Discrete-modulation continuous-variable quantum key distribution with probabilistic amplitude shaping over a linear quantum channel
- URL: http://arxiv.org/abs/2603.02870v1
- Date: Tue, 03 Mar 2026 11:22:33 GMT
- Title: Discrete-modulation continuous-variable quantum key distribution with probabilistic amplitude shaping over a linear quantum channel
- Authors: Emanuele Parente, Michele N. Notarnicola, Stefano Olivares, Enrico Forestieri, Luca Potì, Marco Secondini,
- Abstract summary: We deal with the infinite key size regime, consider a homodyne detection scheme, and analyze what happens for different cardinalities of the input alphabet at different distances.<n>We find that our protocol, beyond being easily reproducible in the laboratory, provides a way to closely approach the theoretical performance offered by GG02.
- Score: 2.7338779723187474
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The practical implementation difficulties arising from the Gaussian modulation of the GG02 protocol lead us to investigate the possibilities offered by the combination of probabilistic amplitude shaping technique and quadrature amplitude modulation formats in the context of continuous variable quantum key distribution systems. Our interest comes from the fact that quadrature amplitude modulation and probabilistic shaping can be implemented with current technologies and are widely used in classical telecom equipment. In this treatment, we assume to work in the scenario of a linear quantum channel and we analyze maximum achievable secure key rates, maximum reachable distances and the resilience to noise of our discrete-modulation based protocol with respect to GG02, which is taken as a benchmark. In particular, we deal with the infinite key size regime, consider a homodyne detection scheme, and analyze what happens for different cardinalities of the input alphabet at different distances, in the case of collective attacks and in the reverse reconciliation picture. We find that our protocol, beyond being easily reproducible in the laboratory, provides a way to closely approach the theoretical performance offered by GG02 and, at the same time, preserves the ability to assure an unconditional security level.
Related papers
- Design and Optimization of Adaptive Diversity Schemes in Quantum MIMO Channels [45.812053169933705]
We study an adaptive diversity strategy for discrete-variable QuMIMO systems based on universal asymmetric cloning at the transmitter and probabilistic purification at the receiver.<n>Results show that the proposed scheme yields significant fidelity gains in crosstalk-dominated settings and automatically adapts to channel symmetry and channel conditions.<n>This work provides design guidelines for future QuMIMO systems and establishes a robust baseline for more advanced transmission and decoding strategies.
arXiv Detail & Related papers (2025-11-19T15:58:10Z) - Crosstalk-Resilient Quantum MIMO for Scalable Quantum Communications [40.44880302154388]
Crosstalk arises when physically coupled quantum modes interfere, degrading signal fidelity.<n>We propose a mitigation strategy based on encoding discrete-variable quantum information into continuous-variable modes.<n>We prove the existence of a gauge-fixing decoder enabling recovery of the logical information.
arXiv Detail & Related papers (2025-06-26T18:40:26Z) - Quantum-Enhanced Conformal Methods for Multi-Output Uncertainty: A Holistic Exploration and Experimental Analysis [0.0]
We propose a unified approach to harness quantum conformal methods for multi-output distributions.<n>By combining a multioutput regression model with conformal prediction, we validate coverage and interval-set sizes on both simulated quantum data and measurement data.
arXiv Detail & Related papers (2025-01-07T23:00:07Z) - Bayesian Quantum Amplitude Estimation [46.03321798937855]
We present BAE, a problem-tailored and noise-aware Bayesian algorithm for quantum amplitude estimation.<n>In a fault tolerant scenario, BAE is capable of saturating the Heisenberg limit; if device noise is present, BAE can dynamically characterize it and self-adapt.<n>We propose a benchmark for amplitude estimation algorithms and use it to test BAE against other approaches.
arXiv Detail & Related papers (2024-12-05T18:09:41Z) - Efficient Learning for Linear Properties of Bounded-Gate Quantum Circuits [62.46800898243033]
Recent progress in quantum learning theory prompts a question: can linear properties of a large-qubit circuit be efficiently learned from measurement data generated by varying classical inputs?<n>We prove that the sample complexity scaling linearly in $d$ is required to achieve a small prediction error, while the corresponding computational complexity may scale exponentially in d.<n>We propose a kernel-based method leveraging classical shadows and truncated trigonometric expansions, enabling a controllable trade-off between prediction accuracy and computational overhead.
arXiv Detail & Related papers (2024-08-22T08:21:28Z) - Probabilistic amplitude shaping for continuous-variable quantum key
distribution with discrete modulation over a wiretap channel [0.7829352305480285]
We show that a suitable probabilistic amplitude shaping of a finite set of symbols allows to approximate at will the optimal channel capacity.
We propose a protocol employing discrete quadrature amplitude modulation assisted with probabilistic amplitude shaping.
arXiv Detail & Related papers (2022-11-10T16:48:45Z) - Optimal quantum control via genetic algorithms for quantum state
engineering in driven-resonator mediated networks [68.8204255655161]
We employ a machine learning-enabled approach to quantum state engineering based on evolutionary algorithms.
We consider a network of qubits -- encoded in the states of artificial atoms with no direct coupling -- interacting via a common single-mode driven microwave resonator.
We observe high quantum fidelities and resilience to noise, despite the algorithm being trained in the ideal noise-free setting.
arXiv Detail & Related papers (2022-06-29T14:34:00Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance [7.87972015113057]
We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
arXiv Detail & Related papers (2021-04-22T16:10:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Trusted detector noise analysis for discrete modulation schemes of
continuous-variable quantum key distribution [4.977851927269835]
Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment.
We calculate key rates against collective attacks in the trusted detector noise scenario.
Our results show that we can thus cut out most of the effect of detector noise and obtain key rates similar to those had we access to ideal detectors.
arXiv Detail & Related papers (2020-06-11T03:11:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.