pith. sign in

arxiv: 2507.23327 · v1 · submitted 2025-07-31 · 🪐 quant-ph

High-Performance Fully Passive Discrete-State Continuous-Variable Quantum Key Distribution With Local Local Oscillator

Pith reviewed 2026-05-19 02:26 UTC · model grok-4.3

classification 🪐 quant-ph
keywords continuous-variable quantum key distributionfully passive protocollocal local oscillatordiscrete statesconvex optimizationsecret key ratequantum networks
0
0 comments X p. Extension

The pith

A fully passive discrete-state CV-QKD with local local oscillator reaches 100 km at 1 GHz repetition rate and 127 kbps secret key rate.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper proposes and demonstrates a continuous-variable quantum key distribution protocol that is fully passive on the source side. It removes all modulator side channels by replacing active modulation with specially designed phase rotation and discretization methods while using a local local oscillator at the receiver. Secret key rates are bounded via convex optimization applied to the known prepared-state amplitudes and the measured first- and second-order quadrature moments at the receiver, without any assumptions imposed on the quantum channel. The resulting system maintains a 1 GHz repetition rate over 100 km of fiber and delivers an estimated 127 kbps secure key rate, matching the performance of actively modulated CV-LLO protocols and exceeding other passive discrete-variable and CV schemes.

Core claim

By combining passive discrete-state preparation through phase rotation and discretization at the transmitter with a local local oscillator and convex optimization at the receiver, the protocol achieves a maximum transmission length of 100 km at 1 GHz with a 127 kbps secret key rate estimated solely from prepared-state amplitudes and first- and second-order quadrature moments without imposing assumptions on the quantum channel.

What carries the argument

Phase rotation and discretization methods at the transmitter together with convex optimization on measured first- and second-order quadrature moments at the receiver to bound the secret key rate.

If this is right

  • All modulator side channels on the source side are eliminated.
  • Performance matches that of actively modulated CV-LLO protocols.
  • The scheme outperforms existing passive discrete-variable and CV protocols.
  • The protocol is suitable for quantum metropolitan area networks and quantum access networks.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Hardware simplification could follow if passive preparation replaces active modulators in deployed QKD systems.
  • The approach may extend to multi-user or network-scale deployments where side-channel resistance is critical.
  • Real-fiber tests with fluctuating loss would further confirm whether the 100 km distance holds under practical conditions.

Load-bearing premise

The convex optimization procedure produces a valid lower bound on the secret key rate from only the prepared-state amplitudes and the first- and second-order quadrature moments without hidden assumptions about channel noise or state fidelity.

What would settle it

An experiment in which an eavesdropper extracts information beyond the convex-optimization bound, causing the actual secure key rate to fall below the estimated 127 kbps over 100 km, would falsify the no-assumption security claim.

Figures

Figures reproduced from arXiv: 2507.23327 by Chenyang Li, Jie Yun, Qiang Zeng, Xuyang Wang, Yongmin Li, Yu Zhang, Zhenguo Lu, Zhiliang Yuan.

Figure 1
Figure 1. Figure 1: FIG. 1. Schematic diagram of the passive discrete-state LLO [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: FIG. 2. Schematic diagram of the experimental setup. AWG: arbit [PITH_FULL_IMAGE:figures/full_fig_p003_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: FIG. 3. The secret key rates at different transmission lengths: [PITH_FULL_IMAGE:figures/full_fig_p004_3.png] view at source ↗
read the original abstract

We propose and demonstrate a fully passive discrete-state continuous-variable quantum key distribution (CV-QKD), which can eliminate all modulator side channels on the source side, using a local local oscillator (LLO). The CV-QKD system achieves a maximum transmission length of 100 km with a repetition rate of 1 GHz using specially designed phase rotation and discretization methods, and the corresponding secret key bit rate is 127 kbps, as estimated based on the amplitude of prepared states at the transmitter, as well as the first- and second-order moments of quadratures at the receiver by employing the convex optimization without imposing any assumptions on the quantum channel. The performance of the protocol is similar to that of modulated CV LLO protocols and better than those of passive discrete-variable and CV protocols. Our protocol is expected to play an important role in the quantum metropolitan area networks and quantum access networks with high realistic security.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper proposes and experimentally demonstrates a fully passive discrete-state continuous-variable quantum key distribution (CV-QKD) protocol using a local local oscillator (LLO). It eliminates all modulator side channels on the source side via specially designed phase rotation and discretization methods at the transmitter. The system achieves a maximum transmission length of 100 km at a 1 GHz repetition rate, with a reported secret key rate of 127 kbps estimated from the amplitudes of prepared states at the transmitter together with the measured first- and second-order quadrature moments at the receiver, using convex optimization without any assumptions imposed on the quantum channel. Performance is stated to be comparable to modulated CV-LLO protocols and superior to passive discrete-variable and CV protocols.

Significance. If the security analysis is sound, the work offers a meaningful advance for practical CV-QKD in metropolitan and access networks by achieving high repetition rate and long distance while removing source-side side channels through a fully passive discrete-state approach. The use of convex optimization grounded in measured moments without channel assumptions provides a degree of external grounding for the key-rate bound. Experimental realization at 1 GHz over 100 km is a concrete strength.

major comments (2)
  1. [Abstract and performance estimation paragraph] Abstract and performance estimation paragraph: the secret-key-rate lower bound is obtained via convex optimization over states consistent with the known prepared amplitudes and the measured first- and second-order quadrature moments. For a discrete-state protocol the admissible set is non-Gaussian; it is not shown that the optimization explicitly enforces the discrete support (or an equivalent higher-moment constraint). Consequently the worst-case attack consistent with only the first two moments may be looser than the attack consistent with the full discrete ensemble, rendering the reported 127 kbps figure potentially optimistic.
  2. [Description of the specially designed phase rotation and discretization methods] Description of the specially designed phase rotation and discretization methods: these steps are presented as central to realizing the fully passive discrete-state source, yet no explicit equations, parameter values, or verification that the resulting ensemble remains strictly discrete are supplied. Without this, it is impossible to confirm that the convex-optimization input correctly reflects the prepared discrete states rather than an effective continuous ensemble.
minor comments (2)
  1. [Abstract] The abstract states the key rate is 'estimated based on the amplitude of prepared states... by employing the convex optimization'; a brief reference to the specific optimization formulation or supplementary material containing the SDP would improve traceability.
  2. [Performance comparison] A table comparing the achieved distance, repetition rate, and key rate against representative modulated CV-LLO and passive protocols would make the performance claim easier to evaluate at a glance.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their thorough review and valuable comments on our manuscript. We address each of the major comments in detail below and outline the revisions we plan to make.

read point-by-point responses
  1. Referee: [Abstract and performance estimation paragraph] Abstract and performance estimation paragraph: the secret-key-rate lower bound is obtained via convex optimization over states consistent with the known prepared amplitudes and the measured first- and second-order quadrature moments. For a discrete-state protocol the admissible set is non-Gaussian; it is not shown that the optimization explicitly enforces the discrete support (or an equivalent higher-moment constraint). Consequently the worst-case attack consistent with only the first two moments may be looser than the attack consistent with the full discrete ensemble, rendering the reported 127 kbps figure potentially optimistic.

    Authors: We appreciate the referee highlighting this subtlety in the security analysis. Our convex optimization minimizes the key rate over states that match the prepared discrete amplitudes and the observed first- and second-order moments. The discrete character is encoded in the finite set of known amplitudes used as constraints. Nevertheless, to rigorously demonstrate that the optimization accounts for the non-Gaussian discrete support and to rule out a potentially looser bound, we will add an explicit statement and, if necessary, additional constraints in the revised manuscript. This will strengthen the presentation of the security proof without altering the reported numerical results. revision: yes

  2. Referee: [Description of the specially designed phase rotation and discretization methods] Description of the specially designed phase rotation and discretization methods: these steps are presented as central to realizing the fully passive discrete-state source, yet no explicit equations, parameter values, or verification that the resulting ensemble remains strictly discrete are supplied. Without this, it is impossible to confirm that the convex-optimization input correctly reflects the prepared discrete states rather than an effective continuous ensemble.

    Authors: We agree that additional technical details are required for full reproducibility and verification. In the revised version of the manuscript, we will insert the explicit mathematical expressions for the phase rotation and discretization procedures, including the specific parameter values employed in the experiment. We will also include supplementary verification, such as the measured distribution of the prepared states, to confirm that the ensemble is strictly discrete and that the convex optimization is fed with the correct discrete-state constraints. revision: yes

Circularity Check

0 steps flagged

No significant circularity; key-rate bound derived from measured data via standard convex optimization

full rationale

The central security claim computes the secret key rate directly from the known prepared-state amplitudes together with experimentally measured first- and second-order quadrature moments, using convex optimization that imposes no channel assumptions. This constitutes an external, data-driven bound rather than a self-referential derivation. No equations or self-citations reduce the reported 127 kbps figure or the 100 km reach to fitted parameters or prior author results by construction. The specially designed phase-rotation and discretization steps are protocol choices whose effect is evaluated against the measured moments, not defined in terms of the final key rate.

Axiom & Free-Parameter Ledger

1 free parameters · 1 axioms · 0 invented entities

The central claim rests on standard quantum optics assumptions for quadrature measurements and the validity of convex optimization for secret key extraction; no new particles or forces are introduced, but the discretization and phase rotation methods introduce design choices whose independence from the final key rate is not fully detailed in the abstract.

free parameters (1)
  • phase rotation angles and discretization levels
    Specially designed parameters chosen to prepare states while maintaining passivity; their specific values are not given in the abstract but directly affect achievable distance and rate.
axioms (1)
  • domain assumption Quantum channel can be bounded using only first- and second-order quadrature moments via convex optimization
    Invoked in the key rate estimation paragraph of the abstract.

pith-pipeline@v0.9.0 · 5704 in / 1321 out tokens · 74988 ms · 2026-05-19T02:26:30.736973+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

84 extracted references · 84 canonical work pages

  1. [1]

    During the quantum signal transmission, the laser pulses were sent in frame, with each frame containing 107 pulses

    12 nm was used as LLO instead of the traditional pulsed LLO, which requires a high common-mode rejec- tion ratio that is difficult to achieve with a short pulse. During the quantum signal transmission, the laser pulses were sent in frame, with each frame containing 107 pulses. All output signals of the HDs were sampled using OSs, with 12-bit 50-GSample/s an...

  2. [2]

    F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, Rev. Mod. Phys. 92, 025002 (2020)

  3. [3]

    Y. C. Zhang, Y. M. Bian, Z. Y. Li, S. Yu, and H. Guo, Appl. Phys. Rev. 11, 011304 (2024)

  4. [4]

    Pirandola, U

    S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, and et al., Adv. Opt. Photon. 12, 1012 (2020)

  5. [5]

    Weedbrook, S

    C. Weedbrook, S. Pirandola, R. Garc ´ ıa-Patr´ on, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, Rev. Mod. Phys. 84, 621 (2012)

  6. [6]

    Scarani, H

    V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Duˇ sek, N. L¨ utkenhaus, and M. Peev, Rev. Mod. Phys. 81, 1301 (2009)

  7. [7]

    S. K. Liao, W. Q. Cai, W. Y. Liu, L. Zhang, Y. Li, J. G. Ren, J. Yin, Q. Shen, Y. Cao, Z. P. Li, and et al., Nature 549, 43 (2017)

  8. [8]

    Y. Liu, W. J. Zhang, C. Jiang, J. P. Chen, C. Zhang, W. X. Pan, D. Ma, H. Dong, J. M. Xiong, C. J. Zhang, and et al., Phys. Rev. Lett. 130, 210801 (2023)

  9. [9]

    Y. C. Zhang, Z. Y. Chen, S. Pirandola, X. Y. Wang, C. Zhou, B. J. Chu, Y. J. Zhao, B. J. Xu, S. Yu, and H. Guo, Phys. Rev. Lett. 125, 010502 (2020)

  10. [11]

    Zhang, J

    G. Zhang, J. Y. Haw, H. Cai, F. Xu, S. M. Assad, J. F. Fitzsimons, X. Zhou, Y. Zhang, S. Yu, J. Wu, and et al., Nat. Photon. 13, 839 (2019)

  11. [12]

    L. Li, T. Wang, X. H. Li, P. Huang, Y. Y. Guo, L. J. Lu, L. J. Zhou, and G. H. Zeng, Photonics Res. 11, 504 (2023)

  12. [13]

    Y. X. Jia, X. Y. Wang, X. Hu, X. Hua, Y. Zhang, X. B. Guo, S. X. Zhang, X. Xiao, S. H. Yu, J. Zou, and et al, New J. Phys. 25, 103030 (2023)

  13. [14]

    Y. M. Bian, Y. Pan, X. S. Xu, L. Zhao, Y. Li, W. Huang, L. Zhang, S. Yu, Y. C. Zhang, and B. J. Xu, Appl. Phys. Lett. 124, 174001 (2024)

  14. [15]

    Pi´ etri, L

    Y. Pi´ etri, L. T. Vidarte, M. Schiavon, L. Vivien, P. Grangier, A. Rhouni, and E. Diamanti, Opt. Quan- tum 2, 428 (2024)

  15. [16]

    A. A. E. Hajomer, C. Bruynsteen, I. Derkach, N. Jain, A. Bomhals, S. Bastiaens, U. L. Andersen, X. Yin, and T. Gehring, Optica 11, 1197 (2024)

  16. [17]

    Y. D. Huang, T. Shen, X. Y. Wang, Z. Y. Chen, B. J. Xu, S. Yu, and H. Guo, Phys. Rev. Appl. 16, 064051 (2021)

  17. [18]

    X. Y. Wang, Z. Y. Chen, Z. H. Li, D. K. Qi, S. Yu, and H. Guo, Opt. Lett. 48, 3327 (2023)

  18. [19]

    F. Y. Ji, P. Huang, T. Wang, X. Q. Jiang, and G. H. Zeng, Photonics Res. 12, 1485 (2024)

  19. [20]

    A. A. E. Hajomer, I. Derkach, R. Filip, U. L. Andersen, V. C. Usenko, and T. Gehring, Light Sci. Appl. 13, 291 (2024)

  20. [21]

    Zhang, T

    W. Zhang, T. van Leent, K. Redeker, R. Garthoff, R. Schwonnek, F. Fertig, S. Eppelt, W. Rosenfeld, V. Scarani, C. C.-W. Lim, and et al., Nature 607, 687 (2022)

  21. [22]

    Wooltorton, P

    L. Wooltorton, P. Brown, and R. Colbeck, Phys. Rev. Lett. 132, 210802 (2024)

  22. [23]

    E. Y.-Z. Tan and R. Wolf, Phys. Rev. Lett. 133, 120803 (2024)

  23. [24]

    H.-K. Lo, M. Curty, and B. Qi, Phys. Rev. Lett. 108, 130503 (2012)

  24. [25]

    S. L. Braunstein and S. Pirandola, Phys. Rev. Lett. 108, 130502 (2012)

  25. [26]

    Y. L., T. Y. Chen, L. J. Wang, H. Liang, G. L. Shentu, J. Wang, K. Cui, H. L. Yin, N. L. Liu, L. Li, and et al., Phys. Rev. Lett. 111, 130502 (2013)

  26. [27]

    H. L. Yin, T. Y. Chen, Z. W. Yu, H. Liu, L. X. You, Y. H. Zhou, S. J. Chen, Y. Q. Mao, M. Q. Huang, W. J. Zhang, and et al., Phys. Rev. Lett. 117, 190501 (2016)

  27. [28]

    Y. Cao, Y. H. Li, K. X. Yang, Y. F. Jiang, S. L. Li, X. L. Hu, M. Abulizi, C. L. Li, W. J. Zhang, Q. C. Sun, and et al., Phys. Rev. Lett. 125, 260503 (2020) . 6

  28. [29]

    Y. H. Li, S. L. Li, X. L. Hu, C. Jiang, Z. W. Yu, W. Li, W. Y. Liu, S. K. Liao, J. G. Ren, H. Li, and et al., Phys. Rev. Lett. 131, 100802 (2023)

  29. [30]

    Y. Tian, P. Wang, J. Q. Liu, S. N. Du, W. Y. Liu, Z. G. Lu, X. Y. Wang, and Y. M. Li, Optica 9, 492 (2022)

  30. [31]

    Pirandola, C

    S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, Nat. Photonics 9, 397 (2015)

  31. [32]

    Gisin, S

    N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ri- bordy, Phys. Rev. A 73, 022320 (2006)

  32. [33]

    I. Khan, B. Stiller, N. Jain, P. Jouguet, S. Kunz-Jacques , E. Diamanti, C. Marquardt, and G. Leuchs, in Con- ference on Quantum Cryptography (QCRYPT) (Paris, France, 2014)

  33. [34]

    Jouguet, S

    P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Lev- errier, Phys. Rev. A 86, 032309 (2012)

  34. [35]

    W. Y. Liu, X. Y. Wang, N. Wang, S. N. Du, and Y. M. Li, Phys. Rev. A 96, 042312 (2017)

  35. [36]

    K. I. Yoshino, M. Fujiwara, K. Nakata, T. Sumiya, T. Sasaki, M. Takeoka, M. Sasaki, A. Tajima, M. Koashi, and A. Tomita, npj Quantum Inf. 4 (2018), 10.1038/s41534-017-0057-8

  36. [38]

    C. Y. Li, L. Qian, and H.-K. Lo, npj Quantum Inf. 7 (2021), 10.1038/s41534-021-00482-3

  37. [39]

    Huang, P

    D. Huang, P. Huang, D. k. Lin, and G. H. Zeng, Sci. Rep. 6 (2016), 10.1038/srep19201

  38. [40]

    Derkach, V

    I. Derkach, V. C. Usenko, and R. Filip, Phys. Rev. A 96, 062309 (2017)

  39. [41]

    V. C. Usenko and R. Filip, Phys. Rev. A 81, 022318 (2010)

  40. [42]

    Derkach, V

    I. Derkach, V. C. Usenko, and R. Filip, Phys. Rev. A 93, 032309 (2016)

  41. [43]

    Tamaki, M

    K. Tamaki, M. Curty, and M. Lucamarini, New J. Phys. 18, 065008 (2016)

  42. [44]

    Pereira, M

    M. Pereira, M. Curty, and K. Tamaki, npj Quantum Inf. 5 (2019), 10.1038/s41534-019-0180-9

  43. [45]

    A. A. E. Hajomer, N. Jain, H. Mani, H.-M. Chin, U. L. Andersen, and T. Gehring, npj Quantum Inf. 8, 136 (2022)

  44. [46]

    W. Wang, R. Wang, C. Hu, V. Zapatero, L. Qian, B. Qi, and H.-K. Lo, Phys. Rev. Lett. 130, 220801 (2023)

  45. [47]

    F. Y. Lu, Z. H. Wang, V. Zapatero, J. L. Chen, S. Wang, Z. Q. Yin, M. Curty, D. Y. He, R. Wang, W. Chen, and et al., Phys. Rev. Lett. 131, 110802 (2023)

  46. [49]

    Zapatero, W

    V. Zapatero, W. Y. Wang, and M. Curty, Quantum Sci. Technol. 8, 025014 (2023)

  47. [50]

    B. Qi, H. Gunther, P. G. Evans, B. P. Williams, R. M. Camacho, and N. A. Peters, Phys. Rev. Appl. 13, 054065 (2020)

  48. [51]

    B. Qi, P. G. Evans, and W. P. Grice, Phys. Rev. A 97, 012317 (2018)

  49. [52]

    Huang, T

    P. Huang, T. Wang, R. Chen, P. Wang, Y. M. Zhou, and G. H. Zeng, New J. Phys. 23, 113028 (2021)

  50. [53]

    X. D. Wu, Y. J.Wang, Y. Guo, H. Zhong, and D. Huang, Phys. Rev. A 103, 032604 (2021)

  51. [54]

    C. Li, C. Hu, W. Wang, R. Wang, and H.-K. Lo, arXiv preprint , 5 (2022) , arXiv:2212.01876 [quant-ph]

  52. [55]

    Y. Tian, Y. Zhang, S. S. Liu, P. Wang, Z. G. Lu, X. Y. Wang, and Y. M. Li, Opt. Lett. 48, 2953 (2023)

  53. [56]

    H. Wang, Y. Li, Y. D. Pi, Y. Pan, Y. Shao, L. Ma, Y. C. Zhang, J. Yang, T. Zhang, W. Huang, and et al., Com- mun. Phys. 5, 162 (2022)

  54. [57]

    Y. Pan, H. Wang, Y. Shao, Y. D. Pi, Y. Li, B. Liu, W. Huang, and B. J. Xu, Opt. Lett. 47, 3307 (2022)

  55. [58]

    L. C. Comandar, M. Lucamarini, B. Fr¨ ohlich, J. F. Dynes, Z. L. Yuan, and A. J. Shields, Opt. Express 24, 17849 (2016)

  56. [59]

    Z. L. Yuan, M. Lucamarini, J. F. Dynes, B. Fr¨ ohlich, M. B. Ward, and A. J. Shields, Phys. Rev. Appl. 2, 064006 (2014)

  57. [60]

    Z. L. Yuan, M. Lucamarini, J. F. Dynes, B. Fr¨ ohlich, A. Plews, and A. J. Shields, Appl. Phys. Lett. 104, 261112 (2014)

  58. [61]

    Z. L. Yuan, B. Fr¨ ohlich, M. Lucamarini, G. L. Roberts, J. F. Dynes, and A. J. Shields, Phys. Rev. X 6, 031044 (2016)

  59. [62]

    J. Lin, T. Upadhyaya, and N. L¨ utkenhaus, Phys. Rev. X 9, 041064 (2019)

  60. [63]

    Laudenbach, C

    F. Laudenbach, C. Pacher, C.-H. F. Fung, A. Poppe, M. Peev, B. Schrenk, M. Hentschel, P. Walther, and H. H¨ ubel, Adv. Quantum Technol. 1, 1800011 (2018)

  61. [64]

    Lin and N

    J. Lin and N. L¨ utkenhaus, Phys. Rev. Appl. 14, 064030 (2020)

  62. [65]

    Winick, N

    A. Winick, N. L¨ utkenhaus, and P. J. Coles, Quantum 2, 77 (2018)

  63. [66]

    Jeong, H

    S. Jeong, H. Jung, and J. Ha, npj Quantum Inf. 8, 6 (2022)

  64. [67]

    Y. Feng, R. H. Qiu, K. Zhang, X. Q. Jiang, M. X. Zhang, P. Huang, and G. H. Zeng, Sci. China Inf. Sci. 66, 180511 (2023)

  65. [68]

    S. S. Yang, Z. L. Bai, X. Y. Wang, and Y. M. Li, IEEE Photon. J. 9, 1 (2017)

  66. [69]

    Y. M. Chi, B. Qi, W. Zhu, L. Qian, H.-K. Lo, S.-H. Youn, A. I. Lvovsky, and L. Tian, Quantum Inf. Comput. 13, 1 (2011)

  67. [70]

    Kanitschar, I

    F. Kanitschar, I. George, J. Lin, T. Upadhyaya, and N. L¨ utkenhaus,PRX Quantum 4, 040306 (2023)

  68. [71]

    [9, 18, 46, 47, 49, 51, 54, 55]

    See Supplemental Material at http://link.aps.org/ supplemental/DOI for results on heterodyne detections and data acquisition, phase drift, and performance com- parion, which includes Refs. [9, 18, 46, 47, 49, 51, 54, 55]. Supplemental Materials: High-Performance Fully Passive Discrete-Stat e Continuous-Variable Quantum Key Distribution With Local Local Os...

  69. [72]

    3 × 10− 4 – 50 – 9

    Passive DV 200 MHz 30 – 3 . 3 × 10− 4 – 50 – 9 . 9 × 10− 5 –

  70. [73]

    Passive DV 20 MHz – 7 . 2 7 . 65 × 10− 5 – – 11 . 6 4 . 01 × 10− 5 – – 16 . 7 1 . 86 × 10− 5 –

  71. [74]

    Passive thermal state CV TLO 23 GHz 5 – – 1090

  72. [75]

    Passive thermal state CV TLO – 8.05 – ∼ 10− 2 – 41.2 – ∼ 10− 3 –

  73. [76]

    11 × 10− 1 89.9 25 – 6

    Passive thermal state CV TLO 350 MHz 5 – – 9.3 Current work Passive discrete-state CV LLO 1 GHz 0.002 – 1 . 11 × 10− 1 89.9 25 – 6 . 73 × 10− 3 5.45 50 – 9 . 33 × 10− 4 0.756 100 – 1 . 57 × 10− 4 0.127

  74. [77]

    GM CV LLO 100 Mbaud 100 – – ≥ 0. 025

  75. [78]

    DM CV LLO 2.5 Gbaud 25 – – 49.02 50 – – 11.86 80 – – 2.11

  76. [79]

    DM CV LLO 5 Gbaud LAC 5 – – 190.54 10 – – 137.36 25 – – 52.48 SDP 5 – – 233.87 10 – – 133.6 25 – – 21.53 ∗ wangxuyang@sxu.edu.cn † chenyangli@astri.org ‡ yongmin@sxu.edu.cn

  77. [80]

    A. A. E. Hajomer, I. Derkach, N. Jain, H. M. Chin, U. L. Andersen, and T. Gehring, Sci. Adv. 10, eadi9474 (2024)

  78. [81]

    F. Y. Lu, Z. H. Wang, V. Zapatero, J. L. Chen, S. Wang, Z. Q. Yi n, M. Curty, D. Y. He, R. Wang, W. Chen, and et al., Physical Review Letters 131, 110802 (2023)

  79. [82]

    C. Q. Hu, W. Y. Wang, K.-S. Chan, Z. H. Yuan, and H.-K. Lo, Phys. Rev. Lett. 131, 110801 (2023)

  80. [83]

    F. Y. Ji, P. Huang, T. Wang, X. Q. Jiang, and G. H. Zeng, Photonics Research 12, 1485 (2024)

Showing first 80 references.