High-Performance Fully Passive Discrete-State Continuous-Variable Quantum Key Distribution With Local Local Oscillator
Pith reviewed 2026-05-19 02:26 UTC · model grok-4.3
The pith
A fully passive discrete-state CV-QKD with local local oscillator reaches 100 km at 1 GHz repetition rate and 127 kbps secret key rate.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
By combining passive discrete-state preparation through phase rotation and discretization at the transmitter with a local local oscillator and convex optimization at the receiver, the protocol achieves a maximum transmission length of 100 km at 1 GHz with a 127 kbps secret key rate estimated solely from prepared-state amplitudes and first- and second-order quadrature moments without imposing assumptions on the quantum channel.
What carries the argument
Phase rotation and discretization methods at the transmitter together with convex optimization on measured first- and second-order quadrature moments at the receiver to bound the secret key rate.
If this is right
- All modulator side channels on the source side are eliminated.
- Performance matches that of actively modulated CV-LLO protocols.
- The scheme outperforms existing passive discrete-variable and CV protocols.
- The protocol is suitable for quantum metropolitan area networks and quantum access networks.
Where Pith is reading between the lines
- Hardware simplification could follow if passive preparation replaces active modulators in deployed QKD systems.
- The approach may extend to multi-user or network-scale deployments where side-channel resistance is critical.
- Real-fiber tests with fluctuating loss would further confirm whether the 100 km distance holds under practical conditions.
Load-bearing premise
The convex optimization procedure produces a valid lower bound on the secret key rate from only the prepared-state amplitudes and the first- and second-order quadrature moments without hidden assumptions about channel noise or state fidelity.
What would settle it
An experiment in which an eavesdropper extracts information beyond the convex-optimization bound, causing the actual secure key rate to fall below the estimated 127 kbps over 100 km, would falsify the no-assumption security claim.
Figures
read the original abstract
We propose and demonstrate a fully passive discrete-state continuous-variable quantum key distribution (CV-QKD), which can eliminate all modulator side channels on the source side, using a local local oscillator (LLO). The CV-QKD system achieves a maximum transmission length of 100 km with a repetition rate of 1 GHz using specially designed phase rotation and discretization methods, and the corresponding secret key bit rate is 127 kbps, as estimated based on the amplitude of prepared states at the transmitter, as well as the first- and second-order moments of quadratures at the receiver by employing the convex optimization without imposing any assumptions on the quantum channel. The performance of the protocol is similar to that of modulated CV LLO protocols and better than those of passive discrete-variable and CV protocols. Our protocol is expected to play an important role in the quantum metropolitan area networks and quantum access networks with high realistic security.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes and experimentally demonstrates a fully passive discrete-state continuous-variable quantum key distribution (CV-QKD) protocol using a local local oscillator (LLO). It eliminates all modulator side channels on the source side via specially designed phase rotation and discretization methods at the transmitter. The system achieves a maximum transmission length of 100 km at a 1 GHz repetition rate, with a reported secret key rate of 127 kbps estimated from the amplitudes of prepared states at the transmitter together with the measured first- and second-order quadrature moments at the receiver, using convex optimization without any assumptions imposed on the quantum channel. Performance is stated to be comparable to modulated CV-LLO protocols and superior to passive discrete-variable and CV protocols.
Significance. If the security analysis is sound, the work offers a meaningful advance for practical CV-QKD in metropolitan and access networks by achieving high repetition rate and long distance while removing source-side side channels through a fully passive discrete-state approach. The use of convex optimization grounded in measured moments without channel assumptions provides a degree of external grounding for the key-rate bound. Experimental realization at 1 GHz over 100 km is a concrete strength.
major comments (2)
- [Abstract and performance estimation paragraph] Abstract and performance estimation paragraph: the secret-key-rate lower bound is obtained via convex optimization over states consistent with the known prepared amplitudes and the measured first- and second-order quadrature moments. For a discrete-state protocol the admissible set is non-Gaussian; it is not shown that the optimization explicitly enforces the discrete support (or an equivalent higher-moment constraint). Consequently the worst-case attack consistent with only the first two moments may be looser than the attack consistent with the full discrete ensemble, rendering the reported 127 kbps figure potentially optimistic.
- [Description of the specially designed phase rotation and discretization methods] Description of the specially designed phase rotation and discretization methods: these steps are presented as central to realizing the fully passive discrete-state source, yet no explicit equations, parameter values, or verification that the resulting ensemble remains strictly discrete are supplied. Without this, it is impossible to confirm that the convex-optimization input correctly reflects the prepared discrete states rather than an effective continuous ensemble.
minor comments (2)
- [Abstract] The abstract states the key rate is 'estimated based on the amplitude of prepared states... by employing the convex optimization'; a brief reference to the specific optimization formulation or supplementary material containing the SDP would improve traceability.
- [Performance comparison] A table comparing the achieved distance, repetition rate, and key rate against representative modulated CV-LLO and passive protocols would make the performance claim easier to evaluate at a glance.
Simulated Author's Rebuttal
We thank the referee for their thorough review and valuable comments on our manuscript. We address each of the major comments in detail below and outline the revisions we plan to make.
read point-by-point responses
-
Referee: [Abstract and performance estimation paragraph] Abstract and performance estimation paragraph: the secret-key-rate lower bound is obtained via convex optimization over states consistent with the known prepared amplitudes and the measured first- and second-order quadrature moments. For a discrete-state protocol the admissible set is non-Gaussian; it is not shown that the optimization explicitly enforces the discrete support (or an equivalent higher-moment constraint). Consequently the worst-case attack consistent with only the first two moments may be looser than the attack consistent with the full discrete ensemble, rendering the reported 127 kbps figure potentially optimistic.
Authors: We appreciate the referee highlighting this subtlety in the security analysis. Our convex optimization minimizes the key rate over states that match the prepared discrete amplitudes and the observed first- and second-order moments. The discrete character is encoded in the finite set of known amplitudes used as constraints. Nevertheless, to rigorously demonstrate that the optimization accounts for the non-Gaussian discrete support and to rule out a potentially looser bound, we will add an explicit statement and, if necessary, additional constraints in the revised manuscript. This will strengthen the presentation of the security proof without altering the reported numerical results. revision: yes
-
Referee: [Description of the specially designed phase rotation and discretization methods] Description of the specially designed phase rotation and discretization methods: these steps are presented as central to realizing the fully passive discrete-state source, yet no explicit equations, parameter values, or verification that the resulting ensemble remains strictly discrete are supplied. Without this, it is impossible to confirm that the convex-optimization input correctly reflects the prepared discrete states rather than an effective continuous ensemble.
Authors: We agree that additional technical details are required for full reproducibility and verification. In the revised version of the manuscript, we will insert the explicit mathematical expressions for the phase rotation and discretization procedures, including the specific parameter values employed in the experiment. We will also include supplementary verification, such as the measured distribution of the prepared states, to confirm that the ensemble is strictly discrete and that the convex optimization is fed with the correct discrete-state constraints. revision: yes
Circularity Check
No significant circularity; key-rate bound derived from measured data via standard convex optimization
full rationale
The central security claim computes the secret key rate directly from the known prepared-state amplitudes together with experimentally measured first- and second-order quadrature moments, using convex optimization that imposes no channel assumptions. This constitutes an external, data-driven bound rather than a self-referential derivation. No equations or self-citations reduce the reported 127 kbps figure or the 100 km reach to fitted parameters or prior author results by construction. The specially designed phase-rotation and discretization steps are protocol choices whose effect is evaluated against the measured moments, not defined in terms of the final key rate.
Axiom & Free-Parameter Ledger
free parameters (1)
- phase rotation angles and discretization levels
axioms (1)
- domain assumption Quantum channel can be bounded using only first- and second-order quadrature moments via convex optimization
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
secret key bit rate is 127 kbps, as estimated based on the amplitude of prepared states at the transmitter, as well as the first- and second-order moments of quadratures at the receiver by employing the convex optimization without imposing any assumptions on the quantum channel
-
IndisputableMonolith/Foundation/DimensionForcing.leanalexander_duality_circle_linking unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
using specially designed phase rotation and discretization methods
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
12 nm was used as LLO instead of the traditional pulsed LLO, which requires a high common-mode rejec- tion ratio that is difficult to achieve with a short pulse. During the quantum signal transmission, the laser pulses were sent in frame, with each frame containing 107 pulses. All output signals of the HDs were sampled using OSs, with 12-bit 50-GSample/s an...
work page 2022
-
[2]
F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, Rev. Mod. Phys. 92, 025002 (2020)
work page 2020
-
[3]
Y. C. Zhang, Y. M. Bian, Z. Y. Li, S. Yu, and H. Guo, Appl. Phys. Rev. 11, 011304 (2024)
work page 2024
-
[4]
S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, and et al., Adv. Opt. Photon. 12, 1012 (2020)
work page 2020
-
[5]
C. Weedbrook, S. Pirandola, R. Garc ´ ıa-Patr´ on, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, Rev. Mod. Phys. 84, 621 (2012)
work page 2012
-
[6]
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Duˇ sek, N. L¨ utkenhaus, and M. Peev, Rev. Mod. Phys. 81, 1301 (2009)
work page 2009
-
[7]
S. K. Liao, W. Q. Cai, W. Y. Liu, L. Zhang, Y. Li, J. G. Ren, J. Yin, Q. Shen, Y. Cao, Z. P. Li, and et al., Nature 549, 43 (2017)
work page 2017
-
[8]
Y. Liu, W. J. Zhang, C. Jiang, J. P. Chen, C. Zhang, W. X. Pan, D. Ma, H. Dong, J. M. Xiong, C. J. Zhang, and et al., Phys. Rev. Lett. 130, 210801 (2023)
work page 2023
-
[9]
Y. C. Zhang, Z. Y. Chen, S. Pirandola, X. Y. Wang, C. Zhou, B. J. Chu, Y. J. Zhao, B. J. Xu, S. Yu, and H. Guo, Phys. Rev. Lett. 125, 010502 (2020)
work page 2020
- [11]
-
[12]
L. Li, T. Wang, X. H. Li, P. Huang, Y. Y. Guo, L. J. Lu, L. J. Zhou, and G. H. Zeng, Photonics Res. 11, 504 (2023)
work page 2023
-
[13]
Y. X. Jia, X. Y. Wang, X. Hu, X. Hua, Y. Zhang, X. B. Guo, S. X. Zhang, X. Xiao, S. H. Yu, J. Zou, and et al, New J. Phys. 25, 103030 (2023)
work page 2023
-
[14]
Y. M. Bian, Y. Pan, X. S. Xu, L. Zhao, Y. Li, W. Huang, L. Zhang, S. Yu, Y. C. Zhang, and B. J. Xu, Appl. Phys. Lett. 124, 174001 (2024)
work page 2024
-
[15]
Y. Pi´ etri, L. T. Vidarte, M. Schiavon, L. Vivien, P. Grangier, A. Rhouni, and E. Diamanti, Opt. Quan- tum 2, 428 (2024)
work page 2024
-
[16]
A. A. E. Hajomer, C. Bruynsteen, I. Derkach, N. Jain, A. Bomhals, S. Bastiaens, U. L. Andersen, X. Yin, and T. Gehring, Optica 11, 1197 (2024)
work page 2024
-
[17]
Y. D. Huang, T. Shen, X. Y. Wang, Z. Y. Chen, B. J. Xu, S. Yu, and H. Guo, Phys. Rev. Appl. 16, 064051 (2021)
work page 2021
-
[18]
X. Y. Wang, Z. Y. Chen, Z. H. Li, D. K. Qi, S. Yu, and H. Guo, Opt. Lett. 48, 3327 (2023)
work page 2023
-
[19]
F. Y. Ji, P. Huang, T. Wang, X. Q. Jiang, and G. H. Zeng, Photonics Res. 12, 1485 (2024)
work page 2024
-
[20]
A. A. E. Hajomer, I. Derkach, R. Filip, U. L. Andersen, V. C. Usenko, and T. Gehring, Light Sci. Appl. 13, 291 (2024)
work page 2024
- [21]
-
[22]
L. Wooltorton, P. Brown, and R. Colbeck, Phys. Rev. Lett. 132, 210802 (2024)
work page 2024
-
[23]
E. Y.-Z. Tan and R. Wolf, Phys. Rev. Lett. 133, 120803 (2024)
work page 2024
-
[24]
H.-K. Lo, M. Curty, and B. Qi, Phys. Rev. Lett. 108, 130503 (2012)
work page 2012
-
[25]
S. L. Braunstein and S. Pirandola, Phys. Rev. Lett. 108, 130502 (2012)
work page 2012
-
[26]
Y. L., T. Y. Chen, L. J. Wang, H. Liang, G. L. Shentu, J. Wang, K. Cui, H. L. Yin, N. L. Liu, L. Li, and et al., Phys. Rev. Lett. 111, 130502 (2013)
work page 2013
-
[27]
H. L. Yin, T. Y. Chen, Z. W. Yu, H. Liu, L. X. You, Y. H. Zhou, S. J. Chen, Y. Q. Mao, M. Q. Huang, W. J. Zhang, and et al., Phys. Rev. Lett. 117, 190501 (2016)
work page 2016
-
[28]
Y. Cao, Y. H. Li, K. X. Yang, Y. F. Jiang, S. L. Li, X. L. Hu, M. Abulizi, C. L. Li, W. J. Zhang, Q. C. Sun, and et al., Phys. Rev. Lett. 125, 260503 (2020) . 6
work page 2020
-
[29]
Y. H. Li, S. L. Li, X. L. Hu, C. Jiang, Z. W. Yu, W. Li, W. Y. Liu, S. K. Liao, J. G. Ren, H. Li, and et al., Phys. Rev. Lett. 131, 100802 (2023)
work page 2023
-
[30]
Y. Tian, P. Wang, J. Q. Liu, S. N. Du, W. Y. Liu, Z. G. Lu, X. Y. Wang, and Y. M. Li, Optica 9, 492 (2022)
work page 2022
-
[31]
S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, Nat. Photonics 9, 397 (2015)
work page 2015
- [32]
-
[33]
I. Khan, B. Stiller, N. Jain, P. Jouguet, S. Kunz-Jacques , E. Diamanti, C. Marquardt, and G. Leuchs, in Con- ference on Quantum Cryptography (QCRYPT) (Paris, France, 2014)
work page 2014
-
[34]
P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Lev- errier, Phys. Rev. A 86, 032309 (2012)
work page 2012
-
[35]
W. Y. Liu, X. Y. Wang, N. Wang, S. N. Du, and Y. M. Li, Phys. Rev. A 96, 042312 (2017)
work page 2017
-
[36]
K. I. Yoshino, M. Fujiwara, K. Nakata, T. Sumiya, T. Sasaki, M. Takeoka, M. Sasaki, A. Tajima, M. Koashi, and A. Tomita, npj Quantum Inf. 4 (2018), 10.1038/s41534-017-0057-8
-
[38]
C. Y. Li, L. Qian, and H.-K. Lo, npj Quantum Inf. 7 (2021), 10.1038/s41534-021-00482-3
-
[39]
D. Huang, P. Huang, D. k. Lin, and G. H. Zeng, Sci. Rep. 6 (2016), 10.1038/srep19201
- [40]
-
[41]
V. C. Usenko and R. Filip, Phys. Rev. A 81, 022318 (2010)
work page 2010
- [42]
- [43]
-
[44]
M. Pereira, M. Curty, and K. Tamaki, npj Quantum Inf. 5 (2019), 10.1038/s41534-019-0180-9
-
[45]
A. A. E. Hajomer, N. Jain, H. Mani, H.-M. Chin, U. L. Andersen, and T. Gehring, npj Quantum Inf. 8, 136 (2022)
work page 2022
-
[46]
W. Wang, R. Wang, C. Hu, V. Zapatero, L. Qian, B. Qi, and H.-K. Lo, Phys. Rev. Lett. 130, 220801 (2023)
work page 2023
-
[47]
F. Y. Lu, Z. H. Wang, V. Zapatero, J. L. Chen, S. Wang, Z. Q. Yin, M. Curty, D. Y. He, R. Wang, W. Chen, and et al., Phys. Rev. Lett. 131, 110802 (2023)
work page 2023
-
[49]
V. Zapatero, W. Y. Wang, and M. Curty, Quantum Sci. Technol. 8, 025014 (2023)
work page 2023
-
[50]
B. Qi, H. Gunther, P. G. Evans, B. P. Williams, R. M. Camacho, and N. A. Peters, Phys. Rev. Appl. 13, 054065 (2020)
work page 2020
-
[51]
B. Qi, P. G. Evans, and W. P. Grice, Phys. Rev. A 97, 012317 (2018)
work page 2018
- [52]
-
[53]
X. D. Wu, Y. J.Wang, Y. Guo, H. Zhong, and D. Huang, Phys. Rev. A 103, 032604 (2021)
work page 2021
- [54]
-
[55]
Y. Tian, Y. Zhang, S. S. Liu, P. Wang, Z. G. Lu, X. Y. Wang, and Y. M. Li, Opt. Lett. 48, 2953 (2023)
work page 2023
-
[56]
H. Wang, Y. Li, Y. D. Pi, Y. Pan, Y. Shao, L. Ma, Y. C. Zhang, J. Yang, T. Zhang, W. Huang, and et al., Com- mun. Phys. 5, 162 (2022)
work page 2022
-
[57]
Y. Pan, H. Wang, Y. Shao, Y. D. Pi, Y. Li, B. Liu, W. Huang, and B. J. Xu, Opt. Lett. 47, 3307 (2022)
work page 2022
-
[58]
L. C. Comandar, M. Lucamarini, B. Fr¨ ohlich, J. F. Dynes, Z. L. Yuan, and A. J. Shields, Opt. Express 24, 17849 (2016)
work page 2016
-
[59]
Z. L. Yuan, M. Lucamarini, J. F. Dynes, B. Fr¨ ohlich, M. B. Ward, and A. J. Shields, Phys. Rev. Appl. 2, 064006 (2014)
work page 2014
-
[60]
Z. L. Yuan, M. Lucamarini, J. F. Dynes, B. Fr¨ ohlich, A. Plews, and A. J. Shields, Appl. Phys. Lett. 104, 261112 (2014)
work page 2014
-
[61]
Z. L. Yuan, B. Fr¨ ohlich, M. Lucamarini, G. L. Roberts, J. F. Dynes, and A. J. Shields, Phys. Rev. X 6, 031044 (2016)
work page 2016
-
[62]
J. Lin, T. Upadhyaya, and N. L¨ utkenhaus, Phys. Rev. X 9, 041064 (2019)
work page 2019
-
[63]
F. Laudenbach, C. Pacher, C.-H. F. Fung, A. Poppe, M. Peev, B. Schrenk, M. Hentschel, P. Walther, and H. H¨ ubel, Adv. Quantum Technol. 1, 1800011 (2018)
work page 2018
- [64]
- [65]
- [66]
-
[67]
Y. Feng, R. H. Qiu, K. Zhang, X. Q. Jiang, M. X. Zhang, P. Huang, and G. H. Zeng, Sci. China Inf. Sci. 66, 180511 (2023)
work page 2023
-
[68]
S. S. Yang, Z. L. Bai, X. Y. Wang, and Y. M. Li, IEEE Photon. J. 9, 1 (2017)
work page 2017
-
[69]
Y. M. Chi, B. Qi, W. Zhu, L. Qian, H.-K. Lo, S.-H. Youn, A. I. Lvovsky, and L. Tian, Quantum Inf. Comput. 13, 1 (2011)
work page 2011
-
[70]
F. Kanitschar, I. George, J. Lin, T. Upadhyaya, and N. L¨ utkenhaus,PRX Quantum 4, 040306 (2023)
work page 2023
-
[71]
[9, 18, 46, 47, 49, 51, 54, 55]
See Supplemental Material at http://link.aps.org/ supplemental/DOI for results on heterodyne detections and data acquisition, phase drift, and performance com- parion, which includes Refs. [9, 18, 46, 47, 49, 51, 54, 55]. Supplemental Materials: High-Performance Fully Passive Discrete-Stat e Continuous-Variable Quantum Key Distribution With Local Local Os...
work page 2025
- [72]
-
[73]
Passive DV 20 MHz – 7 . 2 7 . 65 × 10− 5 – – 11 . 6 4 . 01 × 10− 5 – – 16 . 7 1 . 86 × 10− 5 –
-
[74]
Passive thermal state CV TLO 23 GHz 5 – – 1090
-
[75]
Passive thermal state CV TLO – 8.05 – ∼ 10− 2 – 41.2 – ∼ 10− 3 –
-
[76]
Passive thermal state CV TLO 350 MHz 5 – – 9.3 Current work Passive discrete-state CV LLO 1 GHz 0.002 – 1 . 11 × 10− 1 89.9 25 – 6 . 73 × 10− 3 5.45 50 – 9 . 33 × 10− 4 0.756 100 – 1 . 57 × 10− 4 0.127
-
[77]
GM CV LLO 100 Mbaud 100 – – ≥ 0. 025
-
[78]
DM CV LLO 2.5 Gbaud 25 – – 49.02 50 – – 11.86 80 – – 2.11
-
[79]
DM CV LLO 5 Gbaud LAC 5 – – 190.54 10 – – 137.36 25 – – 52.48 SDP 5 – – 233.87 10 – – 133.6 25 – – 21.53 ∗ wangxuyang@sxu.edu.cn † chenyangli@astri.org ‡ yongmin@sxu.edu.cn
-
[80]
A. A. E. Hajomer, I. Derkach, N. Jain, H. M. Chin, U. L. Andersen, and T. Gehring, Sci. Adv. 10, eadi9474 (2024)
work page 2024
-
[81]
F. Y. Lu, Z. H. Wang, V. Zapatero, J. L. Chen, S. Wang, Z. Q. Yi n, M. Curty, D. Y. He, R. Wang, W. Chen, and et al., Physical Review Letters 131, 110802 (2023)
work page 2023
-
[82]
C. Q. Hu, W. Y. Wang, K.-S. Chan, Z. H. Yuan, and H.-K. Lo, Phys. Rev. Lett. 131, 110801 (2023)
work page 2023
-
[83]
F. Y. Ji, P. Huang, T. Wang, X. Q. Jiang, and G. H. Zeng, Photonics Research 12, 1485 (2024)
work page 2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.