Professional Documents
Culture Documents
(Received 9 July 2020; revised 19 October 2020; accepted 22 October 2020; published 9 December 2020)
DOI: 10.1103/PhysRevApplied.14.064030
reason is that the previous method used in the Gaus- Sec. V. We show the simulation results without postselec-
sian modulation protocols relies on the fact [35,36] that tion in Sec. VI and with postselection in Sec. VII. Finally,
Eve’s optimal attacks for Gaussian modulation schemes we summarize the results and provide insights for future
correspond to Gaussian channels, which make it easy to directions in Sec. VIII. We present technical details in the
decouple the trusted detector noise from the channel noise Appendices.
when one looks at the covariance matrix. However, we
cannot assume Gaussian channels here since Gaussian
attacks are not expected to be optimal for discrete mod- II. BACKGROUND
ulation schemes. In our analysis, based on a (commonly
used) quantum optical model of the imperfect detector, Our key-rate calculation in the trusted detector noise
we find its corresponding mathematical description in scenario uses a similar proof method as in our previous
terms of positive operator-valued measure (POVM) and work [31]; that is, we numerically perform the key-rate
then use this POVM to construct observables correspond- optimization problem [39] with a modified set of con-
ing to quantities that are measured experimentally. These straints. In particular, we discuss how to modify the key-
observables are then used in our security proof. We also rate optimization problem in Sec. IV based on the POVM
point out the crucial difference between our analysis and description of a noisy heterodyne detector in Sec. III. To
Ref. [37] for discrete modulation schemes: Our asymptotic help understand this modification, we first review main
analysis is valid against arbitrary collective attacks while ideas of the proof in Ref. [31].
Ref. [37] uses the Gaussian channel assumption and thus For illustration, we focus on the quadrature phase-shift
its security analysis [37] is restricted to Gaussian collective keying scheme with heterodyne detection. We remark that
attacks. since the previous proof can be generalized to other dis-
Our main contributions of this work are finding a suit- crete modulation schemes beyond four coherent states at
able POVM description of a noisy heterodyne detector and the cost of more computational resources, our modified
revising our previous analysis [31] by using a new set of analysis for the trusted detector noise scenario can also
constraints from this POVM in the numerical key-rate opti- be generalized in the same way. Moreover, one can apply
mization problem [38,39]. Similar to our previous analysis, a similar idea presented in this paper to study the homo-
this method is applicable to both direct reconciliation and dyne detection scheme in the presence of trusted detector
reverse reconciliation schemes. Moreover, we study the noise.
postselection of data [8] in the trusted detector noise sce-
nario. As a concrete example, we apply our method to
the quadrature phase-shift keying scheme with heterodyne A. Quadrature phase-shift keying protocol
detection and focus on the reverse reconciliation scheme. To begin with, we review the quadrature phase-shift
Our analysis here is still restricted to the asymptotic regime keying (QPSK) scheme with heterodyne detection. The
against collective attacks and we make the same photon- quantum part of the protocol consists of many repetitions
number cutoff assumption as in the previous works [30,31] of the following two steps: (1) Alice obtains a uniform
to truncate the infinite-dimensional Hilbert space in order random number x ∈ {0, 1, 2, 3}, selects the state |αx =
to perform the numerical calculation. From the numeri- |αeixπ/2 from the set {|α , |iα , |−α , |−iα} according
cal observation, we believe the results do not depend on to the value of x, and sends it to Bob. (2) Bob applies
the choice of cutoff when it is appropriately chosen. We the heterodyne detection to the received state and obtains
direct the discussion about this assumption to Sec. III B of a measurement outcome y ∈ C.
Ref. [31] and leave it for future work to provide an analyt- After the quantum-communication phase of the proto-
ical justification of this assumption beyond the numerical col, they proceed with the classical postprocessing part of
evidences. To extend our analysis to the finite-key regime, the protocol including announcement, sifting, parameter
we remark that we have recently extended the numeri- estimation, key map (with discretization), error correction,
cal method of Ref. [39] on which our analysis is based and privacy amplification. In particular, the parameter esti-
to include finite-key analysis [40]. However, there remain mation step is done according to the key-rate optimization
some technical challenges to solve before we can apply this problem in Eq. (22) discussed later. As the classical part is
method to this protocol and thus we leave the finite-key similar to other CVQKD protocols and is not the focus of
analysis for future work. our discussion, we highlight only the key-map step below
The rest of paper is outlined as follows. In Sec. II, we for our discussion and skip the details of the remaining
review the protocol and proof method in Ref. [31]. We then classical postprocessing procedures here. We direct readers
present a trusted detector noise model and the correspond- to Ref. [31] for a more detailed description.
ing POVM description in Sec. III. In Sec. IV, we modify In the case of reverse reconciliation, for each mea-
the key-rate optimization problem to take trusted detector surement outcome y written as y = |y|eiθ , where θ ∈
noise into account. We discuss our simulation method in [−π/4, 7π /4), Bob obtains a discretized value z according
064030-2
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
064030-3
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
1 i
q̂ = √ (↠+ â), p̂ = √ (↠− â). (7)
2 2
064030-4
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
detector. An alternative view of the electronic noise is that electronic noise, which is equivalent to sending one mode
we can think about the detector as being a perfect detec- of a two-mode squeezed vacuum state (EPR state) to the
tor followed by some classical postprocessing of the data, beam splitter. Each quadrature’s variance of this ancillary
which adds noise. One should note that in a trusted device thermal state is related to the value of electronic noise
scenario, the characterization of the actual noise should νj . More specifically, it is [1 + νj /(1 − ηj )]N0 [11], where
be experimentally verified. Our physical model is chosen N0 = 1/2 denotes the shot-noise variance. In Fig. 2, we
for convenience of calculating the POVM of the actual choose to parametrize the thermal state in terms of its mean
measurement. We depict this physical model of a noisy photon number as n̄j = νj /[2(1 − ηj )] instead of the vari-
heterodyne detector in Fig. 2. In this diagram, we con- ance of each quadrature, which is convenient for writing
sider a more general case where two homodyne detectors of expressions in later sections [47]. We note that this way
have different imperfections. We label the efficiency of the of modeling electronic noise is valid when ηj = 1. Fur-
homodyne detector used for q quadrature measurement as thermore, we assume ηj = 0. That is, we consider the case
η1 and its electronic noise as ν1 (expressed in shot-noise ηj ∈ (0, 1), which is the case of a realistic detector of our
units). Similarly, the efficiency of the homodyne detector interest.
used for p quadrature measurement is labeled as η2 and its In the next section, we derive the POVM correspond-
electronic noise is labeled as ν2 . ing to this detector model. We then choose to consider a
Since our treatment for each homodyne detector in simplified scenario where these two homodyne detectors
this heterodyne setup is the same, we take one homo- are identical for the purpose of illustration and the ease of
dyne detector (shown in each dashed box in Fig. 2) as an numerical calculation. That is, we later assume they both
example and treat the other one similarly by using its cor- have the same detector efficiency η1 = η2 =: ηd and the
responding efficiency and electronic noise. An imperfect same electronic noise ν1 = ν2 =: νel .
homodyne detector with its efficiency ηj < 1 and elec-
tronic noise νj ≥ 0 (for j = 1 or 2) can be modeled by a
B. POVM description
beam splitter placed before a perfect homodyne detector
with the following specification. (1) The ratio of transmis- We use the Wigner function formulation to find the
sion to reflection of this beam splitter is ηj : 1 − ηj . (2) POVM {Gy : y ∈ C} corresponding to this noisy hetero-
One input port of this beam splitter is the signal pulse dyne detector model. When two homodyne detectors give
and the other input port is a thermal state used to model two real numbers qs and ps for q and p quadrature mea-
surements, we label the outcome as y = qs + ips . By con-
sidering Tr(ρGy ) for an arbitrary input density operator ρ
to the noisy heterodyne detector, we are able to find the
Wigner function WGy of the POVM element Gy as
1 2 1 1
WGy (γ ) = √
η1 η2 π π 1 + 2(1−η1 +ν1 ) 1 + 2(1−η2 +ν2 )
η 1 η 2
−2[Re(γ ) − √1 Re(y)]2
η1
× exp 2(1−η1 +ν1 )
1+ η1
−2[Im(γ ) − √1 Im(y)]2
η2
× exp 2(1−η2 +ν2 )
. (12)
1+ η2
064030-5
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
calculation and for the purpose of illustration. We dis- which serves as a basis for our modification in the trusted
cuss how to perform the calculation in the general case in detector noise scenario. The purpose of this reformulation
Appendix B. In this simple case, we set η1 = η2 = ηd and is that once we substitute the POVM of the noisy hetero-
ν1 = ν2 = νel in Eq. (12). This equation is simplified to be dyne detector in place of the one for the ideal heterodyne
⎡ 2
⎤ detector, we can easily formulate the optimization prob-
1 2 1 −2|γ − √yη | lem in the trusted detector noise scenario. Specifically,
WGy (γ ) = exp ⎣ d ⎦. we change Bob’s POVM {MyB } from the ideal heterodyne
ηd π π 1 + 2(1−ηd +νel ) 1 + 2(1−ηd +νel )
ηd ηd
detection {Ey = π1 |y y|} to the POVM description of the
(13) noisy heterodyne detection {Gy } found in Eq. (14). More-
over, compared with our previous work [31], some con-
One can observe that it is the Wigner function of a dis-
straints are modified to match with how data are processed
placed thermal state apart from the prefactor 1/(ηd π ).
in a typical experiment.
Therefore, the POVM element Gy in this case is a scaled
projection onto a displaced thermal state. More precisely,
A. Reformulation of the optimization problem in the
1 y 1 − ηd + νel y untrusted detector noise scenario
Gy = D̂ √ ρth †
D̂ √ ,
ηd π ηd ηd ηd We reconsider the key-rate optimization problem in the
(14) untrusted detector noise scenario by rewriting region oper-
√ ators in Eq. (9) and observables in Eq. (8) in terms of the
where D̂(y/ ηd ) is the displacement operator with the POVM of an ideal heterodyne detector {Ey }. In the case
√
amount of displacement y/ ηd and ρth [(1 − ηd + νel )/ηd ] of ideal heterodyne detection, the POVM description of
is a thermal state with the mean photon number (1 − ηd + Bob’s measurement {MyB } is MyB = Ey = (1/π )|y y|, the
νel )/ηd , which can be expressed in the photon-number projection onto a coherent state |y. By writing y = reiθ in
basis as the polar coordinate and integrating over the correspond-
∞
n̄n ing region Aj , we obtain Eq. (9). If we rewrite Eq. (9) in
ρth (n̄) = |n n|. (15) terms of MyB , we see region operators Rj ’s are defined by
n=0
(1 + n̄)n+1
064030-6
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
In general, one may be interested in a quantity like In the trusted detector noise scenario, we need to substi-
f (y, y ∗ )P(y)d2 y where f (y, y ∗ ) is a real-valued func- tute MyB in Eqs. (16) and (18) by Gy . To distinguish opera-
tion on y and y ∗ such that the integral converges. Such tors defined in this way from the first and second moment
a quantity can be described as the expectation value of an of quadrature operators q̂ and p̂, we call first-moment
observable that is defined in the following way: observables F̂Q and F̂P and second-moment observables
ŜQ and ŜP . More explicitly, they are defined as
Ô = f (y, y ∗ )MyB d2 y (18)
y + y∗
F̂Q = √ Gy d2 y,
2
since ∗
i(y − y)
F̂P = √ Gy d2 y,
∗ 2
Tr[ρ Ô] = d y f (y, y
2
)Tr(ρMyB ) (21)
y + y∗ 2
ŜQ = √ Gy d2 y,
= d2 y f (y, y ∗ )P(y). (19) 2
∗
i(y − y) 2
ŜP = √ Gy d2 y.
In other words, operators constructed in this way corre- 2
spond to expectation values f (y, y ∗ )P(y)d2 y obtained
in an experiment. By comparing Eq. (19) to Eq. (17) Then the revised key-rate optimization problem becomes
and identifying P(y) by Qx (y), we observe the following
choices of f (y, y ∗ ) for q̂, p̂, n̂, and d̂: minimize D(G (ρAB ) Z [G (ρAB )])
subject to
∗y + y∗
q̂ ←→f (y, y ) = √ , Tr[ρAB (|x x|A ⊗ F̂Q )] = px F̂Q x ,
2
∗
i(y − y) Tr[ρAB (|x x|A ⊗ F̂P )] = px F̂P x ,
p̂ ←→f (y, y ∗ ) = √ , (20)
2 Tr[ρAB (|x x|A ⊗ ŜQ )] = px ŜQ x ,
n̂ ←→f (y, y ∗ ) = |y|2 − 1, (22)
Tr[ρAB (|x x|A ⊗ ŜP )] = px ŜP x ,
d̂ ←→f (y, y ∗ ) = y 2 + (y ∗ )2 . Tr[ρAB ] = 1,
064030-7
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
064030-8
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
VI. KEY RATE IN THE ABSENCE OF Bob’s side, to treat νel as a part of channel excess noise in
POSTSELECTION the untrusted detector noise scenario, one needs to define
the effective value of ξ to include the value of νel . For
In this section, we present results when no postselection
the effective value ξeff , the electronic noise νel needs to be
is performed, that is, a = 0. We make two comparisons.
scaled by a factor of 1/ηt (in addition to 1/ηd ), which is
The first one is to compare key rates in the trusted and
large for slightly long distances as ηt becomes small. As a
untrusted detector noise scenarios. The second one is to
result, the redefined value ξeff of ξ is quite large as shown
analyze how different imperfections in detectors affect key
in Fig. 3 and this behavior of key rate is then expected. By
rates in the trusted detector noise scenario.
the observation made from this figure, it is not surprised
that for a larger value of electronic noise, the key rate in
A. Comparison between trusted and untrusted the untrusted detector noise scenario would drop to zero at
detector noise scenarios an even shorter distance.
For this comparison, we supply the same set of simu-
lated data from Eq. (26) to the optimization problem for B. Detector imperfection in the trusted detector noise
the untrusted detector noise scenario in Eq. (8) and the one scenario
for the trusted detector noise scenario in Eq. (22). For sim- To guide the experimental implementation of the QPSK
ulation, we choose parameters ηd = 0.719, νel = 0.01 from scheme, we may be interested in the robustness of the
Ref. [14] for illustration. The result is shown in Fig. 3. protocol in the presence of detector inefficiency and elec-
As we can see from this figure, the key rate of the tronic noise in the trusted detector noise scenario. For this
untrusted detector noise scenario drops quickly at a short purpose, we investigate the effects of different levels of
distance less than 20 km even though the electronic noise is detector efficiency and electronic noise on the key rate. For
only 0.01 SNU, which is a low value compared to detectors curves in Figs. 4 and 5, our simulation uses the same chan-
used in many other CV experiments. On the other hand, nel model but different detector imperfections, that is, in
the key rate in the trusted detector noise scenario extends Eq. (26), the same values of channel parameters ηt and ξ
to much longer distances, which exhibits a similar behav- but different values of detector efficiency ηd and electronic
ior as the results shown in Ref. [31] when the detector is noise νel (as specified in the captions) for different curves.
treated as ideal. One explanation for this behavior is that In Fig. 4, we choose values of ηd and νel for a homodyne
in Ref. [31], we observe that the key rate for the QPSK detector from two experiments [12,14] and compare these
scheme drops quickly when the channel excess noise ξ results with the ideal detector. For the comparison, we opti-
is large. Since the value of ξ is reported at the input of mize α via a coarse-grained search for each distance. We
the quantum channel while the value of νel is measured at
eff
el
el
el
FIG. 3. Secure key rate versus the transmission distance for FIG. 4. Secure key rate versus transmission distance for differ-
untrusted detector noise (black diamonds) and trusted detec- ent detector imperfections reported in experiments in a compar-
tor noise (red stars) scenarios. The excess noise is ξ = 0.01 at ison to the ideal detector. Other parameters are the excess noise
the input of the quantum channel. Parameters for detector are ξ = 0.01, error-correction efficiency β = 0.95, and the trans-
ηd = 0.719, νel = 0.01 [14]. The error-correction efficiency is mittance ηt = 10−0.02L for each distance L in kilometers. For
β = 0.95. The coherent state amplitude is optimized via a coarse- each distance, the coherent-state amplitude α is optimized via a
grained search over the interval [0.5, 0.9] with a step size of 0.05 coarse-grained search in the interval [0.5, 0.9] with a step size of
and the channel transmittance is ηt = 10−0.02L for each distance L 0.05. Black curve with diamond markers is for the ideal hetero-
in kilometers. The effective channel excess noise in the untrusted dyne detector; red curve with star markers is for the detector used
detector scenario is shown with the y axis on the right. At 20 km, in Ref. [14]; cyan curve with square markers is for the detector
the effective channel excess noise ξeff is roughly 0.045. used in Ref. [12].
064030-9
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
(a)
el
el
(b) FIG. 6. Secure key rate versus the detector efficiency ηd for
a fixed value of total transmittance η := ηt ηd = 0.3155. This
figure studies the trade-off between the key rate and the amount
of trusted loss. Other parameters are the excess noise ξ = 0.01,
the electronic noise νel = 0.01, and the error-correction effi-
ciency β = 0.95. We include two curves for different choices of
coherent-state amplitude α.
064030-10
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
(a) (b)
064030-11
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
studied in this work. However, there remain technical chal- APPENDIX A: DERIVATION OF NOISY
lenges to solve before such an analysis can be carried out HETERODYNE DETECTION POVM VIA WIGNER
and thus we leave the finite-key analysis for future work. FUNCTIONS
The second limitation is the same photon-number cutoff
1. Basic Wigner functions
assumption used in Refs. [30,31]. While numerical evi-
dences show that our results are stable when the cutoff As we use the Wigner function approach for our deriva-
photon number is chosen appropriately, we plan to have a tion, we recall useful expressions from Ref. [56] for later
more rigorous analysis on the effects of truncation beyond references.
numerical evidences in future work. Thirdly, we present To calculate Tr(FG) for two operators F and G in terms
simulation results in a simple scenario where two homo- of their Wigner functions WF and WG , the overlap formula
dyne components are treated as identical. This scenario is is
commonly assumed in previous studies of Gaussian mod-
ulation schemes. In the simple scenario, we are able to Tr(FG) = π d2 α WF (α)WG (α). (A1)
provide simplified expressions for region operators and
observables used in the key-rate optimization problem. We can easily generalize the formula to multimode cases.
However, our principles presented in this paper work for The input-output Wigner functions under a beam-splitter
the general case where two detectors are not identical. To transformation whose transmittance is η are related by
handle the general case, one may perform the numerical √ √
integration of POVM element Gy ’s to find necessary oper- Wout (α, β) = Win ( ηα + 1 − ηβ, 1 − ηα − ηβ).
ators in the photon-number basis from the photon-number (A2)
basis representation of each POVM element Gy shown in We list Wigner functions of some quantum states that are
Appendix B 2. It may become numerically demanding to relevant for our discussions here. The Wigner function of
perform these integrals. Alternatively, one may attempt to a vacuum state |0 is
simplify expressions analytically similar to what we have
done for the simple case. It remains as a technical ques- 2 −2|γ |2
W|0 (γ ) = e . (A3)
tion to efficiently compute the matrix elements of operators π
defined in terms of Gy in the photon-number basis, which The Wigner function of a thermal state ρth (n̄) with the
we expect can be solved. Nevertheless, this current limi- mean photon number n̄ is
tation does not affect the principles and methodology we
present in this work about the treatment of trusted detector 2 1 2
Wρth (n̄) (γ ) = e−2|γ | /(1+2n̄) . (A4)
noise. It is also expected that observations in the general π 1 + 2n̄
case will be similar to observations we make here in the
simple case. The Wigner function of a displaced thermal state (DTS)
Finally, we remark on the generality of our method of ρDTS (α, n̄) := D̂(α)ρth (n̄)D̂† (α) with the amount of dis-
treating trusted detector noise. If a different physical model placement α is
of a detector is adopted (which needs to be verified exper- 2 1 2
imentally), we expect that a similar method as described WρDTS (α,n̄) (γ ) = e−2|γ −α| /(1+2n̄) . (A5)
π 1 + 2n̄
here can be used to find a correct POVM description for
the given physical model and then this POVM can be used We notice that if we set α = 0, it reduces to Eq. (A4).
in the security analysis. It is also useful to note the Wigner functions of a
squeezed thermal state (STS) and of a displaced squeezed
thermal state (DSTS). Let Ŝ(ξ ) denote the squeezing oper-
ACKNOWLEDGMENTS ator with a squeezing parameter ξ . For our discussion, we
We thank Mi Zou and Feihu Xu for helpful discussions restrict ξ ∈ R. For a squeezed thermal state ρSTS (ξ , n̄) :=
related to experiments. We also thank Twesh Upadhyaya Ŝ(ξ )ρth (n̄)Ŝ † (ξ ), its Wigner function reads [see, e.g., Eq.
for code review. The work is performed at the Institute (4.13) of Ref. [57] ]
for Quantum Computing (IQC), University of Waterloo,
2 1
which is supported by Industry Canada. J.L. acknowledges WρSTS (ξ ,n̄) (γ ) =
the support of Mike and Ophelia Lazaridis Fellowship π 1 + 2n̄
2ξ
from IQC. The research has been supported by NSERC e Re(γ )2 + e−2ξ Im(γ )2
under the Discovery Grants Program, Grant No. 341495, × exp −2 .
1 + 2n̄
and under the Collaborative Research and Development (A6)
Program, Grant No. CRDP J 522308-17. Financial sup-
port for this work has been partially provided by Huawei The Wigner function of a displaced squeezed thermal
Technologies Canada Co., Ltd. state ρDSTS (α, ξ , n̄) := D̂(α)Ŝ(ξ )ρth (n̄)Ŝ † (ξ )D̂† (α) can be
064030-12
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
1
P(y) = π 4 d2 α d2 β d2 γ d2 ω Wout (α, β, γ , ω)WHRe(y) (α)WHIm(y) (β)
π2
√ α+β
= π2 d2 α Wρ (α) d2 βW|0 (β) d2 γ Wρth (n̄1 ) (γ )WHRe(y) ( η1 √ + 1 − η1 γ )
2
√ α − β
× d2 ωWρth (n̄2 ) (ω)WHIm(y) ( η2 √ + 1 − η2 ω). (A8)
2
064030-13
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
The next step is to substitute the Wigner function of the variable γ . This integration shown in Eq. (A10) is actually
vacuum state in Eq. (A3) and that of the thermal state in similar to the integration that we just did in Eq. (A9).
Eq. (A4) and then to perform the integrals over variables
β, γ , and ω. We first integrate over the variable ω. The √ α+β
relevant integral that involves the variable ω is d2 γ Wρth (n̄1 ) (γ )WHRe(y) ( η1 √ + 1 − η1 γ )
2
1 1
√ α−β = √ √
d2 ωWρth (n̄2 ) (ω)WHIm(y) ( η2 √ + 1 − η2 ω) π π (1 − η1 )(1 + 2n̄1 )
2
η Re(β) − √1 Re(y) + Re(α)2
1 1 1 η1
= √ √ × exp − .
π π (1 − η2 )(1 + 2n̄2 ) (1 + 2n̄1 )(1 − η1 )
η [Im(β) + √1 Im(y) − Im(α)]2 (A10)
2 η2
× exp − . (A9)
(1 + 2n̄2 )(1 − η2 ) Finally, we integrate over the variable β. We now
need to substitute results of Eqs. (A9) and (A10)
Next, we perform the integral related to the variable γ . back to Eq.√ (A8). The prefactor is simplified to be
Since Eq. (A9) does not involve the variable γ , we do not (1/π 3 )[1/ (1 − η1 )(1 + 2n̄1 )(1 − η2 )(1 + 2n̄2 )]. Except
need to plug it back to solve the integral that involves the this prefactor, we perform the following integral:
2 2
η1 Re(β) − √1 Re(y) + Re(α) η2 Im(β) + √1 Im(y) − Im(α)
η1 η2
d2 βW|0 (β) exp − exp −
(1 + 2n̄1 )(1 − η1 ) (1 + 2n̄2 )(1 − η2 )
(1 + 2n̄1 )(1 + 2n̄2 )(1 − η1 )(1 − η2 )
=2
[1 + (1 − η1 ) + 4n̄1 (1 − η1 )][1 + (1 − η2 ) + 4n̄2 (1 − η2 )]
2 2
−2η1 √1 Re(y) − Re(α) −2η2 √1η Im(y) − Im(α)
η1 2
× exp + . (A11)
1 + (1 − η1 ) + 4n̄1 (1 − η1 ) 1 + (1 − η2 ) + 4n̄2 (1 − η2 )
Finally, by putting the prefactor back and expressing the final expression in a format of Gaussian functions, we obtain the
following result:
1 2 1 1
WGy (α) = √
η1 η2 π π 1 + 2(1−η1 )(1+2n̄1 ) 1 + 2(1−η2 )(1+2n̄2 )
η1 η2
2 2
−2 √1 Re(y) − Re(α) −2 √1 Im(y) − Im(α)
η1 η2
× exp 2(1−η1 )(1+2n̄1 )
+ . (A12)
1+ η
1 + 2(1−η2η)(1+2n̄2 )
1 2
By substituting in n̄1 = ν1 /[2(1 − η1 )] and n̄2 = ν2 / factor. To see this, we make the following definitions:
[2(1 − η2 )], we derive Eq. (12) after a straightforward
(1 − ηj )(1 + 2n̄j ) 1 − ηj + νj
simplification. λj := = for j = 1, 2,
ηj ηj
√
3. POVM elements (1 + 2λ1 )(1 + 2λ2 ) − 1
n̄het := ,
a. General case 2
1 1 + 2λ2
As we derive the Wigner function of an arbitrary POVM ξhet := ln ,
element Gy corresponding to the detector model in Fig. 2, 4 1 + 2λ1
we next show that the POVM elements Gy ’s are projec- 1 i
tions onto displaced squeezed thermal states up to a scaling αhet := √ Re(y) + √ Im(y). (A13)
η1 η2
064030-14
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
With these choices of parameters αhet , ξhet , and n̄het , Eq. (A12) can be rewritten as
2ξhet
1 2 1 e Re(γ − αhet )2 + e−2ξhet Im(γ − αhet )2
WGy (γ ) = √ exp −2 . (A14)
η1 η2 π π 1 + 2n̄het 1 + 2n̄het
By comparing the Wigner function of Gy in Eq. (A12) of region operators and observables for the optimization
and the Wigner function of a displaced squeezed problem to be done numerically.
thermal state in Eq. (A7), we can identify Gy =
√
[1/( η1 η2 π )]ρDSTS (αhet , ξhet , n̄het ) for the choices of 1. Simple case
parameters αhet , ξhet , and n̄het in Eq. (A13). Therefore, each
In this simple case where two homodyne detectors in the
Gy is a scaled projection onto a displaced squeezed ther-
heterodyne detection scheme have the same imperfection,
mal state with the displacement αhet , squeezing parameter
the POVM element Gy given in Eq. (14) in the photon-
ξhet and the mean photon number of the initial thermal state
number basis is expressed as [48]
before squeezing and displacement n̄het .
1 |y|2 n̄m
b. Simple case m| Gy |n = exp − d
ηd π ηd (1 + n̄d ) (1 + n̄d )n+1
If η1 = η2 = ηd and ν1 = ν2 = νel , it is easy to verify ∗ n−m 1/2
that Eq. (A12) reduces to Eq. (13). Then one can identify y m!
× √
each POVM element Gy is the projection onto a dis- ηd n!
placed thermal state with a prefactor 1/(ηd π ) in Eq. (14).
An alternative view is to look at the parameters αhet , ξhet , (n−m) |y|2
× Lm − , (B1)
and n̄het in Eq. (A13). In particular, since λ1 = λ2 , the ηd n̄d (1 + n̄d )
amount of squeezing ξhet becomes zero. Thus, by neglect-
ing squeezing in the POVM elements of the general case, where we define n̄d = (1 − ηd + νel )/ηd for ease of writ-
(j )
one can also conclude each POVM element is proportional ing and Lk (x) is the generalized Laguerre polynomial of
to the projection onto a displaced thermal state. One can degree k with a parameter j in the variable x. In particular,
√
further verify that the displacement is αhet = y/ ηd and the diagonal entries are simplified to be
the mean photon number of the initial thermal state n̄het
becomes (1 − ηd + νel )/ηd . 1 |y|2
n| Gy |n = exp −
ηd π ηd (1 + n̄d )
APPENDIX B: PHOTON-NUMBER BASIS
n
n̄d |y|2
REPRESENTATION OF OPERATORS × Ln − , (B2)
(1 + n̄d )n+1 ηd n̄d (1 + n̄d )
In this appendix, we show how to represent region oper-
ators as well as observables needed for the optimization
where Lk (x) = L(0)
k (x) is the Laguerre polynomial of
problem in Eq. (22) in the photon-number basis. By the
degree k in the variable x. For ease of writing
same discussion in Appendix B of Ref. [31], under the (n−m)/2+1
photon-number cutoff assumption, we need only to find later, we define Cm,n = [1/(π ηd )](m!/n!)1/2 [n̄m
d /(1
+ n̄d ) ].
n+1
N ÔN for an operator Ô with a cutoff photon number N .
Thus, we are interested in finding the expression m| Ô |n
a. Region operators
for 0 ≤ m, n ≤ N for each relevant operator Ô. When these
operators are represented in this finite-dimensional Hilbert Our goal here is to write region operators Rj =
2
space spanned by {|n : 0 ≤ n ≤ N }, we can then proceed y∈Aj Gy d y in the photon-number basis. For simplicity,
with numerical optimization to calculate the key rate. we work out the expressions in the absence of postse-
In Appendix B 1, our discussion is restricted to the sim- lection. To include the postselection, one may numeri-
plified scenario that we use in the main text for presenting cally integrate over the discarded region and subtract this
simulation results; that is, we set η1 = η2 = ηd and ν1 = result from the expression without postselection since this
ν2 = νel . Under this scenario, we present formulae that can numerical integration is efficiently computable in MAT-
be efficiently evaluated in MATLAB. We then discuss the LAB. We first consider off-diagonal elements (i.e., m =
general case where the imperfections in two homodyne n). In this case, we plug the expression of m| Gy |n in
detectors are not necessarily the same in Appendix B 2. Eq. (B1) into the definition of Rj in Eq. (16), write it in
For the general case, we provide the matrix representa- the polar coordinate with y = reiθ and perform the integra-
tion of the POVM elements Gy ’s and leave the evaluation tion over the phase θ to obtain the following expression:
064030-15
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
∞ (2j +1)π/4
m| Rj |n = dr r dθ m| Greiθ |n
0 (2j −1)π/4
∞
i[ei(m−n)(2j −1)π/4 − ei(m−n)(2j +1)π/4 ] r2 (n−m) r2
= Cm,n dr exp − L − rn−m+1 . (B3)
m−n 0 ηd (1 + n̄d ) m ηd n̄d (1 + n̄d )
Performing the integral over the variable r, we obtain the result in terms of Taylor series expansion of a simple function:
∞
r2 (n−m) r2
dr exp − L − rn−m+1
0 ηd (1 + n̄d ) m ηd n̄d (1 + n̄d )
1 n−m n−m
= [ηd (1 + n̄d )][(n−m)/2]+1 + 1 fm n̄d , n − m, , (B4)
2 2 2
where is the gamma function and fm (a, α, k) is defined as the Taylor series coefficients of the function below in the
variable t as
−(k+1) ∞
−α+k 1
(1 − t) 1− 1+ t = fn (a, α, k)tn . (B5)
a n=0
We note that the Taylor series coefficients here can be quickly found in MATLAB.
Now, we consider the diagonal entries of Rj (i.e., m = n). By substituting y = reiθ in Eq. (B2), we note that this
expression does not depend on θ . Thus, it is easy to see n| R0 |n = n| R1 |n = n| R2 |n = n| R3 |n . The integration
over the phase θ gives a factor of π/2. We proceed the integration over variable r and obtain
∞
π 1 r2 n̄nd r2
n| Rj |n = dr r exp − Ln −
2 ηd π 0 η(1 + n̄d ) (1 + n̄d )n+1 ηd n̄d (1 + n̄d )
n n
1 n̄d 1 1
= 1+ = . (B6)
4 (1 + n̄d )n n̄d 4
To include postselection, the common integral in the case m = n becomes
∞
r2 r2
dr exp − L(n−m) − rn−m+1
a η d (1 + n̄d ) m
η n̄
d d (1 + n̄d )
1 n − m n−m
= [ηd (1 + n̄d )][(n−m)/2]+1 + 1 fm n̄d , n − m,
2 2 2
a
r2 r2
− dr exp − L(n−m) − rn−m+1 , (B7)
0 η d (1 + n̄d ) m
η n̄
d d (1 + n̄d )
where the second term is efficiently computable numerically. The case for m = n follows similarly.
b. First-moment observables
We then proceed to evaluate the matrix elements of F̂Q and F̂P . In the photon-number basis, the matrix elements are
y + y∗
m| F̂Q |n = √ m| Gy |n d2 y
2
Cm,n ∞ r2 (n−m) r2 2π
= √ dr exp − L − rn−m+2 dθ e−i(n−m)θ (eiθ + e−iθ ),
2 0 ηd (1 + n̄d ) m ηd n̄d (1 + n̄d ) 0
i(y ∗ − y)
m| F̂P |n = √ m| Gy |n d2 y
2
iCm,n ∞ r2 (n−m) r2 2π
= √ dr exp − L − rn−m+2 dθ e−i(n−m)θ (e−iθ − eiθ ). (B8)
2 0 ηd (1 + n̄d ) m ηd n̄d (1 + n̄d ) 0
064030-16
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
As F̂Q is a Hermitian operator, we can first find entries m| F̂Q |n for m ≤ n. Then for m > n, we simply set m| F̂Q |n to
be the complex conjugate of n| F̂Q |m. From the integration over θ , the nonzero entries for m ≤ n are
√ ∞
r2 (1) r2
m| F̂Q |m + 1 = 2π Cm,m+1 dr exp − L − r3
0 ηd (1 + n̄d ) m ηd n̄d (1 + n̄d )
π
= √ Cm,m+1 [(1 + n̄d )ηd ]2 fm (n̄d , 1, 1). (B9)
2
c. Second-moment observables
Next, we evaluate the matrix elements of ŜQ and ŜP . In the photon-number basis, they are
2
y + y∗
m| ŜQ |n = √ m| Gy |n d2 y
2
Cm,n ∞ r2 (n−m) r2 2π
= dr exp − Lm − rn−m+3 dθ e−i(n−m)θ (eiθ + e−iθ )2 ,
2 0 ηd (1 + n̄d ) ηd n̄d (1 + n̄d ) 0
∗
i(y − y) 2
m| ŜP |n = √ m| Gy |n d2 y
2
Cm,n ∞ r2 r2 2π
=− dr exp − L(n−m) − r n−m+3
dθ e−i(n−m)θ (e−iθ − eiθ )2 . (B11)
2 0 ηd (1 + n̄d ) m ηd n̄d (1 + n̄d ) 0
Again, since ŜQ and ŜP are Hermitian operators, we only need to define the upper triangular part and then set the lower
triangular part using the Hermitian property. The relevant integrals are simplified to be
∞
r2 r2
m| ŜQ |m = 2π Cm,m dr exp − Lm − r3
0 ηd (1 + n̄d ) ηd n̄d (1 + n̄d )
= π Cm,m [ηd (1 + n̄d )]2 fm (n̄d , 0, 1),
∞ (B12)
r2 r2
m| ŜQ |m + 2 = π Cm,m+2 dr exp − L(2) − r5
0 η d (1 + n̄d ) m
η n̄
d d (1 + n̄d )
= π Cm,m+2 [ηd (1 + n̄d )]3 fm (n̄d , 2, 2).
064030-17
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
2. General case
We consider the general case where two homodyne
detectors may have different imperfections. In this case, [1] C. H. Bennett and G. Brassard, in Proceedings of IEEE
each POVM element Gy is given in Eq. (A14). Given international conference on computers, systems and signal
√
the POVM Gy = [1/( η1 η2 π )]ρDSTS (αhet , ξhet , n̄het ), its processing (IEEE, New York, 1984), p. 175.
matrix elements are given by Eq. (5.2) of Ref. [58] with [2] A. K. Ekert, Quantum Cryptography based on Bell’s
√
the prefactor 1/( η1 η2 π ) as Theorem, Phys. Rev. Lett. 67, 661 (1991).
[3] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M.
Dušek, N. Lütkenhaus, and M. Peev, The security of prac-
min(m,n) tical quantum key distribution, Rev. Mod. Phys. 81, 1301
1 Q(0) m n k
m| Gy |n = √ √ k! Ã (2009).
η1 η2 m!n! k=0 k k [4] E. Diamanti and A. Leverrier, Distributing secret keys
!(m−k)/2 !(n−k)/2 with quantum continuous variables: Principle, security and
B̃ B̃∗ implementations, Entropy 17, 6072 (2015).
× [5] F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, Secure
2 2 quantum key distribution with realistic devices, Rev. Mod.
Phys. 92, 025002 (2020).
× Hm−k [(2B̃)−1/2 C̃)]Hn−k [(2B̃∗ )−1/2 C̃∗ ], [6] S. Pirandola, U. L. Andersen, L. Banchi, M. Berta,
(B14) D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C.
Lupo, C. Ottaviani, J. Pereira, M. Razavi, J. S. Shaari,
M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi,
where H is the Hermite polynomial of order . With sim- and P. Wallden, Advances in Quantum Cryptography,
ple substitutions, one may verify that these parameters arXiv:1906.01645 (2019).
Ã, B̃, C̃, and Q(0) are defined in terms of λ1 , λ2 , αhet in [7] F. Grosshans and P. Grangier, Continuous Variable Quan-
Eq. (A13) as tum Cryptography Using Coherent States, Phys. Rev. Lett.
88, 057902 (2002).
[8] C. Silberhorn, T. C. Ralph, N. Lütkenhaus, and G. Leuchs,
λ1 + λ2 + 2 Continuous Variable Quantum Cryptography: Beating the
à := 1 − , 3 dB Loss Limit, Phys. Rev. Lett. 89, 167901 (2002).
2(λ1 + 1)(λ2 + 1)
[9] F. Grosshans, G. Van Assche, J. Wenger, R. Brouri,
−|λ1 − λ2 | N. J. Cerf, and P. Grangier, Quantum key distribution
B̃ := ,
2(λ1 + 1)(λ2 + 1) using gaussian-modulated coherent states, Nature 421, 238
Re(αhet ) Im(αhet ) (2003).
C̃ := +i , [10] C. Weedbrook, A. M. Lance, W. P. Bowen, T. Symul, T.
max(λ1 , λ2 ) + 1 min(λ1 , λ2 ) + 1 C. Ralph, and P. K. Lam, Quantum Cryptography without
1 1 Switching, Phys. Rev. Lett. 93, 170504 (2004).
Q(0) := √ [11] J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E.
π (λ1 + 1)(λ2 + 1)
Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-
Re(αhet )2 Im(αhet )2 Brouri, S. W. McLaughlin, and P. Grangier, Quantum
× exp − − . key distribution over 25 km with an all-fiber continuous-
max(λ1 , λ2 ) + 1 min(λ1 , λ2 ) + 1
variable system, Phys. Rev. A 76, 042305 (2007).
(B15)
[12] P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and
E. Diamanti, Experimental demonstration of long-distance
continuous-variable quantum key distribution, Nat. Photon-
As indicated in Eqs. (5.3) and (5.4) of Ref. [58], the
ics 7, 378 (2013).
choice of square roots of B̃ is as B̃1/2 = iei(ϕ/2) |B̃|1/2 and [13] B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek,
(B̃∗ )1/2 = (B̃1/2 )∗ , where ϕ = 0 if λ1 ≤ λ2 and ϕ = π if Generating the Local Oscillator “Locally” in Continuous-
λ1 > λ2 . We note that n̄het and ξhet are defined in terms of Variable Quantum Key Distribution based on Coherent
λ1 and λ2 and one may rewrite these parameters in terms of Detection, Phys. Rev. X 5, 041009 (2015).
n̄het , ξhet , and αhet to make the matrix elements more explic- [14] D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M.
itly depend on the parameters of the displaced squeezed Camacho, J. Urayama, and M. Sarovar, Self-Referenced
thermal states. Continuous-Variable Quantum Key Distribution Protocol,
From the expression of m| Gy |n in Eq. (B14), one can Phys. Rev. X 5, 041010 (2015).
[15] D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng,
apply the definition of region operators Rj ’s in Eq. (16)
High-speed continuous-variable quantum key distribution
to find m| Rj |n by numerical integration. Similarly, from without sending a local oscillator, Opt. Lett. 40, 3695
the definitions of first- and second-moment observables (2015).
in Eq. (21) in terms of POVM elements Gy ’s, one can [16] D. Huang, P. Huang, D. Lin, and G. Zeng, Long-distance
numerically obtain a representation of these operators in continuous-variable quantum key distribution by control-
the photon-number basis. ling excess noise, Sci. Rep. 6, 19201 (2016).
064030-18
TRUSTED DETECTOR NOISE ANALYSIS FOR DISCRETE... PHYS. REV. APPLIED 14, 064030 (2020)
[17] Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, [32] S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri,
B. Chu, Y. Zhao, B. Xu, S. Yu, and H. Guo, Long- and P. Grangier, Improvement of continuous-variable quan-
Distance Continuous-Variable Quantum Key Distribution tum key distribution systems by using optical preamplifiers,
Over 202.81 km of Fiber, Phys. Rev. Lett. 125, 010502 J. Phys. B 42, 114014 (2009).
(2020). [33] V. C. Usenko and R. Filip, Trusted noise in continuous-
[18] C. Wittmann, J. Fürst, C. Wiechers, D. Elser, H. Häseler, variable quantum key distribution: A threat and a defense,
N. Lütkenhaus, and G. Leuchs, Witnessing effective Entropy 18, 20 (2016).
entanglement over a 2 km fiber channel, Opt. Express 18, [34] F. Laudenbach and C. Pacher, Analysis of the trusted-
4499 (2010). device scenario in continuous-variable quantum key distri-
[19] X.-Y. Wang, Z.-L. Bai, S.-F. Wang, Y.-M. Li, and K.-C. bution, Adv. Quantum Technol. 2, 1900055 (2019).
Peng, Four-state modulation continuous variable quantum [35] M. Navascués, F. Grosshans, and A. Acín, Optimality of
key distribution over a 30-km fiber and analysis of excess Gaussian Attacks in Continuous-Variable Quantum Cryp-
noise, Chin. Phys. Lett. 30, 010305 (2013). tography, Phys. Rev. Lett. 97, 190502 (2006).
[20] B. Heim, C. Peuntinger, N. Killoran, I. Khan, C. Wittmann, [36] R. García-Patrón and N. J. Cerf, Unconditional Opti-
C. Marquardt, and G. Leuchs, Atmospheric continuous- mality of Gaussian Attacks against Continuous-Variable
variable quantum communication, New J. Phys. 16, 113018 Quantum Key Distribution, Phys. Rev. Lett. 97, 190503
(2014). (2006).
[21] T. Hirano, T. Ichikawa, T. Matsubara, M. Ono, Y. Oguri, R. [37] R. Namiki, A. Kitagawa, and T. Hirano, Secret key rate
Namiki, K. Kasai, R. Matsumoto, and T. Tsurumaru, Imple- of a continuous-variable quantum-key-distribution scheme
mentation of continuous-variable quantum key distribution when the detection process is inaccessible to eavesdroppers,
with discrete modulation, Quantum Sci. Technol. 2, 024010 Phys. Rev. A 98, 042319 (2018).
(2017). [38] P. J. Coles, E. M. Metodiev, and N. Lütkenhaus, Numerical
[22] F. Laudenbach, B. Schrenk, C. Pacher, M. Hentschel, approach for unstructured quantum key distribution, Nat.
C.-H. F. Fung, F. Karinou, A. Poppe, M. Peev, and H. Commun. 7, 11712 (2016).
Hübel, Pilot-assisted intradyne reception for high-speed [39] A. Winick, N. Lütkenhaus, and P. J. Coles, Reliable numer-
continuous-variable quantum key distribution with true ical key rates for quantum key distribution, Quantum 2, 77
local oscillator, Quantum 3, 193 (2019). (2018).
[23] M. Takeoka, S. Guha, and M. M. Wilde, Fundamental [40] I. George, J. Lin, and N. Lütkenhaus, Numerical Cal-
rate-loss tradeoff for optical quantum key distribution, Nat. culations of Finite Key Rate for General Quantum Key
Commun. 5, 5235 (2014). Distribution Protocols, arXiv:2004.11865 (2020).
[24] S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, [41] In our previous work [31], we also considered a postselec-
Fundamental limits of repeaterless quantum communica- tion parameter p related to the phase of the measurement
tions, Nat. Commun. 8, 15043 (2017). outcome. However, when we perform simulations with this
[25] F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. postselection parameter, we do not obtain any noticeable
Tomamichel, and R. F. Werner, Continuous Variable Quan- advantage. Thus, we omit the introduction of this parameter
tum Key Distribution: Finite-Key Analysis of Composable in this work.
Security Against Coherent Attacks, Phys. Rev. Lett. 109, [42] C. H. Bennett, G. Brassard, and N. D. Mermin, Quantum
100502 (2012). Cryptography Without Bell’s Theorem, Phys. Rev. Lett. 68,
[26] P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Lev- 557 (1992).
errier, Analysis of imperfections in practical continuous- [43] F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and
variable quantum key distribution, Phys. Rev. A 86, 032309 P. Grangier, Virtual entanglement and reconciliation proto-
(2012). cols for quantum cryptography with continuous variables,
[27] E. Kaur, S. Guha, and M. M. Wilde, Asymptotic Security Quantum Inf. Comput. 3, 535 (2003).
of Discrete-Modulation Protocols for Continuous-Variable [44] M. Curty, M. Lewenstein, and N. Lütkenhaus, Entangle-
Quantum Key Distribution, arXiv:1901.10099 (2019). ment as Precondition for Secure Quantum Key Distribution,
[28] Y.-B. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, Asymp- Phys. Rev. Lett. 92, 217903 (2004).
totic security of binary modulated continuous-variable [45] A. Ferenczi and N. Lütkenhaus, Symmetries in quantum
quantum key distribution under collective attacks, Phys. key distribution and the connection between optimal attacks
Rev. A 79, 012307 (2009). and optimal cloning, Phys. Rev. A 85, 052310 (2012).
[29] K. Brádler and C. Weedbrook, Security proof of [46] I. Devetak and A. Winter, Distillation of secret key and
continuous-variable quantum key distribution using three entanglement from quantum states, Proc. R. Soc. A 461,
coherent states, Phys. Rev. A 97, 022310 (2018). 207 (2005).
[30] S. Ghorai, P. Grangier, E. Diamanti, and A. Leverrier, [47] The electronic noise νj is the thermal noise added by the
Asymptotic Security of Continuous-Variable Quantum Key detection electronics. In the quantum-mechanical model of
Distribution with a Discrete Modulation, Phys. Rev. X 9, the detector shown in each dashed box of Fig. 2, the elec-
021059 (2019). tronic noise is modeled by an ancillary thermal state added
[31] J. Lin, T. Upadhyaya, and N. Lütkenhaus, Asymp- to the second input port of the beam splitter that models
totic Security Analysis of Discrete-Modulated Continuous- the detector efficiency. Since the value of electronic noise is
Variable Quantum Key Distribution, Phys. Rev. X 9, unaffected by the detector efficiency, to simulate the desired
041064 (2019). amount of noise before this beam splitter, one then needs
064030-19
JIE LIN and NORBERT LÜTKENHAUS PHYS. REV. APPLIED 14, 064030 (2020)
to scale it by the reflectance of the beam splitter, which [53] Y. Zhang, P. J. Coles, A. Winick, J. Lin, and N. Lütkenhaus,
is 1 − ηj . As the variance of a thermal state with a mean Security Proof of Practical Quantum Key Distribution with
photon number n̄ is (1 + 2n̄)N0 , one can easily see that Detection-Efficiency Mismatch, arXiv:2004.04383 (2020).
the mean photon number of this ancillary thermal state is [54] M. Heid and N. Lütkenhaus, Efficiency of coherent-state
n̄j = νj /[2(1 − ηj )]. quantum cryptography in the presence of loss: Influence of
[48] B. R. Mollow and R. J. Glauber, Quantum theory of realistic error correction, Phys. Rev. A 73, 052316 (2006).
parameteric amplification. I, Phys. Rev. 160, 1076 (1967). [55] T. Matsuura, K. Maeda, T. Sasaki, and M. Koashi, Finite-
[49] K. E. Cahill and R. J. Glauber, Ordered expansions in boson Size Security of Continuous-Variable Quantum Key Dis-
amplitude operators, Phys. Rev. 177, 1857 (1969). tribution with Digital Signal Processing, arXiv:2006.04661
[50] K. E. Cahill and R. J. Glauber, Density operators and (2020).
quasiprobability distributions, Phys. Rev. 177, 1882 (1969). [56] U. Leonhardt, Essential Quantum Optics: from Quan-
[51] Due to our√definition of quadrature operators, we include tum Measurements to Black Holes (Cambridge University
the factor 2 so that we can simply enter values reported in Press, Cambrige, England, 2010).
an experiment using shot-noise units as expectation values [57] M. S. Kim, F. A. M. de Oliveira, and P. L. Knight, Proper-
of corresponding observables. ties of squeezed number states and squeezed thermal states,
[52] M. Milicevic, C. Feng, L. M. Zhang, and P. G. Phys. Rev. A 40, 2494 (1989).
Gulak, Quasi-cyclic multi-edge LDPC codes for long- [58] P. Marian and T. A. Marian, Squeezed states with thermal
distance quantum cryptography, npj Quantum Inf. 4, 21 noise. I. Photon-number statistics, Phys. Rev. A 47, 4474
(2018). (1993).
064030-20