Effective Excess Noise Suppression in Continuous-Variable Quantum Key Distribution through Carrier Frequency Switching
<p>The schematic diagram of the GG02 protocol. Alice prepares quantum signals and transmits them to Bob through the quantum channel. Bob receives transmitted quantum signals and detects the signals’ quadrature components by coherent detection. Data carried by quadrature components are measured by the selected measurement basis. Then the parameter estimation, using part of the data, is conducted to estimate the CV-QKD performance. Finally, data processing is conducted to obtain the final secret key.</p> "> Figure 2
<p>The simulation result of the CV-QKD channel noise power spectrum. The CV-QKD channel noise in this simulation contains crosstalk noise, random interference noise, shot noise, and thermal noise. The simulation is repeated 7 times.</p> "> Figure 3
<p>The schematic diagram of the CV-QKD noise-suppression scheme based on CFS. (1) The receiver obtains the channel condition. The power spectrum of channel noise is obtained. (2) The system searches for the window position. The window position is located at the minimum power value. (3) The window information is fed back to the transmitter. (4) The frequency spectrum of the transmission signal is shifted. (5) A filtering operation is conducted on the received signal. Before the filtering operation, the transmission signal frequency spectrum is supposed to move back to the baseband. (6) The window information is updated at regular time intervals. The channel conditions change in real time. Updating the window information in a timely manner can guarantee the scheme’s performance.</p> "> Figure 4
<p>The channel noise power spectrum of the CV-QKD system. The power spectrum has high-power parts and low-power parts. The black star represents the minimum power value of this curve. The frequency band in the black square is the window position.</p> "> Figure 5
<p>The clearance between electronic noise and shot noise in different frequencies. Since both the shot noise and electronic noise are Gaussian stationary noise, their clearance is also stable, which is consistent with reality.</p> "> Figure 6
<p>Excess noise values of the experimental and two control groups (no channel attenuation). The length of the transmission signal is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>5</mn> </msup> </mrow> </semantics></math>. The symbol rate is set to 10 MHz. The sampling frequency is set to 1 GHz. The sampling pulse is a raised-cosine pulse. The filter type is the Butterworth low-pass filter. The excess noise calculation is repeated 20 times for both experimental and control groups. For control group 1, the excess noise’s mathematical expectation is <math display="inline"><semantics> <mrow> <mn>3.62</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math> and its standard deviation is <math display="inline"><semantics> <mrow> <mn>6.69</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> </mrow> </semantics></math>. For control group 2, the excess noise’s mathematical expectation is <math display="inline"><semantics> <mrow> <mn>1.20</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </mrow> </semantics></math> and its standard deviation is <math display="inline"><semantics> <mrow> <mn>8.75</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> </mrow> </semantics></math>. For the experimental group, the excess noise’s mathematical expectation is <math display="inline"><semantics> <mrow> <mn>6.57</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> </mrow> </semantics></math> and its standard deviation is <math display="inline"><semantics> <mrow> <mn>1.45</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> </mrow> </semantics></math>.</p> "> Figure 7
<p>Excess noise values of the experimental and two control groups (5 km fiber attenuation). The length of the transmission signal is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>5</mn> </msup> </mrow> </semantics></math>. The symbol rate is set to 10 MHz. The sampling frequency is set to 1 GHz. The sampling pulse is a raised-cosine pulse. The transmission distance is set to 5 km. The fiber transmission loss is set to <math display="inline"><semantics> <mrow> <mn>0.2</mn> </mrow> </semantics></math> dB/km. The filter type is the Butterworth low-pass filter. The excess noise calculation is repeated 20 times for both experimental and control groups. For control group 1, the excess noise’s mathematical expectation is <math display="inline"><semantics> <mrow> <mn>5.26</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>2</mn> </mrow> </msup> </mrow> </semantics></math> and its standard deviation is <math display="inline"><semantics> <mrow> <mn>5.48</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> </mrow> </semantics></math>. For control group 2, the excess noise’s mathematical expectation is <math display="inline"><semantics> <mrow> <mn>1.20</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </msup> </mrow> </semantics></math> and its standard deviation is <math display="inline"><semantics> <mrow> <mn>9.00</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>5</mn> </mrow> </msup> </mrow> </semantics></math>. For the experimental group, the excess noise’s mathematical expectation is <math display="inline"><semantics> <mrow> <mn>6.44</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> </mrow> </semantics></math> and its standard deviation is <math display="inline"><semantics> <mrow> <mn>1.05</mn> <mo>×</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> </mrow> </semantics></math>.</p> "> Figure 8
<p>Secret key rate values of the experimental and control groups (5 km fiber attenuation). The length of the transmission signal is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>5</mn> </msup> </mrow> </semantics></math> and the modulation variance is set to 4. The symbol rate is set to 10 MHz. The sampling frequency is set to 1 GHz. The sampling pulse is a raised-cosine pulse. The transmission distance is set to 5 km. The fiber transmission loss is set to <math display="inline"><semantics> <mrow> <mn>0.2</mn> </mrow> </semantics></math> dB/km. The filter type is the Butterworth low-pass filter. The secret key rate is repeatedly calculated 20 times for both experimental and control groups.</p> "> Figure 9
<p>Excess noise mathematical expectation values of the experimental group and the control group at different transmission distances. The length of the transmission signal is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>5</mn> </msup> </mrow> </semantics></math>. The symbol rate is set to 10 MHz. The sampling frequency is set to 1 GHz. The sampling pulse is a raised-cosine pulse. The filter type is the Butterworth low-pass filter. Transmission distances are set to 5 km, 20 km, 50 km, 70 km, and 100 km. The fiber transmission loss is set to <math display="inline"><semantics> <mrow> <mn>0.2</mn> </mrow> </semantics></math> dB/km. The Monte Carlo simulation is conducted for statistical excess noise mathematical expectations at different transmission distances. The excess noise calculation is repeated 10 times for both experimental and control groups at each transmission distance and its mathematical expectation is calculated.</p> "> Figure 10
<p>Excess noise mathematical expectation values of the experimental group and the control group at different transmission distances. The length of the transmission signal is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>5</mn> </msup> </mrow> </semantics></math> and the modulation variance is set to 4. The symbol rate is set to 10 MHz. The sampling frequency is set to 1 GHz. The sampling pulse is a raised-cosine pulse. The filter type is the Butterworth low-pass filter. Transmission distances are set to 5 km, 20 km, 50 km, 70 km, and 100 km. The fiber transmission loss is set to <math display="inline"><semantics> <mrow> <mn>0.2</mn> </mrow> </semantics></math> dB/km. Excess noise values used to calculate secret key rates are the mathematical expectations shown in <a href="#entropy-25-01286-f009" class="html-fig">Figure 9</a>.</p> "> Figure 11
<p>Secret key rate mathematical expectation values of the experimental and control groups at different modulation variances. The length of the transmission signal is set to <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>5</mn> </msup> </mrow> </semantics></math>. The symbol rate is set to 10 MHz. The sampling frequency is set to 1 GHz. The sampling pulse is a raised-cosine pulse. The filter type is the Butterworth low-pass filter. Transmission distances are set to 5 km. The fiber transmission loss is set to <math display="inline"><semantics> <mrow> <mn>0.2</mn> </mrow> </semantics></math> dB/km. Modulation variances are set to 2, 6, 10, 14, 18, 22, 26, 30, 34, and 38. The Monte Carlo simulation is conducted for the statistical secret key rate mathematical expectations with different modulation variances. The secret key rate is repeatedly calculated 5 times for both experimental and control groups with each modulation variance and mathematical expectation calculated.</p> ">
Abstract
:1. Introduction
2. Scheme Description
2.1. Theoretical GG02 Protocol
- Alice prepares and transmits quantum signals. On the Alice side, she generates two distinct sets of random numbers, and , both of which are distributed according to Gaussian distributions of . The range of j is and N represents the number of random numbers. These sets of random numbers are then modulated to quantum signals, resulting in the creation of a coherent state that serves as the transmission quantum signal. Then, she transmits it through the quantum channel to the receiver.
- Bob receives the quantum signal. Upon receipt of the transmission quantum signal, Bob is responsible for detecting its quadrature components using coherent detection, which can be achieved through either homodyne detection or heterodyne detection. In the case of homodyne detection, Bob must randomly select a measurement basis to measure the coherent signal to obtain one of the quadrature components, either or . Once the measurement is complete, Bob must inform Alice of the adopted measurement basis. Alice only retains the data that are consistent with Bob’s measurement results and discards any irrelevant data. In contrast, if Bob adopts heterodyne detection, both and are measured simultaneously, obviating the need for measurement basis selection. In this case, Alice retains all of the data.
- Estimates the CV-QKD system parameters. Alice randomly selects a portion of her data and combines it with the corresponding data from Bob to perform parameter estimation. The key parameters of the system, such as channel transmittance and excess noise, can be calculated using the maximum likelihood estimation algorithm. Based on the parameter estimation results, the secret key rate of the system can be evaluated, ultimately determining the key distribution performance of the system.
- Data processing. The data that are not used for parameter estimation are employed for the purposes of data reconciliation and privacy amplification. Once these processes are complete, the secret key is obtained.
2.2. Channel Noise Model of CV-QKD System
2.3. CV-QKD Noise-Suppression Scheme Based on CFS
- Switching the frequency to the minimum noise transmission window. In order to maximize the separation of the transmission signal from high-power channel noise, the frequency switching method is employed to preprocess the signal prior to channel transmission. The channel noise frequency spectrum in different frequency bands exhibits significant fluctuations with varying noise power. The minimum noise transmission window, or “window” for brevity, corresponds to the frequency band with the lowest noise power in the entire channel noise frequency spectrum. By shifting the frequency spectrum of the transmission signal to align with the window, the transmission signal can be effectively separated from high-power channel noise, thereby reducing noise interference on the signal.
- Digital filtering processing. Despite the use of frequency switching to separate the transmission signal from high-power channel noise, residual noise can still enter the receiver and cause increased excess noise. To minimize this effect, a digital filtering approach can be implemented to allow only the transmission signal and a small amount of channel noise at the same frequency band to pass through, while filtering out high-power noise at other frequency bands. The resulting filtered signal contains fewer noise components, which can facilitate subsequent signal-processing steps at the receiver.
- The receiver obtains the channel condition. In order to accurately locate the minimum noise transmission window in the channel noise frequency spectrum, the receiver must first estimate the CV-QKD channel condition, obtain the channel noise frequency spectrum, and compute its power spectrum. This information is then used to determine the correct window position in the subsequent step.
- Search the window position. Once the power spectrum of the channel noise has been obtained, the position of the minimum power value corresponds to the location of the minimum noise transmission window. Figure 4 depicts the channel noise power spectrum, with the blue curve representing the power spectrum and the black square indicating the window position. The black star on the power spectrum curve indicates the position of the minimum noise transmission window. Figure 5 shows the variation of clearance with frequency.
- Feedback the window information to the transmitter. After obtaining the window information, the receiver sends it to the transmitter for signal modulation.
- Shift the transmission signal frequency spectrum. Upon obtaining the window information, the transmitter subsequently shifts the frequency spectrum of the transmission signal from the baseband to the carrier frequency. The resulting transmission signal is then transmitted through the quantum channel for further processing.
- Conduct the filtering operation on the received signal. Once the signal has been received by the receiver, it is necessary to shift its center frequency from the window position to the baseband. This is followed by a digital low-pass filtering operation, which removes high-power noise outside the baseband while allowing the transmission signal and a minimal amount of channel noise to pass through. The signal that passes through the low-pass filter is subsequently used for data processing. By adopting a Butterworth low-pass filter in this stage, the noise components can be effectively filtered out. The amplitude characteristic of this filter can be expressed by Equation (3).
- Update the window information at regular time intervals. As the channel condition is subject to random fluctuations, the window position in the channel noise power spectrum may also change. To prevent performance deterioration of the CV-QKD system due to signal interference, it is necessary to update the window position periodically instead of relying on the initially searched position. The specific time interval for updating can be determined according to the practical requirements and system characteristics. For conventional slowly changing channels, updates of the channel conditions can be done hourly. For channels that change quickly, channel monitoring can be performed every minute.
3. Performance Analysis and Verification
3.1. Excess Noise at the Same Transmission Distance
3.2. Secret Key Rate at the Same Transmission Distance
3.3. Secret Key Rate at Different Transmission Distances
3.4. Secret Key Rate at Different Modulation Variances
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
CFS | carrier frequency switching |
QKD | quantum key distribution |
CV-QKD | continuous-variable quantum key distribution |
DWDM | dense wavelength division multiplexing |
SQCC | simultaneous QKD and classical communication |
LO | local oscillator |
LLO | local–local oscillator |
MOSFET | metal-oxide-semiconductor field-effect transistor |
Appendix A. Calculation of the Secret Key Rate
References
- Zhou, N.-R.; Li, J.-F.; Yu, Z.-B.; Gong, L.-H.; Farouk, A. New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states. Quantum Inf. Process. 2017, 16, 4. [Google Scholar]
- Pan, Y.; Wang, H.; Shao, Y.; Pi, Y.; Li, Y.; Liu, B.; Huang, W.; Xu, B. Experimental demonstration of high-rate discrete-modulated continuous-variable quantum key distribution system. Opt. Lett. 2022, 47, 3307–3310. [Google Scholar] [CrossRef] [PubMed]
- Li, L.; Wang, T.; Li, X.; Huang, P.; Guo, Y.; Lu, L.; Zhou, L.; Zeng, G. Continuous-variable quantum key distribution with on-chip light sources. Photonics Res. 2023, 11, 504–516. [Google Scholar] [CrossRef]
- Grosshans, F.; Grangier, P. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [PubMed]
- Grosshans, F.; Cerf, N.J. Continuous-variable quantum cryptography is secure against non-Gaussian attacks. Phys. Rev. Lett. 2004, 92, 047905. [Google Scholar] [CrossRef]
- Miguel, N.; Frédéric, G.; Antonio, A. Optimality of Gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar]
- García-Patrón, R.; Cerf, N.J. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef]
- Lodewyck, J.; Grangier, P. Tight bound on the coherent-state quantum key distribution with heterodyne detection. Phys. Rev. A 2007, 76, 022332. [Google Scholar] [CrossRef]
- Sudjana, J.; Magnin, L.; García-Patrón, R.; Cerf, N.J. Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switching. Phys. Rev. A 2007, 76, 052301. [Google Scholar] [CrossRef]
- Renner, R.; Cirac, J.I. de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 2009, 102, 110504. [Google Scholar] [CrossRef] [PubMed]
- Leverrier, A.; Grangier, P. Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation. Phys. Rev. A 2010, 81, 062314. [Google Scholar] [CrossRef]
- Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef]
- Christandl, M.; König, R.; Renner, R. Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 2009, 102, 020504. [Google Scholar] [CrossRef] [PubMed]
- Leverrier, A.; García-Patrón, R.; Renner, R.; Cerf, N.J. Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 2013, 110, 030502. [Google Scholar] [CrossRef]
- Leverrier, A. Composable security proof for continuous-variable quantum key distribution with coherent States. Phys. Rev. Lett. 2015, 114, 070501. [Google Scholar] [CrossRef] [PubMed]
- Leverrier, A. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. Phys. Rev. Lett. 2017, 118, 200501. [Google Scholar] [CrossRef]
- Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 2013, 87, 062313. [Google Scholar] [CrossRef]
- Ma, X.-C.; Sun, S.-H.; Jiang, M.-S.; Liang, L.-M. Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems. Phys. Rev. A 2013, 88, 022339. [Google Scholar] [CrossRef]
- Huang, J.-Z.; Weedbrook, C.; Yin, Z.-Q.; Wang, S.; Li, H.-W.; Chen, W.; Guo, G.-C.; Han, Z.-F. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack. Phys. Rev. A 2013, 87, 062329. [Google Scholar] [CrossRef]
- Huang, J.-Z.; Kunz-Jacques, S.; Jouguet, P.; Weedbrook, C.; Yin, Z.-Q.; Wang, S.; Chen, W.; Guo, G.-C.; Han, Z.-F. Quantum hacking on quantum key distribution using homodyne detection. Phys. Rev. A 2014, 89, 032304. [Google Scholar] [CrossRef]
- Gong, L.-H.; Song, H.-C.; He, C.-S.; Liu, Y.; Zhou, N.-R. A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 2014, 89, 035101. [Google Scholar] [CrossRef]
- Lucamarini, M.; Choi, I.; Ward, M.B.; Dynes, J.F.; Yuan, Z.L.; Shields, A.J. Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution. Phys. Rev. X 2015, 5, 031030. [Google Scholar] [CrossRef]
- Wang, C.; Huang, P.; Huang, D.; Lin, D.; Zeng, G. Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects. Phys. Rev. A 2016, 93, 022315. [Google Scholar] [CrossRef]
- Qin, H.; Kumar, R.; Alléaume, R. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution. Phys. Rev. A 2016, 94, 012325. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhang, Y.; Huang, Y.; Xu, B.; Yu, S.; Guo, H. Polarization attack on continuous-variable quantum key distribution. J. Phys. B At. Mol. Opt. Phys. 2019, 52, 015501. [Google Scholar] [CrossRef]
- Zheng, Y.; Huang, P.; Huang, A.; Peng, J.; Zeng, G. Practical security of continuous-variable quantum key distribution with reduced optical attenuation. Phys. Rev. A 2019, 100, 012313. [Google Scholar] [CrossRef]
- Zheng, Y.; Huang, P.; Huang, A.; Peng, J.; Zeng, G. Security analysis of practical continuous-variable quantum key distribution systems under laser seeding attack. Opt. Express 2019, 27, 27369–27384. [Google Scholar] [CrossRef]
- Alaghbari, K.A.; Rumyantsev, K.; Eltaif, T.; Elmabrok, O. Adaptive Modulation for Continuous-Variable Quantum Key Distribution With Real Local Oscillators Under Phase Attack. IEEE Photonics J. 2021, 13, 7600107. [Google Scholar] [CrossRef]
- Jain, N.; Chin, H.; Chin, H.; Lupo, C.; Nikolic, D.S.; Kordts, A.; Pirandola, S.; Pedersen, T.B.; Kolb, M.; Ömer, B.; et al. Practical continuous-variable quantum key distribution with composable security. Nat. Commun. 2022, 13, 4740. [Google Scholar] [CrossRef] [PubMed]
- Qi, B.; Zhu, W.; Qian, L.; Lo, H.K. Feasibility of quantum key distribution through a dense wavelength division multiplexing network. New J. Phys. 2010, 12, 103042. [Google Scholar] [CrossRef]
- Kumar, R.; Qin, H.; Alleaume, R. Coexistence of continuous variable QKD with intense DWDM classical channels. New J. Phys. 2015, 17, 043027. [Google Scholar] [CrossRef]
- Karinou, F.; Brunner, H.; Fung, C.; Comandar, L.; Bettelli, S.; Hillerkuss, D.; Kuschnerov, M.; Mikroulis, S.; Wang, D.; Xie, C.; et al. Toward the integration of CV quantum key distribution in deployed optical networks. IEEE Photonics Technol. Lett. 2018, 30, 650–653. [Google Scholar] [CrossRef]
- Eriksson, T.A.; Hirano, T.; Puttnam, B.J.; Rademacher, G.; Luís, R.S.; Fujiwara, M.; Namiki, R.; Awaji, Y.; Takeoka, M.; Wada, N.; et al. Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels. Commun. Phys. 2019, 2, 9. [Google Scholar] [CrossRef]
- Qi, B. Simultaneous classical communication and quantum key distribution using continuous variables. Phys. Rev. A 2016, 94, 042340. [Google Scholar] [CrossRef]
- Qi, B.; Lim, C.C.W. Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillator. Phys. Rev. Appl. 2018, 9, 054008. [Google Scholar] [CrossRef]
- Wang, T.; Gong, F.; Lu, A.; Zhang, D.; Zhang, Z. Integration of quantum key distribution and private classical communication through continuous variable. Quantum Inf. Process. 2017, 16, 289. [Google Scholar] [CrossRef]
- Kumar, R.; Wonfor, A.; Penty, R.; Spiller, T.; White, I. Experimental demonstration of single-shot quantum and classical signal transmission on single wavelength optical pulse. Sci. Rep. 2019, 9, 11190. [Google Scholar] [CrossRef]
- Jouguet, P.; Kunz-Jacques, S.; Leverrier, A.; Grangier, P.; Diamanti, E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 2013, 7, 378–381. [Google Scholar] [CrossRef]
- Huang, D.; Huang, P.; Lin, D.; Wang, C.; Zeng, G. High-speed continuous-variable quantum key distribution without sending a local oscillator. Opt. Lett. 2015, 40, 3695–3698. [Google Scholar] [CrossRef]
- Qi, B.; Lougovski, P.; Pooser, R.; Grice, W.; Bobrek, M. Generating the Local Oscillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection. Phys. Rev. X 2015, 5, 041009. [Google Scholar] [CrossRef]
- Soh, D.B.S.; Brif, C.; Coles, P.J.; Lütkenhaus, N.; Camacho, R.M.; Urayama, J.; Sarovar, M. Self-Referenced Continuous-Variable Quantum Key Distribution Protocol. Phys. Rev. X 2015, 5, 041010. [Google Scholar] [CrossRef]
- Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B 2009, 42, 114014. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dong, J.; Wang, T.; He, Z.; Shi, Y.; Li, L.; Huang, P.; Zeng, G. Effective Excess Noise Suppression in Continuous-Variable Quantum Key Distribution through Carrier Frequency Switching. Entropy 2023, 25, 1286. https://doi.org/10.3390/e25091286
Dong J, Wang T, He Z, Shi Y, Li L, Huang P, Zeng G. Effective Excess Noise Suppression in Continuous-Variable Quantum Key Distribution through Carrier Frequency Switching. Entropy. 2023; 25(9):1286. https://doi.org/10.3390/e25091286
Chicago/Turabian StyleDong, Jing, Tao Wang, Zhuxuan He, Yueer Shi, Lang Li, Peng Huang, and Guihua Zeng. 2023. "Effective Excess Noise Suppression in Continuous-Variable Quantum Key Distribution through Carrier Frequency Switching" Entropy 25, no. 9: 1286. https://doi.org/10.3390/e25091286
APA StyleDong, J., Wang, T., He, Z., Shi, Y., Li, L., Huang, P., & Zeng, G. (2023). Effective Excess Noise Suppression in Continuous-Variable Quantum Key Distribution through Carrier Frequency Switching. Entropy, 25(9), 1286. https://doi.org/10.3390/e25091286