Abstract
Quantum photon-catalysis operations can be utilized for improving the performance of continuous-variable quantum key distribution (CVQKD) systems. Motivated by characteristics of quantum photon-catalysis operations that can be implemented by the existing technologies, we consider the performance improvement of self-referenced (SR) CVQKD involving zero-photon catalysis operation. We find that the zero-photon catalysis can be regarded as a noiseless attenuation, and the numerical simulations show that the zero-photon catalysis (ZPC)-based SR-CVQKD scheme outperforms the original SR-CVQKD scheme. In addition, to highlight the advantage of applying zero-photon catalysis operation into SR-CVQKD systems, we make a comparison about the performances between the ZPC-based SR-CVQKD scheme and the previous single-photon subtraction (SPS)-based SR-CVQKD scheme. Numerical simulations show that the ZPC-based SR-CVQKD is superior to the single-photon subtraction case with respect to the transmission distance and the tolerable excess noise. Especially, the ZPC-based SR-CVQKD allows the lower quantum detection efficiency and the higher electronic noise to achieve the same performance. These results show that the proposed protocol is expected to provide theoretical reference for the practical application of SR-CVQKD in metropolitan areas.
© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
1. Introduction
Quantum key distribution (QKD) [1–4] provides a secure approach for two distant legal users, Alice and Bob, to share a common secret key over an untrusted channel since its unconditional security has been guaranteed by the fundamental laws of quantum mechanics [5–8]. Continuous-variable (CV) QKD protocol [9], as a promising alternative, encodes information on the quadratures of the optical field and then decodes the secret information by the better efficiency of coherent detection so that this protocol promises higher key rates than its discrete-variable (DV) QKD counterpart [10–15]. Moreover, other advantages of CVQKD including the low experimental cost and the compatibility with current optical fiber communication have reflected its potential application in commerce, especially for the Gaussian modulated coherent state (GMCS) CVQKD protocol initially proposed theoretically in [16] and experimentally in [17].
In the traditional implementations of GMCS-CVQKD protocol [18–20], the quantum signal is co-transmitted with a bright local oscillator (LO) pulse from Alice to Bob through the quantum channel. However, there exist some security holes of this transmitted LO (TLO) design when implementing in practice. For instance, to realize the long distance and the high speed communication, a stronger LO is usually required at the sender’s side, but unfortunately brings about the inefficiency of QKD and the certain security loopholes, such as the LO fluctuation attack [21] and the calibration attack [22]. In order to overcome these problems, a novel self-referenced (SR) CVQKD protocol [23–29] is the most remarkable in which the extra generation of the local LO is placed at receiver’s side for coherent detections. In SR-CVQKD, Alice consecutively sends two optical pulses used as the quantum signal pulse and the phase reference pulse, respectively, and meanwhile at reception, Bob uses the locally generated LO for coherent detections to estimate the relative phase by employing the phase reference. Note that the maximal transmission distance for the traditional SR-CVQKD is associated with the amplitude of the reference pulse. However, in practice, the amplitude of the reference pulse is unable to take infinity, so it is crucial that how to expand the maximal transmission distance especially when the reference pulse is weak.
Fortunately, due to the fact that the entanglement of Gaussian entangled states can be improved by exploiting non-Gaussian operations, it is a viable scheme for improving the performance of CVQKD by means of these operations [11, 12, 30–33]. Recently, the photon subtraction, as the one of non-Gaussian operations, has been employed extensively for lengthening the maximal transmission distance of one-way CVQKD [11, 12, 30, 31], two-way CVQKD [32] and even measurement device-independent(MDI) CVQKD [33]. In particular, when the so-called virtual photon subtraction was first presented in [12], such an operation not only can be used to simulate the ideal photon subtraction, but also can be implemented via non-Gaussian post-selection, which is applied to extend the maximal transmission distance of SR-CVQKD [23]. Despite the above merits, the success probability of implementing this photon-subtraction operation is usually no more than 0.25 for the variance of the Einstein-Podolsky-Rosen (EPR) state , which may give birth to the lost of the information between Alice and Bob in the process of extracting the secret key [15]. Attractively, the quantum photon catalysis [34–37], as the other non-Gaussian operation, has been used for the CVQKD system so far, performing better than the single photon subtraction case in terms of the transmission distance and the tolerable excess noise without taking detector efficiency into account [15]. In particular, the zero-photon catalysis operation has the best performance. However, from a practical standpoint, the preparation of EPR state is relatively difficult, which makes it impractical to improve the performance of CVQKD system in the case of bilateral catalysis. On the other hand, during the process of multiphoton catalysis, the preparation of multiphoton sources and the use of multiphoton detections are required, thereby resulting in incompatibility with the telecommunication technique. Therefore, inspired by the above analysis, we suggest a SR-CVQKD scheme with the zero-photon catalysis operation involved an on-off type detector.
In this paper, we focus on the performance improvement of the SR-CVQKD system with the zero-photon catalysis. This paper is structured as follows. In Sec.II, we suggest the conventional SR-CVQKD from the perspectives of the prepare-and-measure (PM) scheme and the entanglement-based (EB) scheme, and then propose the model of zero-photon catalysis (ZPC)-based SR-CVQKD in a realistic detection scenario. The secret key rate of the ZPC-based SR-CVQKD and the performance analysis are provided in Sec. III. Finally, we draw conclusions in Sec. IV.
2. The ZPC-based SR-CVQKD System
In this section, we propose the model design of the SR-CVQKD system involving the zero-photon catalysis operation. From a practical point of view, the PM scheme of SR-CVQKD systems is advantageous to be realized, and its security analysis can be formulated by the equivalent EB scheme. Therefore, we first review the PM and EB scheme of SR-CVQKD, and then detail the SR-CVQKD system with zero-photon catalysis.
2.1. PM and EB description of SR-CVQKD
For the conventional PM scheme of the SR-CVQKD system, as shown in Fig. 1, Alice sends a coherent state acting as the quantum signal pulse with two random numbers qA and pA from the Gaussian distribution of variance VA to Bob. In the next time bin, she sends another coherent state as the reference pulse whose fixed amplitude is several times greater than but much weaker than the amplitude of the traditional LO. Note that in oder to carry information on Alice’s reference frame, the mean quadrature values of the reference pulse are publicly known. On the receiver side, Bob performs consecutively coherent detections of quantum signal and reference pulses in his own reference frame where a second laser to generate local LO pulses is placed at Bob station so as to estimate the relative phase . After undergoing the phase correlation on Alice and Bob’s data, a string of secret key finally can be extracted.
However, in the SR-CVQKD system, a critical problem about the estimation of the relative phase need to be solved, which has an effect on the reference frame alignment. Fortunately, following the approach in [24, 25], Bob performs a homodyne detection on the incoming quantum signal pulse and then takes a heterodyne detection on the incoming reference pulses (including the reference pulse by Alice and the LO by Bob). Thus Bob in his own reference frame can obtain one of the mean quadrature values (qB or pB) of the signal pulse and both of mean quadrature values (qBR and qBR) of the reference pulse. Moreover, at Alice and Bob’s station, we assume that the two lasers have a stable line width so that the θE in each round maintains a specific constant. Under these conditions, the correlation between (qAR, pAR) and (qBR, pBR) can be established to estimate the relative phase via
where denotes the effective channel transmittance. In addition, without loss of generality, we assume that Alice’s pAR quadrature of the reference pulse is set to zero. Therefore, according to Eq. (1), it is straightforward to derive the relative phase , i.e.,It is evident that the second laser to generate local LO pulses placed at Bob station is just to estimate the relative phase , which is fully trusted. Unfortunately, in practice, the amplitude of the reference pulse is relatively weaker when compared to the typical LO, so we have to take its quantum uncertainty into account. Thus, the relative phase should be modified as with the actual relative phase θE and the estimation error . Note that is a crucial factor in determining the secret key rate of SR-CVQKD, which satisfies a random probability distribution That is because after Bob performs the phase correlation, the remaining phase noise reads
where , Vch and represent the variance of the phase reference’s estimation error, the variance of the channel and the variance of the relative phase drift, respectively. Thus, the phase noise can be given byThe PM scheme is often implemented in practice systems, while the EB scheme is beneficial to facilitate security analysis, so we have to introduce an equivalent EB version in SR-CVQKD protocol where Alice prepares an EPR source with a modulation variance and retains mode A to heterodyne detection while sending the other mode B to Bob through the quantum channel characterized by the quantum channel transmittance T and the excess noise ε. Thus, the covariance matrix shared between Alice and Bob before executing any detection can be given by
with whereIf the probability distribution is symmetric around , the parameter can be rewritten as with diag [24]. Consequently, we find that in this sense, the contribution of the reference frame alignment is to rescale the off-diagonal elements of the covariance matrix between Alice and Bob.
2.2. Photon catalysis in SR-CVQKD
To remove the relative phase drift noise of the SR-CVQKD scheme, a method of a balanced delay line interferometer was proposed in [28]. Motivated by this delay line, we propose a SR-CVQKD scheme involving the zero-photon catalysis operation, as shown in Fig. 2. Note that the vacuum state itself on auxiliary mode C remains unaffected but facilitates the transformation of the target ensemble during the zero-photon catalysis (the purple box), so that such operation could effectively prevent the loss of information between Alice and Bob in the process of extracting the secret key. From the perspective of PM version, the ZPC-based SR-CVQKD protocol in Fig. 2(a) is described as follows:
- Step 1: Alice generates two coherent states at the repetition rate consecutively. For each generated coherent state , Alice splits into a weak quantum signal pulse and a strong reference pulse by using a balanced delay line interferometer. Note that only the weak quantum signal pulse is modulated by Gaussian modulation and photon catalysis, transmiting over an optical path of length LA, while the strong reference pulse is delayed by a time on an optical path of length .
- Step 2: At reception, Bob successively generates two coherent states at the same repetition rate by the second laser. Likewise, by using the same delay line, Bob obtains some coherent LO pulses ( and ) where the signal pulse propagates through an optical path of length LB, and the reference pulse is delayed by the same time on an optical path of length .
- Step 3: Bob uses the incoming reference pulse pairs ( and ) to measure the received signal pulses ( and ) under his own reference frame by performing coherent detection. More specifically, Bob performs a homodyne detection for the received signal pulse and a heterodyne detection for the reference pulse. According to the measured results, Bob can thus infer an estimation of Alice’s relative phase. Finally, a phase correlation is digitally performed to distill a string of secret key.
As shown in Fig. 2(b), it shows the EB scheme of the ZPC-based SR-CVQKD system where Alice generates an EPR state involving two modes A and B with the modulation variance V, which can be expressed as
with representing a addition photon operator in mode A(B), and . In order to be compatible with the existing experimental techniques, during the process of zero-photon catalysis we introduce an on-off type detector illustrated as the projection operator valued measurement (POVM), which is given byNote that if the photon number outcome n in mode c is equal to zero (no click), then we identify that the zero-photon catalysis operation is under way. Otherwise, it is considered as the n-photon subtraction . Thus the equivalent zero-photon catalysis can be expressed as
where is a normal ordering prescription, is a beam splitter operator with a transmittance [15, 37]. Interestingly, it is clearly seen from Eq. (9) that the zero-photon catalysis process can be taken as a noiseless attenuation since where is the coherent state in PM scheme of SR-CVQKD.As mentioned in [15, 34], the effect of quantum catalysis is to facilitate the conversion between modes B and B1, and hence it results in the state
where Pd is the normalized coefficient that represents the success probability for implementing the zero-photon catalysis, and can be derived asIn Eq. (10), interestingly, the derived state is still a kind of Gaussian state with a new squeezing parameter [36, 37]. Thus, the covariance matrix of the state can be calculated as
whereAfter passing the channel characterized by quantum channel transmittance T and excess noise ε, similar to Eq. (4), the covariance matrix can be calculated as
where the condition of symmetric probability distribution is given by , the effective channel transmittance is , and the channel noise χ is with the detector electronic noise .3. Performance analysis of the ZPC-based SR-CVQKD system
So far we have derived the parameter characteristics of the SR-CVQKD system involving the zero-photon catalysis operation. In what follows, we demonstrate the effect of the zero-photon catalysis on the SR-CVQKD system in terms of the secret key rate and the maximal transmission distance.
3.1. Asymptotic secret key rate
Now, we consider the secret key rate of our scheme for reverse reconciliation under Gaussian collective attack, where both Alice and Bob perform heterodyne detection and coherent detection (homodyne detection for the received signal pulse and heterodyne detection for the reference pulse), respectively. Fortunately, through the zero-photon catalysis, the yielded state can still be regarded as a Gaussian state so that we can directly calculate the secret key rate by using the results of the conventional Gaussian CVQKD protocol. According to the optimality of Gaussian attack [38–40], the asymptotic secret key rate K for reverse reconciliation can be obtained by
where Pd has been derived in Eq. (11), is the Shannon mutual information between Alice and Bob, and is the Holevo bound for Eve’s maximal accessible information. Supposing that (QB or PB) denotes heterodyne-detection (homodyne detection) results of mode A (B2), can thus be derived as with , and . Moreover, according to Eq. (3), the remaining phase noise for the ZPC-based SR-CVQKD with delay line can be written as [18–20]If the probability distribution is tight, we can then obtain the relation as follows
and thus the analytical expression of the mutual information can be achieved from Eq. (17). In addition, to solve the Holevo bound, assuming that Eve can purify the whole system, we obtain where and the symplectic eigenvalues are derived as with and .3.2. Performance analysis
Before demonstrating performance improvement of the ZPC-based SR-CVQKD system, we set the simulation parameters as in shot noise units (SNU) for . Moreover, it is worth noting that the excess noise contributed by the reference pulses (VR can be set as some realistic values of and ) can be neglected when Alice’s amplitude modulator is set to be 60 dB, as expected [28]. As shown in Fig. 3, it shows the maximal secret key rate of the ZPC-based SR-CVQKD system for all possible η with parameter . In Fig. 4 it shows characteristics of the optimal η, which may have effect on the maximal secret key rate in Fig. 3. The black solid line represents the original protocol, which is outperformed by the proposed protocol with zero-photon catalysis operation at long transmission distance range. We find that the zero-photon catalysis operation has advantageous in dramatically enhancing the secret key rate and lengthening the maximal transmission distance. However, at the short-distance range, we find that, for , the secret key rate of the ZPC-based SR-CVQKD system is the same as that of the original protocol since its transmittance η = 1 means that there is no quantum catalysis effect (see Fig. 4(b)). Interestingly, although the performance of the proposed protocol for is better than that of the original protocol at long-distance range, it seems to be worse than that of the protocol for . This indicates that the maximal transmission distance is proportional to the amplitude of the reference pulse [24].
In addition, the tolerable excess noise is another important factor for evaluating the performance of the ZPC-based SR-CVQKD system. In Fig. 5, it shows the maximal tolerable excess noise as a function of the transmission distance when optimizing over η. The performance of the proposed protocol is better than that of the original protocol, which means that the advantages of zero-photon catalysis can improve the maximal tolerable excess noise even for remote users. For instance, when , the proposed protocol can expand the maximal transmission distance to more than 30 km. To our knowledge, for all the photon-subtraction-based SR-CVQKD schemes in Ref. [23], the single-photon subtraction (SPS)-based SR-CVQKD presents the best performance. Consequently, in order to make comparisons about the performances between the SPS-based SR-CVQKD and the ZPC-based SR-CVQKD, the magenta solid line represents the single-photon subtraction case with respect to the the maximal transmission distance and the maximal tolerable excess noise, as shown in Figs. 3 and 5. It is found that the proposed ZPC-based SR-CVQKD system outperforms the SPS-based SR-CVQKD in terms of the maximal transmission distance and the maximal tolerable excess noise. In particular, at the short-distance range, the performance of the SPS-based SR-CVQKD is exceeded by that of the ZPC-based SR-CVQKD system. The reason is that the zero-photon catalysis has an advantage of the success probability over the single-photon subtraction case (see Fig. 6). These results show that the zero-photon catalysis can be used to improve the performance of SR-CVQKD system.
In practice, the parameter η brought by quantum catalysis have an impact on the performance of ZPC-based SR-CVQKD. The reason is that the accurate estimation of η to maintain a relatively high performance usually requires some complicated implementations if the secret key rate changes significantly with η around its optimal value. Fortunately, the secret key rate slowly changes with η at each distance around its optimal value (red solid line), as depicted in Fig. 7. We find that the secret key rate can maintain higher than 90% of its optimal value () when the estimated η locates in the region between the black dashed line and the orange dashed line. On the other hand, As shown in Figs. 3 and 5, the imperfection of coherent detections is also an important factor that can interfere with the performance of ZPC-based SR-CVQKD system. Fig. 8 shows the performance comparison of SR-CVQKD with the zero-photon catalysis and the single-photon subtraction for different quantum detection efficiency μ and electronic noise of the coherent detections, when given and transmission distance 20 km. We can find that the performance of the ZPC-based SR-CVQKD always is better than that of the SPS-based SR-CVQKD when μ and take a finite value. In other words, the SR-CVQKD system with the zero-photon catalysis requires lower quantum detection efficiency μ and higher electronic noise than the SPS-based SR-CVQKD under the case of achieving the same performance.
4. Conclusions
We have suggested a method to improve the performance of the SR-CVQKD system by using the zero-photon catalysis, which can be taken as a noiseless attenuation. Moreover, we derive the asymptotic secret key rate of the ZPC-based SR-CVQKD system for reverse reconciliation against the collective attack, according to the optimality of Gaussian attack. The numerical simulations show that comparing with the original protocol, the ZPC-based SR-CVQKD system has an advantage of lengthening the maximal transmission distance with the increased secret key rate. Attractively, in order to further highlight the advantage of applying the zero-photon catalysis in the SR-CVQKD systems, we make a comparison of the SR-CVQKD schemes involving zero-photon catalysis and single-photon subtraction, and find that the performance of the ZPC-based SR-CVQKD system is superior to that of the single-photon subtraction case in terms of the transmission distance and the tolerable excess noise. In particular, the ZPC-based SR-CVQKD system allows the lower quantum detection efficiency and the higher electronic noise to achieve the same performance.
Funding
National Natural Science Foundation of China (61572529, 61821407, 11664017); Outstanding Young Talent Program of Jianxi Province (20171BCB23034).
Acknowledgments
LiYun Hu is supported by the Outstanding Young Talent Program of Jianxi Province (20171BCB23034).
Disclosures
The authors declare that there are no conflicts of interest related to this article.
References
1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers Systems, and Signal Processing, Bangalore, India, (1984), pp. 175–179.
2. N. Gisin, G. G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145–195 (2002). [CrossRef]
3. S. L. Braunstein and P. van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77, 513–577 (2005). [CrossRef]
4. E. Diamanti and A. Leverrier, “Distributing secret keys with quantum continuous variables: Principle, security and implementations,” Entropy 17, 6072–6092 (2015). [CrossRef]
5. H.-K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nat. Photon. 8, 595 (2014). [CrossRef]
6. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dusek, N. Lutkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81, 1301–1350 (2009). [CrossRef]
7. J. Y. Bang and M. S. Berger, “Quantum mechanics and the generalized uncertainty principle,” Phys. Rev. D 74, 125012 (2006). [CrossRef]
8. W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299, 802–803 (1982). [CrossRef]
9. T. C. Ralph, “Continuous variable quantum cryptography,” Phys. Rev. A 61, 010303 (1999). [CrossRef]
10. P. Huang, J. Z. Huang, T. Wang, H. S. Li, D. Huang, and G. H. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A 95, 052302 (2017). [CrossRef]
11. Y. Guo, Q. Liao, Y. J. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017). [CrossRef]
12. Z. Y. Li, Y. C. Zhang, X. Y. Wang, B. J. Xu, X. Peng, and H. Guo, “Non-gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution,” Phys. Rev. A 93, 012310 (2016). [CrossRef]
13. Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382, 372–381 (2018). [CrossRef]
14. Q. Liao, Y. J. Wang, D. Huang, and Y. Guo, “Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution,” Opt. Express 26, 19907–19920 (2018). [CrossRef] [PubMed]
15. Y. Guo, W. Ye, H. Zhong, and Q. Liao, “Continuous-variable quantum key distribution with non-Gaussian quantum catalysis,” arXiv e-prints arXiv:1811.06698 (2018).
16. F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88, 057902 (2002). [CrossRef] [PubMed]
17. F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003). [CrossRef] [PubMed]
18. D. Huang, D. K. Lin, C. Wang, W. Q. Liu, S. H. Fang, J. Y. Peng, P. Huang, and G. H. Zeng, “Continuous-variable quantum key distribution with 1 mbps secure key rate,” Opt. Express 23, 17511–17519 (2015). [CrossRef] [PubMed]
19. P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photon. 7, 378–381 (2013). [CrossRef]
20. B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007). [CrossRef]
21. X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013). [CrossRef]
22. P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013). [CrossRef]
23. H. Zhong, Y. J. Wang, X. D. Wang, Q. Liao, X. D. Wu, and Y. Guo, “Enhancing of self-referenced continuous-variable quantum key distribution with virtual photon subtraction,” Entropy 20, 578 (2018). [CrossRef]
24. D. B. S. Soh, C. Brif, P. J. Coles, N. Lutkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5, 041010 (2015).
25. B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5, 041009 (2015).
26. M. Koashi, “Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse,” Phys. Rev. Lett. 93, 120501 (2004). [CrossRef] [PubMed]
27. T. Wang, P. Huang, Y. M. Zhou, W. Q. Liu, H. X. Ma, S. Y. Wang, and G. H. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26, 2794–2806 (2018). [CrossRef] [PubMed]
28. A. Marie and R. Alleaume, “Self-coherent phase reference sharing for continuous-variable quantum key distribution,” Phys. Rev. A 95, 012316 (2017). [CrossRef]
29. M. Li and M. Cvijetic, “Continuous-variable quantum key distribution with self-reference detection and discrete modulation,” IEEE J. Quantum Electron. 54, 1–8 (2018).
30. Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-gaussian state-discrimination detection,” New J. Phys. 20, 023015 (2018). [CrossRef]
31. P. Huang, G. Q. He, J. Fang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution via photon subtraction,” Phys. Rev. A 87, 012317 (2013). [CrossRef]
32. Y. J. Zhao, Y. C. Zhang, Z. Y. Li, S. Yu, and H. Guo, “Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction,” Quantum Inf. Process 16, 184 (2017). [CrossRef]
33. H. X. Ma, P. Huang, D. Y. Bai, S. Y. Wang, W. S. Bao, and G. H. Zeng, “Continuous-variable measurement-device-independent quantum key distribution with photon subtraction,” Phys. Rev. A 97, 042329 (2018). [CrossRef]
34. A. I. Lvovsky and J. Mlynek, “Quantum-optical catalysis: Generating nonclassical states of light by means of linear optics,” Phys. Rev. Lett. 88, 250401 (2002). [CrossRef] [PubMed]
35. L. Y. Hu, J. N. Wu, Z. Y. Liao, and M. S. Zubairy, “Multiphoton catalysis with coherent state input: nonclassicality and decoherence,” J. Phys. B: At. Mol. Opt. Phys. 49, 175504 (2016). [CrossRef]
36. W. D. Zhou, W. Ye, C. J. Liu, L. Y. Hui, and S. Q. Liu, “Entanglement improvement of entangled coherent state via multiphoton catalysis,” Laser Phys. Lett. 15, 065203 (2018). [CrossRef]
37. L. Y. Hu, Z. Y. Liao, and M. S. Zubairy, “Continuous-variable entanglement via multiphoton catalysis,” Phys. Rev. A 95, 012310 (2017). [CrossRef]
38. M. Navascues, F. Grosshans, and A. Acin, “Optimality of gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006). [CrossRef] [PubMed]
39. R. Garcia-Patron and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006). [CrossRef] [PubMed]
40. M. M. Wolf, G. Giedke, and J. I. Cirac, “Extremality of gaussian quantum states,” Phys. Rev. Lett. 96, 080502 (2006). [CrossRef] [PubMed]