Next Article in Journal
Rapid Dynamic Separation of Radial and Azimuthal Polarization Components in Circular Airy Vortex Beams via Linear Electro-Optic Effect in Uniaxial Crystals
Previous Article in Journal
High-Responsivity Waveguide UTC Photodetector with 90 GHz Bandwidth for High-Speed Optical Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Implementation and Realistic Security of Unidimensional Modulation Continuous-Variable Quantum Key Distribution in Downstream Access Networks

1
School of Information, Shanxi University of Finance and Economics, Taiyuan 030006, China
2
College of Information Engineering, Shanxi Vocational University of Engineering Science and Technology, Jinzhong 030619, China
3
School of Information and Communication Engineering, North University of China, Taiyuan 030051, China
*
Author to whom correspondence should be addressed.
Photonics 2025, 12(9), 892; https://doi.org/10.3390/photonics12090892
Submission received: 22 June 2025 / Revised: 18 July 2025 / Accepted: 22 July 2025 / Published: 5 September 2025

Abstract

To address the demand for low-cost deployment in quantum key distribution (QKD) networks, this study explores the implementation of unidimensional (UD) modulation continuous-variable quantum key distribution (CV-QKD) protocols within downstream access networks. The UD CV-QKD protocol employs a single modulator for information encoding, offering benefits such as reduced implementation cost and lower random number consumption, which collectively decrease the overall setup expense of QKD systems. Through systematic performance analysis, it is demonstrated that the proposed UD modulation downstream access network scheme exhibits strong scalability and practical applicability. When supporting 32 users, the system maintains secure communication over transmission distances of up to 50 km. As the number of users increases to 64, performance declines slightly; however, the system still achieves a 35 km transmission distance, which remains suitable for many metropolitan access applications. Even in high-density access scenarios involving 128 users, the system sustains a positive key rate within a transmission range of 20 km. Furthermore, this study evaluates the protocol’s practical security under source intensity errors and finite-size effects. These results provide meaningful guidance for deploying low-cost, high-security quantum communication access networks and contribute to advancing QKD technologies toward scalable, real-world implementations.

1. Introduction

Quantum key distribution (QKD), grounded in the principles of quantum mechanics, enables secure key exchange between communication parties, thereby providing theoretically unconditional information security [1,2,3]. This intrinsic feature positions QKD as a promising solution to address the emerging security challenges posed by quantum computing. Continuous-variable QKD (CV-QKD), which encodes key information using the quadrature components of optical fields and employs coherent detection methods (such as homodyne or heterodyne detection), is capable of achieving high key rates within metropolitan area networks [4,5,6,7,8,9,10,11]. Additionally, CV-QKD is highly compatible with existing fiber communication infrastructure, allowing it to be integrated into optical networks without substantial modifications [12,13,14]. This compatibility shortens the transition from theoretical quantum communication to practical application and has garnered considerable attention [15].
As CV-QKD continues to advance, the development of multi-user quantum communication networks has become a central research focus [16,17,18,19,20,21], marking a critical stepping stone toward the realization of the quantum internet [22,23]. A downstream access network scheme based on coherent states has recently been proposed, wherein the central service node, Alice, uses passive beam splitters to concurrently provide secure key distribution services to multiple user nodes, Bobs [24]. This scheme has attracted attention for its potential to enable simultaneous multi-user access to quantum communication networks [25,26,27,28]. Unidimensional (UD) modulation CV-QKD, which modulates only one quadrature of the optical field, offers significant hardware simplification, reduces the consumption of random numbers, and decreases overall system cost [29]. However, existing research on UD CV-QKD has primarily focused on point-to-point communication models, which are insufficient for addressing the requirements of multi-user quantum communication networks [30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47].
This study bridges this gap by extending the UD CV-QKD protocol from conventional point-to-point configurations to network environments that support multi-user access. To rigorously assess the protocol’s feasibility in practical network scenarios, a detailed performance analysis is conducted, evaluating the number of users supported, the achievable transmission distance, and the system’s excess noise tolerance. In addition, this study examines the protocol’s realistic security by analyzing the impacts of statistical fluctuations due to finite block size and potential intensity errors in quantum state sources. These factors are incorporated into a revised security model to validate the protocol’s robustness under real-world conditions. This work provides foundational theoretical support for integrating low-cost UD CV-QKD into future multi-user quantum communication networks.

2. UD CV-QKD in the Downstream Access Network

2.1. Protocol Model

In Figure 1a, the protocol model for UD CV-QKD in a downstream access network is presented, realizing a star network structure in which multiple users share a single source. The information sender (Alice) initially encodes classical information into quantum states, which are then distributed to multiple receivers ( Bob 1 , , n ) via an N-port beam splitter. Specifically, Alice employs an amplitude modulator with a modulation variance of V M to modulate the coherent state, as illustrated in Figure 1a. The modulated quantum states exhibit a UD chain structure in phase space. These coherent states are passively divided and transmitted to each downstream user through the N-port beam splitter. Upon reception, each user utilizes a practical balanced homodyne detector to measure the quadrature amplitude and a portion of the quadrature phase of the quantum state. For any Bob k , depending on the choice of measurement quadrature, Alice retains only the corresponding quadrature component. Consequently, Alice and Bob k obtain a set of correlated data. Through classical post-processing steps, including parameter estimation, data reconciliation, and privacy amplification, Alice and any Bob k can derive an identical set of secret keys.

2.2. Security Analysis

To analyze the security of the protocol, it is essential to consider an equivalent entanglement-based (EB) scheme. As shown in Figure 1b, Alice prepares an EPR state with variance V and performs homodyne detection on the mode A retained. For the other mode A , she applies a squeezing operator (Squeezer) with squeezing parameter r = ln V to compress the quadrature phase, thereby generating mode S. Alice subsequently transmits mode S through a quantum channel characterized by transmission efficiency T A and excess noise ε A to an N-port beam splitter. The output modes are then delivered to individual users, Bob 1 through Bob n , via quantum sub-channels, each described by its respective transmission coefficient ( T B 1 T B n ) and excess noise level ( ε B 1 ε B n ). Given that the use of the N-port beam splitter introduces insertion loss T N BS and excess noise ε N BS , the overall transmittance and excess noise between Alice and any k t h user Bob k can be expressed as follows [24]:
T tot k = T A T N BS T B k = 1 n T A T B k ,
ε tot k = ε A + ε N BS + ε B k .
The initial EPR state ρ A A , after applying phase squeezing to mode A , results in the quantum state ρ A S , whose covariance matrix can be expressed as follows:
γ A S = V 0 V V 2 1 0 0 V 0 V 2 1 / V V V 2 1 0 V 2 0 0 V 2 1 / V 0 1 .
The variance of the phase quadrature of mode S is 1, equivalent to a single shot-noise unit. Subsequently, mode S is sent to Bob k via the quantum channel, and its covariance matrix consequently changes to the following:
γ A B k = 1 + V M 0 T totx V M 1 + V M 1 / 4 0 0 1 + V M 0 C y B k T totx V M 1 + V M 1 / 4 0 T totx V M + 1 + χ linex 0 0 C y B k 0 V y B k ,
where V M = V 2 1 ; χ linex = 1 T totx / T totx + ε totx denotes the total noise introduced in the quadrature amplitude direction of the quantum state by the channel relative to the channel input, and C y B k and V y B k denote the correlations and variances of modes A and B k in the quadrature phase direction.
Furthermore, at the receiver end, after transformation by the beam splitter, simulating actual homodyne detection, the covariance matrix γ A B k transforms into γ A B k , which takes the following form:
γ A B k = 1 + V M 0 η T totx V M 1 + V M 1 / 4 0 0 1 + V M 0 C y B k η T totx V M 1 + V M 1 / 4 0 η T totx V M + 1 + χ totx 0 0 C y B k 0 V y B k ,
where V y B k = η V y B k + χ hom and C y B k = C y B k η . χ totx = χ linex + χ hom / T totx represents the total noise introduced in the quadrature amplitude direction relative to the channel input. χ hom = 1 η / η + ν el / η corresponds to the noise arising from imperfections in the detector at Bob’s side.
By employing the EB scheme described above, the secure key rate can be conveniently calculated. Under asymptotic conditions, with Bob k ’s data serving as the reference side (i.e., reverse reconciliation), the formula for computing the secure key rate is given as follows:
K asy = β · I A B k χ B k E ,
where I A B k represents the Shannon mutual information between Alice and Bob k ; χ B k E denotes the Holevo bound, which quantifies the maximum amount of information that Eve can extract from Bob k ’s data; and β indicates the efficiency of the data reconciliation process.
The mutual information I A B k is expressed as follows:
I A B k = 1 2 log 2 V A V A x B k = 1 2 log 2 1 + V M 1 + χ totx .
The Holevo bound χ B k E is defined as follows:
χ B k E = S ( ρ E ) S ρ E x B k ,
where S ( ρ ) denotes the von Neumann entropy of the quantum state ρ .
Since all of the users share a common source, their data exhibit inherent correlations. To ensure the protocol’s security, our analysis considers an extreme-case scenario in which any user other than the legitimate communicating party may be compromised by Eve, thereby treating them as untrusted nodes within the network. By applying Eve’s purification principle, we derive the following:
χ B k E = S ( ρ E ) S ρ E x B k
= S ρ A B k S ρ A G k R k x B k
= i = 1 2 g λ i 1 2 i = 3 5 g λ i 1 2
where g x = x + 1 log 2 x + 1 x log 2 x .
λ 1 , 2 and λ 3 , 4 , 5 are the symplectic eigenvalues of the quantum states ρ A B k and ρ A G k R k x B k , respectively, and can be calculated as follows:
λ 1 , 2 2 = 1 2 A ± A 2 4 B ,
A = 1 + V y B k + V M + V y B k ε totx + V M T totx + 2 C y B k 1 + V M 1 4 V M T totx ,
B = V y B k 1 + V M C y B k 2 1 + V M 1 + ε totx T totx ,
and
λ 3 , 4 2 = 1 2 C ± C 2 4 D , λ 5 = 1 ,
C = A ( 1 + ν el ) + ( ( ε totx T totx + 1 ) ( V M + 2 ) + V M T totx A ) η 1 + ε totx T totx η + V M T totx η + ν el ,
D = B ( 1 + ν el η ) + ( 1 + V M ) ( 1 + ε totx T totx ) η 1 + ε totx T totx η + V M T totx η + ν el .
Based on the above results, the key rate can be calculated. For the unknown parameters C y B k and V y B k , V y B k can be estimated at Bob’s end by randomly measuring the orthogonal phase quadrature of the quantum state. However, C y B k cannot be estimated because the initial quantum state prepared by Alice does not involve modulation on the phase quadrature. Nevertheless, the unknown parameter C y B k can be constrained using Heisenberg’s uncertainty principle, which leads to the following condition [40]:
γ A B k + i · Ω 0 ,
where
Ω = 2 i = 1 0 1 1 0 .
Then, we have
( C y B k C 0 ) 2 V M ( 1 + V M ) χ linex 1 + χ linex ( V y B k V 0 ) ,
where
C 0 = V 0 T totx V M ( 1 + V M ) 1 / 4 , V 0 = 1 T totx 1 + χ linex .
For a fixed V y B k , the minimum secure key rate can be obtained by scanning C y B k based on the above constraint equation.

2.3. Protocol Performance

In this study, we consider a symmetric network configuration in which the loss and noise parameters are identical across all of the links connecting the splitter to the users, i.e., T tot 1 = T tot k = T tot n = T tot and ε tot 1 = ε tot k = ε tot n = ε tot . Figure 2 illustrates the relationship between the achievable secret key rate and the transmission distance for various numbers of optical network units (ONUs), with simulation parameters set as follows: excess noise ε tot = 0.02 , reconciliation efficiency β = 0.97 , detector efficiency η = 0.6 , and electronic noise v el = 0.1 . These results are obtained using Equation (6). This figure provides valuable insights into how the network’s secure key distribution capability is influenced by both the network scale (i.e., the number of connected users) and the communication link distance. The results indicate that networks with fewer than 16 ONUs can sustain relatively high key rates over transmission distances of up to 50 km. As additional ONUs are connected, the secret key rate decreases. Nevertheless, the system can still support 32 users over 50 km, 64 users over 35 km, and 128 users over 20 km with a positive key rate.
Figure 3 presents the achievable secret key rate as a function of the number of ONUs, evaluated at different transmission distances. The results are obtained using Equation (6). As shown, the key rate consistently declines with an increasing number of ONUs. A notable decrease occurs when the number of ONUs is below 20. Additionally, the key rate decreases more rapidly with increasing ONUs at longer distances compared to shorter distances. These trends highlight the inherent trade-off between network capacity and secure communication range in QKD access networks.
Figure 4 illustrates the relationship between tolerable excess noise and transmission distance for different numbers of ONUs. The simulation results are obtained using Equation (6). The results reveal that configurations with fewer users can tolerate higher levels of excess noise. As both the number of users and the transmission distance increase, the tolerable excess noise gradually decreases. For example, at a transmission distance of 30 km, 32 users can tolerate up to 0.03 excess noise, while at 50 km, 128 users can still tolerate excess noise levels exceeding 0.025. These findings demonstrate the adaptability of the UD scheme in downstream access networks, supporting its suitability for low-cost quantum communication network development.

3. Realistic Security

3.1. Source Errors

In downstream access networks, all of the users share a single source, rendering the security of this source critical. During the actual implementation of the protocol, errors are inevitably introduced when Alice prepares coherent states, such as source intensity errors [48,49]. Suppose the pulse intensity of the signal source varies within the range I L , I U , where I L and I U represent the lower and upper bounds, respectively. For simplicity, we set I L U = g L U I , resulting in I g L , g U I . To ensure the protocol’s security, Alice adjusts her raw data to the upper bound value g U x A and conducts parameter estimation and key extraction using the adjusted data.
When Alice and Bob k perform parameter estimation with the revised data, we have:
T totx = T g T totx / g U , ε totx ε totx g U / T g + V g 4 m g 2 g U V M ,
where T g = m g 1 V g / 8 m g 2 2 , m g and V g denote the intrinsic mean and variance of the intensity variation factor.
Figure 5 illustrates the variation in the protocol’s secret key rate with respect to transmission distance for different numbers of users in the presence of source intensity errors. The simulation results are derived using Equations (6) and (22). The source error parameters are set to g U = 1.1 , m g = 1.03 , and V g = 10 4 . The modulation variance is optimized to maximize the key rate. Solid lines represent the key rate for an ideal (error-free) source, while dashed lines correspond to the case where source intensity errors are considered. The results show that source errors lead to an approximately 20% reduction in the key rate, highlighting the importance of incorporating source error considerations into the system design.

3.2. Finite-Size Effects

In practical implementations of the protocol, limitations in hardware, storage capacity, and computational resources mean that the total number of signals exchanged between Alice and Bob is finite. Under finite data block conditions, statistical fluctuations must be taken into account. These fluctuations, in conjunction with source errors, can result in significant discrepancies between expected values and actual observations.
Let the total number of signals exchanged between Alice and Bob be denoted by N tot . Following detection by Bob k , Alice and Bob k obtain a set of correlated data samples x A i , x B k i i = 1 · · · N tot l in the amplitude quadrature. Of these, n signals are reserved for key extraction, while m = N tot l n signals are used to estimate the transmission efficiency T totx and the excess noise ε totx . Additionally, l represents the number of data points Bob collects in the phase quadrature, which are used to evaluate its variance V y B k . The formula for calculating the secure key rate under finite-size conditions is then given as follows [50]:
K finite = n N ( β I A B k δ PE χ B k E δ PE Δ ( n ) ) ,
where δ PE represents the failure probability of parameter estimation. Δ ( n ) denotes a correction term related to privacy amplification, defined as follows:
Δ ( n ) 7 log 2 ( 2 / ξ ) n , n 10 4 .
To ensure the security of the protocol, we consider the worst-case scenario for parameter estimation, where the most pessimistic estimations are adopted, as follows [39]:
T totx low 1 η η T totx z δ PE / 2 1 + η T totx ε totx + ν el m V M 2 ,
ε totx up ε totx + z δ PE / 2 1 + η T totx ε totx + ν el 2 η T totx m ,
V y B k up V y B k + z δ PE / 2 η V y B k 1 + 1 + ν el 2 η l .
Figure 6 illustrates the secret key rate of the protocol as a function of transmission distance for various data block sizes, considering a network with 8 users. The results are derived using Equation (23). The parameters m and l are optimized to maximize the key rate. The results show that, as the transmission distance increases, the key rate under finite data block sizes decreases significantly more rapidly compared to the asymptotic case. Smaller data block sizes exhibit a steeper decline due to the increased statistical uncertainty in parameter estimation as the block size decreases. Moreover, it is observed that as the data block size increases from 10 9 to 10 12 , the key rate initially increases sharply with transmission distance, followed by a more gradual improvement. This behavior suggests the presence of an optimal block size that balances statistical reliability and performance. These findings confirm the practical feasibility of implementing UD CV-QKD in downstream access networks under realistic operating conditions.

4. Discussion

In this study, we extend the UD modulation scheme of CV-QKD to downstream access networks, thereby significantly broadening the applicability of UD modulation protocols to address the growing demands of multi-user access networks. To comprehensively assess network performance, we systematically investigated three core metrics: the scale of user access supported, the achievable transmission distance, and the system’s tolerance to excess noise. The results indicate that when the number of users is 32, secure transmission remains feasible up to 50 km; with 64 users, the maximum transmission distance is reduced to 35 km; and even in high-density scenarios involving 128 users, a positive key rate is achievable within a 20 km range. These findings demonstrate that the proposed UD modulation scheme for downstream access networks offers both scalability and practical utility. Furthermore, we conducted a detailed analysis of the protocol’s realistic security performance under source intensity errors and finite-size effects, providing valuable insights for the deployment of low-cost downstream quantum communication networks.
A key feature of traditional downstream access networks is the passive optical distribution network, enabling low-cost, highly reliable multi-user access via passive optical splitters. The proposed protocol can be easily integrated into current telecom infrastructure. Specifically, passive beam splitters, initially engineered for classical signals, can be directly repurposed to distribute quantum states, naturally accommodating the star network topology. This integration significantly reduces QKD deployment costs while inheriting the inherent resilience against failures in active components. For practical implementation, the development and integration of miniaturized modulators and low-noise balanced homodyne detectors into existing optical line terminals and ONUs is crucial for minimizing modifications to legacy equipment and streamlining engineering deployment. Furthermore, simulating complex real-world access network conditions in laboratory settings is vital to support the future large-scale adoption of QKD.

Author Contributions

Conceptualization, P.W. and J.L.; methodology, Y.T.; software, Z.B.; validation, P.W., Z.B. and L.C.; formal analysis, Y.T.; investigation, J.L.; resources, P.W.; data curation, Z.B.; writing—original draft preparation, P.W.; writing—review and editing, P.W.; visualization, P.W.; supervision, P.W.; project administration, P.W.; funding acquisition, P.W., Z.B., L.C. and Y.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 62305198; the Humanities and Social Science Fund of Ministry of Education of China, grant numbers 23YJCZH003, 23YJCZH009; the Fundamental Research Program of Shanxi Province, grant numbers 202103021224290, 202303021212168, 202403021212343; and the Higher Education Innovation Projects of Shanxi Province, grant number 2024L433.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available upon reasonable request from the authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef]
  2. Portmann, C.; Renner, R. Security in quantum cryptography. Rev. Mod. Phys. 2022, 94, 025008. [Google Scholar] [CrossRef]
  3. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dusek, M.; Peev, M. The Security of Practical Quantum Key Distribution. Rev. Mod. Phys. 2009, 81, 1301. [Google Scholar] [CrossRef]
  4. Braunstein, S.L.; van Loock, P. Quantum information with continuous variables. Rev. Mod. Phys. 2005, 77, 513–577. [Google Scholar] [CrossRef]
  5. Diamanti, E.; Leverrier, A. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations. Entropy 2015, 17, 6072–6092. [Google Scholar] [CrossRef]
  6. Goncharov, R.; Vorontsova, I.; Kirichenko, D.; Filipov, I.; Adam, I.; Chistiakov, V.; Smirnov, S.; Nasedkin, B.; Pervushin, B.; Kargina, D.; et al. The Rationale for the Optimal Continuous-Variable Quantum Key Distribution Protocol. Optics 2022, 3, 338–351. [Google Scholar] [CrossRef]
  7. Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef]
  8. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  9. Li, Y.M.; Wang, X.Y.; Bai, Z.L.; Liu, W.Y.; Yang, S.S.; Peng, K.C. Continuous variable quantum key distribution. Chin. Phys. B 2017, 26, 040303. [Google Scholar] [CrossRef]
  10. Liu, W.B.; Li, C.L.; Liu, Z.P.; Zhou, M.G.; Yin, H.L.; Chen, Z.B. Theoretical development of discrete-modulated continuous-variable quantum key distribution. Quantum Sci. Technol. 2022, 1, 985276. [Google Scholar] [CrossRef]
  11. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  12. Karinou, F.; Brunner, H.H.; Fung, C.F.; Comandar, L.C.; Bettelli, S.; Hillerkuss, D.; Kuschnerov, M.; Mikroulis, S.; Wang, D.; Xie, C.; et al. Toward the Integration of CV Quantum Key Distribution in Deployed Optical Networks. IEEE Photonics Technol. Lett. 2018, 30, 650–653. [Google Scholar] [CrossRef]
  13. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  14. Xu, F.H.; Ma, X.F.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  15. Zhang, Y.; Bian, Y.; Li, Z.; Yu, S.; Guo, H. Continuous-variable quantum key distribution system: Past, present, and future. Appl. Phys. Rev. 2024, 11, 011318. [Google Scholar] [CrossRef]
  16. Fröhlich, B.; Dynes, J.F.; Lucamarini, M.; Sharpe, A.W.; Yuan, Z.; Shields, A.J. A quantum access network. Nature 2013, 501, 69–72. [Google Scholar] [CrossRef]
  17. Jain, N.; Chin, H.M.; Hajomer, A.A.E.; Null, D.; Larfort, H.; Nysom, N.L.; Bidstrup, E.; Andersen, U.L.; Gehring, T. Future proofing network encryption technology with continuous-variable quantum key distribution. Opt. Express 2024, 32, 43607–43620. [Google Scholar] [CrossRef]
  18. Joshi, S.K.; Aktas, D.; Wengerowsky, S.; Lončarić, M.; Neumann, S.P.; Liu, B.; Scheidl, T.; Lorenzo, G.C.; Samec, Ž.; Kling, L.; et al. A trusted node–free eight-user metropolitan quantum communication network. Sci. Adv. 2020, 6, eaba0959. [Google Scholar] [CrossRef]
  19. Liu, S.; Tian, Y.; Zhang, Y.; Lu, Z.; Wang, X.; Li, Y. Integrated quantum communication network and vibration sensing in optical fibers. Optica 2024, 11, 1762–1772. [Google Scholar] [CrossRef]
  20. Ren, S.; Wang, Y.; Su, X. Hybrid quantum key distribution network. Sci. China Inf. Sci. 2022, 65, 200502. [Google Scholar] [CrossRef]
  21. Xu, Y.; Wang, T.; Zhao, H.; Huang, P.; Zeng, G. Round-trip multi-band quantum access network. Photonics Res. 2023, 11, 1449–1464. [Google Scholar] [CrossRef]
  22. Illiano, J.; Caleffi, M.; Manzalini, A.; Cacciapuoti, A.S. Quantum Internet protocol stack: A comprehensive survey. Comput. Netw. 2022, 213, 109092. [Google Scholar] [CrossRef]
  23. Rozenman, G.G.; Kundu, N.K.; Liu, R.; Zhang, L.; Maslennikov, A.; Reches, Y.; Youm, H.Y. The quantum internet: A synergy of quantum information technologies and 6G networks. IET Quantum Commun. 2023, 4, 147–166. [Google Scholar] [CrossRef]
  24. Huang, Y.; Shen, T.; Wang, X.; Chen, Z.; Xu, B.; Yu, S.; Guo, H. Realizing a Downstream-Access Network Using Continuous-Variable Quantum Key Distribution. Phys. Rev. Appl. 2021, 16, 064051. [Google Scholar] [CrossRef]
  25. Hajomer, A.A.E.; Derkach, I.; Filip, R.; Andersen, U.L.; Usenko, V.C.; Gehring, T. Continuous-variable quantum passive optical network. Light Sci. Appl. 2024, 13, 291. [Google Scholar] [CrossRef]
  26. Li, Z.; Wang, X.; Qi, D.; Chen, Z.; Yu, S. Experimental Implementation of Four-User Downstream Access Network Continuous-Variable Quantum Key Distribution. J. Light. Technol. 2024, 42, 6662–6670. [Google Scholar] [CrossRef]
  27. Qi, D.; Wang, X.; Li, Z.; Ma, J.; Chen, Z.; Lu, Y.; Yu, S. Experimental demonstration of a quantum downstream access network in continuous variable quantum key distribution with a local local oscillator. Photonics Res. 2024, 12, 1262–1273. [Google Scholar] [CrossRef]
  28. Zhang, J.; Wang, X.; Xia, F.; Yu, S.; Chen, Z. Multiple-quadrature-amplitude-modulation continuous-variable quantum key distribution realization with a downstream-access network. Phys. Rev. A 2024, 109, 052429. [Google Scholar] [CrossRef]
  29. Usenko, V.C.; Grosshans, F. Unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2015, 92, 062337. [Google Scholar] [CrossRef]
  30. Bai, D.; Huang, P.; Zhu, Y.; Ma, H.; Xiao, T.; Wang, T.; Zeng, G. Unidimensional continuous-variable measurement-device-independent quantum key distribution. Quantum Inf. Process. 2019, 19, 53. [Google Scholar] [CrossRef]
  31. Bian, Y.; Huang, L.; Zhang, Y. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Entropy 2021, 23, 294. [Google Scholar] [CrossRef] [PubMed]
  32. Hu, J.; Liao, Q.; Mao, Y.; Guo, Y. Performance improvement of unidimensional continuous-variable quantum key distribution using zero-photon quantum catalysis. Quantum Inf. Process. 2021, 20, 31. [Google Scholar] [CrossRef]
  33. Jacobsen, C.S.; Madsen, L.S.; Usenko, V.C.; Filip, R.; Andersen, U.L. Complete elimination of information leakage in continuous-variable quantum communication channels. NPJ Quantum Inf. 2018, 4, 32. [Google Scholar] [CrossRef]
  34. Li, Y.; Wang, T. Security analysis of unidimensional continuous-variable quantum key distribution with discretized amplitude modulation. J. Phys. B At. Mol. Opt. Phys. 2024, 57, 145502. [Google Scholar] [CrossRef]
  35. Liao, Q.; Guo, Y.; Xie, C.; Huang, D.; Huang, P.; Zeng, G. Composable security of unidimensional continuous-variable quantum key distribution. Quantum Inf. Process. 2018, 17, 113. [Google Scholar] [CrossRef]
  36. Shen, S.Y.; Dai, M.W.; Zheng, X.T.; Sun, Q.Y.; Guo, G.C.; Han, Z.F. Free-space continuous-variable quantum key distribution of unidimensional Gaussian modulation using polarized coherent states in an urban environment. Phys. Rev. A 2019, 100, 012325. [Google Scholar] [CrossRef]
  37. Usenko, V.C. Unidimensional continuous-variable quantum key distribution using squeezed states. Phys. Rev. A 2018, 98, 032321. [Google Scholar] [CrossRef]
  38. Usenko, V.C. Shared-reference-frame-independent continuous-variable quantum key distribution. Opt. Express 2025, 33, 22643–22653. [Google Scholar] [CrossRef]
  39. Wang, P.; Wang, X.; Li, J.; Li, Y. Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions. Opt. Express 2017, 25, 27995–28009. [Google Scholar] [CrossRef]
  40. Wang, P.; Wang, X.; Li, Y. Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations. Entropy 2018, 20, 157. [Google Scholar] [CrossRef]
  41. Wang, X.; Cao, Y.; Wang, P.; Li, Y. Advantages of the coherent state compared with squeezed state in unidimensional continuous variable quantum key distribution. Quantum Inf. Process. 2018, 17, 344. [Google Scholar] [CrossRef]
  42. Wang, X.; Liu, W.; Wang, P.; Li, Y. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution. Phys. Rev. A 2017, 95, 062330. [Google Scholar] [CrossRef]
  43. Zhang, H.; Ruan, X.; Wu, X.; Zhang, L.; Guo, Y.; Huang, D. Plug-and-play unidimensional continuous-variable quantum key distribution. Quantum Inf. Process. 2019, 18, 128. [Google Scholar] [CrossRef]
  44. Zhao, R.; Zhou, J.; Shi, R.; Shi, J. Unidimensional Continuous Variable Quantum Key Distribution under Fast Fading Channel. Ann. Phys. 2024, 536, 2300401. [Google Scholar] [CrossRef]
  45. Zhao, W.; Shi, R.; Feng, Y.; Huang, D. Unidimensional continuous-variable quantum key distribution with discrete modulation. Phys. Lett. A 2020, 384, 126061. [Google Scholar] [CrossRef]
  46. Zhao, W.; Shi, R.; Wu, X.; Wang, F.; Ruan, X. Quantum digital signature with unidimensional continuous-variable against the measurement angular error. Opt. Express 2023, 31, 17003–17016. [Google Scholar] [CrossRef] [PubMed]
  47. Zhou, K.; Chen, Z.; Guo, Y.; Liao, Q. Performance improvement of unidimensional continuous-variable quantum key distribution using heralded hybrid linear amplifier. Phys. Lett. A 2020, 384, 126074. [Google Scholar] [CrossRef]
  48. Wang, P.; Bai, Z.; Chang, L. Influence of source intensity errors in unidimensional Gaussian modulation continuous-variable quantum key distribution. Acta Phys. Sin. 2025, 74, 090302. [Google Scholar] [CrossRef]
  49. Wang, P.; Wang, X.; Li, Y. Continuous-variable measurement-device-independent quantum key distribution with source-intensity errors. Phys. Rev. A 2020, 102, 022609. [Google Scholar] [CrossRef]
  50. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 2010, 81, 062343. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of UD CV-QKD in the Downstream Access Network. (a) Preparation and measurement scheme. Alice employs an amplitude modulator to generate a series of Gaussian-modulated coherent states. These are transmitted through a single fiber to a 1 : n passive splitter, distributing the signal to n users via individual channels, where each user performs homodyne detection. (b) Entanglement-based scheme. Alice prepares a Gaussian entangled state, known as an Einstein–Podolsky–Rosen (EPR) state. She measures one mode with a homodyne detector and squeezes the other mode using a Squeezer. The realistic homodyne detection process at the receiver is modeled as a beam splitter (BS) transformation with transmission efficiency η , incorporating input noise characterized by a variance V F = 1 + ν el / ( 1 η ) .
Figure 1. Schematic diagram of UD CV-QKD in the Downstream Access Network. (a) Preparation and measurement scheme. Alice employs an amplitude modulator to generate a series of Gaussian-modulated coherent states. These are transmitted through a single fiber to a 1 : n passive splitter, distributing the signal to n users via individual channels, where each user performs homodyne detection. (b) Entanglement-based scheme. Alice prepares a Gaussian entangled state, known as an Einstein–Podolsky–Rosen (EPR) state. She measures one mode with a homodyne detector and squeezes the other mode using a Squeezer. The realistic homodyne detection process at the receiver is modeled as a beam splitter (BS) transformation with transmission efficiency η , incorporating input noise characterized by a variance V F = 1 + ν el / ( 1 η ) .
Photonics 12 00892 g001
Figure 2. Achievable secret key rate versus transmission distance in an access network with varying numbers of users.
Figure 2. Achievable secret key rate versus transmission distance in an access network with varying numbers of users.
Photonics 12 00892 g002
Figure 3. Achievable secret key rate versus number of ONUs in the network at various transmission distances.
Figure 3. Achievable secret key rate versus number of ONUs in the network at various transmission distances.
Photonics 12 00892 g003
Figure 4. Tolerable excess noise versus transmission distance for varying numbers of ONUs.
Figure 4. Tolerable excess noise versus transmission distance for varying numbers of ONUs.
Photonics 12 00892 g004
Figure 5. Achievable secret key rate versus transmission distance for different numbers of users, without (solid lines) and with (dashed lines) source intensity errors.
Figure 5. Achievable secret key rate versus transmission distance for different numbers of users, without (solid lines) and with (dashed lines) source intensity errors.
Photonics 12 00892 g005
Figure 6. Lower bound of the secret key rate versus transmission distance in the finite-size scenario for various data block sizes, considering a network with 8 users.
Figure 6. Lower bound of the secret key rate versus transmission distance in the finite-size scenario for various data block sizes, considering a network with 8 users.
Photonics 12 00892 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, P.; Liu, J.; Bai, Z.; Chang, L.; Tian, Y. Implementation and Realistic Security of Unidimensional Modulation Continuous-Variable Quantum Key Distribution in Downstream Access Networks. Photonics 2025, 12, 892. https://doi.org/10.3390/photonics12090892

AMA Style

Wang P, Liu J, Bai Z, Chang L, Tian Y. Implementation and Realistic Security of Unidimensional Modulation Continuous-Variable Quantum Key Distribution in Downstream Access Networks. Photonics. 2025; 12(9):892. https://doi.org/10.3390/photonics12090892

Chicago/Turabian Style

Wang, Pu, Jianqiang Liu, Zengliang Bai, Liwei Chang, and Yan Tian. 2025. "Implementation and Realistic Security of Unidimensional Modulation Continuous-Variable Quantum Key Distribution in Downstream Access Networks" Photonics 12, no. 9: 892. https://doi.org/10.3390/photonics12090892

APA Style

Wang, P., Liu, J., Bai, Z., Chang, L., & Tian, Y. (2025). Implementation and Realistic Security of Unidimensional Modulation Continuous-Variable Quantum Key Distribution in Downstream Access Networks. Photonics, 12(9), 892. https://doi.org/10.3390/photonics12090892

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop