconciliation (RR) scheme, along with privacy amplification [11,12], to obtain the initially encoded messages. However, the transmission and measurement of quantum states are inevitably affected by the unknown characteristics of the quantum channel and the imperfections inherent in practical commercial devices, which can further degrade system performance. Therefore, data post-processing must be conducted before performing Gaussian inverse mapping to ensure the fidelity and security of the decoded messages, which includes three sequential steps, i.e., parameter estimation, reconciliation, and privacy amplification.
As for parameter estimation, Bob measures the quadrature components modulated on the mode M sequence and records the corresponding results. Alice then transmits the original mode D sequence to Bob through a publicly authenticated classical channel. By comparing his measurement outcomes with the known values received from Alice, Bob can construct a set of correlated data and perform accurate estimation of quantum channel parameters, such as transmittance and excess noise. Once parameter estimation is completed, Alice and Bob proceed with the reconciliation process, during which they aim to correct discrepancies between their respective data sequences caused by channel noise and device imperfections. This step is typically realized through a carefully designed reconciliation scheme. One approach is reverse reconciliation (RR), where measurement results at the receiver can be served as the reference for aligning Alice’s data. Specifically, Alice holds the original mode M sequence, while Bob receives the degraded version of mode M sequence after quantum channel transmission. By applying an error-correcting code, Alice and Bob collaboratively refine their sequences into a shared reconciled message. The choice of reconciliation direction, whether direct or reverse has significant implications for both the efficiency and the security of the QSDC, with reverse reconciliation generally offering better tolerance to channel loss and noise. Finally, prior to restoring the secret information block, both Alice and Bob apply privacy amplification to eliminate any redundant information introduced during the Gaussian mapping process and to erase potential information leakage to an eavesdropper, Eve, throughout the transmission. Through hashing or other randomness extraction methods, privacy amplification effectively compresses the reconciled message into a shorter, fully secure message, free from partial knowledge that might have been acquired by an adversary.

3. Performance Analysis

3.1. Effect of Channel Loss and Noise

As for the practical implementation of the CV-QSDC system, channel loss has an effect on the performance of the communication system. In a microwave-based setup, the source of loss arises from the transmission of microwave signals through a superconducting coaxial cable. This loss can be modeled by using a beam splitter with transmittance τ E as follows
τ E = 10 L 10 ,
where L = γ d represents the channel loss for a microwave signal propagating through the superconducting coaxial cable. Here, γ denotes the attenuation coefficient and d is the transmission distance.
In quantum channels, channel coupling noise is the other parameter that has an effect on the fidelity of the transmitted quantum states. It can be described with the input–output relation as follows:
a ^ o u t = τ E a ^ i n + 1 τ E n ^ ,
where n ^ denotes the ambient thermal photon noise caused by environmental thermal fluctuations. This noise is intrinsically related to both the signal frequency and the ambient temperature. The average thermal photon number can be calculated using the Planck distribution
n ¯ = 1 e h ω / 2 π k B T 1 ,
where ω / 2 π is the signal frequency, T denotes the ambient temperature, h denotes Planck constant, and k B denotes Boltzmann’s constant. Based on the above-mentioned average thermal photon number, the number of photons for the coupled noise can be derived as
n ^ = 1 2 1 τ E n ¯ .
Since the generation of the M-EPR state is in a 50 mK environment that enables the superconducting of the core components, the thermal noise can be mitigated for the source preparation in the proposed CV-QSDC system.
While taking into account the lossy channel, we evaluate the effective information capacity of the communication process for microwave signals at different frequencies by employing either the DR or RR scheme, as shown in Figure 2a. We find that the DR scheme performs better under low channel loss. However, as the channel loss increases, the RR scheme exhibits better performance compared to the DR scheme. This is consistent with the underlying principles of the DR and RR schemes. When the channel loss increases, the signal received by Bob becomes weaker, leading to larger measurement errors in the DR scheme. In other words, as the channel loss grows, the amount of effective information in the DR scheme decays more rapidly than in the RR scheme.
Moreover, we illustrate the relationship between the average thermal noise photon number and microwave frequency and ambient temperature during propagation. In Figure 3a, it is revealed that for the given ambient temperature, higher microwave frequencies result in lower average thermal noise photon numbers during wave propagation. In Figure 3b, it is demonstrated that the limited variations in ambient temperature have a negligible impact on the average thermal noise photon number generated during microwave propagation. However, microwave frequency exhibits a more pronounced influence on the generation of average thermal noise photon numbers, and thus it demonstrates an exponential decrease with increasing microwave frequency.

3.2. Derivation of Effective Information Transmission Rate

The eavesdropper, Eve, may perform three kinds of the attack strategies to obtain the useful information from a quantum Gaussian source, including the individual attack, the collective attack, and the coherence attack. It is known that the collective attack is a serious threat to the CV-QSDC system while being compared to those of the individual and coherent attacks [11]. Therefore, we focuses on the performance of the CV-QSDC system under collective attack, where the amount of security-effective information between Alice and Bob is described as [12]
Δ I = β I A B χ B ( A ) E ,
where I A B denotes the mutual information between Alice and Bob, β 0 , 1 denotes the efficiency of the reconciliation protocol, and χ B ( A ) E denotes the maximum amount of information Eve can access from Bob/Alice under the constraints of the Holevo bound, the former corresponding to the DR scheme and the latter to the RR scheme.
The mutual information I A B between Alice and Bob can be given by [19]
I A B = 1 2 log 2 V B V B | A = 1 2 log 2 V A + 1 V A | B + 1 = 1 2 log 2 V + χ χ + 1 .
In addition, the value of χ B E depends heavily on the reconciliation algorithm [20]. When Eve is assumed to purify the entire system, the effective information derived from the respective DR and RR schemes is as follows [21]:
χ E D R = S ( ρ A B ) S ( ρ A B | x A M ) ,
and
χ E D R = S ( ρ A B ) S ( ρ A B | x B ) ,
where S ( ρ A B ) denotes the von Neumann entropy between Alice and Bob, and the von Neumann entropy of the Gaussian state can be obtained from
S ( ρ A B ) = i = 1 2 G λ i 1 2 ,
where G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 ( x ) . Here, the notations λ 1 , 2 are the symplectic eigenvalues corresponding to the covariance matrix between Alice and Bob, which can be described as
A B = a I b σ ^ z b σ ^ z c I ,
where a = V , b = τ E V + χ and c = τ E V 2 1 . Here, V = V A + 1 denotes the modulation variance, τ E denotes the transmittance of the quantum channel, and χ = ( 1 τ E ) / τ E + ε denotes the noise variance ( ε being the excess noise). Moreover, the symplectic eigenvalues can be given by
λ 1 , 2 = 1 2 Δ ± Δ 2 4 D 2 ,
where
Δ = a 2 + b 2 2 c 2 ,
and
D = a b c 2 .
For the DR scheme, the symplectic eigenvalues can be calculated as [22]
λ 3 , 4 2 = 1 2 ( A ± A 2 4 B 2 ) ,
where
A = 1 a + 1 a + b D + Δ ,
B = D a + 1 ( b + D ) .
For the RR algorithm, the symplectic eigenvalues can be calculated as
λ 5 2 = a ( a c 2 / b ) .
Consequently, the amount of effective information for security is derived as follows:
χ E D R = i = 1 2 G λ i 1 2 i = 3 4 G λ i 1 2 ,
χ E R R = i = 1 2 G λ i 1 2 G λ 5 1 2 .

3.3. Security Analysis for Collective Attacks

In order to demonstrate the performance of the microwave-based CV-QSDC, we take into account three frequencies of microwave signals as sources. In addition, the collective attack has been considered while performing the numerical simulations. In addition, the attenuation coefficient used in this work can be assumed as 6   ×   10 3 dB/km and the temperature condition is 30 °C at room temperature, used for the numerical simulations. As shown in Figure 2b, we demonstrate the performance of the microwave-based CV-QSDC system while taking into account the selected quantum signals for the given frequencies at 1 GHz, 3 GHz, and 5 GHz. We find that the broader bandwidth results in the higher transmission rate of the system. Namely, when microwave signal for M-EPR generation is selected at 5 GHz, the effective information transmission rate performs better when compared to those of the 1 GHz and 3 GHz signals. In the field of the traditional microwave communication, the most commonly used microwave frequency is 5GHz.
Furthermore, we have conducted numerical simulations to evaluate the effective transmission information for both the DR and RR schemes. As shown in Figure 4, the effective information depends on both the modulation variance V A and the channel transmittance τ E . When the channel transmittance is high, the DR scheme outperforms the RR scheme. However, as the channel loss increases, the RR scheme demonstrates superior performance. In addition, the modulation variance plays an important role, as higher values of V A yield greater effective information.
So far, we have considered the ideal security of the CV-QSDC under collective attacks using both DR and RR schemes. Namely, Alice and Bob would exchange an infinite number of signals to ensure the perfect security of the protocol. However, in practice, the number of exchanged signals is finite, making the asymptotic assumption unrealistic. In what follows, we demonstrate the practical security needed to address this limitation, when taking into account the finite-size security framework.

3.4. Security with Finite-Size Effects

Since the quantum channels are not known in advance, a subset of the exchanged signals should be selected for parameter estimation, whose complexity grows proportionally with the total number of exchanged signals. Within the finite-size regime [23], the mutual information (bit/pulse) can be described as follows:
Δ I = n N β I A B χ B E Δ n ,
where m denotes the number of signals used for information transmission, N denotes the total number of signals exchanged, and n is the number of signals used for parameter estimation. In addition, the parameter Δ n is related to privacy amplification security, which is given by
Δ n = 2 dim Λ + 3 log 2 2 / ϵ S n + 2 n log 2 1 + ϵ P A ,
where dim Λ denotes the dimension of the original key space Λ , ϵ S denotes the smoothing coefficient, and ϵ P A denotes the probability of privacy amplification failure. Since a binary encoding of the original version of the secret message is used for the CV-QSDC, we have the parameter dim Λ = 2 .
Alice and Bob share a portion of a secret message of length m over an open channel, which allows them to parameterize the loss and the number of coupled photons in the quantum channel during communication. This allows them to build a statistical estimator such that a lower bound on the quantum channel transmittance and an upper bound on the excess noise can be provided.
While considering the finite-size effects, we have to derive S ϵ P E using a covariance matrix Φ ϵ P E that minimizes the key rate of the QSDC system with probability 1 ϵ P E . We can achieve the covariance matrix Φ ϵ P E by using m pairs of correlated variables, which can be analyzed with the normal linear model given by
y = t x + z ,
where t = τ E , and z obeys a normal distribution with zero mean and variance δ 2 = 1 + τ E ϵ . The parameter ϵ is the calculated accounts for various noise factors. Thus, the covariance matrix Φ ϵ P E is expressed as [24]
Φ ϵ P E = V a + 1 I t min Z σ ^ z t min Z σ ^ z t min 2 V a + δ max 2 I ,
where t m i n and δ max denote the minimum value of t and the maximum value of δ that are compatible with the sampling pair, except with probability ϵ PE / 2 and Z = V a 2 + 2 V a .
The maximum likelihood estimation can be calculated as
t ^ = k = 1 m x k y k k = 1 m x k 2 ,
and
δ ^ 2 = 1 s k = 1 s ( y k t ^ x k ) 2 .
Based on the above-derived results, we have
t min T Z ϵ P E / 2 1 + T s V A ,
δ max 2 1 + T + Z ϵ P E / 2 2 ( 1 + T ) s .
In addition, the parameter Z ϵ P E / 2 satisfies the constraints
1 erf Z ϵ P E / 2 2 / 2 = ϵ PE / 2 ,
with the notation erf ( x ) defined by
erf ( x ) = 2 π 0 x e t 2 d t .
The theoretical values of the above error probabilities are realized when taking into account the given parameters ϵ PE = ϵ PA = ϵ S = 10 10 [24]. The covariance matrix of the quantum state shared by Alice and Bob can be rewritten as follows
γ A B = V a I ( t min 2 V a + δ max 2 ) σ ^ z ( t min 2 V a + δ max 2 ) σ ^ z t min V a 2 + 2 V a I .
Consequently, the effective information of the CV-QSDC can be achieved from this covariance matrix.
As shown in Figure 5, we have obtained the effective information capacity of this CVQSDC system for the given encoding lengths and signal frequencies (with modulation variance V A = 7 for numerical simulations). In addition, the attenuation coefficient used in numerical simulation is still 6   ×   10 3 dB/km for the simplified implementation. It demonstrates the impact of signal frequency on system performance. Compared with low-frequency signals, the 5 GHz signal demonstrates an advantage when considering both effective information capacity and maximum transmission distance. This improvement is attributed to the reduced channel background thermal noise for the high-rate signal frequencies.
When we select a signal frequency of 5 GHz, the asymptotic key rates of the DR and RR schemes remain positive at transmission distances of 1500 m and 2000 m, respectively, indicating that the QSDC is theoretically feasible in implementation. However, when taking the finite-size effect of the available resources into account, the maximum transmission distance of the system is reduced. For example, when the key length is set N = 10 5 , the transmission distances for both DR and RR schemes are both shortened to approximately 1000 m. Furthermore, when N increases to 10 6 , the corresponding maximum transmission distance exceeds 1500 m, approaching the maximum transmission distance of the asymptotic capacity for effective information.

4. Conclusions

In this paper, we have proposed an approach to implementing the microwave-based CV-QSDC using entangled M-EPR states. We evaluate the performance of the communication process while considering effects of the external incorporating parameter estimation for both DR and RR strategies. Numerical simulations demonstrate that the high GHz microwave signals results in the long secure transmission distance of covert information achieved when different calibration strategies are taken into account in a cryogenic environment under various reconciliation strategies. In addition, we demonstrate the impact of message block length on the effective information rate and achievable transmission distance. The numerical simulations show that as the block length increases from 10 5 to 10 6 , the maximum transmission distance of the system approaches to the asymptotic limit predicted by the effective information capacity. The influence of microwave signal frequency on communication performance has been shown. The 5 GHz microwave signal enable the longest effective transmission distance, which can be attributed to its relatively low background thermal noise. It means that the performance of the system can be improved by making full use of the partially trusted phase noise. It leaves an optimization space for CVQSDC in practical implementation.
These results are useful for the confirmation of microwave-provided entangled quantum states as a source for practical CV-QSDC. Compared to the optical implementations, the microwave-based CVQSDC has unique advantages, particularly in terms of integration with superconducting circuits and on-chip quantum technologies. This makes it a promising candidate for short-range secure quantum communication in cryogenic or solid-state platforms, offering both practicality and scalability for the scaled quantum network architectures provided with a large number of nodes, switching, routing, and synchronization.

Author Contributions

Conceptualization, Y.M.; writing—original draft preparation, L.M.; writing—simulation, W.W.; writing—review, Y.W.; writing—simulation, H.Z.; writing—editing, Y.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of Hunan Province (No. 2023JJ50269) and Scientific research project of Hunan Provincial Department of Education (No. 22C0446).

Data Availability Statement

All data generated or analyzed during this study are included in this published article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. The Phase Noise

The parameter V error denotes the variance generated by the error between the real phase rotation value θ R and estimated value θ ^ R , given by [19,20]
V error = var θ R θ ^ R = χ + 1 E R 2 ,
where χ is the total noise of phase reference, it can be calculated by
χ = 1 T 1 + ε 0 + 2 μ + 2 v el T μ .
The first three items mentioned above are the components of channel-added noise in quantum communications, and the last item denotes the heterodyne detector noise. The parameter V drift represents the variance of the relative phase drift between two lasers for Δ T , which can be described as
V drift = 2 π Δ v A + Δ v B Δ T
where Δ v A and Δ v B correspond to the line widths of the two free-running lasers. The parameter V channel represents the variance of the noise resulting from the accumulated drift of phase of the signal pulse. Therefore, when V e s t approaches 0, the phase noise can be approximated as
ξ phase = V A V drift + V channel + V error = ξ drift + ξ channel + ξ error .
Furthermore, we consider the characteristics of the trusted noise after calibration [21,22]. The excess noise ξ is a component element of the channel added noise, which is part of the total added noise, and hence it can be described as
ξ = ξ phase + ξ rest .
Then, the total channel added noise χ line can be given by
χ line = 1 / T 1 + ξ .
The total detection added noise χ het can be calculated as
χ het = 2 μ + 2 v e l / μ .
Combined with the noise calculation method, the total noise can be derived as
χ tot = χ line + χ het T .
In what follows, we try to distinguish the trusted and untrusted parts among them. We assume that χ het is the trusted noise based on μ and v e l being well calibrated. Meanwhile, since the part of the phase noise ξ error can be perfectly controlled and calibrated by Bob, it can be regarded as the trusted noise [24].
Based on (A8), we achieve the total phase noise of reference given by
χ = χ u + χ T T ,
where χ u = 1 / T 1 + ε 0 and χ T = 2 μ + 2 v el / μ .
Combined with (A1), (A2), (A4), and (A9), the measurement noise of phase reference can calculated as
ξ error = ξ error u + ξ error T T ,
where
ξ error u = V A χ u + 1 E R 2 = V A 1 + T ε 0 T E R 2 ,
and
ξ error T = V A χ T E R 2 = V A 2 μ + 2 v el μ E R 2 .

References

  1. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  2. Liao, Q.; Xiao, G.; Zhong, H.; Guo, Y. Multi-label learning for improving discretely-modulated continuous- variable quantum key distribution. New J. Phys. 2021, 22, 083086. [Google Scholar] [CrossRef]
  3. Zhou, K.; Yi, C.; Yan, W.; Hou, Z.; Zhu, H.; Xiang, G.; Li, C.; Guo, G. Experimental Realization of Genuine Three-Copy Collective Measurements for Optimal Information Extraction. Phys. Rev. Lett. 2025, 134, 210201. [Google Scholar] [CrossRef] [PubMed]
  4. Xie, M.; Niu, S.; Han, Z.; Li, Y.; Chen, R.; Wang, X.; Gao, M.; Chen, L.; Song, Y.; Zhou, Z.; et al. Quantum-enhanced imaging for characterizing anisotropic material. npj Quantum Inf. 2025, 11, 57. [Google Scholar] [CrossRef]
  5. Deng, F.; Long, G.; Liu, X. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 2003, 68, 042317. [Google Scholar]
  6. Deng, F.; Long, G. Secure direct communication with a quantum one-time pad. Phys. Rev. A 2004, 69, 052319. [Google Scholar] [CrossRef]
  7. Wang, C.; Deng, F.; Li, Y.; Liu, X.; Long, G. Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 2005, 71, 044305. [Google Scholar] [CrossRef]
  8. Niu, P.; Zhou, Z.; Lin, Z.; Sheng, Y.; Yin, L.; Long, G. Measurement-device-independent quantum communication without encryption. Sci. Bull. 2018, 63, 1345–1350. [Google Scholar]
  9. Zhou, Z.; Niu, P.; Sheng, Y.; Yin, L.; Long, G. Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 2019, 63, 230362. [Google Scholar] [CrossRef]
  10. Zhou, L.; Sheng, Y.; Long, G. Device-independent quantum secure direct communication against collective attacks. Sci. Bull. 2020, 65, 12–20. [Google Scholar] [CrossRef]
  11. Zhong, H.; Ye, W.; Zuo, Z.; Huang, D.; Guo, Y. Kalman filter-enabled parameter estimation for simultaneous quantum key distribution and classical communication scheme over a satellite-mediated link. Opt. Express 2022, 30, 5981. [Google Scholar]
  12. Liao, Q.; Xiao, G.; Xu, C.-G.; Xu, Y.; Guo, Y. Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source. Phys. Rev. A 2020, 102, 032604. [Google Scholar] [CrossRef]
  13. Pirandola, S.; Braunstein, S.L.; Mancini, S.; Lloyd, S. Quantum direct communication with continuous variables. Europhys. Lett. 2018, 84, 20013. [Google Scholar]
  14. Fesquet, F.; Kronowetter, F.; Renger, M.; Gross, R.; Fedorov, K.G. Demonstration of microwave single-shot quantum key distribution. Nat. Commun. 2024, 15, 7544. [Google Scholar] [CrossRef] [PubMed]
  15. Fedorov, K.; Renger, M.; Pogorzalek, S.; Di Candia, R.; Chen, Q.; Nojiri, Y.; Inomata, K.; Nakamura, Y.; Partanen, M.; Marx, A.; et al. Experimental quantum teleportation of propagating microwaves. Sci. Adv. 2021, 7, 0891. [Google Scholar]
  16. Fedorov, K.G.; Pogorzalek, S.; Las Heras, U.; Sanz, M.; Yard, P.; Eder, P.; Fischer, M.; Goetz, J.; Xie, E.; Inomata, K.; et al. Finite-time quantum entanglement in propagating squeezed microwaves. Sci. Rep. 2018, 8, 6416. [Google Scholar] [CrossRef]
  17. Pogorzalek, S.; Fedorov, K.G.; Xu, M.; Parra-Rodriguez, A.; Sanz, M.; Fischer, M.; Xie, E.; Inomata, K.; Nakamura, Y.; Solano, E.; et al. Secure quantum remote state preparation of squeezed microwave states. Nat. Commun. 2019, 10, 2604. [Google Scholar] [CrossRef]
  18. Menzel, E.P.; Di Candia, R.; Deppe, F.; Eder, P.; Zhong, L.; Ihmig, M.; Haeberlein, M.; Baust, A.; Hoffmann, E.; Ballester, D.; et al. Path Entanglement of Continuous-Variable Quantum Microwaves. Phys. Rev. Lett. 2012, 109, 250502. [Google Scholar] [CrossRef]
  19. Paul, J.; Kunz-Jacques, S.; Leverrier, A. Long-distance continuous-variable quantum key distribution with a Gaussian modulation. Phys. Rev. A 2011, 84, 062317. [Google Scholar]
  20. Lodewyck, J.; Bloch, M.; Fossier, S.; Karpo, E.; Diamanti, E.; Debuisschert, T.; Cerf, N.J.; Tualle-Brouri, R.; McLaughlin, S.W.; Grangier, P. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 2007, 76, 042305. [Google Scholar] [CrossRef]
  21. Usenko, V.C.; Laszlo, R.; Radim, F. Entanglement-based continuous-variable quantum key distribution with multimode states and detectors. Phys. Rev. A 2014, 90, 062326. [Google Scholar] [CrossRef]
  22. Tene, A.G.; Anne, M.; Stephanie, K. Error correction based artificial neural network in multi-modes CV-QKD with simultaneous type-I and type-II parametric-down conversion entangled photon source. Opt. Commun. 2024, 565, 130681. [Google Scholar] [CrossRef]
  23. Leverrier, A. Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States. Phys. Rev. Lett. 2015, 114, 042317. [Google Scholar] [CrossRef] [PubMed]
  24. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef]
Figure 1. The microwave-based CV-QSDC with two-step protocol in two cryogenic channels.
Figure 1. The microwave-based CV-QSDC with two-step protocol in two cryogenic channels.
Mathematics 13 03263 g001
Figure 2. Performance of the CV-QSDC system using the DR and RR schemes, respectively. (a) Relationship between the amount of effective information and the channel transmission loss. (b) Relationship between the amount of effective information and the transmission distance. The solid and dashed lines indicate that the DR and RR protocols are used for data post-processing, respectively, and the blue, red, and black colors indicate that the signals are modulated for 1 GHz, 3 GHz, and 5 GHz, respectively.
Figure 2. Performance of the CV-QSDC system using the DR and RR schemes, respectively. (a) Relationship between the amount of effective information and the channel transmission loss. (b) Relationship between the amount of effective information and the transmission distance. The solid and dashed lines indicate that the DR and RR protocols are used for data post-processing, respectively, and the blue, red, and black colors indicate that the signals are modulated for 1 GHz, 3 GHz, and 5 GHz, respectively.
Mathematics 13 03263 g002
Figure 3. The variation curve of the average thermal noise photon number with (a) microwave frequency and (b) ambient temperature.
Figure 3. The variation curve of the average thermal noise photon number with (a) microwave frequency and (b) ambient temperature.
Mathematics 13 03263 g003
Figure 4. Performance of the effective information of the microwave-based CV-QSDC for the DR scheme (a) and the RR scheme (b). It also shows the relationship between the effective information of the system and the protocol modulation variance V A and channel transmittance τ E .
Figure 4. Performance of the effective information of the microwave-based CV-QSDC for the DR scheme (a) and the RR scheme (b). It also shows the relationship between the effective information of the system and the protocol modulation variance V A and channel transmittance τ E .
Mathematics 13 03263 g004
Figure 5. The effective information for the communication process is a function of the transmission distance using the DR and RR algorithm. (a,b) Relationship between effective information and transmission distance for ideal conditions, with multiple different frequency correspondences. From left to right, the dashed, dotted, and solid lines indicate signals with frequencies of 1 GHz, 3 GHz, and 5 GHz, respectively. While the type of line corresponds to the information code length used, blue, red, and black lines correspond to N = 10 5 , 10 6 and system asymptotic effective information, respectively.
Figure 5. The effective information for the communication process is a function of the transmission distance using the DR and RR algorithm. (a,b) Relationship between effective information and transmission distance for ideal conditions, with multiple different frequency correspondences. From left to right, the dashed, dotted, and solid lines indicate signals with frequencies of 1 GHz, 3 GHz, and 5 GHz, respectively. While the type of line corresponds to the information code length used, blue, red, and black lines correspond to N = 10 5 , 10 6 and system asymptotic effective information, respectively.
Mathematics 13 03263 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mao, Y.; Mao, L.; Wang, W.; Wang, Y.; Zhang, H.; Guo, Y. Microwave-Enabled Two-Step Scheme for Continuous Variable Quantum Communications in Integrated Superconducting. Mathematics 2025, 13, 3263. https://doi.org/10.3390/math13203263

AMA Style

Mao Y, Mao L, Wang W, Wang Y, Zhang H, Guo Y. Microwave-Enabled Two-Step Scheme for Continuous Variable Quantum Communications in Integrated Superconducting. Mathematics. 2025; 13(20):3263. https://doi.org/10.3390/math13203263

Chicago/Turabian Style

Mao, Yun, Lei Mao, Wanyi Wang, Yijun Wang, Hang Zhang, and Ying Guo. 2025. "Microwave-Enabled Two-Step Scheme for Continuous Variable Quantum Communications in Integrated Superconducting" Mathematics 13, no. 20: 3263. https://doi.org/10.3390/math13203263

APA Style

Mao, Y., Mao, L., Wang, W., Wang, Y., Zhang, H., & Guo, Y. (2025). Microwave-Enabled Two-Step Scheme for Continuous Variable Quantum Communications in Integrated Superconducting. Mathematics, 13(20), 3263. https://doi.org/10.3390/math13203263

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop