Abstract
In continuous-variable quantum key distribution (CV-QKD) systems, information reconciliation (IR) is a crucial step that significantly affects the secret key rate (SKR). The fixed-rate error-correcting codes used in IR are highly sensitive to changes in the signal-to-noise ratio (SNR) and cannot maintain a high reconciliation efficiency in practical CV-QKD systems. To address this issue, we first propose a rate-adaptive IR protocol, namely Threshold-based IR (TIR), which changes the code rate of low-density parity-check (LDPC) codes by selectively revealing bits with lower reliability and adjusting their log-likelihood ratios (LLRs). Then, we propose a rate-adaptive IR protocol, namely Sorting-based IR (SIR), which not only adjusts the code rate according to variations in SNR, but also enables the CV-QKD systems to achieve high reconciliation efficiency over a wide range of SNRs. Furthermore, we perform an analysis of the protocols in terms of code rate, reconciliation efficiency, and complexity. The simulation results demonstrate that the proposed protocols outperform other rate-adaptive IR protocols, achieving a reconciliation efficiency higher than 98.5% in the SNR range below −20 dB and maintaining a certain SKR in long-distance transmission.
Keywords: continuous-variable quantum key distribution, information reconciliation, reconciliation efficiency, secret key rate, log-likelihood ratios
1. Introduction
Quantum key distribution (QKD) [1,2,3] is among the most practical implementations of quantum-information technologies, enabling two spatially separated parties, Alice and Bob, to share random keys in an untrusted environment and theoretically guaranteeing unconditional security [4]. Currently, QKD technology falls into two mainstream types: discrete-variable QKD (DV-QKD) [1,2] and continuous-variable QKD (CV-QKD) [5]. In DV-QKD systems, key information is used to encode the polarization or phase of a single-photon state; in contrast, in CV-QKD systems, the encoding process targets the amplitude and phase quadrature states [6]. CV-QKD systems have attracted considerable research interest due to their compatibility with conventional telecommunication infrastructure [7]. Recent studies have mainly focused on enhancing secure transmission distances and optimizing the secret key rate (SKR) in CV-QKD systems [8,9].
Quantum transmission and post-processing make up a typical CV-QKD system [8]. Bob uses a homodyne or heterodyne detector to test quantum states at random during the quantum transmission [10]. Base sifting [11], parameter estimation [12], information reconciliation (IR) [13,14], and privacy amplification [15] are the four primary processes of post-processing, which is used to obtain secret keys from both parties. Among these, IR is considered the primary technical bottleneck, limiting the transmission distance and the SKR of the system. Ongoing research aims to improve reconciliation efficiency and reduce the frame error rate (FER), thereby improving the SKR [16]. Currently, slice reconciliation [17] and multidimensional reconciliation [18] are currently widely utilized reconciliation techniques.
Considering finite-size effects [12], high-performance error-correcting codes with long block lengths are typically employed in IR to achieve a high reconciliation efficiency. Specifically, multi-edge-type low-density parity-check (MET-LDPC) codes [19,20], as a generalization of LDPC codes [20], have demonstrated near-Shannon-limit performance, which can achieve a high reconciliation efficiency at low signal-to-noise ratios (SNRs). However, fixed-rate LDPC codes cannot maintain a high reconciliation efficiency under fluctuating SNR conditions in practical CV-QKD systems [6,21,22]. Raptor codes [23] and spinal codes [24] with the rateless property can achieve a high reconciliation efficiency over a wider range of SNRs, but require a higher decoding complexity compared to LDPC codes. The rate-adaptive LDPC codes in [16] maintain over 96% reconciliation efficiency by modifying a fixed-size parity-check matrix, though this fixed size is a limitation. The multiple decoding attempt (MDA) protocol was proposed [25], which reveals bits randomly after decoding failure to adjust log-likelihood ratios (LLRs), thereby changing the code rate. However, we follow the definition of bit reliability as proposed in [26], and it has been experimentally demonstrated that bits with lower reliability are significantly more likely to be erroneous, and thus are key contributors to decoding failure.
In this paper, we propose that selectively revealing bits with lower reliability and adjusting their LLRs can change the code rate of LDPC codes. To achieve this, we first introduce a rate-adaptive IR protocol named Threshold-based IR (TIR), where bits with lower reliability below a threshold are disclosed. Then, we propose a Sorting-based IR (SIR) protocol, through which bits are sorted by reliability, and the least reliable bits are selectively disclosed. The SIR protocol not only adjusts the code rate according to variations in SNRs, but also achieves high reconciliation efficiency across a wide range of SNRs.
The rest of the paper is structured as follows: In Section 2, we review the fundamentals of IR in brief. In Section 3, we introduce the proposed protocols in detail. In Section 4, we perform an analysis of the proposed protocols. The simulation results of our scheme are shown and analyzed in Section 5. Finally, we conclude this paper in Section 6.
2. Preliminaries
IR serves as a crucial procedure in CV-QKD systems, which aims to accomplish error correction while minimizing leakage the information of secret keys, thereby enabling the two communicating parties to acquire symmetric secret keys. IR can be categorized into two main types: direct reconciliation and reverse reconciliation [11]. Reverse reconciliation provides longer transmission distances and maintains a specific SKR during long-distance fiber optic communication at low SNRs, in contrast to direct reconciliation [27].
Multidimensional reverse reconciliation is a popular reconciliation technique for CV-QKD systems due to its superior reconciliation efficiency at low SNRs and low capacity loss. A schematic diagram of CV-QKD systems is presented in Figure 1. The general method of information reconciliation was proposed in [18] and improved in [6,16,28,29]. After going through the data sifting and parameter estimation steps, Alice and Bob obtain correlated quantum sequences and ; in this context, , with standing for the quantum channel noise. Alice and Bob then split the sequences and into d-dimensional vectors, and proceed to normalize these vectors respectively.
Figure 1.
Multidimensional reverse reconciliation schematic diagram.
Using a quantum random number generator (QRNG), Bob creates a secret key consisting of a random binary sequence . The encoder employs an error-correcting code to encode into , and outputs side information that avoids revealing the secret key. To compute the mapping function that acts as part of the side information, we utilize the encoded sequence and the normalized sequence . is an orthogonal transformation, defined as , where ; the specific form of matrix is available in [18]. Bob then uses a classical channel to send Alice this side information. After receiving , Alice uses it together with the normalized sequence to obtain via data mapping. Subsequently, the LDPC code and sum-product algorithm are adopted to recover into the sequence . Once the decoding process succeeds, Alice and Bob will share a symmetrical secret key.
The SKR of a CV-QKD system with one-way multidimensional reverse reconciliation, considering finite-size effects into account, is provided by [10]
| (1) |
where N is the total amount of data that Alice and Bob exchanged, n is the amount of data that was used to extract the keys, and the remaining portion is used for parameter estimation. is the reconciliation FER, which is defined as the ratio of discarded secret keys to total secret keys. The reconciliation efficiency is measured by
| (2) |
where R denotes the error-correcting code rate and represents the channel capacity when the SNR is set to s. represents Alice and Bob’s classical mutual information. The maximum Holevo information that Eve can receive from Bob’s data is , where is the parameter estimate failure probability [29]. The finite-size offset factor is represented by . According to Equation (1), an imperfect reconciliation scheme leads to a reduction in the SKR and imposes limitations on the applicable range of the protocol.
3. The Proposed Protocols
In this section, we introduce two rate-adaptive IR protocols for CV-QKD systems, both of which are designed based on the principle of revealing bits with lower reliability. The schematic diagram of the protocols is shown in Figure 2.
Figure 2.
Schematic diagram of the proposed protocols.
3.1. Threshold-Based IR (TIR)
3.1.1. Threshold Selection
The TIR protocol involves setting a threshold for the reliability of the bits during the iterative decoding process. Here, define as the LLR of the i-th bit and define the reliability of the i-th bit as the absolute value of , denoted as . The determination of the threshold is precisely based on the reliability value difference between erroneous bits and correct bits. To clarify how this difference supports the selection of , we verify this through a practical scenario: take a rate 0.02 LDPC code with SNR = −15.1 dB and analyze one hundred failed codewords. Histograms of reliability values for correct bits and erroneous bits after decoding failure are drawn in Figure 3a and Figure 3b, respectively. It is shown that the reliability value of erroneous bits is obviously smaller than that of most correct bits, which can be used to distinguish them efficiently. Hence, for a failed codeword, one can set a suitable threshold . If the reliability value , the corresponding bits are classified into the set of suspicious bits, which have a high probability of being erroneous bits and are selected to be revealed.
Figure 3.
Histogram of decoded bits after decoding failure. (a) Correct bits. (b) Erroneous bits. The code length is 1,000,000.
3.1.2. TIR Protocol
In this paper, we adopt multidimensional reverse reconciliation. Alice and Bob both have correlated Gaussian sequences, and , which satisfy on Euclidean space and , where and d indicates the multidimensional IR dimension. Subsequently, they normalize and into and , where and . Here denotes a norm of a vector. The uniform distribution of the sequences and is satisfied by their distribution on the surface of the unit sphere , which centers on zero.
Using the QRNG, Bob generates a binary sequence . He then employs LDPC encoding to produce the codeword . However, in order to adapt for multidimensional reconciliation, must be converted into a binary spherical sequence by
| (3) |
After acquiring and , Bob uses and to compute , also known as the mapping function. This mapping function satisfies the following condition: . Bob transmits to Alice through the classical channel. Then, Alice transforms into using the mapping function .
Alice uses the parity-check matrices of the LDPC code and sum-product algorithm to recover sequence into sequence . During the iterative decoding process, while calculating the LLR, Alice sets a threshold for . She identifies the set of indices and sends to Bob.
Bob determines the values of the bits in and returns the values to Alice. If Bob confirms that the i-th bit is 1, Alice sets to a large negative value, thereby forcing the bit to be interpreted as 1 in subsequent iterations. Conversely, if Bob confirms that the i-th bit is 0, Alice sets to a large positive value, thereby forcing the bit to be interpreted as 0 in subsequent iterations. Alice continues the iterative decoding with the modified LLRs. If the decoding process is successful, Alice and Bob will possess symmetric secret keys, which are retained for final secret keys; if decoding fails, the secret keys are discarded outright to ensure the absolute security of the final secret keys.
Finally, privacy amplification decreases the information leakage that occurs through the preceding quantum and raw key generation processes. The final secret keys can thus be established by Alice and Bob using a robust randomness extraction protocol.
3.2. Sorting-Based IR (SIR)
The SIR protocol for revealing bits with lower reliability involves sorting the during the iterative decoding process and selecting a certain number of bits with lower reliability for disclosure. This protocol effectively enables adaptive reconciliation. Before IR, Alice and Bob calculate the optimal code rate based on the time-varying SNR of the quantum channel. Then, they select a high-performance original LDPC code whose code rate is close to . Typically, the original LDPC code rate is defined as
| (4) |
Here, m and n correspond to the number of rows and columns of the LDPC parity-check matrix , respectively. Subsequently, to achieve the target reconciliation efficiency, it is necessary to reveal bits with lower reliability so that the original code rate equals the optimal code rate. This relationship is formulated as
| (5) |
In the SIR protocol, the main differences from the TIR protocol are as follows: Alice uses LDPC decoding to recover sequence into sequence . During the iterative decoding process, while calculating the LLR, Alice takes the and sorts them in ascending order. Then, Alice identifies the indices corresponding to the smallest values, such that . She constructs the index set and sends to Bob.
4. Analysis of the TIR and SIR Protocols
In this section, we perform an analysis of the TIR and SIR protocols, focusing on their code rate, reconciliation efficiency, and complexity.
4.1. Code Rate
In CV-QKD, we need rate-adaptive and high-efficiency codes since errors must be efficiently corrected at low SNRs to increase the SKR and the secure transmission distance. The TIR protocol identifies bits with lower reliability using the threshold : bits with reliability are selected for revelation. Thus, the code rate is calculated as
| (6) |
where denotes the number of revealed bits and depends on both the threshold and the channel SNR. This results in a passive rate adjustment: varies with SNRs, since more bits have at low SNRs, which increases and lowers . However, in the SIR protocol, rate-adaptive adjustment of the code rate is achieved by adjusting the number of disclosed bits with lower reliability according to variations in SNRs. Specifically, it first sorts the bits in descending order of their reliability and then calculates the optimal code rate , which is given by using Equation (2). Finally, to ensure that the original code rate is equal to , we reveal bits with lower reliability. According to Equation (5), the is calculated as
| (7) |
Algorithm 1 demonstrates the code rate calculation process of the SIR protocol. In summary, both the TIR and SIR protocols proposed in this paper can achieve adaptive adjustment of the code rate.
| Algorithm 1 The code rate calculation process of the SIR protocol. |
| Step 1 Obtain the channel capacity C(s) based on the practical SNR. |
| Step 2 Determine the target reconciliation efficiency . |
| Step 3 Sort the bits in descending order of reliability . |
| Step 4 Obtain the optimal code rate using Equation (2). |
| Step 5 Determine the to disclose using Equation (7). |
4.2. Reconciliation Efficiency
A higher reconciliation efficiency is required at low SNRs in order to meet the criterion that the SKR is greater than zero. From Equation (2), we know that the code rate is the major factor affecting reconciliation efficiency. Thus, in the TIR protocol, the reconciliation efficiency is defined by Equations (2) and (6) as
| (8) |
Additionally, it can also be derived from Equation (2) that under various SNRs, fixed-rate error-correcting codes are unable to sustain high reconciliation efficiency. However, the SIR protocol adjusts the code rate according to variations in SNRs to achieve high reconciliation efficiency across a wide range of SNRs. To be specific, we first set a target reconciliation efficiency, denoted as . Then, we determine the optimal code rate under a given SNR based on Equation (2). Finally, we calculate the number of bits with lower reliability to be disclosed using Equation (7), such that the original code rate is adjusted to the optimal code rate , thereby achieving a high reconciliation efficiency.
4.3. Complexity
We conduct an analysis of the time complexity and space complexity for the TIR and SIR protocols. The time complexity and space complexity are defined as the asymptotic time cost and storage cost of an algorithm, respectively, both of which are associated with the algorithm’s scale, and specifically described using the -notation [30]. In this context, and are functions that characterize the growth rates of running time of the algorithm and storage demand, with both dependent on the input size . According to the notations above, the time complexity of the TIR protocol is , since it only requires comparator operations to determine if satisfies . The computational cost thus grows linearly with the block length n, and the dominant factor is the number of decoding iterations. In comparison, the SIR protocol requires an additional sorting of the reliability. A direct sorting implementation has complexity , which increases with the block length more rapidly than the TIR protocol. In terms of space complexity, both protocols scale linearly with the block length. For the TIR protocol, the memory requirement is minimal, involving only the storage of indices of revealed bits. The SIR protocol requires additional buffers to store sorted indices and to compute the number of disclosed bits, which leads to slightly higher memory usage but still of linear order. In addition, we analyzed the complexity of other rate-adaptive reconciliation protocols, including the Raptor and MDA protocols. Raptor codes consist of an outer pre-code and an inner Luby transform (LT) code. Therefore, the two-stage architecture also presents challenges. For the Raptor protocol, the complexity of precoding increases dramatically with block length, making it unsuitable for practical applications at low SNRs [8]. Furthermore, LT code decoding requires dynamic symbol generation and confidence propagation, resulting in a complexity of , exceeding that of LDPC-based protocols. The MDA protocol, while sharing the complexity of the TIR protocol for random bit revelation, may require multiple decoding attempts, which multiplies the base complexity. Overall, both the TIR and SIR protocols maintain a linear order of computational and storage complexity, providing positive implications for the practical implementation of CV-QKD systems.
5. Simulation Results
In this section, we study the performance of the proposed TIR and SIR protocols, focusing on reconciliation efficiency, FER, and the SKR. We employ MET-LDPC codes in our simulations. For MET-LDPC codes, different types of edges have independent degree distribution functions. Here, the degree refers to the number of edges connected to variable nodes or check nodes. The detailed degree distribution we use in this paper is shown in Table 1, where denotes the generating polynomial for the variable node types and denotes the generating polynomial for the check node types. For more information about the degree distribution of MET-LDPC codes, refer to [9]. The dimension d of multidimensional reconciliation is set to 8 in the simulation that follows.
Table 1.
The degree distribution of MET-LDPC codes.
| Code Rate | Degree Distribution |
|---|---|
| 0.1 | |
| 0.05 | |
| 0.02 | |
Figure 4 illustrates the FER performance comparison between the TIR protocol with threshold-based bit revelation and a baseline strategy that randomly reveals the same number of bits, where the 0.02 MET-LDPC code, as presented in Table 1, is used in the comparison. As observed, the method of setting the threshold to reveal bits consistently outperforms random revelation in the SNR range from −15.4 to −14.9 dB. This demonstrates that selectively revealing bits with significantly enhances decoding performance and reduces the FER at low SNRs.
Figure 4.
FER comparison between the TIR protocol and random bit revelation.
Figure 5 shows the FER performance of the SIR protocol compared with the MDA protocol [25] under varying bit revelation ratios at SNR = −15.23 dB. In the proposed SIR protocol, bits are sorted according to , and the least reliable ones are selectively revealed. In contrast, the MDA protocol randomly reveals bits for LLR adjustment after decoding failure. As shown in the Figure 5, the proposed SIR protocol consistently achieves a lower FER across all tested revelation ratios. Specifically, when the bit revelation ratio exceeds 6%, the FER of the SIR protocol drops below 0.01, while the MDA protocol still maintains a relatively high FER of around 0.08. This clearly demonstrates that the proposed protocol, which reveals bits with lower reliability, outperforms the MDA protocol [25] with random bit disclosure.
Figure 5.
FER comparison under varying bit revelation ratios.
To further study the performance of our proposed SIR protocol at low SNRs, we compare the FER with the Raptor protocol in reference [6], as shown in Figure 6. The target reconciliation efficiency is set to 96% in the SNR range of −18 and −13 dB, and 95% of −12 to −10 dB. As shown in Table 2, we evaluate the number of revealed bits to convert the original code rate 0.02, 0.05, 0.1 into the optimal code rate under various SNR conditions, in order to maintain the target reconciliation efficiency. Although Figure 6 shows the FER is relatively high, this is a reasonable trade-off to achieve high reconciliation efficiency at low SNRs. Therefore, the simulation results demonstrate that all points (FER < 1) have the desired reconciliation efficiency. In the SNR range between −18 and −10 dB, the SIR protocol has a smaller FER, indicating a greater SKR.
Figure 6.
Comparison of FER performance between the SIR protocol and Raptor protocol at low SNRs.
Table 2.
The detailed results of the SIR protocol.
| SNR (dB) | |||
|---|---|---|---|
| 0.02 | −18 | 9210 | 0.01089 |
| −17 | 6408 | 0.01368 | |
| −16 | 2869 | 0.01718 | |
| 0.05 | −15 | 29,069 | 0.02156 |
| −14 | 23,605 | 0.02703 | |
| −13 | 16,700 | 0.03387 | |
| −12 | 8421 | 0.04193 | |
| 0.1 | −11 | 1005 | 0.05238 |
| −10 | 742 | 0.06531 |
Figure 7 presents the finite-size SKR results of the SIR protocol for a CV-QKD system with one-way reverse reconciliation. In practice, the modulation variance is applied to approximate the theoretical ideal value by adjusting it in real time based on various channel characteristics. Nevertheless, it is not feasible to obtain simulation results covering the full SNR range from −20 to −10 dB. Thus, we simulate the reconciliation efficiency at low SNRs and present the simulation in Figure 7. Specifically, Figure 7 shows the finite-size SKR results for a block length of at SNRs of −20, −18, −16, −14, −12, and −10 dB, respectively, while also providing the corresponding asymptotic theoretical SKR. The SKR of our adaptive SIR protocol is calculated using Equation (1), and other parameters remain consistent with those in reference [6]. Given that some bits are used for parameter estimation, we designate half of the bits for parameter estimation and the other half for symmetric secret key extraction () in IR. The simulation results indicate that when the FER of reconciliation is 0.99, the SIR protocol can achieve a reconciliation efficiency of 98.5%, with a theoretical transmission distance exceeding 165 km.
Figure 7.
Finite-size secret key rate vs. distance. The cross points, circle points, triangle points, block points, rhombus points, and orange five-pointed stars correspond to our simulation results. The black five-pointed stars are derived from simulations conducted in accordance with the Raptor protocol in reference [6], with an FER of reconciliation of 0.99. The asymptotic theoretical SKRs under different SNRs are represented by a solid line, dashed line, and dot-dash line, respectively. Alice’s modulation variance has been optimized, and the other parameters configured are listed as follows: excess noise , detection efficiency , quantum channel attenuation factor dB/km, and electronic noise .
6. Conclusions
In this paper, we proposed two rate-adaptive IR protocols for CV-QKD systems, which dynamically adjusted the code rate and improved reconciliation efficiency at low SNRs. The TIR protocol disclosed bits with , while the SIR protocol revealed a fixed number of the least reliable bits, allowing dynamic adjustment of the code rate to the time-varying nature of the quantum channel of CV-QKD systems. The analysis demonstrated the overall effectiveness of the proposed TIR and SIR protocols in terms of key metrics including code rate, reconciliation efficiency, and complexity. The simulation results showed that selectively revealing bits with lower reliability outperformed randomly revealing bits. Moreover, the SIR protocol reduced the FER and improved reconciliation efficiency, achieving high reconciliation efficiency over a wide range of SNRs and even attaining over 98.5% efficiency when the SNR dropped below −20 dB. Furthermore, the relationship between the finite-size SKR and transmission distance confirmed the superiority of our scheme. Our work may contribute to the development of practical applications for CV-QKD systems.
Author Contributions
Conceptualization, Y.F.; methodology, X.-Q.J.; software, H.F.; validation, H.F.; formal analysis, H.F.; investigation, H.F.; resources, Y.F.; data curation, H.F. and X.-Q.J.; writing—original draft preparation, H.F.; writing—review and editing, H.F., J.D., H.G. and X.-Q.J.; visualization, H.F.; supervision, J.D., Y.F., H.H., H.G., P.H. and X.-Q.J.; project administration, H.H., P.H. and X.-Q.J.; funding acquisition, P.H. All authors have read and agreed to the published version of the manuscript.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author(s).
Conflicts of Interest
The authors declare no conflicts of interest.
Funding Statement
This research was funded by the National Natural Science Foundation of China (Grant Nos. 61971276, 62071319), the Key R&D Program of Guangdong province (Grant No. 2020B0303040002), the Shanghai Municipal Science and Technology Major Project (Grant No. 2019SHZDZX01), the State Key Laboratory of Advanced Optical Communication Systems and Networks (Grant No. 2024GZKF006), and the Innovation Program for Quantum Science and Technology (Grant No. 2021ZD0300703).
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.Gisin N., Ribordy G., Tittel W., Zbinden H. Quantum cryptography. Rev. Mod. Phys. 2002;74:145. doi: 10.1103/RevModPhys.74.145. [DOI] [Google Scholar]
- 2.Scarani V., Bechmann-Pasquinucci H., Cerf N.J., Dušek M., Lütkenhaus N., Peev M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009;81:1301–1350. doi: 10.1103/RevModPhys.81.1301. [DOI] [Google Scholar]
- 3.Pirandola S., Andersen U.L., Banchi L., Berta M., Bunandar D., Colbeck R., Englund D., Gehring T., Lupo C., Ottaviani C., et al. Advances in quantum cryptography. Adv. Opt. Photonics. 2020;12:1012–1236. doi: 10.1364/AOP.361502. [DOI] [Google Scholar]
- 4.Diamanti E., Lo H.-K., Qi B., Yuan Z. Practical challenges in quantum key distribution. npj Quantum Inf. 2016;2:16025. doi: 10.1038/npjqi.2016.25. [DOI] [Google Scholar]
- 5.Braunstein S.L., Loock P.V. Quantum information with continuous variables. Rev. Mod. Phys. 2005;77:513–577. doi: 10.1103/RevModPhys.77.513. [DOI] [Google Scholar]
- 6.Zhou C., Wang X., Zhang Y., Zhang Z., Yu S., Guo H. Continuous-variable quantum key distribution with rateless reconciliation protocol. Phys. Rev. Appl. 2019;12:054013. doi: 10.1103/PhysRevApplied.12.054013. [DOI] [Google Scholar]
- 7.Jouguet P., Kunz-Jacques S., Leverrier A., Grangier P., Diamanti E. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics. 2013;7:378–381. doi: 10.1038/nphoton.2013.63. [DOI] [Google Scholar]
- 8.Milicevic M., Feng C., Zhang L.M., Gulak P.G. Quasi-cyclic multi-edge ldpc codes for long-distance quantum cryptography. npj Quantum Inf. 2018;4:21. doi: 10.1038/s41534-018-0070-6. [DOI] [Google Scholar]
- 9.Jouguet P., Kunz-Jacques S., Leverrier A. Long-distance continuous-variable quantum key distribution with a gaussian modulation. Phys. Rev. A At. Mol. Opt. Phys. 2011;84:062317. doi: 10.1103/PhysRevA.84.062317. [DOI] [Google Scholar]
- 10.Lodewyck J., Bloch M., García-Patrón R., Fossier S., Karpov E., Diamanti E., Debuisschert T., Cerf N.J., Tualle-Brouri R., McLaughlin S.W., et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A At. Mol. Opt. Phys. 2007;76:042305. doi: 10.1103/PhysRevA.76.042305. [DOI] [Google Scholar]
- 11.Grosshans F., Grangier P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002;88:057902. doi: 10.1103/PhysRevLett.88.057902. [DOI] [PubMed] [Google Scholar]
- 12.Leverrier A., Grosshans F., Grangier P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A At. Mol. Opt. Phys. 2010;81:062343. doi: 10.1103/PhysRevA.81.062343. [DOI] [Google Scholar]
- 13.Grosshans F., Cerf N.J., Wenger J., Tualle-Brouri R., Grangier P. Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables. arXiv. 2003 doi: 10.26421/QIC3.s-6.quant-ph/0306141 [DOI] [Google Scholar]
- 14.Assche G.V., Cardinal J., Cerf N.J. Reconciliation of a quantum-distributed gaussian key. IEEE Trans. Inf. Theory. 2004;50:394–400. doi: 10.1109/tit.2003.822618. [DOI] [Google Scholar]
- 15.Bennett C.H., Brassard G., Crépeau C., Maurer U.M. Generalized privacy amplification. IEEE Trans. Inf. Theory. 2002;41:1915–1923. doi: 10.1109/18.476316. [DOI] [Google Scholar]
- 16.Zhou C., Wang X., Zhang Z., Yu S., Chen Z., Guo H. Rate compatible reconciliation for continuous-variable quantum key distribution using raptor-like ldpc codes. Sci. China Physics, Mech. Astron. 2021;64:260311. doi: 10.1007/s11433-021-1688-4. [DOI] [Google Scholar]
- 17.Jouguet P., Elkouss D., Kunz-Jacques S. High-bit-rate continuous-variable quantum key distribution. Phys. Rev. 2014;90:042329. doi: 10.1103/PhysRevA.90.042329. [DOI] [Google Scholar]
- 18.Leverrier A., Alléaume R., Boutros J., Zémor G., Grangier P. Multidimensional reconciliation for a continuous-variable quantum key distribution. Phys. Rev. A At. Mol. Opt. Phys. 2008;77:042325. doi: 10.1103/PhysRevA.77.042325. [DOI] [Google Scholar]
- 19.Richardson T., Urbanke R. Workshop Honoring Prof. Bob McEliece on His 60th Birthday. California Institute of Technology; Pasadena, CA, USA: 2002. Multi-edge type ldpc codes; pp. 24–25. [Google Scholar]
- 20.Gallager R. Low-density parity-check codes. IRE Trans. Inf. Theory. 1962;8:21–28. doi: 10.1109/TIT.1962.1057683. [DOI] [Google Scholar]
- 21.Zhang M., Hai H., Feng Y., Jiang X.-Q. Rate-adaptive reconciliation with polar coding for continuous-variable quantum key distribution. Quantum Inf. Process. 2021;20:318. doi: 10.1007/s11128-021-03248-0. [DOI] [Google Scholar]
- 22.Jeong S., Jung H., Ha J. Rate-compatible multi-edge type low-density parity-check code ensembles for continuous-variable quantum key distribution systems. npj Quantum Inf. 2022;8:6. doi: 10.1038/s41534-021-00509-9. [DOI] [Google Scholar]
- 23.Shokrollahi A. Raptor codes. IEEE Trans. Inf. Theory. 2006;52:2551–2567. doi: 10.1109/TIT.2006.874390. [DOI] [Google Scholar]
- 24.Perry J., Iannucci P.A., Fleming K.E., Balakrishnan H., Shah D. Spinal codes. ACM SIGCOMM Comput. Commun. Rev. 2012;42:49–60. doi: 10.1145/2377677.2377684. [DOI] [Google Scholar]
- 25.Gümüş K., Eriksson T.A., Takeoka M., Fujiwara M., Sasaki M., Schmalen L., Alvarado A. A novel error correction protocol for continuous variable quantum key distribution. Sci. Rep. 2021;11:10465. doi: 10.1038/s41598-021-90055-3. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 26.Zhou C., Li Y., Ma L., Yang J., Huang W., Sun A., Wang H., Luo Y., Li Y., Chen Z., et al. Integrated high-performance error correction for continuous-variable quantum key distribution. arXiv. 20242407.16432 [Google Scholar]
- 27.Grosshans F., Grangier P. Reverse reconciliation protocols for quantum cryptography with continuous variables. arXiv. 2002 doi: 10.48550/arXiv.quant-ph/0204127.quant-ph/0204127 [DOI] [Google Scholar]
- 28.Zhang K., Jiang X.-Q., Feng Y., Qiu R., Bai E. High efficiency continuous-variable quantum key distribution based on atsc 3.0 ldpc codes. Entropy. 2020;22:1087. doi: 10.3390/e22101087. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 29.Jiang X.Q., Xue S., Tang J., Huang P., Zeng G. Low-complexity adaptive reconciliation protocol for continuous-variable quantum key distribution. Quantum Sci. Technol. 2024;9:025008. doi: 10.1088/2058-9565/ad1f3c. [DOI] [Google Scholar]
- 30.Elkouss D., Martínez-Mateo J., Martín V. Secure rate-adaptive reconciliation; Proceedings of the 2010 International Symposium On Information Theory & Its Applications; Taichung, Taiwan. 17–20 October 2010; New York, NY, USA: IEEE; 2010. pp. 179–184. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author(s).







