{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T01:45:24Z","timestamp":1774316724331,"version":"3.50.1"},"reference-count":47,"publisher":"Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union Horizon 2020 Research and Innovation Programme","award":["820466"],"award-info":[{"award-number":["820466"]}]},{"name":"European Research Council","award":["851716"],"award-info":[{"award-number":["851716"]}]}],"content-domain":{"domain":["quantum-journal.org"],"crossmark-restriction":false},"short-container-title":["Quantum"],"abstract":"<jats:p>We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation, and numerical bounds existed in the case of simple phase-shift-keying modulations. The latter bounds were obtained as a solution of convex optimization problems and our new analytical bound matches the results of Ghorai <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mtext class=\"MJX-tex-mathit\" mathvariant=\"italic\">et al.<\/mml:mtext><\/mml:mrow><\/mml:math> (2019), up to numerical precision. The more relevant case of quadrature amplitude modulation (QAM) could not be analyzed with the previous techniques, due to their large number of coherent states. Our bound shows that relatively small constellation sizes, with say 64 states, are essentially sufficient to obtain a performance close to a true Gaussian modulation and are therefore an attractive solution for large-scale deployment of continuous-variable quantum key distribution. We also derive similar bounds when the modulation consists of arbitrary states, not necessarily pure.<\/jats:p>","DOI":"10.22331\/q-2021-09-13-540","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T18:47:31Z","timestamp":1631558851000},"page":"540","update-policy":"https:\/\/doi.org\/10.22331\/q-crossmark-policy-page","source":"Crossref","is-referenced-by-count":109,"title":["Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation"],"prefix":"10.22331","volume":"5","author":[{"given":"Aur\u00e9lie","family":"Denys","sequence":"first","affiliation":[{"name":"Inria, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9593-0136","authenticated-orcid":false,"given":"Peter","family":"Brown","sequence":"additional","affiliation":[{"name":"ENS Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6707-1458","authenticated-orcid":false,"given":"Anthony","family":"Leverrier","sequence":"additional","affiliation":[{"name":"Inria, France"}]}],"member":"9598","published-online":{"date-parts":[[2021,9,13]]},"reference":[{"key":"0","doi-asserted-by":"publisher","unstructured":"C.H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175, 1984. 10.1016\/j.tcs.2014.05.025.","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"1","doi-asserted-by":"publisher","unstructured":"Kamil Br\u00e1dler and Christian Weedbrook. Security proof of continuous-variable quantum key distribution using three coherent states. Phys. Rev. A, 97 (2): 022310, 2018. 10.1103\/PhysRevA.97.022310.","DOI":"10.1103\/PhysRevA.97.022310"},{"key":"2","doi-asserted-by":"publisher","unstructured":"Nicolas J Cerf, Marc Levy, and Gilles Van Assche. Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A, 63 (5): 052311, 2001. 10.1103\/PhysRevA.63.052311.","DOI":"10.1103\/PhysRevA.63.052311"},{"key":"3","doi-asserted-by":"publisher","unstructured":"Matthias Christandl, Robert K\u00f6nig, and Renato Renner. Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett., 102 (2): 020504, 2009. 10.1103\/PhysRevLett.102.020504.","DOI":"10.1103\/PhysRevLett.102.020504"},{"key":"4","unstructured":"Aur\u00e9lie Denys, Peter Brown, and Anthony Leverrier. Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. arXiv preprint arXiv:2011.09746v1, 2021."},{"key":"5","doi-asserted-by":"publisher","unstructured":"I. Devetak and A. Winter. Distillation of secret key and entanglement from quantum states. In Proc. R. Soc. A, volume 461, pages 207\u2013235, 2005. 10.1098\/rspa.2004.1372.","DOI":"10.1098\/rspa.2004.1372"},{"key":"6","doi-asserted-by":"publisher","unstructured":"Frederic Dupuis, Omar Fawzi, and Renato Renner. Entropy accumulation. Communications in Mathematical Physics, 379: 867\u2013913, 2020. 10.1007\/s00220-020-03839-5.","DOI":"10.1007\/s00220-020-03839-5"},{"key":"7","doi-asserted-by":"publisher","unstructured":"Radim Filip. Continuous-variable quantum key distribution with noisy coherent states. Phys. Rev. A, 77: 022310, Feb 2008. 10.1103\/PhysRevA.77.022310.","DOI":"10.1103\/PhysRevA.77.022310"},{"key":"8","doi-asserted-by":"publisher","unstructured":"F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner. Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks. Phys. Rev. Lett., 109: 100502, 2012. 10.1103\/PhysRevLett.109.100502.","DOI":"10.1103\/PhysRevLett.109.100502"},{"key":"9","doi-asserted-by":"publisher","unstructured":"Ra\u00fal Garc\u00eda-Patr\u00f3n and Nicolas J. Cerf. Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution. Phys. Rev. Lett., 97 (19): 190503, 2006. 10.1103\/PhysRevLett.97.190503.","DOI":"10.1103\/PhysRevLett.97.190503"},{"key":"10","doi-asserted-by":"publisher","unstructured":"Amirhossein Ghazisaeidi et al. Advanced C$+$L-Band Transoceanic Transmission Systems Based on Probabilistically Shaped PDM-64QAM. J. Lightwave Technol., 35 (7): 1291\u20131299, Apr 2017. 10.1109\/JLT.2017.2657329.","DOI":"10.1109\/JLT.2017.2657329"},{"key":"11","doi-asserted-by":"publisher","unstructured":"Shouvik Ghorai, Philippe Grangier, Eleni Diamanti, and Anthony Leverrier. Asymptotic security of continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. X, 9: 021059, Jun 2019. 10.1103\/PhysRevX.9.021059.","DOI":"10.1103\/PhysRevX.9.021059"},{"key":"12","unstructured":"F. Grosshans and P. Grangier. Reverse reconciliation protocols for quantum cryptography with continuous variables. Arxiv preprint quant-ph\/0204127, 2002a."},{"key":"13","doi-asserted-by":"crossref","unstructured":"F. Grosshans, N.J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier. Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables. Quantum Information and Computation, 3 (Sp. Iss. SI): 535\u2013552, 2003.","DOI":"10.26421\/QIC3.s-6"},{"key":"14","doi-asserted-by":"publisher","unstructured":"Fr\u00e9d\u00e9ric Grosshans and Philippe Grangier. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett., 88 (5): 057902, 2002b. 10.1103\/PhysRevLett.88.057902.","DOI":"10.1103\/PhysRevLett.88.057902"},{"key":"15","doi-asserted-by":"publisher","unstructured":"Matthias Heid and Norbert L\u00fctkenhaus. Security of coherent-state quantum cryptography in the presence of Gaussian noise. Phys. Rev. A, 76 (2): 022313, 2007. 10.1103\/PhysRevA.76.022313.","DOI":"10.1103\/PhysRevA.76.022313"},{"key":"16","doi-asserted-by":"publisher","unstructured":"Takuya Hirano, H Yamanaka, M Ashikaga, T Konishi, and R Namiki. Quantum cryptography using pulsed homodyne detection. Physical Review A, 68 (4): 042331, 2003. 10.1103\/PhysRevA.68.042331.","DOI":"10.1103\/PhysRevA.68.042331"},{"key":"17","doi-asserted-by":"publisher","unstructured":"Fanny Jardel, Tobias A Eriksson, Cyril M\u00e9asson, Amirhossein Ghazisaeidi, Fred Buchali, Wilfried Idler, and Joseph J Boutros. Exploring and experimenting with shaping designs for next-generation optical communications. Journal of Lightwave Technology, 36 (22): 5298\u20135308, 2018. 10.1109\/JLT.2018.2871248.","DOI":"10.1109\/JLT.2018.2871248"},{"key":"18","doi-asserted-by":"publisher","unstructured":"Paul Jouguet, S\u00e9bastien Kunz-Jacques, and Anthony Leverrier. Long-distance continuous-variable quantum key distribution with a Gaussian modulation. Phys. Rev. A, 84: 062317, Dec 2011. 10.1103\/PhysRevA.84.062317.","DOI":"10.1103\/PhysRevA.84.062317"},{"key":"19","doi-asserted-by":"publisher","unstructured":"Eneet Kaur, Saikat Guha, and Mark M Wilde. Asymptotic security of discrete-modulation protocols for continuous-variable quantum key distribution. Physical Review A, 103 (1): 012412, 2021. 10.1103\/PhysRevA.103.012412.","DOI":"10.1103\/PhysRevA.103.012412"},{"key":"20","doi-asserted-by":"publisher","unstructured":"Felipe Lacerda, Joseph M Renes, and Volkher B Scholz. Coherent state constellations for Bosonic Gaussian channels. In Information Theory (ISIT), 2016 IEEE International Symposium on, pages 2499\u20132503. IEEE, 2016. 10.1109\/ISIT.2016.7541749.","DOI":"10.1109\/ISIT.2016.7541749"},{"key":"21","doi-asserted-by":"publisher","unstructured":"Anthony Leverrier. Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett., 114: 070501, 2015. 10.1103\/PhysRevLett.114.070501.","DOI":"10.1103\/PhysRevLett.114.070501"},{"key":"22","doi-asserted-by":"publisher","unstructured":"Anthony Leverrier. Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction. Phys. Rev. Lett., 118: 200501, May 2017. 10.1103\/PhysRevLett.118.200501.","DOI":"10.1103\/PhysRevLett.118.200501"},{"key":"23","doi-asserted-by":"publisher","unstructured":"Anthony Leverrier. SU(p, q) coherent states and a Gaussian de Finetti theorem. Journal of Mathematical Physics, 59 (4): 042202, 2018. 10.1063\/1.5007334.","DOI":"10.1063\/1.5007334"},{"key":"24","doi-asserted-by":"publisher","unstructured":"Anthony Leverrier and Philippe Grangier. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett., 102: 180504, May 2009. 10.1103\/PhysRevLett.102.180504.","DOI":"10.1103\/PhysRevLett.102.180504"},{"key":"25","doi-asserted-by":"publisher","unstructured":"Anthony Leverrier and Philippe Grangier. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation. Phys. Rev. A, 83: 042312, Apr 2011. 10.1103\/PhysRevA.83.042312.","DOI":"10.1103\/PhysRevA.83.042312"},{"key":"26","doi-asserted-by":"publisher","unstructured":"Jie Lin, Twesh Upadhyaya, and Norbert L\u00fctkenhaus. Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution. Phys. Rev. X, 9: 041064, Dec 2019. 10.1103\/PhysRevX.9.041064.","DOI":"10.1103\/PhysRevX.9.041064"},{"key":"27","doi-asserted-by":"publisher","unstructured":"S. Lorenz, N. Korolkova, and G. Leuchs. Continuous-variable quantum key distribution using polarization encoding and post selection. Appl. Phys. B, 79 (3): 273\u2013277, 2004. 10.1007\/s00340-004-1574-7.","DOI":"10.1007\/s00340-004-1574-7"},{"key":"28","doi-asserted-by":"publisher","unstructured":"Hossein Mani, Tobias Gehring, Philipp Grabenweger, Bernhard \u00d6mer, Christoph Pacher, and Ulrik Lund Andersen. Multiedge-type low-density parity-check codes for continuous-variable quantum key distribution. Phys. Rev. A, 103: 062419, Jun 2021. 10.1103\/PhysRevA.103.062419. URL https:\/\/link.aps.org\/doi\/10.1103\/PhysRevA.103.062419.","DOI":"10.1103\/PhysRevA.103.062419"},{"key":"29","doi-asserted-by":"publisher","unstructured":"Takaya Matsuura, Kento Maeda, Toshihiko Sasaki, and Masato Koashi. Finite-size security of continuous-variable quantum key distribution with digital signal processing. Nature communications, 12 (1): 1\u201313, 2021. 10.1038\/s41467-020-19916-1.","DOI":"10.1038\/s41467-020-19916-1"},{"key":"30","doi-asserted-by":"publisher","unstructured":"Mario Milicevic, Feng Chen, Lei M Zhang, and P Glenn Gulak. Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography. NPJ Quantum Information, 4: 1\u20139, 2018. 10.1038\/s41534-018-0070-6.","DOI":"10.1038\/s41534-018-0070-6"},{"key":"31","doi-asserted-by":"publisher","unstructured":"Miguel Navascu\u00e9s, Fr\u00e9d\u00e9ric Grosshans, and Antonio Ac\u00edn. Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography. Phys. Rev. Lett., 97 (19): 190502, 2006. 10.1103\/PhysRevLett.97.190502.","DOI":"10.1103\/PhysRevLett.97.190502"},{"key":"32","doi-asserted-by":"publisher","unstructured":"Panagiotis Papanastasiou and Stefano Pirandola. Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective Gaussian attacks. Phys. Rev. Research, 3: 013047, Jan 2021. 10.1103\/PhysRevResearch.3.013047.","DOI":"10.1103\/PhysRevResearch.3.013047"},{"key":"33","doi-asserted-by":"publisher","unstructured":"S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden. Advances in quantum cryptography. Adv. Opt. Photon., 12 (4): 1012\u20131236, Dec 2020. 10.1364\/AOP.361502.","DOI":"10.1364\/AOP.361502"},{"key":"34","doi-asserted-by":"publisher","unstructured":"Stefano Pirandola, Carlo Ottaviani, Gaetana Spedalieri, Christian Weedbrook, Samuel L Braunstein, Seth Lloyd, Tobias Gehring, Christian S Jacobsen, and Ulrik L. Andersen. High-rate measurement-device-independent quantum cryptography. Nat. Photon., 9 (6): 397\u2013402, 2015. 10.1038\/nphoton.2015.83.","DOI":"10.1038\/nphoton.2015.83"},{"key":"35","doi-asserted-by":"publisher","unstructured":"R. Renner. Symmetry of large physical systems implies independence of subsystems. Nat. Phys., 3 (9): 645\u2013649, 2007. 10.1038\/nphys684.","DOI":"10.1038\/nphys684"},{"key":"36","doi-asserted-by":"publisher","unstructured":"R. Renner and J. I. Cirac. de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography. Phys. Rev. Lett., 102 (11): 110504, 2009. 10.1103\/PhysRevLett.102.110504.","DOI":"10.1103\/PhysRevLett.102.110504"},{"key":"37","doi-asserted-by":"publisher","unstructured":"V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Du\u0161ek, N. L\u00fctkenhaus, and M. Peev. The security of practical quantum key distribution. Rev. Mod. Phys., 81 (3): 1301, 2009. 10.1103\/RevModPhys.81.1301.","DOI":"10.1103\/RevModPhys.81.1301"},{"key":"38","doi-asserted-by":"publisher","unstructured":"Denis Sych and Gerd Leuchs. Coherent state quantum key distribution with multi letter phase-shift keying. New J. Phys., 12 (5): 053019, 2010. 10.1088\/1367-2630\/12\/5\/053019.","DOI":"10.1088\/1367-2630\/12\/5\/053019"},{"key":"39","doi-asserted-by":"publisher","unstructured":"Marco Tomamichel and Renato Renner. Uncertainty relation for smooth entropies. Phys. Rev. Lett., 106: 110506, Mar 2011. 10.1103\/PhysRevLett.106.110506.","DOI":"10.1103\/PhysRevLett.106.110506"},{"key":"40","doi-asserted-by":"publisher","unstructured":"Twesh Upadhyaya, Thomas van Himbeeck, Jie Lin, and Norbert L\u00fctkenhaus. Dimension reduction in quantum key distribution for continuous- and discrete-variable protocols. PRX Quantum, 2: 020325, 2021. 10.1103\/PRXQuantum.2.020325.","DOI":"10.1103\/PRXQuantum.2.020325"},{"key":"41","doi-asserted-by":"publisher","unstructured":"Vladyslav C. Usenko and Radim Filip. Feasibility of continuous-variable quantum key distribution with noisy coherent states. Phys. Rev. A, 81: 022318, Feb 2010. 10.1103\/PhysRevA.81.022318.","DOI":"10.1103\/PhysRevA.81.022318"},{"key":"42","doi-asserted-by":"publisher","unstructured":"Christian Weedbrook, Andrew M. Lance, Warwick P. Bowen, Thomas Symul, Timothy C. Ralph, and Ping Koy Lam. Quantum cryptography without switching. Phys. Rev. Lett., 93 (17): 170504, 2004. 10.1103\/PhysRevLett.93.170504.","DOI":"10.1103\/PhysRevLett.93.170504"},{"key":"43","doi-asserted-by":"publisher","unstructured":"Christian Weedbrook, Stefano Pirandola, Seth Lloyd, and Timothy C. Ralph. Quantum cryptography approaching the classical limit. Phys. Rev. Lett., 105: 110501, Sep 2010. 10.1103\/PhysRevLett.105.110501.","DOI":"10.1103\/PhysRevLett.105.110501"},{"key":"44","doi-asserted-by":"publisher","unstructured":"Christian Weedbrook, Stefano Pirandola, Ra\u00fal Garc\u00eda-Patr\u00f3n, Nicolas J. Cerf, Timothy C. Ralph, Jeffrey H. Shapiro, and Seth Lloyd. Gaussian quantum information. Rev. Mod. Phys., 84: 621\u2013669, 2012. 10.1103\/RevModPhys.84.621.","DOI":"10.1103\/RevModPhys.84.621"},{"key":"45","doi-asserted-by":"publisher","unstructured":"Yihong Wu and Sergio Verd\u00fa. The impact of constellation cardinality on Gaussian channel capacity. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 620\u2013628, 2010. 10.1109\/ALLERTON.2010.5706965.","DOI":"10.1109\/ALLERTON.2010.5706965"},{"key":"46","doi-asserted-by":"publisher","unstructured":"Yi-Bo Zhao, Matthias Heid, Johannes Rigas, and Norbert L\u00fctkenhaus. Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks. Phys. Rev. A, 79: 012307, 2009. 10.1103\/PhysRevA.79.012307.","DOI":"10.1103\/PhysRevA.79.012307"}],"container-title":["Quantum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/quantum-journal.org\/papers\/q-2021-09-13-540\/pdf\/","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T18:47:37Z","timestamp":1631558857000},"score":1,"resource":{"primary":{"URL":"https:\/\/quantum-journal.org\/papers\/q-2021-09-13-540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":47,"URL":"https:\/\/doi.org\/10.22331\/q-2021-09-13-540","archive":["CLOCKSS"],"relation":{},"ISSN":["2521-327X"],"issn-type":[{"value":"2521-327X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,13]]},"article-number":"540"}}