Nature Communications
Home Finite-size security of continuous-variable quantum key distribution with digital signal processing
Finite-size security of continuous-variable quantum key distribution with digital signal processing
Finite-size security of continuous-variable quantum key distribution with digital signal processing

Article Type: research-article Article History
Abstract

In comparison to conventional discrete-variable (DV) quantum key distribution (QKD), continuous-variable (CV) QKD with homodyne/heterodyne measurements has distinct advantages of lower-cost implementation and affinity to wavelength division multiplexing. On the other hand, its continuous nature makes it harder to accommodate to practical signal processing, which is always discretized, leading to lack of complete security proofs so far. Here we propose a tight and robust method of estimating fidelity of an optical pulse to a coherent state via heterodyne measurements. We then construct a binary phase modulated CV-QKD protocol and prove its security in the finite-key-size regime against general coherent attacks, based on proof techniques of DV QKD. Such a complete security proof is indispensable for exploiting the benefits of CV QKD.

While continuous-variable QKD presents many experimental advantages, a full security proof that addresses the most general attacks and digitized signals in the finite-size regime has so far been lacking. Here, the authors fill this gap in the case of a protocol with a binary phase modulation.

Keywords
Matsuura,Maeda,Sasaki,and Koashi: Finite-size security of continuous-variable quantum key distribution with digital signal processing

Introduction

Quantum key distribution (QKD) aims at generating a secret key shared between two remote legitimate parties with information-theoretic security, which provides secure communication against an adversary with arbitrary computational power and hardware technology. Since the first proposal in 19841, various QKD protocols have been proposed with many kinds of encoding and decoding schemes. These protocols are typically classified into two categories depending on the detection methods. One of them is called discrete-variable (DV) QKD, which uses photon detectors and includes earlier protocols such as BB841 and B922 protocols. The other is called continuous-variable (CV) QKD, which uses homodyne and heterodyne measurements with photo detectors35. See refs. 6,7 for comprehensive reviews of the topic.

Although DV QKD is more mature and achieves a longer distance if photon detectors with low dark count rates are available, CV QKD has its own distinct advantages for a short distance. It can be implemented with components common to coherent optical communication technology and is expected to be cost-effective. Excellent spectral filtering capability inherent in homodyne/heterodyne measurements suppresses crosstalk in wavelength division multiplexing (WDM) channels. This allows multiplexing of hundreds of QKD channels into a single optical fiber8 as well as co-propagation with classical data channels915, which makes integration into existing communication network easier.

One major obstacle in putting CV QKD to practical use is the gap between the employed continuous variables and mandatory digital signal processing. The CV-QKD protocols are divided into two branches depending on whether the modulation method of the encoder is also continuous, or it is discrete. The continuous modulation protocols usually adopts Gaussian modulation, in which the sender chooses the complex amplitude of a coherent-state pulse according to a Gaussian distribution35,16,17 (see refs. 18,19 for a review). This allows powerful theoretical tools such as Gaussian optimality20,21, and complete security proofs for a finite-size key and against general attacks have been given22. To implement Gaussian protocols with a digital random-number generator and digital signal processing, it is necessary to approximate the continuous distribution with a constellation composed of a large but finite number of complex amplitudes23,24. This is where difficulty arises, and the security analysis has been confined to the asymptotic regime and collective attacks. The other branch gives priority to simplicity of the modulation and uses a very small (usually two to four) number of amplitudes2528. As for the security analysis, the status is more or less similar to the Gaussian constellation case, and current security proofs are either in the asymptotic regime against collective attacks2932 or in the finite-size regime but against more restrictive attacks33,34. Hence, regardless of approaches, a complete security proof of CV QKD in the finite-size regime against general attacks has been a crucial step yet to be achieved.

Here we achieve the above step by proposing a binary phase-modulated CV-QKD protocol with a complete security proof in the finite-size regime against general attacks. The key ingredient is an estimation method using heterodyne measurement developed in this paper, which is suited for analysis of confidence region in the finite-size regime. The outcome of heterodyne measurement, which is unbounded, is converted to a bounded value by a smooth function such that its expectation is proved to be no larger than the fidelity of the input pulse to a coherent state. This allows us to use a standard technique to derive a lower bound on the fidelity with a required confidence level in the finite-size regime. The fidelity as a measure of disturbance in the binary modulated protocol is essentially the same as what is monitored through bit errors in the B92 protocol2,35,36. This allows us to construct a security proof based on a reduction to distillation of entangled qubit pairs37,38, which is a technique frequently used for DV-QKD protocols.

Results

Estimation of fidelity to a coherent state

We first introduce a test scheme to estimate the fidelity between an optical state ρ and the vacuum state 00 through a heterodyne measurement. For a state ρ of a single optical mode, the heterodyne measurement produces an outcome ω^C with a probability density

where a coherent state ω is defined as
We refer to the expectation associated with the distribution qρ(ω) simply as Eρ. To construct a lower bound for the fidelity 0ρ0 from ω^, we will use the associated Laguerre polynomials which are given by
where
are the Laguerre polynomials. Our test scheme is based on the following theorem.

Theorem 1: Let Λm,r(ν) (ν ≥ 0) be a bounded function given by

for an integer m ≥ 0 and a real number r > 0. Then, we have
where In,m are constants satisfying (−1)mIn,m > 0.

From Eq. (6), a lower bound on the fidelity between ρ and the vacuum state is given by

for any odd integer m. As seen in Fig. 1a, the absolute value and the slope of the function Λm,r are moderate for small values of m and r, which is advantageous in executing the test in a finite duration with a finite resolution. Compared to a similar method proposed in ref. 39, our method excels in its tightness for weak input signals; we see from Eq. (6) that, regardless of the value of r, the inequality (7) saturates when ρ has at most m photons. This is crucial for the use in QKD in which tightness directly affects the efficiency of the key generation.
The test scheme to estimate the fidelity.
Fig. 1

The test scheme to estimate the fidelity.

a Example of the test functions Λm,r used in the estimation. The values of r in the figure are chosen so that the range of Λm,r is minimized for given m. In general, the minimum range of the function Λm,r becomes larger as m increases. The pair (mr) = (1, 0.4120) was used in the numerical simulation of key rates below. b A schematic description of the usage of obtained outcomes in heterodyne measurement. In order to estimate the lower bound on the fidelity to the coherent states ±β, the squared distance between the outcome ω^ and the objective point (−1)aβ (i.e., ω^(1)aβ2) is used.

Extension to the fidelity to a coherent state β is straightforward as

The proofs are given in Methods.

Proposed protocol

Based on this fidelity test, we propose the following discrete-modulation protocol (see Fig. 2). Prior to the protocol, Alice and Bob determine the number of rounds N, the acceptance probability of homodyne measurement fsuc(x)(xR) with fsuc(0) = 0, the parameters for the test function (mr), and the protocol parameters (μpsigptestptrashβs) with psig + ptest + ptrash = 1, where all the parameters are positive. Alice and Bob then run the protocol described in Box 1. Upon successful verification, the protocol generates a shared final key of length

where h(x):=xlog2(x)(1x)log2(1x) is the binary entropy function and the function U(F^,N^trash) will be specified later.
The proposed continuous-variable quantum key distribution protocol.
Fig. 2

The proposed continuous-variable quantum key distribution protocol.

Alice generates a random bit a ∈ {0, 1} and sends a coherent state with amplitude (1)aμ. Bob chooses one of the three measurements based on the predetermined probability. In the signal round, Bob performs a homodyne measurement on the received optical pulse and obtains an outcome x^. In the test round, Bob performs a heterodyne measurement on the received optical pulse and obtains an outcome ω^. In the trash round, he produces no outcome.

The acceptance probability fsuc(∣x∣) should be chosen to post-select the rounds with larger values of ∣x∣, for which the bit error probability is expected to be lower. It is ideally a step function, but our security proof is applicable to any form of fsuc(∣x∣). The parameter β is typically chosen to be ημ with η being a nominal transmissivity of the quantum channel, while the security proof itself holds for any choice of β. The parameters s and s are related to the overall security parameter in the security proof below.

1. Alice generates a random bit a ∈ {0, 1} and sends an optical pulse C~ in a coherent state with amplitude (1)aμ to Bob. She repeats it N times.

2. For each of the received N pulses, Bob chooses a label from {signal, test, trash} with probabilities psigptest, and ptrash, respectively. According to the label, Alice and Bob do one of the following procedures.

[signal] Bob performs a homodyne measurement on the received optical pulse C, and obtains an outcome x^R. With a probability fsuc(x^), he regards the detection to be a "success”, and defines a bit b = 0 (resp. 1) when sign(x^)=+()1. He announces success/failure of the detection. In the case of a success, Alice (resp. Bob) keeps a (b) as a sifted key bit.

[test] Bob performs a heterodyne measurement on the received optical pulse C, and obtains an outcome ω^. Alice announces her bit a. Bob calculates the value of Λm,r(ω^(1)aβ2).

[trash] Alice and Bob produce no outcomes.

3. We refer to the numbers of “success” and “failure” signal rounds, test rounds, and trash rounds as N^suc,N^fail,N^test, and N^trash, respectively. (N=N^suc+N^fail+N^test+N^trash holds by definition.) Bob calculates the sum of Λm,r(ω^(1)aβ2) obtained in the N^test test rounds, which is denoted by F^.

4. For error correction, they use (HEC+s)-bits of encrypted communication consuming a pre-shared secret key to do the following. Alice sends Bob HEC bits of syndrome of a linear code for her sifted key. Bob reconciles his sifted key accordingly. Alice and Bob verify the correction by comparing s bits via universal2 hashing54.

5. Bob computes and announces the final key length N^fin according to Eq. (9). Alice and Bob apply privacy amplification to obtain the final key. The net key gain G^ per pulse is thus given by G^=(N^finHECs)/N.

Security proof

We determine a sufficient amount of the privacy amplification according to Shor and Preskill37,40, which has been widely used for the DV-QKD protocols. We consider a coherent version of Steps 1 and 2, in which Alice and Bob share an entangled pair of qubits for each success signal round, such that their Z-basis measurement outcomes correspond to the sifted key bits a and b. For Alice, we introduce a qubit A and assume that she entangles it with an optical pulse C~ in a state

Then, Step 1 is equivalent to the preparation of ΨAC~ followed by a measurement of the qubit A on Z basis {0,1} to determine the bit value a. For Bob, we construct a process of probabilistically converting the received optical pulse C to a qubit B (See Fig. 3). Consider a completely positive (CP) map defined by
with
where x maps a state vector to the value of its wave function at x (See also Eq. (111)). When the pulse C is in a state ρC, the corresponding process succeeds with a probability psuc and then prepares the qubit B in a state ρB, where psucρB=FCB(ρC). If the qubit B is further measured on Z basis, probabilities of the outcome b = 0, 1 are given by
which shows the equivalence to the signal round in Step 2. This is illustrated in Fig. 3.
Bob’s qubit extraction in the entanglement-sharing protocol.
Fig. 3

Bob’s qubit extraction in the entanglement-sharing protocol.

Bob performs on the optical pulse a non-demolition projective measurement, with which the absolute value of the outcome of homodyne measurement x^ is determined. Then, Bob extracts a qubit B by the operation F defined in Eq. (11). A Z-basis measurement on this qubit gives the same sifted key bit b as described in the actual protocol. On the other hand, the X-basis measurement on this qubit reveals the parity of photon number of the received optical pulse.

To clarify the above observation, we introduce an entanglement-sharing protocol defined in Box 2. This protocol leaves N^suc pairs of qubits shared by Alice and Bob. If they measure these qubits on Z basis to define the sifted key bits, the whole procedure is equivalent to Steps 1 through 3 of the actual protocol (see Fig. 4). Alice’s measurements on X basis {±:=(0+1)/2} in the trash rounds are added for later security argument, and they do not affect the equivalence.

Relation between three protocols.
Fig. 4

Relation between three protocols.

The actual protocol and the estimation protocol are related through the entanglement-sharing protocol. After the entanglement-sharing protocol, Alice and Bob are left with the observed data (N^suc,N^fail,N^test,N^trash,F^,Q^) and N^suc pairs of qubits. If Alice and Bob ignore Q^ and measure their qubits on the Z-basis to determine their N^suc-bit sifted keys, it becomes equivalent to the actual protocol. On the other hand, if Alice and Bob measure their N^suc pairs of qubits on the X-basis, they can count the number N^phsuc of phase errors, which we call the estimation protocol. If we can find a reliable upper bound U on N^phsuc in the estimation protocol, it restricts the property of the state of N^suc pairs of qubits after the entanglement-sharing protocol, which in turn limits the amount of leaked information on the sifted keys in the actual protocol. The security proof is thus reduced to finding such an upper bound U in the estimation protocol, represented as a function of the variables that are commonly available in the three protocols.

The Shor-Preskill argument connects the amount of privacy amplification to the so-called phase error rate. Suppose that, after the entanglement-sharing protocol, Alice and Bob measure their N^suc pairs of qubits on X basis {+,}. A pair with outcomes (+, −) or (−, +) is defined to be a phase error. Let N^phsuc be the number of phase errors among N^suc pairs. If we can have a good upper bound eph on the phase error rate N^phsuc/N^suc, shortening by fraction h(eph) via privacy amplification in the actual protocol achieves the security in the asymptotic limit37.

To cover the finite-size case as well, we need a more rigorous statement on the upper bound. For that purpose, we define an estimation protocol in Box 3 (see also Fig. 4). The task of proving the security of the actual protocol is then reduced to construction of a function U(F^,N^trash) which satisfies

for any attack in the estimation protocol. It is known that the condition (15) immediately implies that the actual protocol is ϵsec-secure with a small security parameter ϵsec=2ϵ+2s+2s40,41. See Methods for the rationale and the detailed definition of security.

At this point, it is beneficial for the analysis of the phase error statistics to clarify what property of the optical pulse C is measured by Bob’s X-basis measurement in the estimation protocol (see Fig. 3). Let Πev(od) be the projection to the subspace with even (resp. odd) photon numbers. (Πev + Πod = 1C holds by definition.) Furthermore, since Πev − Πodd is the operator for an optical phase shift of π, we have (ΠevΠodd)x=x. Eq. (12) is then rewritten as

Therefore, when the state of the pulse C is ρC, the probability of obtaining  +(−) in the X-basis measurement in the estimation protocol is given by
where
This shows that Bob’s X-basis measurement distinguishes the parity of the photon number of the received pulse. In this sense, the secrecy of our protocol is assured by the complementarity between the sign of the quadrature and the parity of the photon number.

As an intermediate step toward our final goal of Eq. (15), let us first derive a bound on the expectation value E[N^phsuc] in terms of those collected in the test and the trash rounds, E[F^] and E[Q^], in the estimation protocol. Let ρAC be the state of the qubit A and the received pulse C averaged over N pairs, and define relevant operators as

Then we immediately have
and
while application of the property of Eq. (8) leads to
Let us denote TrρACM simply by M for any operator M. The set of points Mphsuc,Πfid,Πtrash for all the density operators ρAC form a convex region. Rather than directly deriving the boundary of the region, it is easier to pursue linear constraints in the form of
where B(κ,γ),κ,γR.

It is expected that a meaningful bound is obtained only for κγ ≥ 0. Decreasing fidelity Πfid should allow more room for eavesdropping, leading to a larger value of phase error rate Mphsuc. Hence Eq. (25) will give a good bound only when κ≥0. As for Πtrash, it only depends on the marginal state of Alice’s qubit A, which is independent of the adversary’s attack. We thus have Πtrash=q:=AΨAC~2=(1e2μ)/2. Since Alice’s use of a stronger pulse should lead to larger leak of information, we should choose γ ≥ 0 for a good bound.

To find a function B(κγ) satisfying Eq. (25), let us define an operator

Then Eq. (25) is rewritten as TrρACM[κ,γ]B(κ,γ). This condition holds for all ρAC iff M[κγ] satisfies an operator inequality
If the operator M[κγ] was represented by a matrix of a small size, the tightest bound would be found by computing the maximum eigenvalue of the matrix. But here M[κγ] has an infinite rank and it is difficult to compute the tightest bound. We thus compromise and heuristically find a computable bound B(κγ) which is not necessarily tight; we reduce the problem to finding the maximum eigenvalues of small-size matrices by replacing M[κγ] with a constant upper-bound except in a relevant finite-dimensional subspace spanned by ±β and Mev(od)suc±β. For the detailed derivation of B(κγ), see Methods.

With B(κγ) computed, we can rewrite Eq. (25) using Eqs. (22)–(24) to obtain a relation between E[N^phsuc], E[F^], and E[Q^]. It is concisely written as

with
This relation leads to an explicit bound on the phase error rate as E[N^phsuc]/psigNB(κ,γ)+γqκE[F^]/ptestN, which is enough for the computation of asymptotic key rates.

The security in the finite-size regime is proved as follows. The fact that the bound given in Eq. (28) is true for all the states ρAC allows us to use Azuma’s inequality42 to evaluate the fluctuations around the expectation value, leading to an inequality

which holds with a probability no smaller than 1 − ϵ/2 (see Methods for the explicit form of δ1(ϵ/2), which is of O(N)). We remark that the reason for including the trash rounds in the actual protocol is to circumvent a technical issue which would arise in this step. Without measurement of Q^ in the estimation protocol, we would obtain an inequality E[psig1N^phsuc+ptest1κF^]NB(κ,γ)+γq. In contrast to Eq. (28), the new inequality is true only when ρAC satisfies Πtrash=q, which is too stringent for the application of Azuma’s inequality.

Although Eq. (29) includes Q^ which is inaccessible in the actual protocol, we can derive a bound by noticing that it is an outcome from Alice’s qubits and is independent of the adversary’s attack. In fact, given N^trash, it is the tally of N^trash Bernoulli trials with a probability q. Hence, we can derive an inequality of the form

which holds with a probability no smaller than 1 − ϵ/2. Here δ2(ϵ/2;N^trash) can be determined by a Chernoff bound (see Methods). Combining Eqs. (29), (30), and (31), we obtain U(F^,N^trash) satisfying Eq. (15) to complete the finite-size security proof.

1. Alice prepares a qubit A and an optical pulse C~ in a state ΨAC~ defined in (10). She repeats it N times.

2. For each of the received N pulses, Bob announces a label in the same way as that in Step 2. Alice and Bob do one of the following procedures according to the label.

[signal] Bob performs a quantum operation on the received pulse C specified by the CP map FCB to determine success/failure of detection and to obtain a qubit B upon success. He announces success/failure of detection. In the case of a success, Alice keeps her qubit A.

[test] Bob performs a heterodyne measurement on the received optical pulse C, and obtains an outcome ω^. Alice measures her qubit A on Z basis and announces the outcome a ∈ {0, 1}. Bob calculates the value of Λm,r(ω^(1)aβ2).

[trash] Alice measures her qubit A on X basis to obtain a{+,}.

3. N^suc,N^fail,N^test,N^trash, and F^ are defined in the same way as those in Step 3. Let Q^ be the number of rounds in the N^trash trash rounds with a=.

1–3. Same as Steps 1, 2, and 3 of the entanglement-sharing protocol.

4. Alice and Bob measure each of their N^suc pairs of qubits on X basis and obtain outcomes a and b, respectively. Let N^phsuc be the number of pairs found in the combination (a,b)=(+,) or (−, +).

Numerical simulation

We simulated the net key gain per pulse G^ as a function of attenuation in the optical channel (including the efficiency of Bob’s apparatus). We assume a channel model with a loss with transmissivity η and an excess noise at channel output; Bob receives Gaussian states obtained by randomly displacing coherent states ±ημ to increase their variances by a factor of (1 + ξ)43,44. We assume a step function with a threshold xth( > 0) as the acceptance probability fsuc(∣x∣). The expected amplitude of coherent state β is chosen to be ημ. We set ϵsec=250 for the security parameter, and set ϵ=2s=ϵsec2/16 and 2s=ϵsec/2. We thus have two coefficients (κγ), four protocol parameters (μxthpsigptest), and two parameters (mr) of the test function to be determined. For each transmissivity η, we determined (κγ) via a convex optimization using the CVXPY 1.0.2545,46 and (μxthpsigptest) via the Nelder-Mead in the scipy.minimize library in Python, in order to maximize the key rate. Furthermore, we adopted m = 1 and r = 0.4120, which leads to (maxΛm,r,minΛm,r)=(2.824,0.9932). See Methods for the detail of the model of our numerical simulation and examples of optimized parameters. Typical optimized values of the threshold xth range from 0.4 to 1.5 (we adopted a normalization for which the vacuum fluctuation is (Δx)2=0.5). They are larger than those in other analyses of protocols with post-selection (e.g., ref. 31). A possible reason is the fact that the latter protocols use more than two states to monitor the eavesdropping act, which may lead to a lower cost of privacy amplification and higher tolerance against bit errors.

Figure 5 shows the key rates of our protocol in the asymptotic limit N →  and finite-size cases with N = 109–1012 for ξ = 10−2.0–10−3.0 and 0. (Note that from the results of the recent experiments8,44,47, excess noise with ξ = 10−2.0–10−3.0 at the channel output seems reasonable. Furthermore, the state-of-the-art experiments8 work at 0.5 GHz repetition rate, which implies that total number of rounds N = 109–1012 can be achieved in a realistic duration.) For the noiseless model (ξ = 0), the asymptotic rate reaches 8 dB. In the case of ξ = 10−3.0, it reaches 4 dB, which is comparable to the result of a similar binary modulation protocol proposed in ref. 29. As for finite-size key rates, we see that the noiseless model shows a significant finite-size effect even for N = 1012. On the other hand, with a presence of noises (ξ = 10−3.0) the effect becomes milder, and N = 1011 is enough to achieve a rate close to the asymptotic case. This may be ascribed to the cost of the fidelity test. In order to make sure that the fidelity is no smaller than 1 − δ, the statistical uncertainty of the fidelity test must be reduced to O(δ). As a result, approaching the asymptotic rate of ξ = 0 will require many rounds for the fidelity test.

The net key gain per pulse G^ (key rate) vs. transmissivity η of the optical channel.
Fig. 5

The net key gain per pulse G^ (key rate) vs. transmissivity η of the optical channel.

The abscissa represents attenuation in decibel, i.e., 10log10η. We assumed that the optical pulse that Bob receives is given by randomly displacing a coherent state to increase its variance by a factor of (1 + ξ). a The asymptotic key rate for various values of ξ. b The key rate for various values of ξ when the pulse number is finite (N = 1011). c The key rate without the excess noise (ξ = 0) along with the repeaterless bound (PLOB bound) of the secure key rate in the pure-loss channel55. d The key rate with the excess noise of ξ = 10−3.0.

Discussion

Numerically simulated key rates above were computed on the implicit assumption that Bob’s observed quantities are processed with infinite precision. Even when these are approximated with a finite set of discrete points, we can still prove the security with minimal degradation of key rates. For the heterodyne measurement used for the test in the protocol, assume that a digitized outcome ωdig ensures that the true value ω^ lies in a range Ω(ωdig). Then, we need only to replace Λm,r(ω^±β2) with its worst-case value, min{Λm,r(ω^±β2):ω^Ω(ωdig)}. As seen in Fig. 1a, the slope of function Λm,r(ν) is moderate and goes to zero for ν → . This means that the worst-case value can be made close to the true value, leading to small influence on the key rate. For the homodyne measurement used for the signal, finite precision can be treated through appropriate modification of the acceptance probability fsuc(x). Aside from a very small change in the success rate and the bit error rate, this function affects the key rate only through integrals in Eqs. (116), (118), and (120) in Methods, and hence influence on the key rate is expected to be small. We thus believe that the fundamental obstacles associated with the analog nature of the CV protocol have been settled by our approach.

In comparison with recent asymptotic analyses31,32 of discrete-modulation CV QKD, our protocol achieves lower key rates and much shorter distance. Since ours is the first attempt of applying the proof technique of DV QKD to CV QKD, there is much room for possible improvement. We sacrificed the optimality for simplicity in deriving the operator inequality. The definition of the phase error is not unique and there may be a better choice. The trash rounds were introduced for technical reasons, but we are not sure whether they are really necessary. Nonetheless, we believe that the dominant reason for the difference lies in the fact that our protocol uses only two states. In contrast, the protocols considered in refs. 31,32 use four or more states in signal or test modes. The genuine binary protocol was analyzed in ref. 29, and the key rate derived there is comparable to ours.

In order to improve the presented finite-size key rate, a promising route will thus be increasing the number of states from two. Our fidelity test can be straightforwardly generalized to monitoring of such a larger constellation of signals, and we will be able to confine the adversary’s attacks more tightly than in the present binary protocol. As for the proof techniques to determine the amount of privacy amplification, there are two possible directions. One is to generalize the present DV-QKD-inspired approach of estimating the number of phase errors in qubits to the case of qudits. The other direction is to seek a way to combine the existing analyses31,32,48 of discrete-modulation CV-QKD protocols, which have been reported to yield high key rates in the asymptotic regime, to our fidelity test. Although either of the approaches is nontrivial, we believe that the present results will open up new direction toward exploiting the expected high potential of CV QKD with an improved security level.

In summary, we proved the security of a binary-modulated CV-QKD protocol in the finite-size regime while completely circumventing the problems arising from the analog nature of CV QKD. We believe that it is a significant milestone toward real-world implementation of CV QKD, which has its own advantages.

Methods

Proof of Theorem 1 and Eq. (8)

In this section, we prove Theorem 1 stated in the main text and derive Eq. (8) as a corollary of Theorem 1.

Proof: From Eq. (1), the expectation value of Λm,r(ω^2) when given a measured state ρ is given by

where
for integers nm ≥ 0.

The following three properties hold for In,m:

    (i)In,m = 0 for m ≥ n ≥ 1.

This results from orthogonality relations of the associated Laguerre polynomials, that is,

Since the polynomial νn−1 can be written as a linear combination of lower order polynomials {Ll(1)(ν)}0ln1, In,m vanishes whenever m ≥ n ≥ 1.

    (ii)(−1)mIn,m > 0 for n > m ≥ 0.

This property is shown as follows. First, the associated Laguerre polynomials satisfy the following recurrence relation for m ≥ 149:

Substituting this to Eq. (33) and using integration by parts, we have
for n ≥ 1 and m ≥ 1. The property (ii) is then proved by induction over m. For m = 0, it is true since In,0 = 1 > 0. When (−1)m−1In,m−1 > 0 for n > m − 1, we can prove (−1)mIn,m > 0 for n > m by using Eq. (36) recursively with Im,m = 0 from property (i).

    (iii)I0,m = 1 for m ≥ 0.

This also follows from property (i) and Eq. (36) for n = 1 and m ≥ 1, which leads to I0,m = I0,0 = 1.

Combining properties (i), (ii), and (iii) shows Eq. (6).

Eq. (8) in the main text is derived as the following corollary.

Corollary 1: Let β(βC) be the coherent state with amplitude β. Then, for any βC and for any odd positive integer m, we have

Proof: From Eq. (6) of Theorem 1, for any odd positive integer m, we have

Let Dβ be a displacement operator satisfying
and Dβ=Dβ. With ρ~:=DβρDβ, we have qρ~(ω)=qρ(ωβ) for probability density function of heterodyne measurement outcome, which implies that
Replacing ρ~ with ρ, we obtain Eq. (37).

Detail of the security proof

In this section, we prove the security of the proposed protocol in the main text. This section consists of several subsections. In the first subsection, we give a definition of security, which is standard in the literature. The security condition is divided into two conditions, secrecy and correctness. Since the correctness is trivially satisfied, it is the secrecy that is the focus of the security proof. The second subsection explains how the secrecy condition is reduced to Eq. (15) of the estimation protocol, which bounds the number of phase errors. The third subsection lays the groundwork for the full security proof by deriving the inequality (27) involving three operators relevant for the quantities observed in the signal, the test, and the trash round in the estimation protocol. After proving a general lemma (Lemma 1), an explicit form of the upper bound B(κγ) satisfying Eq. (27) is given as a corollary (Corollary 2) of the lemma. Finally, the fourth subsection uses Azuma’s inequality and Corollaries 1 and 2 to derive an explicit form of U(F^,N^trash) that fulfills Eq. (15), which completes the security proof of the actual protocol.

1. Definition of security in the finite-size regime. We evaluate the secrecy of the final key as follows. When the final key length is Nfin ≥ 1, we represent Alice’s final key and an adversary’s quantum system as a joint state

and define the corresponding ideal state as
Let σ1=Trσσ be the trace norm of an operator σ. We say a protocol is ϵsct-secret when
holds regardless of the adversary’s attack. The main goal of the security proof is to derive the amount of privacy amplification, or equivalently to find the function U(F^,N^trash) in Eq. (9), such that Eq. (43) should hold for given ϵsct > 0.

For correctness, we say a protocol is ϵcor-correct if the probability for Alice’s and Bob’s final key to differ is bounded by ϵcor. Our protocol achieves ϵcor=2s via the verification in Step 4.

When the above two conditions are met, the protocol becomes ϵsec-secure with ϵsec=ϵsct+ϵcor in the sense of universal composability50.

2. Reduction to the estimation protocol. Here we show that Eq. (15) in the estimation protocol implies ϵsct-secrecy of the actual protocol with ϵsct=2ϵ+2s. We have already seen that the entanglement-sharing protocol immediately followed by Z-basis measurements of the qubits is equivalent to Steps 1 through 3 of the actual protocol. Here we consider a slightly modified scenario in which, after the entanglement-sharing protocol, a controlled-NOT operation V is applied on each pair of qubits, where V:=00A1B+11AXB with XB:=10B+01B. Alice then measures her qubits on the Z basis to define her sifted key bits and proceeds with Step 5 of the actual protocol. Since V does not affect the Z-basis value of the Alice’s qubit, her procedure of determining the N^fin-bit final key in this scenario is equivalent to that in the actual protocol. Although V prevents Bob from obtaining an equivalent final key, he can still simulate the reconciliation and the verification process in Step 4 since the Z-basis value of each of his N^suc qubits corresponds to absence/presence of a bit error between Alice’s and Bob’s sifted key bits. Hence Bob can equivalently carry out all the announcements in Steps 4 and 5 of the actual protocol. As a result, this scenario leads to exactly the same distribution Pr(Nfin) and the same states ρAENfinfin as those of the actual protocol.

The secrecy of Alice’s final key can be determined from the X-basis property of her N^suc qubits after the application of V. Since V can be rewritten as V=1A++B+ZAB with ZA:=+A++A, the X-basis value of each of Alice’s qubits corresponds to absence/presence of a phase error. Suppose that these N^suc qubits are measured on the X-basis to produce an outcome x^{+,}N^suc. Let wt(x^) be the number of symbol ‘−’ in x^. If Eq. (15) holds in the estimation protocol, the statistics of x^ should satisfy

which implies that the number of probable patterns x^ is limited. To be more precise, let us introduce a set Ω(nw) ≔ {x ∈ {+, −}n∣ wt(x) ≤ w}, whose size is bounded as ∣Ω(nw)∣ ≤ 2nh(w/n). The condition (44) then implies
with T(N^suc,F^,N^trash):=ΩN^suc,U(F^,N^trash), which satisfies
from Eq. (9). It is known40,41,51 that the above conditions imply Eq. (43) with ϵsct=2ϵ+2s. Therefore, it suffices to show that Eq. (15) holds in the estimation protocol for proving the actual protocol to be ϵsec-secure with ϵsec=2ϵ+2s+2s.

We remark that the encryption of M:=HEC+s bits in Step 4 can be omitted as long as each bit linearly depends on Alice’s sifted key over GF(2). In such a case, the above scenario must include measurements on Alice’s qubits to simulate the announcement of the M bits in Step 4. The backaction on X basis caused by the measurement for each bit amounts to doubling the number of probable patterns x^. We can thus redefine the set T(N^suc,F^,N^trash) by enlarging its size by factor of 2M such that Eq. (45) holds. Then, by decreasing N^fin by M, Eq. (46) also holds. This means that we achieve the same net key rate with the same level of security.

3. Derivation of the operator inequality. The aim of this subsection is to construct B(κγ) which fulfills the operator inequality (27). Let σsup(O) denote the supremum of the spectrum of a bounded self-adjoint operator O. Although B(κ,γ)=σsup(M[κ,γ]) would give the tightest bound satisfying Eq. (27), it is hard to compute it numerically since system C has an infinite-dimensional Hilbert space. Instead, we derive a looser but simpler bound. We first prove the following lemma.

Lemma 1: Let Π± be orthogonal projections satisfying Π+Π = 0. Suppose that the rank of Π± is no smaller than 2 or infinite. Let M± be self-adjoint operators satisfying Π±M±Π± = M±α±Π±, where α± are real constants. Let ψ be an unnormalized vector satisfying (Π++Π)ψ=ψ and Π±ψ0. Define following quantities with respect to ψ:

Then, for any real numbers γ+ and γ, we have
where four dimensional matrix M4d is defined as

Proof: We choose orthonormal vectors e±(1),e±(2) in the domain of Π±, respectively, to satisfy

which is well-defined due to Eqs. (47)–(49) and Π±M±Π± = M±. From (Π++Π)ψ=ψ, we have
Let us define the following projection operators:
Since Eq. (53) implies Π±(3)M±Π±(1)=0, we have
The second term in the right-hand side of Eq. (58) is bounded as
since M± ≤ α±Π±. Combining Eqs. (48), (58), and (59), we have
Combining Eqs. (54) and (60), we have
where M4d is given in Eq. (51) with the basis {e+(2),e+(1),e(1),e(2)}. Since α±γ±=e±(2)M4de±(2)σsupM4d, supremum of the spectrum of the right-hand side of Eq. (61) is equal to the maximum eigenvalue of the four-dimensional matrix M4d. We thus obtain Eq. (50).

As a corollary, we derive Eq. (27) as follows.

Corollary 2: Let β be a coherent state. Let Πev(od), Mev(od)suc, and M[κγ] be as defined in the main text, and define following quantities:

Let M4derr[κ,γ] and M2dcor[κ,γ] be defined as follows:
Define a convex function
Then, for κγ ≥ 0, we have

Proof: Let us first observe that the operator Πfid defined in Eq. (20) can be rewritten as follows:

where orthogonal states ϕerrAC and ϕcorAC are defined as
Next, using Eqs. (70), (19), and (21), we rearrange the operator M[κγ] defined in Eq. (26) as follows:
where
We can apply Lemma 1 to Merr[κγ] by the following substitutions
Here, M± ≤ Π± (i.e., α± = 1) holds because Mod(ev)suc are POVM elements. The other prerequisites of Lemma 1 are easy to be confirmed. Thus, we obtain
In the same way, we can apply Lemma 1 to Mcor[κγ] via
Since M± = 0 implies D± = V± = 0 in Lemma 1, this time we can reduce the dimension of relevant matrix Eq. (51) by separating known eigenvalues 0 and  −γ. Therefore, we have
where the last inequality holds since γ ≥ 0 and κCev ≥ 0. We then obtain Eq. (69) from Eqs. (73), (81), and (87). Since M4derr[κ,γ] and M2dcor[κ,γ] are symmetric and their elements linearly depend on κ and γ, σsupM4derr[κ,γ] and σsupM2dcor[κ,γ] are convex functions over κ and γ, and so is B(κγ).

4. Derivation of the finite-size bound. Here we construct the function U(F^,N^trash) to satisfy Eq. (15) in the estimation protocol. For that, we will first derive Eq. (30). In the estimation protocol, we define the following random variables labeled by the number i of the round;

    (i)N^phsuc,(i) is defined to be unity only when “signal” is chosen in the i-th round, the detection is a “success”, and a pair of outcomes (a,b) is (+, −) or (−, +). Otherwise, N^phsuc,(i)=0. We have

    and N^phsuc=i=1NN^phsuc,(i).

    (ii)F^(i) is defined to be Λm,r(ω^(1)aβ2) when “test” is chosen in the i-th round. We have

    and F^=i=1NF^(i).

    (iii)Q^(i) is defined to be unity only when “trash” is chosen in the i-th round and a=. Otherwise, Q^(i)=0. We have

    and Q^=i=1NQ^(i).

    (iv)We also define

    which leads to T^[κ,γ]=i=1NT^(i).

We will make use of Azuma’s inequality42. We define stochastic processes {X^(k)}k=0,,N and {Y^(k)}k=1,,N as follows:

where X^<k:=(X^(0),X^(1),,X^(k1)). Note that Y^(k) is a constant when conditioned on X^<k. Such a sequence {Y^(k)}k=1,2, is called a predictable process with regards to {X^(k)}. Since T^(i) is bounded for any i and {X^(k)}k=0,1, is a martingale, we can apply Azuma’s inequality.

Proposition 1 (Azuma’s inequality52,53): Suppose {X^(k)}k=0,1, is a martingale which satisfies

for constants cmin and cmax, and a predictable process {Y^(k)}k=1,2, with regards to {X^(k)}, i.e., Y^(k) is constant when conditioned on X^<k. Then, for all positive integers N and all positive reals δ,

We define constants cmin and cmax as follows. In each round, at most one of N^phsuc,(i), F^(i), and Q^(i) takes non-zero value; N^phsuc,(i) and Q^(i) are either zero or unity, and minΛm,rF^(i)maxΛm,r. Since κγ ≥ 0, Eq. (95) holds when cmin and cmax are defined as

With cmin and cmax defined as above, we further define
Setting δ = δ1(ϵ/2) in the proposition, we conclude that
holds with a probability no smaller than 1 − ϵ/2.

Next, we will construct a deterministic bound on Y^(i). Let ρAC(i) be the state of Alice’s i-th qubit and Bob’s i-th pulse conditioned on X^<i. Then, using the same argument as that has lead to Eqs. (22)–(24), we have

and thus
where M[κγ] is defined in Eq. (26). Using the operator inequality (27), we obtain a bound independent of i as
Combining this with Eq. (100) proves Eq. (30).

The function δ2(ϵ/2;N^trash) satisfying the bound (31) on Q^ can be derived from the fact that Pr[Q^N^trash] is a binomial distribution. The following inequality thus holds for any positive integer n and a real δ with 0 < δ < (1 − q)n (Chernoff bound):

where
is the Kullback-Leibler divergence. On the other hand, for any non-negative integer n, we always have
Therefore, for any non-negative integer n, by defining δ2(ϵn) which satisfies
and by combining Eq. (106) and (108), we conclude that Eq. (31) holds with a probability no smaller than 1 − ϵ/2.

Combining Eq. (30) and Eq. (31), we obtain Eq. (15) by setting

which holds with a probability no smaller than 1 − ϵ (Union bound). Note that since B(κγ) is a convex function, so is U(F^,N^trash) with respect to auxiliary parameters κ and γ.

Models for numerical simulation of key rates

In what follows, we normalize quadrature x such that a coherent state ω has expectation x=Re(ω) and variance (Δx)2=1/4. The wave function for ω = ωR + iωI is given by

For the simulation of the key rate G^, we assume that the communication channel and Bob’s detection apparatus can be modeled by a pure loss channel followed by random displacement, that is, the states which Bob receives are given by

where η is the transmissivity of the pure loss channel and pξ(γ) is given by
The parameter ξ is the excess noise relative to the vacuum, namely,

We assume that Bob sets β=ημ for the fidelity test. The actual fidelity between Bob’s objective state (1)aημ and the model state ρmodel(a) is given by

For the acceptance probability of Bob’s measurement in the signal rounds, we assume fsuc(x) = Θ(∣x∣ − xth), a step function with the threshold xth > 0. In this case, the quantities defined in Eqs. (64) and (65) are given by
where β=ημ and the complementary error function erfc(x) is defined as
For the derivation of Eq. (120), we used the fact that Πev + Πod = 1 and (ΠevΠod)β=β.

We assume that the number of “success” signal rounds N^suc is equal to its expectation value,

where
We also assume that the number of test rounds N^test is equal to ptestN and the number of trash rounds N^trash is equal to ptrashN. The test outcome F^ is assumed to be equal to its expectation value E[F^], which is given by

Under these assumptions, the key rate G^ for each transmissivity η is optimized over two coefficients (κγ) and four protocol parameters (μxthpsigptest) as discussed in the main part. Examples of optimized parameters are shown in Table 1. The cost of bit error correction HEC is assumed to be 1.1×N^such(ebit), where the bit error rate ebit is given by

Table 1
Examples of optimized parameters.
η [dB]Key rate G^(κγ)μxthpsigptest
Parameters for N = 1011 and ξ = 0
0.52.17 × 10−1(44.9, 1.92)0.5540.4510.8210.172
1.01.38 × 10−1(32.4, 1.38)0.5140.5320.8210.172
1.58.71 × 10−2(24.9, 1.01)0.4870.6100.8160.176
2.05.36 × 10−2(20.3, 0.741)0.4420.7240.8310.160
2.53.16 × 10−2(17.0, 0.538)0.4590.7710.7880.205
3.01.75 × 10−2(14.6, 0.381)0.4510.8550.7670.227
3.58.92 × 10−3(13.6, 0.262)0.4460.9410.7060.289
4.04.15 × 10−3(12.6, 0.175)0.4421.030.6240.371
4.51.50 × 10−3(11.4, 0.107)0.4391.130.5220.473
5.03.23 × 10−4(9.98, 0.059)0.4381.250.3700.626
5.51.63 × 10−5(8.78, 0.031)0.4431.370.1260.869
Parameters for N = 1011 and ξ = 10−3.0
0.51.79 × 10−1(23.5, 1.60)0.4910.4890.8540.137
1.01.13 × 10−1(17.9, 1.19)0.4660.5670.8530.138
1.56.95 × 10−2(14.3, 0.889)0.4500.6450.8480.143
2.04.07 × 10−2(11.9, 0.666)0.4420.7240.8310.160
2.52.20 × 10−2(10.1, 0.487)0.4390.8080.8040.187
3.01.02 × 10−2(8.85, 0.345)0.4400.8980.7580.233
3.53.56 × 10−3(7.72, 0.232)0.4470.9990.6740.316
4.05.29 × 10−4(6.70, 0.147)0.4631.110.4840.505
Parameters for N = 1012 and ξ = 0
0.52.68 × 10−1(82.9, 2.26)0.6160.4210.8640.133
1.01.69 × 10−1(54.9, 1.56)0.5560.5040.8740.123
1.51.08 × 10−1(40.3, 1.11)0.5180.5900.8730.124
2.06.76 × 10−2(31.3, 0.798)0.4930.6700.8680.128
2.54.12 × 10−2(26.5, 0.575)0.4750.7500.8520.145
3.02.41 × 10−2(23.2, 0.408)0.4660.8340.8290.168
3.51.32 × 10−2(20.1, 0.275)0.4490.9190.8030.195
4.06.93 × 10−3(17.7, 0.184)0.4431.010.7720.226
4.53.15 × 10−3(16.4, 0.115)0.4341.100.6980.300
5.01.14 × 10−3(14.6, 0.065)0.4271.210.5960.402
5.53.29 × 10−4(12.9, 0.036)0.4231.320.4670.531
6.03.23 × 10−5(10.8, 0.017)0.4211.450.2400.759
Parameters for N = 1012 and ξ = 10−3.0
0.52.09 × 10−1(29.4, 1.71)0.5130.4740.9060.089
1.01.32 × 10−1(21.7, 1.25)0.4820.5540.9090.086
1.58.23 × 10−2(16.9, 0.928)0.4620.6330.9090.086
2.04.92 × 10−2(13.8, 0.689)0.4500.7120.8990.096
2.52.74 × 10−2(11.5, 0.502)0.4440.7970.8880.107
3.01.36 × 10−2(9.82, 0.355)0.4420.8860.8580.137
3.55.28 × 10−3(8.26, 0.237)0.4460.9890.8340.161
4.01.17 × 10−3(7.13, 0.151)0.4581.100.7010.293

Peer review information: Nature Communications thanks Anthony Leverrier and the other, anonymous, reviewer(s) for their contribution to the peer review of this work. Peer reviewer reports are available.
Publisher’s note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Supplementary information is available for this paper at 10.1038/s41467-020-19916-1.

Acknowledgements

This work was supported by Cross-ministerial Strategic Innovation Promotion Program (SIP) (Council for Science, Technology and Innovation (CSTI)); CREST (Japan Science and Technology Agency) JPMJCR1671; JSPS KAKENHI Grant Number JP18K13469.

Author contributions

T.M., K.M., T.S. and M.K. contributed to the initial conception of the ideas, to the working out of details, and to the writing and editing of the manuscript.

Data availability

Data sharing not applicable to the article as no datasets were generated or analyzed during the current study.

Code availability

Computer codes to calculate the key rates are available from the corresponding author upon reasonable request.

Competing interests

The authors declare no competing interests.

References

1. 

Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175 (India, 1984).

2. 

3. 

4. 

5. 

    Grosshans F, Grangier P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett.2002. 88: 057902 doi: 10.1103/PhysRevLett.88.057902

6. 

    Xu F, Ma X, Zhang Q, Lo H-K, Pan J-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys.2020. 92: 025002 doi: 10.1103/RevModPhys.92.025002

7. 

Pirandola, S. et al. Advances in quantum cryptography. Preprint at https://arxiv.org/abs/1906.01645 (2019).

8. 

    Eriksson TA, . Wavelength division multiplexing of 194 continuous variable quantum key distribution channels. J. Lightwave Technol.2020. 38: 2214-2218 doi: 10.1109/JLT.2020.2970179

9. 

    Huang D, . Continuous-variable quantum key distribution with 1 Mbps secure key rate. Opt. Express2015. 23: 17511-17519 doi: 10.1364/OE.23.017511

10. 

    Kumar R, Qin H, Alléaume R. Coexistence of continuous variable QKD with intense DWDM classical channels. N. J. Phys.2015. 17: 043027 doi: 10.1088/1367-2630/17/4/043027

11. 

    Huang D, . Field demonstration of a continuous-variable quantum key distribution network. Opt. Lett.2016. 41: 3511-3514 doi: 10.1364/OL.41.003511

12. 

Karinou, F. et al. Experimental evaluation of the impairments on a QKD system in a 20-channel WDM co-existence scheme. In 2017 IEEE Photonics Society Summer Topical Meeting Series (SUM), 145–146 (IEEE, 2017).

13. 

    Karinou F, . Toward the integration of CV quantum key distribution in deployed optical networks. IEEE Photonics Technol. Lett.2018. 30: 650-653 doi: 10.1109/LPT.2018.2810334

14. 

Eriksson, T. A. et al. Coexistence of continuous variable quantum key distribution and 7 × 12.5 Gbit/s classical channels. In 2018 IEEE Photonics Society Summer Topical Meeting Series (SUM), 71–72 (IEEE, 2018).

15. 

    Eriksson TA, . Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels. Commun. Phys.2019. 2: 1-8 doi: 10.1038/s42005-018-0105-5

16. 

    Grosshans F, . Quantum key distribution using gaussian-modulated coherent states. Nature2003. 421: 238-241 doi: 10.1038/nature01289

17. 

18. 

    Diamanti E, Leverrier A. Distributing secret keys with quantum continuous variables: principle, security and implementations. Entropy2015. 17: 6072-6092 doi: 10.3390/e17096072

19. 

    Laudenbach F, . Continuous-variable quantum key distribution with gaussian modulation – the theory of practical implementations. Adv. Quantum Technol.2018. 1: 1800011 doi: 10.1002/qute.201800011

20. 

    Navascués M, Grosshans F, Acin A. Optimality of gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett.2006. 97: 190502 doi: 10.1103/PhysRevLett.97.190502

21. 

    García-Patrón R, Cerf NJ. Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett.2006. 97: 190503 doi: 10.1103/PhysRevLett.97.190503

22. 

    Leverrier A. Security of continuous-variable quantum key distribution via a gaussian de Finetti reduction. Phys. Rev. Lett.2017. 118: 200501 doi: 10.1103/PhysRevLett.118.200501

23. 

    Jouguet P, Kunz-Jacques S, Diamanti E, Leverrier A. Analysis of imperfections in practical continuous-variable quantum key distribution. Phys. Rev. A2012. 86: 032309 doi: 10.1103/PhysRevA.86.032309

24. 

Kaur, E., Guha, S. & Wilde, M. M. Asymptotic security of discrete-modulation protocols for continuous-variable quantum key distribution. Preprint at https://arxiv.org/abs/1901.10099 (2019).

25. 

    Silberhorn C, Ralph TC, Lütkenhaus N, Leuchs G. Continuous variable quantum cryptography: Beating the 3 dB loss limit. Phys. Rev. Lett.2002. 89: 167901 doi: 10.1103/PhysRevLett.89.167901

26. 

    Hirano T, Yamanaka H, Ashikaga M, Konishi T, Namiki R. Quantum cryptography using pulsed homodyne detection. Phys. Rev. A2003. 68: 042331 doi: 10.1103/PhysRevA.68.042331

27. 

    Leverrier A, Grangier P. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett.2009. 102: 180504 doi: 10.1103/PhysRevLett.102.180504

28. 

    Leverrier A, Grangier P. Erratum: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett.2011. 106: 259902 doi: 10.1103/PhysRevLett.106.259902

29. 

    Zhao Y-B, Heid M, Rigas J, Lütkenhaus N. Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks. Phys. Rev. A2009. 79: 012307 doi: 10.1103/PhysRevA.79.012307

30. 

    Brádler K, Weedbrook C. Security proof of continuous-variable quantum key distribution using three coherent states. Phys. Rev. A2018. 97: 022310 doi: 10.1103/PhysRevA.97.022310

31. 

    Lin J, Upadhyaya T, Lütkenhaus N. Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution. Phys. Rev. X2019. 9: 041064

32. 

    Ghorai S, Grangier P, Diamanti E, Leverrier A. Asymptotic security of continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. X2019. 9: 021059

33. 

Papanastasiou, P. & Pirandola, S. Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective gaussian attacks. Preprint at https://arxiv.org/abs/1912.11418 (2019).

34. 

    Samsonov E, . Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis. Sci. Rep.2020. 10: 1-9 doi: 10.1038/s41598-020-66948-0

35. 

    Tamaki K, Koashi M, Imoto N. Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett.2003. 90: 167904 doi: 10.1103/PhysRevLett.90.167904

36. 

    Koashi M. Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. Phys. Rev. Lett.2004. 93: 120501 doi: 10.1103/PhysRevLett.93.120501

37. 

    Shor PW, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett.2000. 85: 441 doi: 10.1103/PhysRevLett.85.441

38. 

    Lo HK, Chau HF. Unconditional security of quantum key distribution over arbitrarily long distances. Science1999. 283: 2050-2056 doi: 10.1126/science.283.5410.2050

39. 

Chabaud, U., Douce, T., Grosshans, F., Kashefi, E. & Markham, D. Building trust for continuous variable quantum states. Preprint at https://arxiv.org/abs/1905.12700 (2019).

40. 

    Hayashi M, Tsurumaru T. Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths. N. J. Phys.2012. 14: 093014 doi: 10.1088/1367-2630/14/9/093014

41. 

    Koashi M. Simple security proof of quantum key distribution based on complementarity. N. J. Phys.2009. 11: 045018 doi: 10.1088/1367-2630/11/4/045018

42. 

    Azuma K. Weighted sums of certain dependent random variables. Tohoku Math. J.1967. 19: 357-367 doi: 10.2748/tmj/1178243286

43. 

    Namiki R, Hirano T. Practical limitation for continuous-variable quantum cryptography using coherent states. Phys. Rev. Lett.2004. 92: 117901 doi: 10.1103/PhysRevLett.92.117901

44. 

    Hirano T, . Implementation of continuous-variable quantum key distribution with discrete modulation. Quantum Sci. Technol.2017. 2: 024010 doi: 10.1088/2058-9565/aa7230

45. 

    Diamond S, Boyd S. CVXPY: A Python-embedded modeling language for convex optimization. J. Mach. Learn. Res.2016. 17: 1-5

46. 

    Agrawal A, Verschueren R, Diamond S, Boyd S. A rewriting system for convex optimization problems. J. Control Decis.2018. 5: 42-60 doi: 10.1080/23307706.2017.1397554

47. 

    Jouguet P, Kunz-Jacques S, Leverrier A, Grangier P, Diamanti E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics2013. 7: 378-381 doi: 10.1038/nphoton.2013.63

48. 

    Devetak I, Winter A. Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A: Math., Phys. Eng. Sci.2005. 461: 207-235 doi: 10.1098/rspa.2004.1372

49. 

Abramowitz, M. & Stegun, I. A. Handbook of Mathematical Functions With Formulas, Graphs, and Mathematical Tables, vol. 55 (US Government printing office, 1948).

50. 

51. 

    Matsuura T, Sasaki T, Koashi M. Refined security proof of the round-robin differential-phase-shift quantum key distribution and its improved performance in the finite-sized case. Phys. Rev. A2019. 99: 042303 doi: 10.1103/PhysRevA.99.042303

52. 

    Raginsky M, Sason I. Concentration of measure inequalities in information theory, communications, and coding. Found. Trends Commun. Inf. Theory2013. 10: 1-246 doi: 10.1561/0100000064

53. 

McDiarmid, C.Concentration, 195–248. Probabilistic methods for algorithmic discrete mathematics (Springer, 1998).

54. 

55. 

    Pirandola S, Laurenza R, Ottaviani C, Banchi L. Fundamental limits of repeaterless quantum communications. Nat. Commun.2017. 8: 1-15 doi: 10.1038/ncomms15043