Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Kalman filter-enabled parameter estimation for simultaneous quantum key distribution and classical communication scheme over a satellite-mediated link

Open Access Open Access

Abstract

An accurate estimation of system parameters is of significance for the practical implementation of the simultaneous quantum key distribution and classical communication (SQCC) over a satellite-mediated link when considering the finite-size effect. In this paper, we propose a Kalman filter (KF)-enabled parameter estimation method for the SQCC over a satellite-mediated link. The fast and slow phase drift can be both estimated by using the improved vector KF carrier phase estimation algorithm, and thus the phase estimation error can be tracked in real time and be almost approximate to the theoretical mean square error limit. Taking advantage of the achieved phase estimation and the dual modulation of the SQCC scheme, the excess noise can be estimated with not only a higher precise but also a lower sacrificing rate of raw keys. Numerical simulations demonstrate the feasibility of the SQCC in both the downlink and uplink in terms of the finite-size effect. As a comparison of the Mth-power algorithm, we find that the secret key rate and achievable zenith angle perform better by using the vector KF algorithm. It paves the way of practical implementations for the SQCC system.

© 2022 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

Quantum key distribution (QKD) [1,2] enables two legitimate parties, Alice and Bob, to share secret keys on an un-secure quantum channel controlled by an eavesdropper, Eve. Continuous-variable (CV) QKD encodes information on quadratures of optical fields and extracts information by coherent detections [35], thereby possessing the advantages of high secret key rate, low cost and compatible with classical coherent optical communication, which is different from its counterpart discrete variable QKD. Gaussian modulated coherent state (GMCS) protocol [6] is the most mature CVQKD protocol. Theoretically, its unconditional security has been completely demonstrated [712], and many of its improvements have also been put forward [1318]. Experimentally, on the other hand, encouraging developments in terms of high speed, long distance and field test have been achieved in the last one decade [1926]. In particular, based on the theoretical prove and experimental success, the feasibility of CVQKD parallelly transmitted with classical signals has been demonstrated using multiplexing technique [2732], which provides a feasible way of CVQKD directly compatible with present coherent optical communication network.

Recently, a new scheme compatible with classical communication, named simultaneous quantum key distribution and classical communication (SQCC) scheme, was suggested, which superposes Gaussian quantum signals on the classical binary phase-shift keying (BPSK) signals [33], enabling CVQKD and classical communication to implement simultaneously on a single wavelength with the same communication infrastructure. More interestingly, a noise-test experiment demonstrated that the SQCC scheme is feasible with classical quadrature phase-shift keying (QPSK) modulation using a locally generated local oscillator (LO), although it is sensitive to the phase noise [34]. In a sense, this scheme provides a simpler alternation method for one way CVQKD coexisting with classical signals in the present optical communication networks and can also extend to the two way case [35,36]. By using classical carrier phase estimation (CPE) algorithm (the Mth-power algorithm), the complexity of the SQCC system can be further simplified as it can eliminate the fast phase drift without the aid of the reference signal [37], which makes the SQCC system more closer and compatible to the practical classical optical communication system.

However, the frequency offset (FO) between the carrier and the true LO, which contributes to the slow phase drift of the carrier phase, is ignored in Ref. [37]. For a relatively large carrier frequency offset (CFO), for example, the level of MHz, the phase deviation caused by the frequency offset will be non-negligible when the symbol rate is 10 Gs/s and the data block length is of the order of 100 or larger, rendering an extra phase noise for the signal data after phase compensation. In practice, The FO between different lasers has always existed inevitably. Therefore, it is necessary to simultaneously perform the estimation of the carrier phase (CP) and the CFO, which can not only eliminate the slow phase drift caused by CFO but also improve the accuracy of the CP compensation. On the other hand, for practical situation with finite-size effects of the CVQKD, the superimposed classical QPSK modulation on the quantum signal may bring new problems to the channel parameter estimation, especially for the satellite-mediated channel with a fluctuated transmittance.

To solve the problems mentioned above, in this paper, we suggest the Kalman filter (KF)-enabled parameter estimation for the SQCC scheme over satellite-mediated link, including the carrier phase and frequency offset estimation, the phase noise estimation after phase compensation and the estimation of channel parameters characterized by the transmittance and excess noise. By employing a improved vector KF algorithm, the CP and the CFO can be estimated with high precision, meaning that the fast and slow drift of optical CP can be tracked accurately. Meanwhile, the phase estimation error is almost approximate to the theoretical mean square error (MSE) limit, which enables us to perform an excellent phase noise estimation after the phase compensation. By utilizing the superimposed classical QPSK modulation and the accurate CP compensation, one can obtain a more accurate estimation of excess noise with disclosing a lower rate of raw keys, which enables us to obtain a higher precision of channel parameter estimation and a better performance of secret key rate in the finite-size case. We perform numerical simulation based on the proposed parameter estimation methods and the elliptic-beam atmospheric channel model, confirming the feasibility of our parameter estimation methods for the SQCC scheme in both the downlink and uplink of the satellite-mediated link. Further, we find that based on the proposed KF algorithm, the SQCC system performance in terms of secret key rate and achievable zenith angle is better than that based on the Mth-power algorithm. Our work suggests the operable parameter estimation methods of the SQCC scheme and demonstrates the requirements for the SQCC scheme to operate on the satellite-mediated coherent optical communication system, which can also extend to fiber or underwater link, paving the way of the SQCC scheme to the practical employment.

This paper is organized as follows: In Sec. 2, we give a brief description of the SQCC scheme over satellite-mediated link and make a detailed noise analysis of it. In Sec. 3, the improved vector KF phase compensation algorithm is introduced, and the phase estimation noise after compensation is derived. Then, the channel parameter estimation method is shown in Sec. 4. We perform numerical simulation in Sec. 5. Finally, conclusions are drawn in Sec. 6.

2. SQCC over satellite-mediated link

In this section, we show the proposed scheme of the SQCC over the satellite-mediated link and the corresponding noise models.

2.1 Description of the SQCC

The schematic illustration of the SQCC over satellite-mediated link is shown in Fig. 1. At Alice’s side, she generates a continuous optical carrier with a central wavelength of $\lambda _A$. This continuous optical carrier is firstly modulated to optical pulses by the first amplitude modulator (AM), and then modulated in the cascaded AM and phase modulator (PM) for achieving the simultaneous QPSK and Gaussian modulation. After that, the optical pulses are attenuated by a variable optical attenuator (VOA) to be the expected coherent state $\left | ({{x}_{A}}+{{e}^{-i{{m}_{A}}\pi }}\alpha _C )+i({{p}_{A}}+{{e}^{-i{{n}_{A}}\pi }}\alpha _C ) \right \rangle$, where $x_A$ and $p_A$ are the Gaussian modulated information with variance $V_A$, $\alpha _C$ is the amplitude of the classical QPSK modulation, and $m_A, n_A \in \{0, 1\}$ are the classical bits. Then, she sends the signals to Bob. At Bob’s side, he amends the polarization of the signals by the polarization controller (PC), and couples the signal pulses with his locally local oscillator (LLO), which has the same wavelength with the signals, for heterodyne detection. The detected results ($x_B$ and $p_B$) are further processed to obtain the expected information by digital signal process (DSP), including carrier phase recovery, parameter estimation, classical and quantum data extraction and the conventional data postprocessing of CVQKD. Note that for the SQCC scheme, Eve has full access and control of the classical and quantum signals. While Bob extracts the classical bits from his received data, the whole system can be seen as a standard GMCS QKD system. Since Eve has the additional power to control the classical bits, the security of the proposed SQCC scheme is at least as strong as the standard GMCS QKD, meaning that the security proofs of the standard GMCS QKD can be applied to this scheme.

 figure: Fig. 1.

Fig. 1. The schematic diagram of the SQCC over satellite-mediated link. AM, amplitude modulator; PM, phase modulator; LO, local oscillator; P, fiber polarizer; Iso, Isolator; 90$^\circ$ OH, 90$^\circ$ optical hybrid; PC, Polarization controller; HD, homodyne detector. (a)-(e) represent the signal distribution in phase space from preparation to reception to recovery.

Download Full Size | PDF

2.2 Noise model

For the convenience of the performance analysis of the proposed scheme, a comprehensive noise analysis and modeling is required. According to the analysis results shown in Refs. [34,38], here we give a detailed description of the noise model for the proposed scheme, including the phase noise, the analog-to-digital converter (ADC) quantization noise and the bit error rate (BER)-introduced noise. There are also many other kinds of noise haven discussed in the previous literatures of CVQKD and therefore not expounded here.

Phase excess noise Phase noise is one of the main excess noises for all the LLO-based scheme as two independent laser sources are used for the legitimate parts. If the residual phase noise after Bob’s phase compensation is $\sigma _{ph}^2$, then the phase excess noise can be given by [34]

$$\xi_{\sigma_{ph}} = (\frac{\alpha_C^2}{N_0} + V_A)\sigma_{ph}^2,$$
where $V_A$ is Alice’s Gaussian modulation variance, $N_0 = 1/4$ the shot noise variance.

ADC quantization noise As the output detection results will be quantized by an ADC, there will be an additional error generated in the quantized value of quadratures of the signal. The ADC quantization noise, which is depended on the maximal amplitude of the modulated signal [4,38], has the following form as

$$\xi_{ADC} \geqslant \frac{|\alpha_{S_m} + \sqrt{2}\alpha_{C}/\sqrt{N_0}|^2}{12\times 2^N},$$
where $\alpha _{S_m}$ is the signal’s maximal amplitude that only with Gaussian modulation and can be assumed to be $\sqrt {10V_A}$ [39,40], $N$ represents the quantization bit number.

BER-introduced noise The BER in classical communication will contribute a extra excess noise given by [34]

$$\xi_{BER} = \frac{4|\alpha_{C}|^2C_{BER}}{N_0},$$
where $C_{BER}$ is the BER, which has the following form $C_{BER} = \frac {1}{2}\textrm {erfc}\left (\sqrt {\frac {T_c\eta \alpha _C^2}{4N_{tot}N_0}}\right )$ with $N_{tot} = \frac {1}{2}T_q\eta [V_A + \xi _{ADC} + \xi _0 + \frac {\alpha _C^2}{N_0}\sigma _{ph}] + 1 + \xi _{el}$, where $\xi _0$ is the other untrusted noise described below, $T_c$ is the channel transmittance of the classical bits, $T_q$ is the channel transmittance of the QKD signals, and $\eta$ and $\xi _{el}$ are the quantum efficiency and the electronic noise of the detector detecting signal pulse, respectively [34].

Other untrusted excess noise Except the analyzed noise mentioned above, there are some other kinds of noise fully considered in the conventional CVQKD, such as relative-intensity noise, modulation noise, background noise, excess noise caused by the Eve’s attack and so on. In order to facilitate the analysis, we will assume that the sum of these noises $\xi _0$ to be 0.01 (in shot noise units) in the rest content.

It is worthy to note that there are two noise models considered in the previous SQCC scheme, i.e. the untrusted and trusted noise model [34,37]. In the untrusted noise model, the phase excess noise is assumed to be controlled by Eve. Actually, from a more practical point of view, the phase excess noise is contributed from the phase compensation error, which can be monitored by the algorithm in real time. Consequently, in the trusted noise model, the phase excess noise is regarded as a trusted noise. In these situations, we will consider both of the two noise models in the following performance analysis.

3. Phase compensation and phase noise estimation

After Bob gets the measurements of two quadratures, the first step of his DSP is CP recovery. The phases of the carrier and the LO will be drifted fast with two random walk processes (modeled by a Wiener process), which is caused by the linewidth of the two lasers at Alice and Bob’s side. Meanwhile, the nonzero CFO between the two lasers will render a slowly extra phase drift. Therefore, both the fast and slow drift of CP should be compensated. In Ref. [37], it has adopted the Mth-power algorithm to perform the CPE. To reduce the effect of additive noise on phase estimation error, this algorithm uses an equal-tap-weight transversal filter to average the estimated phase over a sequence of symbols with the block length of $N_b$, which should be optimized so that the phase compensation error is minimum. However, the above Mth-power algorithm ignores the beat-frequency offset. To guarantee the offset-induced phase deviation in a block is smaller than $5^{\circ }$ [41], $N_b$ can not be too large. For example, if the symbol rate is 10 GS/s, $N_b = 100$, the CFO should be smaller than 1.4 MHz. In the analysis of Ref. [37], the optimal block length $N_b$ is about the order of 100, indicating that the CFO between the sender and receiver’s lasers should lower than the order of MHz.

To suppress the impact of frequency offset, one of approaches is to split the carrier recovery into two individual operations of CFO compensation and CP compensation. However, the performance of the CFO compensation has a significant impact on the CP compensation. Therefore, a better way to do carrier recovery is to simultaneously estimate the CP and CFO. Fortunately, the KF algorithm, which estimates the carrier phase based on the principle of MSE, is an excellent method to simultaneously track the CP and CFO with low complexity and high accuracy [42]. In Ref. [43], the vector KF is used to estimate the reference phase and the residual optical frequency difference for the LLO-CVQKD. To make it compatible with the proposed SQCC scheme, we give the improved vector KF algorithm as follows.

For the received complex signal $r = x_B + ip_B$, it is divided into fixed-length blocks with block length of $N_b$. CFO can be considered as a constant over tens block of signals since the laser linewidth is much smaller than the symbol rate. Consequently, according to the models described in Refs. [42,43], the state equation for the kth block can be given by

$$\theta_{k} = \theta_{k - 1} + N_b\omega_k + \varsigma_k, $$
$$\omega_k = \omega_{k - 1} + \varrho_k, $$
where $\theta _{k}$ is the phase at the midpoint in the duration of the block, $\omega _k$ is the slope corresponding to the CFO, $\varsigma _k$ is the first process noise representing the fast phase drift between the $(k - 1)$th block and the kth block and $\varrho _k$ is the second process noise representing the slow phase drift between the $(k - 1)$th block and the kth block. Note that $\varsigma _k$ can be modeled as a zero-mean Gaussian noise with variance $\sigma _{\varsigma }^2 = 2\pi N_b(\Delta f_A + \Delta f_B)/B_{sr}$, where $\Delta f_A$ and $\Delta f_B$ are the spectral linewidth of Alice’s and Bob’s laser respectively, and $B_{sr}$ is the symbol rate. While $\varrho _k$ can be modeled as zero-mean Gaussian noise with variance $\sigma _{\varrho }^2$, which should be optimized according to the spectral linewidth. The CP of the $l$th symbol in the $k$th block $\theta _{k,l}$ $(l = 1, \ldots, N_b)$ can be expressed as
$$\theta_{k,l} = \theta_{k} + (l - \frac{N_b + 1}{2})\omega_k.$$

As practical measurements of the phase drifts are contaminated by noises from channel and detector, the measurement equation of phase drift can be given by

$$y_k = \theta_{k} + n_k,$$
where $y_k$ is the observation of the phase drift at the midpoint in the duration of the block and $n_k$ is the measurement noise which is a zero-mean Gaussian noise with variance $\sigma _n^2$.

The above state equations and the measurement equation can be rewritten into matrix forms, given by

$$ \mathbf{s}(k) = \mathbf{A}\mathbf{s}(k - 1) + \mathbf{v}(k), $$
$$ y(k) = \mathbf{C}\mathbf{s}(k) + n(k),$$
where $\mathbf {s}(k) = (\theta _{k}, \omega _k)^T$, $\mathbf {v}(k) = (\varsigma _k, \varrho _k)^T$, $\mathbf {A} = \left ( \begin {array}{cc} 1 & N_b \\ 0 & 1 \end {array} \right )$, and $\mathbf {C} = [1, 0]$. The covariance matrix of the state noises is given by
$$\mathbf{Q} = \mathbb{E}[\mathbf{v}(k)\mathbf{v}^T(k)] = \left[ \begin{array}{cc} \sigma_{\varsigma}^2 & 0 \\ 0 & \sigma_{\varrho}^2 \end{array} \right],$$
where $\varsigma _k$ and $\varrho _k$ are assumed to be independent of each other. The measurement noise can be expressed as
$$\mathbf{R} = \mathbb{E}[n^2(k)] = \sigma_n^2.$$

For practical heterodyne detection, the measurement noise is arising from three aspects: the noise superposed on the QBSK signals before heterodyne detection, the measurement noise of the homodyne detector and the vacuum noise entering the empty port of the input beamsplitter corresponding to the two arms. Consequently, the measurement noise $\sigma _n^2$ can be modeled as $\sigma _n^2 = \frac {1 + \xi _{el} + \eta T_q(V_A + \xi _{ADC} + \xi _0)/2}{4\eta T_c(\sqrt {2}\alpha _C)^2/N_0} = \frac {1 + \xi _{el} + \sigma _{n_0}^2}{4\eta T_c(\sqrt {2}\alpha _C)^2/N_0}$ [44], where $\sigma _{n_0}^2 = \eta T_q(V_A + \xi _{ADC} + \xi _0)/2$.

Based on the models described by Eqs. (8) and (9), we can establish an iteration algorithm to acquire an optimal estimation of the state vector $\mathbf {s}(k)$, which is denoted by $\hat {\mathbf {s}}(k)$. For the initialization stage, we set $\mathbf {P}(0) = \mathbf {0}$, $\hat {\mathbf {s}}(0) = \mathbf {0}$. For the prediction stage, the prior estimation of the current state vector $\hat {\mathbf {s}}^{-}(k)$ and its error covariance matrix $\mathbf {P}^{-}(k) = \mathbb {E}[(\mathbf {s}(k) - \hat {\mathbf {s}}^{-}(k))(\mathbf {s}(k) - \hat {\mathbf {s}}^{-}(k))^T]$ are given as

$$\hat{\mathbf{s}}^{-}(k) = \mathbf{A}\hat{\mathbf{s}}(k - 1),$$
$$\mathbf{P}^{-}(k) = \mathbf{A}\mathbf{P}(k - 1)\mathbf{A}^T + \mathbf{Q}, $$
where $\hat {\mathbf {s}}(k - 1)$ and $\mathbf {P}(k - 1)$ are the posterior estimation of the state vector and its error covariance matrix in the previous block, respectively. For the update stage, the posterior estimation of the state vector $\hat {\mathbf {s}}(k)$ and its error covariance matrix $\mathbf {P}(k) = \mathbb {E}[(\mathbf {s}(k) - \hat {\mathbf {s}}(k))(\mathbf {s}(k) - \hat {\mathbf {s}}(k))^T]$ can be given by
$$\hat{\mathbf{s}}(k) = \hat{\mathbf{s}}^{-}(k) + \mathbf{G}(k)(y_k - \mathbf{C}\hat{\mathbf{s}}^{-}(k)) \equiv \hat{\mathbf{s}}^{-}(k) + \mathbf{G}(k)\mathbf{e}_k,$$
$$\mathbf{P}(k) = (\mathbf{I} - \mathbf{G}(k))\mathbf{P}^{-}(k)$$
with
$$\mathbf{G}(k) = \mathbf{P}^{-}(k)\mathbf{C}^T(\mathbf{C}\mathbf{P}^{-}(k)\mathbf{C}^T + \mathbf{R})^{{-}1},$$
where $\mathbf {I}$ is a second-order identity matrix. The innovation $\mathbf {e}_k$ can be calculated directly by [42]
$$\mathbf{e}_k = \tan^{{-}1}\left\{\mathrm{Im}\left[\sum_{l = 1}^{N_b}r^{-}_ld^{-{\ast}}_l\right]/\mathrm{Re}\left[\sum_{l = 1}^{N_b}r^{-}_ld^{-{\ast}}_l\right]\right\},$$
where $r^{-}_l$ and $d^{-}_l$ are the symbols before and after decision. The schematic diagram of the proposed carrier phase recovery scheme is shown in Fig. 2. For each block of $N_b$ complex amplitudes, they are split into two copies. One is used for phase estimation, and the other is given as output after phase recovery. The phase estimation includes three stages; prediction, observation, and update. The prediction stage is accomplished by using Eqs. (6), (12), and (13) and to obtain the prior estimates of the state vector $\hat {\mathbf {s}}^{-}(k)$, the error covariance matrix $\mathbf {P}^{-}(k)$ and the carrier phases ($\theta _{k,1}^{-}$, $\cdots$, $\theta _{k,N_b}^{-}$), respectively. In the observation stage, the innovation $\mathbf {e}_k$ is calculated directly by using Eq. (17). The update (optimum estimation) stage can be achieved according to the prior state vector $\hat {\mathbf {s}}^{-}(k)$, the error covariance matrix $\mathbf {P}^{-}(k)$ and the innovation $\mathbf {e}_k$. After that, the complex signals after phase recovery are obtained and the transmittance of the classical bits $T_c$ can be estimated by using the proposed parameter estimation method in the next section. Then, the classical bits can be recovered by $m_{B,l} = \frac {1}{2}[1+\mathrm {Re}(r_l')/|\mathrm {Re}(r_l')|]$ and $n_{B,l} = \frac {1}{2}[1+\mathrm {Im}(r_l')/|\mathrm {Im}(r_l')|]$, where $r_l'$ is the output complex amplitude after carrier recovery, $\mathrm {Re}(\bullet )$ and $\mathrm {Im}(\bullet )$ represent the real and imaginary parts of $\bullet$, respectively, and $l = 1, \ldots, N_b$. Finally, the QKD signals can be recovered by $r_l'' = r_l' - \sqrt {\frac {\eta \hat {T}_c}{2}}(e^{-im_{B,l}\pi } + ie^{-in_{B,l}\pi })\alpha _C$, where $r_l''$ is the complex amplitude of the quantum signal.

 figure: Fig. 2.

Fig. 2. The schematic diagram of the improved vector KF algorithm and the data recovery of the classical bit and quantum information.

Download Full Size | PDF

Since the transmittance of the satellite-mediated link is fluctuated in a frequency of the order of kHz, the measurement noise $\sigma _n^2$ will be fluctuated with the transmittance. It is reasonable to assume that the transmittance is a constant value in a coherent time of $10^{-4}$s. Therefore, to obtain a accurate estimation of the measurement noise, we should make a relative precise estimation of transmittance in each coherent time before the CPE. This estimation method is shown in Section 4. Then, the measurement noise $\mathbf {R}(j)$ can be updated for the $j$th coherent time.

Based on the above improved vector KF algorithm, we acquire an excellent tracking capability of CFO even for the FO of 50 MHz, as shown in Fig. 3(a), where we assume $\Delta f_A = \Delta f_B = 1$ MHz, the symbol rate is 10 Gs/s, the channel coherent time is $10^{-4}$ s, the parameter $\sigma _{\varrho }^2 = 5\times 10^{-9}$, the BER is $10^{-5}$ (which is the expected BER to obtain the displacement $\alpha _C$), the modulation variance $V_A = 4$ (shot noise units), the transmittance is 0.3 ($T_c$ and $T_q$), the block length $N_b = 5$, and the detector’s electronic noise and efficiency are 0.1 (shot noise units) and 0.6 respectively. Distinctly, the impact from the CFO can be almost completely eliminated and the estimation accuracy of carrier phase can be determined by the algebraic Riccati equation applied in the Ref. [43]. Therefore, after Bob’s phase compensation, we can estimate the residual phase noise as [43]

$$\sigma_{ph}^2 = \frac{1}{2}\left[\sqrt{\sigma_{\varsigma}^2(\sigma_{\varsigma}^2 + 4\sigma_n^2)} - \sigma_{\varsigma}^2\right],$$
which can be seen as the theoretical MSE limit of the scalar KF [43] in the ideal case where the optical frequency difference is eliminated completely. In Fig. 3(b), we show the real-time MSE performance (the first diagonal element of the error covariance matrix $\textbf {P}(k)$) and compare it with the theoretical MSE limit. Furthermore, multiple simulation results show that the real-time MSE is fluctuated around the theoretical limit (the deviation is within the order of $10^{-6}$). The results indicate that the phase estimation error is almost approximate to the theoretical MSE limit, demonstrating that the proposed vector KF reaches the ideal case of the scalar KF and the theoretical estimation of phase noise using Eq. (18) is reasonable for the estimation of the practical phase noise.

 figure: Fig. 3.

Fig. 3. The simulation results of the FO and the MSE of the phase estimation for the proposed KF algorithm. (a) The estimated FO. (b) The real-time phase estimation MSE.

Download Full Size | PDF

According to Eqs. (1) and (18), the phase excess noise increases with the spectral linewidth, the block length $N_b$, the power of the classical QPSK signal and the modulation variance $V_A$. To control the magnitude of phase noise and take advantage of the parallelism of the KF algorithm, we should choose the laser with smaller spectral linewidth and a overall consideration of block length $N_b$. From Eq. (3), the BER-introduced noise decreases with the increase of the power of the classical QPSK signal. To clearly see this point, we plot the phase excess noise, the sum of the phase excess noise and the BER-introduced noise and the BER as a function of the power of the classical QPSK signal in Fig. 4, where the phase excess noise based on the result in Ref. [37] is also shown (dash-dotted line) for comparison. We can see that the phase excess noise based on our improved vector KF algorithm is lower than that of the Mth-power algorithm in Ref. [37], which means a more accurate phase compensation can be achieved by simultaneously performing the CP and CFO estimation. Meanwhile, although a low classical QPSK signal power can help us to suppress the phase excess noise, the BER-introduced noise will increase remarkably while the classical QPSK signal power is lower than a certain value. Therefore, while the spectral linewidth of laser and the block length $N_b$ is selected properly, the classical QPSK modulation displacement $\alpha _C$ should be optimized for each zenith angle at a fixed height or at least be optimized at a fixed height for a overall consideration of all zenith angles.

 figure: Fig. 4.

Fig. 4. The sum of the phase excess noise and the BER-introduced noise, the phase excess noise and the BER as a function of the power of the classical QPSK signal. The linewidth of lasers is 1 kHz, the symbol rate is 10 Gs/s, the block length is $N_b = 5$, the modulation variance $V_A = 4$, $\eta = 0.6$, $\xi _{el} = 0.1$, the channel transmittance is 0.25. The left coordinate is corresponding to the noise variance, and the right coordinate is used to depict the BER of classical communication. We also use the method described in Ref. [37] to calculate the corresponding phase excess noise (optimizing the block length with Eq. (12) in Ref. [37]), which is displayed by the dash-dotted line.

Download Full Size | PDF

4. Channel parameter estimation

After finishing the carrier phase recovery, the next step of DSP is the classical bit recovery and the channel parameter estimation, in which the obtained channel parameters are indispensable for the following quantum information extraction and performance evaluation.

The channel is characterized by two parameters, the transmittance and the excess noise. For the SQCC scheme, the classical bits and the QKD signals may be controlled by Eve so that the transmittances of them may be different. For example, in the case of intercept-and-resent attack, Eve has some freedom to control the loss/noise of the QKD signals and the classical bits separately when she regenerates the overall quantum states. Therefore, one has to estimate both the transmittances of the classical bits $T_c$ and the QKD signals $T_q$ separately. This can be reached as follows.

Before the phase compensation, the quadratures of the received signal in Heisenberg picture are given by

$$\begin{pmatrix} x_B \\ p_B \end{pmatrix}= \sqrt{\frac{\eta T_c}{2}}\begin{pmatrix} \cos\theta & \sin\theta \\ -\sin\theta & \cos\theta \end{pmatrix}\begin{pmatrix} x_C \\ p_C \end{pmatrix} + \sqrt{\frac{\eta T_q}{2}}\begin{pmatrix} \cos\theta & \sin\theta \\ -\sin\theta & \cos\theta \end{pmatrix}\begin{pmatrix} x_A \\ p_A \end{pmatrix} + \begin{pmatrix} x_{N} \\ p_{N} \end{pmatrix},$$
where $x_C$ and $p_C$ are quadratures coming from the classical modulation, $x_{N}$ and $p_{N}$ represent quadratures of Gaussian noise coming from the ADC quantization noise $\xi _{ADC}$, the shot noise, the detector’s electronic noise $\xi _{el}$ and the other untrusted noise $\xi _0$, and $\theta$ is the carrier phase of the transmitter laser referenced to the LO. Note that the variance of $x_N$ (or $p_N$) is $V_N = 1 + \frac {\eta T_q}{2}\xi _{ADC} + \xi _{el} + \frac {\eta T_q}{2}\xi _0$. After the phase compensation, Alice and Bob share a set of related data. As the classical QPSK modulation can be shared by Alice and Bob with an extremely low error probability (typically lower than $10^{-5}$) after phase compensation, they can take advantage of this shared modulation to complete the estimation of the transmittances. The equivalent transfer relationship of one quadrature variable after phase compensation can be described in Heisenberg picture as follow:
$$\begin{aligned} x_{B}' = &\sqrt{\frac{\eta T_c}{2}}x_C +\sqrt{\frac{\eta T_q}{2}}x_A + x_N + x_{phase} + x_{BER}\\ = &\sqrt{\frac{\eta T_c}{2}}x_C +\sqrt{\frac{\eta T_q}{2}}x_A + x_{N_1} = \sqrt{\frac{\eta T_c}{2}}x_C + x_{N_2}, \end{aligned}$$
where $x_{phase}$ and $x_{BER}$ are respectively the quadratures of the equivalently residual phase compensation error noise and the BER-introduces noise, $x_{N_1} = x_N + x_{phase} + x_{BER}$ and the variance of $x_{N_1}$ is $V_{N_1} = V_N + \frac {\eta T_q}{2}\xi _{\sigma _{ph}} + \frac {\eta T_q}{2}\xi _{BER}$, $x_{N_2} = x_{N_1} + \sqrt {\frac {\eta T_q}{2}}x_A$ and the variance of $x_{N_2}$ is $V_{N_2} = V_{N_1} + \eta T_qV_A/2$. Denote $A_i$, $B_i$ and $Q_i$ the realizations of $x_A$, $x_B'$ and $x_C$, respectively. The covariance of $x_C$ and $x_B'$ is $\texttt {Cov}(x_C,x_B) = \sqrt {\frac {\eta T_c}{2}}V_C =: C_{QB}$. For simplicity, we assume that the transmittances of the classical bits for each constellation points are equal. Thus, based on the maximum likelihood estimation, the transmittance of the classical bits $T_c$ can be estimated by
$$\hat{T}_c = \frac{2(\hat{C}_{QB})^2}{\eta V_C^2}$$
with $\hat {C}_{QB} = \frac {1}{m}\sum _{i = 1}^{m}Q_iB_i$, where $\hat {C}_{QB}$ is a maximum likelihood estimator with variance $\mathrm {Var}(\hat {C}_{QB}) = \frac {V_CV_{N_2}}{m}$, $m$ is the number of received signals in one coherent time. In the above derivation, we have used the relationships $\mathrm {Var}(x_C) = \alpha _C^2/N_0 = V_C$. From that we can obtain its mean $\mathbb {E}(\hat {T}_c) = T_c + 2\mathrm {Var}(\hat {C}_{QB})/\eta V_C^2 = T_c + O(\frac {1}{mV_C})$ and variance $\mathrm {Var}(\hat {T}_c) = \sigma _{\hat {T}_c}^2 = 8T_c\mathrm {Var}(\hat {C}_{QB})/\eta V_C^2 + 8[\mathrm {Var}(\hat {C}_{QB})]^2/\eta ^2V_C^4 = O(\frac {1}{mV_C})$ [45]. Similarly, to estimate $\sqrt {T_c}$, one can define another maximum likelihood estimator
$$\sqrt{\hat{T}_c} = \sqrt{\frac{2(\hat{C}_{QB})^2}{\eta V_C^2}}$$
such that the mean and variance of it are $\mathbb {E}(\sqrt {\hat {T}_c}) = \sqrt {T_c}$ and $\mathrm {Var}(\sqrt {\hat {T}_c}) = 2\mathrm {Var}(\hat {C}_{QB})/\eta V_C^2 = O(\frac {1}{mV_C})$, respectively.

Based on the estimated $\sqrt {T_c}$, we can further estimate the transmittance of the QKD signals $T_q$. Extract the classical displacement from $x_B'$, we have

$$x_{B}^{\prime\prime} = \sqrt{\frac{\eta T_c}{2}}x_C - \sqrt{\frac{\eta\hat{T}_c}{2}}x_C + \sqrt{\frac{\eta T_q}{2}}x_A + x_{N_1} \cong \sqrt{\frac{\eta T_q}{2}}x_A + x_{N_1}.$$

Note, as the estimation of $\sqrt {T_c}$ is unbiased and the variance of the estimator $\sqrt {\hat {T}_c}$ is of the order of $O(\frac {1}{mV_C})$, the noise coming from the imperfect classical displacement extraction is negligible. Denote $B_i'$ the realizations of $x_B''$. The covariance of $x_A$ and $x_B''$ is $\texttt {Cov}(x_A,x_B'') = \sqrt {\frac {\eta T_q}{2}}V_A =: C_{AB}$. Then, the transmittance of the QKD signals $T_q$ can be estimated as

$$\hat{T}_q = \frac{2(\hat{C}_{AB})^2}{\eta V_C^2}$$
with $\hat {C}_{AB} = \frac {1}{m_1}\sum _{i = 1}^{m_1}A_iB_i'$, where $\hat {C}_{AB}$ is a maximum likelihood estimator with variance $\mathrm {Var}(\hat {C}_{AB}) = (\eta T_qV_A^2 + V_AV_{N_1})/m_1$, $m_1 = fm$ is the number of revealed Gaussian modulation information, $f$ is the rate of the revealed Gaussian-modulated information. Therefore, the mean and variance of $\hat {T}_q$ are
$$\mathbb{E}(\hat{T}_q) = T_q + 2\mathrm{Var}(\hat{C}_{AB})/\eta V_A^2 = T_q + O(\frac{1}{m_1}),$$
$$\mathrm{Var}(\hat{T}_q) = 8T_q\mathrm{Var}(\hat{C}_{AB})/\eta V_A^2 = \sigma_{\hat{T}_q}^2.$$

The next step is to estimate the excess noise. Although the superposed classical QPSK modulation can increase the total noise of the SQCC system, we can take advantage of this double-modulated scheme for the estimation of excess noise, which has been demonstrated in Ref. [45]. Furthermore, different from the method presented in Ref. [45], the estimation of excess noise can be finished without any classical communication to disclose the second modulation. Thus, to obtain the estimation of the excess noise $\hat {V}_n$, we use two maximum likelihood estimators $\hat {V}_{n_1}$ and $\hat {V}_{n_2}$. For the former one, it has the following form

$$\hat{V}_{n_1} = \frac{1}{m_1}\sum_{i = 1}^{m_1}(B_i' - \sqrt{\frac{\eta \hat{T}_q}{2}}A_i)^2 - 1 - \xi_{el}.$$

For the latter one, it can be expressed as

$$\hat{V}_{n_2} = \frac{1}{m}\sum_{i = 1}^{m}(B_i - \sqrt{\frac{\eta \hat{T}_c}{2}}Q_i)^2 - 1 - \xi_{el} - \frac{\eta \hat{T}_q}{2}V_A.$$

We can see that $B_i' - \sqrt {\frac {\eta T_q}{2}}A_i$ and $B_i - \sqrt {\frac {\eta T_c}{2}}Q_i$ are normally distributed with variances $V_{N_1}$ and $V_{N_2}$, respectively. Consequently, $Y_1 := \Sigma _{i = 1}^{m}(\frac {B_i' - \sqrt {\frac {\eta T_q}{2}}A_i}{\sqrt {V_{N_1}}})^2$ and $Y_2 := \Sigma _{i = 1}^{m}(\frac {B_i - \sqrt {\frac {\eta T_c}{2}}Q_i}{\sqrt {V_{N_2}}})^2$ will be $\chi ^2$ distributed: $Y_1(Y_2) \sim \chi ^2(m)$. Thus, the mean of estimators $\hat {V}_{n_1}$ and $\hat {V}_{n_2}$ can be expressed as

$$\mathbb{E}(\hat{V}_{n_1}) = \mathbb{E}(\hat{V}_{n_2}) = \frac{\eta T_q}{2}(\xi_{ADC} + \xi_0 + \xi_{\sigma_{ph}} +\xi_{BER}) = \frac{\eta T_q}{2}\xi_{t} \equiv V_{\epsilon}.$$

Then, the estimator $\hat {V}_n$ can be obtained as

$$\hat{V}_{n} = \nu_n\hat{V}_{n_1} + (1 - \nu_n)\hat{V}_{n_2}$$
with $\nu _n = \frac {\sigma _{\hat {n}_2}^2}{\sigma _{\hat {n}_1}^2 + \sigma _{\hat {n}_2}^2}$, $\sigma _{\hat {n}_1}^2 = \frac {2}{m_1}(V_{N_1})^2$, $\sigma _{\hat {n}_2}^2 = \frac {2}{m}(V_{N_2})^2 + \frac {\eta ^2V_A^2\sigma _{\hat {T}_q}^2}{4}$, where $\sigma _{\hat {n}_1}^2$ and $\sigma _{\hat {n}_2}^2$ are the variance of the estimator $\hat {V}_{n_1}$ and $\hat {V}_{n_2}$, respectively. The mean of $\hat {V}_n$ is $\mathbb {E}(\hat {V}_n) = V_{\epsilon }$, and its variance is given by
$$\mathrm{Var}(\hat{V}_n) = \frac{\sigma_{\hat{n}_1}^2\sigma_{{n_2}}^2}{\sigma_{\hat{n}_1}^2 + \sigma_{\hat{n}_2}^2} = \sigma_{\hat{V}_n}^2.$$

Note that given the transmittances of the classical and quantum signals, Eve adds noise to the classical bits will be equivalent to add it on the quantum signals as the classical and quantum modulations can be extracted out accurately. Consequently, it is feasible to take advantage of the dual modulation for the estimation of excess noise.

Now, let us resolve the left problem in the previous section. In the KF algorithm, to obtain a more accurate estimation of measurement noise, we need to estimate the transmittance of the classical bits $T_c$ and the noise $\sigma _{n_0}^2$ for each coherent time before the phase compensation. This can be achieved by two steps. Firstly, one can assume that the transmittances of the classical bits and the QKD signals are equal, so that one is able to obtain a coarse estimation of the measurement noise. Since the carrier phase is unknown for the originally received complex signals before phase compensation, we need to choose a quantity that can obtain the information of the transmittance but is insensible to the CP. For this purpose, we define $R_B = x_B^2 + p_B^2$, and the mean of it can be given by

$$\mathbb{E}(R_B) =\eta T_cV_C + \eta T_q(V_A + \xi_{ADC}+ \xi_0) + 2(1 + \xi_{el}) = \mathbb{R}.$$

In the above derivation, we have used the relationships $x_C^2 + p_C^2 = 2\alpha _C^2/N_0$, $\mathrm {Var}(x_C) = \mathrm {Var}(p_C) = \alpha _C^2/N_0 = V_C$. Based on the quantity of $R_B$, we can define the maximum likelihood estimator $\hat {R}_B = \frac {1}{m}\sum _{i = 1}^{m}R_i$, where $R_i$ denotes the realizations of $R_B$ ($i \in {1, 2, \ldots, m}$). Thus, the mean of $\hat {R}_B$ is given as

$$\mathbb{E}(\hat{R}_B) = \frac{1}{m}\sum_{i = 1}^{m}\mathbb{E}(R_i) = \mathbb{E}(R_B) = \mathbb{R}.$$

The channel transmittance $T$ (assuming that $T_c = T_q = T$) can be estimated by

$$\hat{T}_1 = \frac{\hat{R}_B - 2(1 + \xi_{el})}{\eta(V_A + V_C + \xi_{ADC}+ \xi_0)} \cong \frac{\hat{R}_B - 2(1 + \xi_{el})}{\eta(V_A + V_C)}.$$

Then, the measurement noise can be approximated as $\sigma _{n}^2 = \frac {1 + \xi _{el} + \eta \hat {T}_1V_A/2}{4\eta \hat {T}_1(\sqrt {2}\alpha _C)^2/N_0}$. With this approximated measurement noise, one can use the proposed KF algorithm to achieve a coarse carrier phase recovery with a relatively large block length (to achieve a fast carrier phase recovery), which can still reach a very low BER but result in a larger phase noise. After that, a high-precise estimation of $T_c$ can be obtained according to Eq. (25). Secondly, the noise $\sigma _{n_0}^2$ is able to estimated from the originally received complex signals, given by

$$\hat{\sigma}_{n_0}^2 = \frac{1}{2}[\hat{R}_B - \eta\hat{T}_cV_C - 2(1 + \xi_{el})].$$

Based on the estimated noise $\hat {\sigma }_{n_0}^2$, one can perform our improved KF algorithm again with an appropriate block length to obtain a more accurate estimation of carrier phase.

5. Performance analysis

In this section, we show the performance of the proposed scheme in terms of secret key rate based on the above noise model and the parameter estimation methods. The global simulation parameters involved in the following analysis are shown in the Table 1. We have consider the satellite-mediated link, where the probability distribution of the channel transmittance is obtained by the elliptic-beam model [4649] shown in the Appendix A. Meanwhile, an extra extinction factor contributed from the absorption and back-scattering should be taken into account to obtain the final distribution of the channel transmittance. The extinction factor has the form $T_{ext} = \exp [-\vartheta \sec (\zeta )]$, where $\zeta$ is the zenith angle, and $\vartheta = 0.7$ [46,49]. We also take three atmospheric conditions into account, including the clear day, the clear night and the fog night. The detailed calculations of the secret key rate are shown in Appendix B. As the results corresponding to the atmospheric condition of clear day are close to that of the clear night, we don’t show them in the following simulations.

Tables Icon

Table 1. Simulation parameters.

We first show the numerical results for the untrusted noise model. In this noise model, although the residual phase noise can be estimated essentially from the proposed phase compensation algorithm, it is assumed to be controlled by Eve for a conservative evaluation. We show the performance of the proposed SQCC scheme in various altitude for both downlink and uplink in Fig. 5, where the laser linewidths of the transmitter and receiver are set to 1 kHz and 10 kHz, respectively. For each altitude, the disclosed raw key rate f and the classical signal power (shot noise unit) are optimized to get the maximum value of the sum of secret key rates throughout all the zenith angles. From the results shown in the figures, we can see that with our proposed parameter estimation methods, the SQCC scheme is feasible over satellite-mediated link for a typical data length of $10^9$ with various atmospheric conditions but requires, however, very narrow laser linewidth. Although the atmospheric thickness is identical for both the downlink and the uplink, the performance of the uplink is much worse as the turbulence of atmosphere effects the signals at the beginning of its transmission. For the laser linewidth of 1 kHz, the tolerable zenith angle of downlink, where the secret key rate is positive in the atmospheric condition of clear night, can be up to about 45 and 28 degree while the satellite altitude is 160 km and 300 km (black solid lines in the first row of the figures), respectively. The tolerable zenith angle reduces to about 44 and 23 degree (green solid lines in the first row of the figures) in the atmospheric condition of fog night. For the uplink, the tolerable zenith angle reaches about 33 degree in the clear night for the altitude of 100 km (black solid line in the lower left of the figures). Non positive secret key rate can be obtained when the atmospheric condition turns into fog night or the altitude increases to 150 km. If the laser linewidth becomes to 10 kHz, the performance of the both cases of downlink and uplink has a relatively large degradation. In this case, the tolerable zenith angle of downlink at the altitude of 160 km reduce to about 31 and 28 degree for the clear night and fog night (red and blue solid lines in the top left of the figures), respectively. At the altitude of 300 km, we can not obtain a positive secret key rate. The tolerable zenith angle of uplink at the altitude of 100 km degrades to only about 12 degree for the clear night (red solid line in the lower left of the figures). No secret key can be acquired in the other cases for the uplink when the laser linewidth is 10 kHz. The results of asymptotical secret key rates are also displayed in Fig. 5 to show the upper bound of performance for the untrusted noise model.

 figure: Fig. 5.

Fig. 5. The secret key rate of the proposed SQCC scheme as a function of the zenith angle under the untrusted noise model. The laser linewidths of 1 kHz and 10 kHz are considered for both the downlink and uplink case. The solid lines represent the secret key rates of finite-size case. The black lines denote the case of 1 kHz linewidth in the clear night. The red lines are the case of 10 kHz in the clear night. The green lines represent the case of 1 kHz in the fog night. The blue lines express the case of 10 kHz in the fog night. The dash-dotted lines are the secret key rates of the asymptotical case. CN, clear night; FN, fog night.

Download Full Size | PDF

We now consider the trusted noise model where the phase noise after phase compensation is not controlled by Eve. We set the laser linewidths to 10 kHz and 1 MHz, respectively. The numerical simulation results for various altitudes and atmospheric conditions are shown in Fig. 6. Similarly, the asymptotical secret key rates of the trusted noise model are also shown for comparison. We can see that the obtained performance and the tolerable laser linewidth are better and larger than that of the untrusted model above. For the laser linewidth of 10 kHz, the tolerable zenith angles of downlink at the altitude of 160 km can reach 52 degree for both the clear night and fog night (red and blue solid lines in the top left of the figures). Even the altitude is up to 500 km, the tolerable zenith angle at which the key can be distributed still reaches about 28 degree (red and blue solid lines in the top right of the figures). For uplink, the reachable zenith angle is close to 40 degree at the altitude of 100 km for the clear night (red solid lines in the lower left of the figures). At the altitude of 160 km, the tolerable zenith angle can be up to near 22 degree for the clear night (red solid line in the lower right of the figures). No key can be obtained for other atmospheric conditions. While the laser linewidth increases to 1 MHz, different from the situation of the untrusted noise model, we don’t find a significant performance degradation compared with that of 10 kHz laser linewidth, meaning that the standard distributed feedback lasers (linewidths of order of MHz) can be used in this case. From a practical point of view, since the phase noise can be tracked in real time with our improved vector KF algorithm, it is reasonable to consider the trusted noise model and thus feasible to deploy the SQCC scheme over satellite-mediated link with the commercial communication devices.

 figure: Fig. 6.

Fig. 6. The secret key rate of the proposed SQCC scheme as a function of the zenith angle under the trusted noise model. The laser linewidths of 10 kHz and 1 MHz are shown for both the downlink and uplink case. The solid lines represent the secret key rates of finite-size case. The red lines denote the case of 10 kHz linewidth in the clear night. The blue lines are the case of 10 kHz in the fog night. The cyan lines represent the case of 1 MHz in the clear night. The magenta lines express the case of 1 MHz in the fog night. The dash-dotted lines are the secret key rates of the asymptotical case. CN, clear night; FN, fog night.

Download Full Size | PDF

We remark that the optimal disclosed raw key rate f is lower than that of the case that only uses one estimator to estimate the excess noise, meaning that one can get a higher estimation precise of excess noise with sacrificing a low rate of raw keys. In other words, if take advantage of the extra information carried by the classical QPSK signals, one can not only perform a better excess noise estimation, but also acquire a higher secret key rate. Benefit from this, when the data length is $10^{9}$, the secret key rate considering finite-size effect is close to that of the asymptotical case, as shown in Fig. 5 and 6. Moreover, the block length $N_b$ is set to 5 for all the simulations above. One can obtain a higher precise of phase compensation by setting a smaller value of $N_b$, which results in a better system performance but at the expense of increasing the time complexity of the phase estimation. Besides, when the zenith angle approaches to the maximal tolerable zenith angle, we find that the BER of classical communication remains of the order of $10^{-5}$, which is acceptable for the practical communication.

With our proposed channel parameter estimation method, we also extend the SQCC scheme suggested in Ref. [37] to the satellite-mediated link and show its performance in Fig. 7, where the solid lines represent the results of our proposed scheme. We can see that for both the untrusted and the trusted noise model, the performance of secret key rate and the achievable zenith angle based on our improved vector KF algorithm is better than that based on the Mth-power algorithm, which results from the fact that the phase excess noise of the former is lower than that of the latter (see Fig. 4). Similar results can be obtained for other satellite altitudes.

 figure: Fig. 7.

Fig. 7. The secret key rate of the SQCC scheme using the KF algorithm or the Mth-power algorithm as a function of the zenith angle under finite-size effect. (a) Untrusted noise model with laser linewidth of 1 kHz. (b) Trusted noise model with laser linewidth of 1 MHz. The solid lines represent the results using our proposed KF algorithm. The dotted lines denote the results using the Mth-power algorithm in Ref. [37]. The block size $N_b$ is 5 for the case using the KF algorithm, while it is optimized for the case using the Mth-power algorithm. Other simulation parameters are the same with in Table 1. The atmospheric conditions here are all assumed to be clear night.

Download Full Size | PDF

6. Conclusion

We have proposed the KF-enabled parameter estimation for the SQCC scheme over satellite-mediated link. Using the improved KF CPE algorithm, the carrier phase and FO referred to the true LO can be simultaneously estimated and recovered with high precise, which enables the phase estimation error of the proposed KF algorithm can be lower than that of the Mth-power algorithm and be almost approximate to the theoretical MSE limit. Since Eve has full access and control of the classical bits, the transmittances of the classical signals and the quantum signals need to be estimated separately. Taking advantage of the accurate phase estimation and the dual modulation of the SQCC scheme, the excess noise can be estimated with not only a higher precise but also a lower rate of sacrificed raw keys. Based on our parameter estimation methods, numerical simulations demonstrate the feasibility and confirm the conditions required for the SQCC scheme in both the downlink and uplink. Further, benefiting from the lower phase estimation error, the performance of our proposed scheme in terms of the secret key rate and the achievable zenith angle is better than that of the SQCC scheme based on the Mth-power algorithm. Our work suggests the operable parameter estimation methods of the SQCC scheme that is applied into the satellite-mediated coherent optical communication system. These parameter estimation methods can also be used in other channels, such as fiber and under water channels.

Appendix

A. Elliptic-beam model

In this section, we give a brief review of the elliptic-beam model used for describing the probability distribution of the transmissivity of the satellite-mediated link [4649]. In this model, the received beam is assumed to have the profile of ellipse and can be modeled by a random vector $\upsilon = (x_0, y_0, W_1, W_2, \varphi )$, where $(x_0, y_0)$ is the beam-centroid coordinates of the arriving beam in the received aperture, $W_1$ and $W_2$ are the two half axis of the elliptical beam, $\varphi$ is the angle of the half axis $W_1$ relative to the x-axis. With the knowledge of the mean values and covariance matrix of the vector $\upsilon$, one is able to estimate the probability density function of the transmissivity via the Monte Carlo method. In the Monte Carlo simulation, the transmittance T is expressed as [4649]

$$T = {{T}_{0}}\exp \left\{ -{{\left[ \frac{r/a}{R\left( \frac{2}{{{W}_{eff}}\left(\varphi - \phi\right)} \right)} \right]}^{\lambda \left( \frac{2}{{{W}_{eff}}\left(\varphi - \phi\right)} \right)}} \right\},$$
where
$$\lambda \left( \tau \right)= 2a^{2}{{\tau }^{2}}\frac{\exp \left({-}a^{2}{{\tau }^{2}} \right){{I}_{1}}\left( a^{2}{{\tau }^{2}} \right)}{1-\exp \left({-}a^{2}{{\tau }^{2}} \right){{I}_{0}}\left( a^{2}{{\tau }^{2}} \right)}\left[ \ln \left( 2\frac{1-\exp \left( -\frac{1}{2}a^{2}{{\tau }^{2}} \right)}{1-\exp \left({-}a^{2}{{\tau }^{2}} \right){{I}_{0}}\left( a^{2}{{\tau }^{2}} \right)} \right) \right],$$
$$R\left(\tau\right)=\left[\mathrm{ln}\left( 2\frac{1-\exp \left( -\frac{1}{2}a^{2}{\tau }^{2} \right)}{1-\exp \left({-}a^{2}\tau^{2} \right){I}_{0}\left( a^{2}\tau^{2} \right)} \right) \right]^{-\frac{1}{\lambda \left( \tau \right)}},$$
$$\begin{aligned}{{T}_{0}}=&1-{{I}_{0}}\left( a^{2}\frac{W_{1}^{2}-W_{2}^{2}}{W_{1}^{2}W_{2}^{2}} \right)\exp \left[{-}a^{2}\frac{W_{1}^{2}+W_{2}^{2}}{W_{1}^{2}W_{2}^{2}} \right]- 2\left\{ 1-\exp \left[ -\frac{a^{2}}{2}{{\left( \frac{1}{{{W}_{1}}}-\frac{1}{{{W}_{2}}} \right)}^{2}} \right] \right\}\\ &\times \exp \left\{ -\left[ \frac{\frac{\left( {{W}_{1}}+{{W}_{2}} \right)^{2}}{\left| W_{1}^{2}-W_{2}^{2} \right|}}{R\left( \frac{1}{{W}_{1}}-\frac{1}{{W}_{2}} \right)}\right]^{\lambda \left( \frac{1}{{W}_{1}}-\frac{1}{{W}_{2}} \right)} \right\}, \end{aligned}$$
$$W_{eff}\left(\tau\right) = 2a \left[ \omega\left( \frac{4a^{2}}{{{W}_{1}}{{W}_{2}}}e^{ \frac{a^{2}}{W_{1}^{2}}\left( 1+2{{\cos }^{2}}\tau \right) + \frac{a^{2}}{W_{2}^{2}}\left( 1+2{{\sin }^{2}}\tau \right)} \right) \right]^{{-}1/2},$$
$r = x_0^2 + y_0^2$, $\phi$ is the angle of $\textbf {r} = (x_0, y_0)$ in the polar coordinates $(r, \phi )$, a is the receiving lens radius, and $\omega (\cdot )$ denotes the Lambert W function.

To apply the Monte Carlo method, one needs to obtain the mean values and covariance matrix of the vector $\upsilon$. Since the parameter $\varphi$ is assumed to be a uniform distribution in $[0, \pi /2]$ and has no correlation with other parameters [47,48], the mean values of the vector $\upsilon$ reduces to the form [46,49]

$$\bar{\upsilon} = (\langle x_0\rangle, \langle y_0\rangle, \langle W_1^2\rangle, \langle W_2^2\rangle),$$
where the elements $\langle x_0\rangle = \langle y_0\rangle = 0$. The covariance matrix of $\upsilon$ can be given as
$$\Sigma = \left( \begin{array}{cccc} \langle\Delta x_0^2\rangle & 0 & 0 & 0\\ 0 & \langle\Delta y_0^2\rangle & 0 & 0\\ 0 & 0 & \langle\Delta W_1^2\rangle & \langle\Delta W_1\Delta W_2\rangle\\ 0 & 0 & \langle\Delta W_1\Delta W_2\rangle & \langle\Delta W_2^2\rangle \end{array} \right).$$

For downlink case,

$$\langle\Delta x_0^2\rangle_{\textrm{down}} = \langle\Delta y_0^2\rangle_{\textrm{down}} = \varpi H\sec(\zeta_1),$$
$$\langle W_i^2\rangle_{\textrm{down}} = \frac{4H^2\sec^2(\zeta_1)}{k^2W_0^2}[1 + \frac{\pi}{24}n_0W_0^2\sec(\zeta_1)\frac{H_0^3}{H^2} + 1.1C_n^2k^2W_0^{5/3}\sec(\zeta_1)\frac{H_0^{8/3}}{H^{5/3}} ],$$
$$\langle\Delta W_i\Delta W_j\rangle_{\textrm{down}} = (2\delta_{ij} - 0.8)\frac{4.14H_0^{8/3}C_n^2H^{7/3}\sec^5(\zeta_1)}{k^2W_0^{7/3}}[1 + \frac{\pi}{24}n_0W_0^2\sec(\zeta_1)\frac{H_0^3}{H^2}],$$
where $k$ is the optical wave number, $\varpi$ the boresight error, $\zeta _1$ the zenith angle, $H$ the altitude of the satellite, $H_0$ the thickness of the atmosphere, $W_0$ the initial Gaussian beam radius, $n_0$ the scatterer particles per unit volume in the equivalent atmosphere channel and $C_n^2$ the atmospheric index-of-refraction structure constant in the equivalent channel. In this paper, we consider three atmospheric conditions, and the values of $C_n^2$ and $n_0$ under these three conditions are shown in Table 2. For uplink case,
$$\langle\Delta x_0^2\rangle_{\textrm{up}} = \langle\Delta y_0^2\rangle_{\textrm{up}} = 1.16H_0C_n^2W_0^{{-}1/3}H^2\sec^3(\zeta_2),$$
$$\langle W_i^2\rangle_{\textrm{up}} = \frac{4H^2\sec^2(\zeta_2)}{k^2W_0^2}[1 + \frac{\pi}{8}n_0W_0H\sec(\zeta_2) + 1.8C_n^2k^2W_0^{5/3}H_0\sec(\zeta_2) ],$$
$$\langle\Delta W_i\Delta W_j\rangle_{\textrm{up}} = (2\delta_{ij} - 0.8)\frac{11H_0C_n^2H^{4}\sec^5(\zeta_2)}{k^2W_0^{7/3}}[1 + \frac{\pi}{8}n_0W_0^2H_0\sec(\zeta_2)],$$
where $\zeta _2$ is the zenith angle.

Tables Icon

Table 2. The parameters of the equivalent atmosphere channel [46,49].

B. Calculations of the secret key rate

For the GMCS CVQKD protocol, the equivalent entanglement-based scheme of it is more convenient for security analysis. The covariance matrix of the ensemble-average state at the output of the fluctuating channel is given by [5052]

$$\Gamma_{AB} = \left( \begin{array}{cc} V\mathbf{I} & \sqrt{T_e}\sqrt{V^2 - 1}\sigma_Z\\ \sqrt{T_e}\sqrt{V^2 - 1}\sigma_Z & T_e(V + \chi_{line})\mathbf{I} \end{array} \right)$$
with the parameters
$$V = V_A + 1,$$
$$T_e = \langle\sqrt{T_q}\rangle^2,$$
$$\chi_{line} = \frac{1 - T_e}{T_e} + \varepsilon_e - \langle\xi_{\sigma_{ph}}\rangle^{trust},$$
$$\varepsilon_e = \frac{X_1(V - 1) + 2\langle V_{\varepsilon}\rangle/\eta}{T_e},$$
$$X_1 = \langle T_q\rangle - \langle\sqrt{T_q}\rangle^2,$$
where $\mathbf {I} = \bigg (\begin {array}{cc} 1 & 0 \\ 0 & 1 \end {array}\bigg )$, $\sigma _Z = \bigg (\begin {array}{cc} 1 & 0 \\ 0 & -1 \end {array}\bigg )$, $T_e$ and $\chi _{line}$ are the effective transmittance and channel added excess noise, respectively. For the trusted noise model, $\langle \xi _{\sigma _{ph}}\rangle ^{trust} = \langle \xi _{\sigma _{ph}}\rangle = \int P(T_q)\xi _{\sigma _{ph}}(T_q)$, where $P(T_q)$ is the probability density function of $T_q$. Otherwise, $\langle \xi _{\sigma _{ph}}\rangle ^{trust} = 0$. We assume that $\langle V_{\varepsilon }\rangle = \eta \langle T_q\rangle \xi _t/2$ for simplicity. In practical implementation, $\langle V_{\varepsilon }\rangle$ should be regarded as $\int P(T_q)V_{\varepsilon }(T_q)$.

To get the secret key rate in the finite-size case, we first calculate the asymptotical secret key rate of the GMCS CVQKD. For the reverse reconciliation case, the asymptotical secret key rate read as [34]

$$K_{asy} = \beta I_{AB} - \chi_{BE},$$
where $I_{AB}$ is the Shannon mutual information between Alice and Bob, $\beta$ is the reconciliation efficiency, $\chi _{BE}$ is the Holevo bound on Eve’s information about Bob’s secret key. The mutual information between Alice and Bob can be given by [34]
$$I_{AB} = \log\left(\frac{V + \chi_{tot}}{1 + \chi_{tot}}\right),$$
where
$$\chi_{tot} = \chi_{line} + \frac{\chi_{det}}{T_e},$$
$$\chi_{det} = \frac{1 + (1 - \eta) + 2\xi_{el}}{\eta} + T_e\langle\xi_{\sigma_{ph}}\rangle^{trust}.$$

The Holevo bound between Eve and Bob is given as [34]

$$\chi_{BE} = \sum_{j = 1}^{2}G\left(\frac{\lambda_j - 1}{2}\right) - \sum_{j = 3}^{5}G\left(\frac{\lambda_j - 1}{2}\right),$$
where $G(x) = (x + 1)\log _2(x + 1) - x\log _2x$. The symplectic eigenvalues $\lambda _{1,2}$ take the form
$$\lambda_{1,2}^2 = \frac{1}{2}[\mathbb{A} \pm \sqrt{\mathbb{A}^2 - 4\mathbb{B}}]$$
with
$$\mathbb{A} = V^2 + T_e^2(V + \chi_{line})^2 - 2T_e(V^2 - 1),$$
$$\mathbb{B} = \left(VT_e(V + \chi_{line}) - T_e^2(V^2 - 1)\right)^2.$$

The symplectic eigenvalues $\lambda _{3,4}$ have the form

$$\lambda_{3,4}^2 = \frac{1}{2}[\mathbb{C} \pm \sqrt{\mathbb{C}^2 - 4\mathbb{D}}],$$
where
$$\mathbb{C} =\frac{1}{(T_e(V + \chi_{tot}))^2}[\mathbb{A}\chi_{det}^2 + \mathbb{B} + 2T_e(V^2 - 1) + 1 + 2\chi_{det}(V\sqrt{\mathbb{B}} + T_e(V + \chi_{line}))],$$
$$\mathbb{D} =\left(\frac{V + \sqrt{\mathbb{B}}\chi_{det}}{T_e(V + \chi_{tot})}\right)^2.$$

The symplectic eigenvalue $\lambda _5 = 1$.

Under the finite-size case, the secret key rate is given by [45,51]

$$K_{fini} = \frac{m_2}{m}[K_{asy}(T_e^{low}, X_1^{up}, \langle V_{\varepsilon}\rangle^{up}) - \Delta(m_2)],$$
where $X_1^{up} = X_1 + \gamma \sqrt {\textrm {Var}(X_1)}$, $\langle V_{\varepsilon }\rangle ^{up} = \langle V_{\varepsilon }\rangle + \gamma \sqrt {\langle \sigma _{\hat {V}_n}^2\rangle }$ [45], $\Delta (m_2)$ is given as [9]
$$\Delta(m_2) = 7\sqrt{\frac{\mathrm{log_2}(2/\epsilon_{sm})}{m_2}} + \frac{2}{m_2}\mathrm{log_2}(1/\epsilon_{PA}),$$
where $\epsilon _{sm}$ is a smoothing parameter, $\epsilon _{PA}$ is the failure probability of the privacy amplification procedure. Here, $\gamma$ is a factor such that for a normally distributed variable $Z$ with mean $\mu$ and standard derivation $\sigma$, $P_{prob}(\mu - \gamma \sigma < Z < \mu + \gamma \sigma ) = 1 - \delta$, where $P_{prob}(\cdot )$ represents probability, $\delta$ denotes the significance level of the symmetric confidence interval around $\mu$. Consequently, $\gamma = \Psi ^{-1}(1 - \delta /2)$, where $\Psi$ is the cumulative distribution function of the standard normal distribution. For a usual magnitude of error $10^{-10}$, $\delta /2 = 10^{-10}$ and then $\gamma \approx 6.5$, which is used in this paper. To get $T_e^{low}$, we introduce another Gaussian variable $X_2:= \langle T_q\rangle + \langle \sqrt {T_q}\rangle ^2$ [51]. Thus, $T_e^{low} = (X_2^{low} - X_1^{up})/2$, where $X_2^{low} = X_2 - \gamma \sqrt {\textrm {Var}(X_2)}$. The variances of $X_1$ and $X_2$ are given by
$$\textrm{Var}(X_1) = \textrm{Var}(X_2) = \sigma_{\langle T_q\rangle}^2 + 2\sigma_{\langle \sqrt{T_q}\rangle}^4[1 + 2\frac{\mu_{\sqrt{T_q}}^2}{\sigma_{\langle \sqrt{T_q}\rangle}^2}],$$
where $\sigma _{\langle T_q\rangle }^2 = \int (P(T_q))^2\sigma _{\hat {T}_q}^2$, $\mu _{\sqrt {T}_q} = \int P(T_q)\mathbb {E}\left (\sqrt {\hat {T}_q}\right )$, $\sigma _{\langle \sqrt {T_q}\rangle }^2 = \int (P(T_q))^2\textrm {Var}\left (\sqrt {\hat {T}_q}\right )$. For estimator $\sqrt {\hat {T}_q}$, we have
$$\sqrt{\hat{T}_q} = \sqrt{\frac{2(\hat{C}_{AB})^2}{\eta V_A^2}}$$

Therefore, the mean value and variance of estimator $\sqrt {\hat {T}_q}$ are given as

$$\mathbb{E}(\sqrt{\hat{T}_q}) = \sqrt{T_q},$$
$$\textrm{Var}\left(\sqrt{\hat{T}_q}\right) = \frac{2\mathrm{Var}(\hat{C}_{AB})}{\eta V_A^2}.$$

We assume that $\epsilon _{sm} = \epsilon _{PA} = 10^{-10}$ in this paper.

We note that due to the present of turbulence, the laser beam wavefront arriving at the receiver will be distorted. This will lead to spot motion or image dancing at the focal place of the receiver. This effect is called angle-of-arrival fluctuation, which may lead to communication interruption. However, it can be compensated by the use of adaptive optics or fast beam steering mirror [53]. Therefore, in this paper, we have assumed that the angle-of-arrival fluctuation has been compensated and its effect is not considered.

Funding

National Natural Science Foundation of China (61801522, 61871407, 61872390); Postgraduate Scientific Research Innovation Project of Hunan Province, China (CX20200209); Postgraduate Independent Exploration and Innovation Project of Central South University (2020zzts136).

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61871407, 61872390, 61801522), the Postgraduate Scientific Research Innovation Project of Hunan Province, China (Grant No. CX20200209) and the Postgraduate Independent Exploration and Innovation Project of Central South University (Grant No. 2020zzts136).

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers Systems, and Signal Processing, Bangalore, India, (1984), pp. 175–179.

2. H. K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nat. Photonics 8(8), 595–604 (2014). [CrossRef]  

3. S. L. Braunstein and P. van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77(2), 513–577 (2005). [CrossRef]  

4. F. Laudenbach, C. Pacher, C.-H. F. Fung, A. Poppe, M. Peev, B. Schrenk, M. Hentschel, P. Walther, and H. Hübel, “Continuous-variable quantum key distribution with gaussian modulation-the theory of practical implementations,” Adv. Quantum Technol. 1(1), 1800011 (2018). [CrossRef]  

5. S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. Pereira, M. Razavi, J. S. Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, “Advances in quantum cryptography,” arXiv e-prints p. arXiv:1906.01645 (2019).

6. F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88(5), 057902 (2002). [CrossRef]  

7. R. García-Patrón and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97(19), 190503 (2006). [CrossRef]  

8. M. Navascués, F. Grosshans, and A. Acín, “Optimality of gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97(19), 190502 (2006). [CrossRef]  

9. A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010). [CrossRef]  

10. F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012). [CrossRef]  

11. A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett. 114(7), 070501 (2015). [CrossRef]  

12. A. Leverrier, “Security of continuous-variable quantum key distribution via a gaussian de finetti reduction,” Phys. Rev. Lett. 118(20), 200501 (2017). [CrossRef]  

13. S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers,” J. Phys. B: At., Mol. Opt. Phys. 42(11), 114014 (2009). [CrossRef]  

14. J. Fiurasek and N. J. Cerf, “Gaussian postselection and virtual noiseless amplification in continuous-variable quantum key distribution,” Phys. Rev. A 86(6), 060302 (2012). [CrossRef]  

15. P. Huang, G. He, J. Fang, and G. Zeng, “Performance improvement of continuous-variable quantum key distribution via photon subtraction,” Phys. Rev. A 87(1), 012317 (2013). [CrossRef]  

16. Z. Li, Y. Zhang, X. Wang, B. Xu, X. Peng, and H. Guo, “Non-gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution,” Phys. Rev. A 93(1), 012310 (2016). [CrossRef]  

17. Y. Guo, W. Ye, H. Zhong, and Q. Liao, “Continuous-variable quantum key distribution with non-gaussian quantum catalysis,” Phys. Rev. A 99(3), 032327 (2019). [CrossRef]  

18. M. Ghalaii, C. Ottaviani, R. Kumar, S. Pirandola, and M. Razavi, “Long-distance continuous-variable quantum key distribution with quantum scissors,” IEEE J. Sel. Topics Quantum Electron. 26(3), 1–12 (2020). [CrossRef]  

19. S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tuallebrouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New J. Phys. 11(4), 045023 (2009). [CrossRef]  

20. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013). [CrossRef]  

21. D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015). [CrossRef]  

22. D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015). [CrossRef]  

23. D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016). [CrossRef]  

24. Y. Zhang, Z. Li, Z. Chen, C. Weedbrook, Y. Zhao, X. Wang, Y. Huang, C. Xu, X. Zhang, Z. Wang, M. Li, X. Zhang, Z. Zheng, B. Chu, X. Gao, N. Meng, W. Cai, Z. Wang, G. Wang, S. Yu, and H. Guo, “Continuous-variable qkd over 50 km commercial fiber,” Quantum Sci. Technol. 4(3), 035006 (2019). [CrossRef]  

25. H. Wang, Y. Pi, W. Huang, Y. Li, Y. Shao, J. Yang, J. Liu, C. Zhang, Y. Zhang, and B. Xu, “High-speed gaussian-modulated continuous-variable quantum key distribution with a local local oscillator based on pilot-tone-assisted phase compensation,” Opt. Express 28(22), 32882–32893 (2020). [CrossRef]  

26. Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, and H. Guo, “Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,” Phys. Rev. Lett. 125(1), 010502 (2020). [CrossRef]  

27. B. Qi, W. Zhu, L. Qian, and H.-K. Lo, “Feasibility of quantum key distribution through a dense wavelength division multiplexing network,” New J. Phys. 12(10), 103042 (2010). [CrossRef]  

28. R. Kumar, H. Qin, and R. Alléaume, “Coexistence of continuous variable QKD with intense DWDM classical channels,” New J. Phys. 17(4), 043027 (2015). [CrossRef]  

29. F. Karinou, L. Comandar, H. H. Brunner, D. Hillerkuss, F. Fung, S. Bettelli, S. Mikroulis, D. Wang, Q. Yi, M. Kuschnerov, C. Xie, A. Poppe, and M. Peev, “Experimental evaluation of the impairments on a QKD system in a 20-channel WDM co-existence scheme,” in 2017 IEEE Photonics Society Summer Topical Meeting Series (SUM), (2017), pp. 145–146.

30. T. A. Eriksson, B. J. Puttnam, G. Rademacher, R. S. Luís, M. Fujiwara, M. Takeoka, Y. Awaji, M. Sasaki, and N. Wada, “Crosstalk impact on continuous variable quantum key distribution in multicore fiber transmission,” IEEE Photonics Technol. Lett. 31(6), 467–470 (2019). [CrossRef]  

31. T. A. Eriksson, T. Hirano, B. J. Puttnam, G. Rademacher, R. S. Luís, M. Fujiwara, R. Namiki, Y. Awaji, M. Takeoka, N. Wada, and M. Sasaki, “Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 tbit/s data channels,” Commun. Phys. 2(1), 9 (2019). [CrossRef]  

32. T. A. Eriksson, R. S. Luís, B. J. Puttnam, G. Rademacher, M. Fujiwara, Y. Awaji, H. Furukawa, N. Wada, M. Takeoka, and M. Sasaki, “Wavelength division multiplexing of 194 continuous variable quantum key distribution channels,” J. Lightwave Technol. 38(8), 2214–2218 (2020). [CrossRef]  

33. B. Qi, “Simultaneous classical communication and quantum key distribution using continuous variables,” Phys. Rev. A 94(4), 042340 (2016). [CrossRef]  

34. B. Qi and C. C. W. Lim, “Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillator,” Phys. Rev. Appl. 9(5), 054008 (2018). [CrossRef]  

35. D. Pan, S. X. Ng, D. Ruan, L. Yin, G. Long, and L. Hanzo, “Simultaneous two-way classical communication and measurement-device-independent quantum key distribution with coherent states,” Phys. Rev. A 101(1), 012343 (2020). [CrossRef]  

36. X.-D. Wu, Y.-J. Wang, D. Huang, and Y. Guo, “Simultaneous measurement-device-independent continuous variable quantum key distribution with realistic detector compensation,” Front. Phys. 15(3), 31601 (2020). [CrossRef]  

37. T. Wang, P. Huang, S. Wang, and G. Zeng, “Carrier-phase estimation for simultaneous quantum key distribution and classical communication using a real local oscillator,” Phys. Rev. A 99(2), 022318 (2019). [CrossRef]  

38. T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A 97(1), 012310 (2018). [CrossRef]  

39. A. Marie and R. Alleaume, “Self-coherent phase reference sharing for continuous-variable quantum key distribution,” Phys. Rev. A 95(1), 012316 (2017). [CrossRef]  

40. Y. Shao, H. Wang, Y. Pi, W. Huang, Y. Li, J. Liu, J. Yang, Y. Zhang, and B. Xu, “Phase noise model for continuous-variable quantum key distribution using a local local oscillator,” Phys. Rev. A 104(3), 032608 (2021). [CrossRef]  

41. D. Ly-Gagnon, S. Tsukamoto, K. Katoh, and K. Kikuchi, “Coherent detection of optical quadrature phase-shift keying signals with carrier phase estimation,” J. Lightwave Technol. 24(1), 12–21 (2006). [CrossRef]  

42. T. Inoue and S. Namiki, “Carrier recovery for m-qam signals based on a block estimation process with kalman filter,” Opt. Express 22(13), 15376–15387 (2014). [CrossRef]  

43. B. Huang, Y. Huang, and Z. Peng, “Tracking reference phase with a kalman filter in continuous-variable quantum key distribution,” Opt. Express 28(19), 28727–28739 (2020). [CrossRef]  

44. S. Roy, I. R. Petersen, and E. H. Huntington, “Robust adaptive quantum phase estimation,” New J. Phys. 17(6), 063020 (2015). [CrossRef]  

45. L. Ruppert, V. C. Usenko, and R. Filip, “Long-distance continuous-variable quantum key distribution with efficient channel estimation,” Phys. Rev. A 90(6), 062310 (2014). [CrossRef]  

46. Z. Zuo, Y. Wang, D. Huang, and Y. Guo, “Atmospheric effects on satellite-mediated continuous-variable quantum key distribution,” J. Phys. A: Math. Theor. 53(46), 465302 (2020). [CrossRef]  

47. D. Vasylyev, A. A. Semenov, and W. Vogel, “Atmospheric quantum channels with weak and strong turbulence,” Phys. Rev. Lett. 117(9), 090501 (2016). [CrossRef]  

48. D. Vasylyev, A. A. Semenov, W. Vogel, K. Günthner, A. Thurn, O. Bayraktar, and C. Marquardt, “Free-space quantum links under diverse weather conditions,” Phys. Rev. A 96(4), 043856 (2017). [CrossRef]  

49. C. Liorni, H. Kampermann, and D. Bruß, “Satellite-based links for quantum key distribution: beam effects and weather dependence,” New J. Phys. 21(9), 093055 (2019). [CrossRef]  

50. G. Chai, Z. Cao, W. Liu, S. Wang, P. Huang, and G. Zeng, “Parameter estimation of atmospheric continuous-variable quantum key distribution,” Phys. Rev. A 99(3), 032326 (2019). [CrossRef]  

51. L. Ruppert, C. Peuntinger, B. Heim, K. Günthner, V. C. Usenko, D. Elser, G. Leuchs, R. Filip, and C. Marquardt, “Fading channel estimation for free-space continuous-variable secure quantum communication,” New J. Phys. 21(12), 123036 (2019). [CrossRef]  

52. N. Hosseinidehaj, N. Walk, and T. C. Ralph, “Composable finite-size effects in free-space continuous-variable quantum-key-distribution systems,” Phys. Rev. A 103(1), 012605 (2021). [CrossRef]  

53. H. Kaushal and G. Kaddoum, “Optical communication in space: Challenges and mitigation techniques,” IEEE Commun. Surv. Tutorials 19(1), 57–96 (2017). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1.
Fig. 1. The schematic diagram of the SQCC over satellite-mediated link. AM, amplitude modulator; PM, phase modulator; LO, local oscillator; P, fiber polarizer; Iso, Isolator; 90$^\circ$ OH, 90$^\circ$ optical hybrid; PC, Polarization controller; HD, homodyne detector. (a)-(e) represent the signal distribution in phase space from preparation to reception to recovery.
Fig. 2.
Fig. 2. The schematic diagram of the improved vector KF algorithm and the data recovery of the classical bit and quantum information.
Fig. 3.
Fig. 3. The simulation results of the FO and the MSE of the phase estimation for the proposed KF algorithm. (a) The estimated FO. (b) The real-time phase estimation MSE.
Fig. 4.
Fig. 4. The sum of the phase excess noise and the BER-introduced noise, the phase excess noise and the BER as a function of the power of the classical QPSK signal. The linewidth of lasers is 1 kHz, the symbol rate is 10 Gs/s, the block length is $N_b = 5$, the modulation variance $V_A = 4$, $\eta = 0.6$, $\xi _{el} = 0.1$, the channel transmittance is 0.25. The left coordinate is corresponding to the noise variance, and the right coordinate is used to depict the BER of classical communication. We also use the method described in Ref. [37] to calculate the corresponding phase excess noise (optimizing the block length with Eq. (12) in Ref. [37]), which is displayed by the dash-dotted line.
Fig. 5.
Fig. 5. The secret key rate of the proposed SQCC scheme as a function of the zenith angle under the untrusted noise model. The laser linewidths of 1 kHz and 10 kHz are considered for both the downlink and uplink case. The solid lines represent the secret key rates of finite-size case. The black lines denote the case of 1 kHz linewidth in the clear night. The red lines are the case of 10 kHz in the clear night. The green lines represent the case of 1 kHz in the fog night. The blue lines express the case of 10 kHz in the fog night. The dash-dotted lines are the secret key rates of the asymptotical case. CN, clear night; FN, fog night.
Fig. 6.
Fig. 6. The secret key rate of the proposed SQCC scheme as a function of the zenith angle under the trusted noise model. The laser linewidths of 10 kHz and 1 MHz are shown for both the downlink and uplink case. The solid lines represent the secret key rates of finite-size case. The red lines denote the case of 10 kHz linewidth in the clear night. The blue lines are the case of 10 kHz in the fog night. The cyan lines represent the case of 1 MHz in the clear night. The magenta lines express the case of 1 MHz in the fog night. The dash-dotted lines are the secret key rates of the asymptotical case. CN, clear night; FN, fog night.
Fig. 7.
Fig. 7. The secret key rate of the SQCC scheme using the KF algorithm or the Mth-power algorithm as a function of the zenith angle under finite-size effect. (a) Untrusted noise model with laser linewidth of 1 kHz. (b) Trusted noise model with laser linewidth of 1 MHz. The solid lines represent the results using our proposed KF algorithm. The dotted lines denote the results using the Mth-power algorithm in Ref. [37]. The block size $N_b$ is 5 for the case using the KF algorithm, while it is optimized for the case using the Mth-power algorithm. Other simulation parameters are the same with in Table 1. The atmospheric conditions here are all assumed to be clear night.

Tables (2)

Tables Icon

Table 1. Simulation parameters.

Tables Icon

Table 2. The parameters of the equivalent atmosphere channel [46,49].

Equations (71)

Equations on this page are rendered with MathJax. Learn more.

ξ σ p h = ( α C 2 N 0 + V A ) σ p h 2 ,
ξ A D C | α S m + 2 α C / N 0 | 2 12 × 2 N ,
ξ B E R = 4 | α C | 2 C B E R N 0 ,
θ k = θ k 1 + N b ω k + ς k ,
ω k = ω k 1 + ϱ k ,
θ k , l = θ k + ( l N b + 1 2 ) ω k .
y k = θ k + n k ,
s ( k ) = A s ( k 1 ) + v ( k ) ,
y ( k ) = C s ( k ) + n ( k ) ,
Q = E [ v ( k ) v T ( k ) ] = [ σ ς 2 0 0 σ ϱ 2 ] ,
R = E [ n 2 ( k ) ] = σ n 2 .
s ^ ( k ) = A s ^ ( k 1 ) ,
P ( k ) = A P ( k 1 ) A T + Q ,
s ^ ( k ) = s ^ ( k ) + G ( k ) ( y k C s ^ ( k ) ) s ^ ( k ) + G ( k ) e k ,
P ( k ) = ( I G ( k ) ) P ( k )
G ( k ) = P ( k ) C T ( C P ( k ) C T + R ) 1 ,
e k = tan 1 { I m [ l = 1 N b r l d l ] / R e [ l = 1 N b r l d l ] } ,
σ p h 2 = 1 2 [ σ ς 2 ( σ ς 2 + 4 σ n 2 ) σ ς 2 ] ,
( x B p B ) = η T c 2 ( cos θ sin θ sin θ cos θ ) ( x C p C ) + η T q 2 ( cos θ sin θ sin θ cos θ ) ( x A p A ) + ( x N p N ) ,
x B = η T c 2 x C + η T q 2 x A + x N + x p h a s e + x B E R = η T c 2 x C + η T q 2 x A + x N 1 = η T c 2 x C + x N 2 ,
T ^ c = 2 ( C ^ Q B ) 2 η V C 2
T ^ c = 2 ( C ^ Q B ) 2 η V C 2
x B = η T c 2 x C η T ^ c 2 x C + η T q 2 x A + x N 1 η T q 2 x A + x N 1 .
T ^ q = 2 ( C ^ A B ) 2 η V C 2
E ( T ^ q ) = T q + 2 V a r ( C ^ A B ) / η V A 2 = T q + O ( 1 m 1 ) ,
V a r ( T ^ q ) = 8 T q V a r ( C ^ A B ) / η V A 2 = σ T ^ q 2 .
V ^ n 1 = 1 m 1 i = 1 m 1 ( B i η T ^ q 2 A i ) 2 1 ξ e l .
V ^ n 2 = 1 m i = 1 m ( B i η T ^ c 2 Q i ) 2 1 ξ e l η T ^ q 2 V A .
E ( V ^ n 1 ) = E ( V ^ n 2 ) = η T q 2 ( ξ A D C + ξ 0 + ξ σ p h + ξ B E R ) = η T q 2 ξ t V ϵ .
V ^ n = ν n V ^ n 1 + ( 1 ν n ) V ^ n 2
V a r ( V ^ n ) = σ n ^ 1 2 σ n 2 2 σ n ^ 1 2 + σ n ^ 2 2 = σ V ^ n 2 .
E ( R B ) = η T c V C + η T q ( V A + ξ A D C + ξ 0 ) + 2 ( 1 + ξ e l ) = R .
E ( R ^ B ) = 1 m i = 1 m E ( R i ) = E ( R B ) = R .
T ^ 1 = R ^ B 2 ( 1 + ξ e l ) η ( V A + V C + ξ A D C + ξ 0 ) R ^ B 2 ( 1 + ξ e l ) η ( V A + V C ) .
σ ^ n 0 2 = 1 2 [ R ^ B η T ^ c V C 2 ( 1 + ξ e l ) ] .
T = T 0 exp { [ r / a R ( 2 W e f f ( φ ϕ ) ) ] λ ( 2 W e f f ( φ ϕ ) ) } ,
λ ( τ ) = 2 a 2 τ 2 exp ( a 2 τ 2 ) I 1 ( a 2 τ 2 ) 1 exp ( a 2 τ 2 ) I 0 ( a 2 τ 2 ) [ ln ( 2 1 exp ( 1 2 a 2 τ 2 ) 1 exp ( a 2 τ 2 ) I 0 ( a 2 τ 2 ) ) ] ,
R ( τ ) = [ l n ( 2 1 exp ( 1 2 a 2 τ 2 ) 1 exp ( a 2 τ 2 ) I 0 ( a 2 τ 2 ) ) ] 1 λ ( τ ) ,
T 0 = 1 I 0 ( a 2 W 1 2 W 2 2 W 1 2 W 2 2 ) exp [ a 2 W 1 2 + W 2 2 W 1 2 W 2 2 ] 2 { 1 exp [ a 2 2 ( 1 W 1 1 W 2 ) 2 ] } × exp { [ ( W 1 + W 2 ) 2 | W 1 2 W 2 2 | R ( 1 W 1 1 W 2 ) ] λ ( 1 W 1 1 W 2 ) } ,
W e f f ( τ ) = 2 a [ ω ( 4 a 2 W 1 W 2 e a 2 W 1 2 ( 1 + 2 cos 2 τ ) + a 2 W 2 2 ( 1 + 2 sin 2 τ ) ) ] 1 / 2 ,
υ ¯ = ( x 0 , y 0 , W 1 2 , W 2 2 ) ,
Σ = ( Δ x 0 2 0 0 0 0 Δ y 0 2 0 0 0 0 Δ W 1 2 Δ W 1 Δ W 2 0 0 Δ W 1 Δ W 2 Δ W 2 2 ) .
Δ x 0 2 down = Δ y 0 2 down = ϖ H sec ( ζ 1 ) ,
W i 2 down = 4 H 2 sec 2 ( ζ 1 ) k 2 W 0 2 [ 1 + π 24 n 0 W 0 2 sec ( ζ 1 ) H 0 3 H 2 + 1.1 C n 2 k 2 W 0 5 / 3 sec ( ζ 1 ) H 0 8 / 3 H 5 / 3 ] ,
Δ W i Δ W j down = ( 2 δ i j 0.8 ) 4.14 H 0 8 / 3 C n 2 H 7 / 3 sec 5 ( ζ 1 ) k 2 W 0 7 / 3 [ 1 + π 24 n 0 W 0 2 sec ( ζ 1 ) H 0 3 H 2 ] ,
Δ x 0 2 up = Δ y 0 2 up = 1.16 H 0 C n 2 W 0 1 / 3 H 2 sec 3 ( ζ 2 ) ,
W i 2 up = 4 H 2 sec 2 ( ζ 2 ) k 2 W 0 2 [ 1 + π 8 n 0 W 0 H sec ( ζ 2 ) + 1.8 C n 2 k 2 W 0 5 / 3 H 0 sec ( ζ 2 ) ] ,
Δ W i Δ W j up = ( 2 δ i j 0.8 ) 11 H 0 C n 2 H 4 sec 5 ( ζ 2 ) k 2 W 0 7 / 3 [ 1 + π 8 n 0 W 0 2 H 0 sec ( ζ 2 ) ] ,
Γ A B = ( V I T e V 2 1 σ Z T e V 2 1 σ Z T e ( V + χ l i n e ) I )
V = V A + 1 ,
T e = T q 2 ,
χ l i n e = 1 T e T e + ε e ξ σ p h t r u s t ,
ε e = X 1 ( V 1 ) + 2 V ε / η T e ,
X 1 = T q T q 2 ,
K a s y = β I A B χ B E ,
I A B = log ( V + χ t o t 1 + χ t o t ) ,
χ t o t = χ l i n e + χ d e t T e ,
χ d e t = 1 + ( 1 η ) + 2 ξ e l η + T e ξ σ p h t r u s t .
χ B E = j = 1 2 G ( λ j 1 2 ) j = 3 5 G ( λ j 1 2 ) ,
λ 1 , 2 2 = 1 2 [ A ± A 2 4 B ]
A = V 2 + T e 2 ( V + χ l i n e ) 2 2 T e ( V 2 1 ) ,
B = ( V T e ( V + χ l i n e ) T e 2 ( V 2 1 ) ) 2 .
λ 3 , 4 2 = 1 2 [ C ± C 2 4 D ] ,
C = 1 ( T e ( V + χ t o t ) ) 2 [ A χ d e t 2 + B + 2 T e ( V 2 1 ) + 1 + 2 χ d e t ( V B + T e ( V + χ l i n e ) ) ] ,
D = ( V + B χ d e t T e ( V + χ t o t ) ) 2 .
K f i n i = m 2 m [ K a s y ( T e l o w , X 1 u p , V ε u p ) Δ ( m 2 ) ] ,
Δ ( m 2 ) = 7 l o g 2 ( 2 / ϵ s m ) m 2 + 2 m 2 l o g 2 ( 1 / ϵ P A ) ,
Var ( X 1 ) = Var ( X 2 ) = σ T q 2 + 2 σ T q 4 [ 1 + 2 μ T q 2 σ T q 2 ] ,
T ^ q = 2 ( C ^ A B ) 2 η V A 2
E ( T ^ q ) = T q ,
Var ( T ^ q ) = 2 V a r ( C ^ A B ) η V A 2 .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.