Discrete-modulation continuous-variable quantum key distribution with probabilistic amplitude shaping over a linear quantum channel

📅 2026-03-03
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work proposes a discrete-modulation-based continuous-variable quantum key distribution (CV-QKD) protocol to address the experimental challenges associated with Gaussian modulation in the GG02 protocol. By integrating probabilistic amplitude shaping with quadrature amplitude modulation for the first time, and employing homodyne detection together with reverse reconciliation, the scheme is proven unconditionally secure against collective attacks. Theoretical analysis demonstrates that, in the asymptotic limit of infinite key length, the protocol achieves performance closely approaching the GG02 benchmark in terms of maximum secret key rate, transmission distance, and noise tolerance, while substantially enhancing practical feasibility for real-world implementation.

Technology Category

Application Category

📝 Abstract
The practical implementation difficulties arising from the Gaussian modulation of the GG02 protocol lead us to investigate the possibilities offered by the combination of probabilistic amplitude shaping technique and quadrature amplitude modulation formats in the context of continuous variable quantum key distribution systems. Our interest comes from the fact that quadrature amplitude modulation and probabilistic shaping can be implemented with current technologies and are widely used in classical telecom equipment. In this treatment, we assume to work in the scenario of a linear quantum channel and we analyze maximum achievable secure key rates, maximum reachable distances and the resilience to noise of our discrete-modulation based protocol with respect to GG02, which is taken as a benchmark. In particular, we deal with the infinite key size regime, consider a homodyne detection scheme, and analyze what happens for different cardinalities of the input alphabet at different distances, in the case of collective attacks and in the reverse reconciliation picture. We find that our protocol, beyond being easily reproducible in the laboratory, provides a way to closely approach the theoretical performance offered by GG02 and, at the same time, preserves the ability to assure an unconditional security level.
Problem

Research questions and friction points this paper is trying to address.

continuous-variable quantum key distribution
discrete modulation
probabilistic amplitude shaping
GG02 protocol
practical implementation
Innovation

Methods, ideas, or system contributions that make the work stand out.

probabilistic amplitude shaping
discrete modulation
continuous-variable quantum key distribution
quadrature amplitude modulation
unconditional security
🔎 Similar Papers
No similar papers found.
E
Emanuele Parente
Telecommunications, Computer Engineering, and Photonics (TeCIP) Institute, Scuola Superiore Sant'Anna, Pisa, Italy
M
Michele N. Notarnicola
Department of Optics, Palacký University, 779 00 Olomouc, Czech Republic
S
Stefano Olivares
Dipartimento di Fisica “Aldo Pontremoli”, Università degli Studi di Milano, I-20133 Milano, Italy; and INFN, Sezione di Milano, I-20133 Milano, Italy
E
Enrico Forestieri
Telecommunications, Computer Engineering, and Photonics (TeCIP) Institute, Scuola Superiore Sant'Anna, Pisa, Italy; and National Laboratory of Photonic Networks, CNIT, Pisa, Italy
Luca Potì
Luca Potì
Consorzio Nazionale Interuniversitario per le Telecomunicazioni
TelecommunicationsOptical communications
M
Marco Secondini
Telecommunications, Computer Engineering, and Photonics (TeCIP) Institute, Scuola Superiore Sant'Anna, Pisa, Italy; and National Laboratory of Photonic Networks, CNIT, Pisa, Italy