pith. machine review for the scientific record. sign in

arxiv: 2604.27299 · v2 · submitted 2026-04-30 · 🪐 quant-ph · physics.optics

Recognition: unknown

High-Rate Free-Space Continuous-Variable QKD with Self-Referenced Passive State Preparation

G.H. Zeng, H.W. Yin, K.T. Zhu, P. Huang, T. Wang, X.J. Liao, Y.H. Xu

Authors on Pith no claims yet

Pith reviewed 2026-05-08 03:08 UTC · model grok-4.3

classification 🪐 quant-ph physics.optics
keywords continuous-variable quantum key distributionpassive state preparationlocal local oscillatorfree-space channelsecret key ratephase compensationatmospheric turbulenceself-referenced pilot
0
0 comments X

The pith

A self-referenced passive state preparation scheme enables local-local-oscillator CVQKD to reach 10.34 Mbps secret key rate over free-space channels with 23.5 dB loss.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper introduces a continuous-variable quantum key distribution system that prepares quantum states passively at the transmitter while placing the local oscillator at the receiver. It proves equivalence between this self-referenced passive scheme and the standard Gaussian-modulated coherent state protocol through temporal-mode theory. A self-referenced pilot tone supplies the data needed for precise, time-varying frequency and phase compensation algorithms. The resulting setup produces a high secret key rate across a lossy free-space link while remaining stable under turbulence. Readers focused on deployable quantum links would see value in hardware that avoids transmitting a bright local oscillator and reduces sensitivity to channel fluctuations.

Core claim

The authors implement a local-local-oscillator continuous-variable quantum key distribution system that relies on self-referenced passive state preparation. They establish equivalence to the Gaussian-modulated coherent-state protocol via temporal-mode theory. The self-referenced pilot enables high-precision compensation of frequency and phase drifts, producing an asymptotic secret key rate of 10.34 Mbps at up to 23.5 dB channel loss while keeping excess noise low and performance stable under turbulent conditions.

What carries the argument

Self-referenced pilot scheme that supplies data for time-varying frequency and phase compensation in a passive state preparation CVQKD link.

If this is right

  • The system maintains low excess noise and stable operation under turbulent free-space conditions.
  • High-rate key generation becomes feasible over lossy free-space channels where prior passive schemes failed.
  • The proven equivalence allows existing Gaussian-modulated coherent-state security proofs to apply directly to this passive setup.
  • The architecture supplies a practical route to secure high-rate quantum links without transmitting a local oscillator.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The compensation method could extend to other free-space optical protocols that face similar phase and frequency instability.
  • Reduced hardware demands from passive preparation may lower barriers to outdoor or mobile quantum communication trials.
  • If excess noise scales predictably with loss, the same approach could support longer terrestrial distances once turbulence statistics are better characterized.

Load-bearing premise

The self-referenced passive state preparation must match the standard protocol without adding undetected noise, and excess noise must remain low enough under real turbulence for the security bounds to yield a positive key rate.

What would settle it

An experimental measurement of excess noise high enough to drive the secret key rate to zero at 23.5 dB loss under realistic atmospheric turbulence would show the claimed performance does not hold.

read the original abstract

Continuous-variable quantum key distribution (CVQKD) using passive state preparation (PSP) offers low-cost, high-rate secure communication. However, the existing PSP-CVQKD scheme with a transmitted local oscillator has high photon leakage noise and poor stability, making it unsuitable for high-loss transmission. In this work, for the first time, we propose and implement a local local oscillator (LLO) CVQKD system using a self-referenced (SR) PSP scheme, and give a theoretical proof of the equivalence of the PSP and GMCS protocol using temporal-mode theory. By employing the novel self-referenced pilot scheme to achieve high-precision time-varying frequency and phase compensation algorithms, we significantly improve the system' s signal-to-noise ratio and stability. The system achieves a record-high asymptotic secret key rate of 10.34 Mbps over a free-space channel with up to 23.5 dB loss, while maintaining low excess noise and robust performance under turbulent conditions. This work establishes the feasibility of SR-LLO CVQKD, providing a practical pathway toward secure, high-rate quantum communication in realistic environments.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The manuscript proposes and experimentally demonstrates a self-referenced passive state preparation (SR-PSP) scheme for local-local-oscillator continuous-variable quantum key distribution (LLO-CVQKD) over free-space channels. It claims a theoretical equivalence between the SR-PSP scheme and the Gaussian-modulated coherent state (GMCS) protocol via temporal-mode theory, and reports a record asymptotic secret key rate of 10.34 Mbps at up to 23.5 dB loss with low excess noise and robust performance under turbulence, enabled by self-referenced pilot tones for real-time frequency and phase compensation.

Significance. If the equivalence holds without unaccounted turbulence-induced noise terms and the measured excess noise remains compatible with GMCS security bounds, the work would constitute a meaningful advance in practical free-space CVQKD by mitigating photon leakage and stability issues of prior transmitted-LO PSP schemes while achieving high rates in realistic turbulent conditions.

major comments (2)
  1. [Theoretical equivalence proof (via temporal-mode theory)] The temporal-mode theory equivalence proof must explicitly derive or bound any additional covariance-matrix terms (off-diagonal or excess-noise) that could arise when turbulence couples differently into the self-referenced pilot modes versus the signal modes; without this, direct reuse of existing GMCS security proofs is not justified.
  2. [Experimental results and noise analysis] The experimental noise analysis and key-rate calculation at 23.5 dB loss require an explicit decomposition isolating pilot-induced contributions under turbulence, together with a turbulence model folded into the security analysis; the reported low excess noise alone does not confirm that the asymptotic GMCS key-rate formula remains applicable.
minor comments (1)
  1. [Abstract] Clarify in the abstract and introduction whether the self-referenced pilot scheme introduces any additional degrees of freedom that must be calibrated or bounded for the equivalence to hold.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive and detailed comments, which help clarify the presentation of our theoretical equivalence and experimental validation. We address each major comment below and will revise the manuscript to incorporate the suggested improvements.

read point-by-point responses
  1. Referee: [Theoretical equivalence proof (via temporal-mode theory)] The temporal-mode theory equivalence proof must explicitly derive or bound any additional covariance-matrix terms (off-diagonal or excess-noise) that could arise when turbulence couples differently into the self-referenced pilot modes versus the signal modes; without this, direct reuse of existing GMCS security proofs is not justified.

    Authors: We appreciate this observation. Our temporal-mode analysis demonstrates equivalence by treating the self-referenced pilots and signal as sharing identical temporal modes, with turbulence effects captured in the overall channel transmittance and excess noise. To explicitly address possible differential coupling, we will expand the proof to derive the additional covariance-matrix elements and provide analytical bounds using the measured turbulence parameters from our experiment. These bounds will show that any extra terms are negligible compared to the reported excess noise, thereby justifying direct application of the GMCS security proof. The revised theoretical section will include this derivation. revision: yes

  2. Referee: [Experimental results and noise analysis] The experimental noise analysis and key-rate calculation at 23.5 dB loss require an explicit decomposition isolating pilot-induced contributions under turbulence, together with a turbulence model folded into the security analysis; the reported low excess noise alone does not confirm that the asymptotic GMCS key-rate formula remains applicable.

    Authors: We agree that an explicit decomposition strengthens the security claim. In the revised manuscript, we will add a detailed noise budget that isolates the pilot-tone contributions under the observed turbulence conditions. We will also incorporate a standard free-space turbulence model (parameterized by the measured scintillation index) into the security analysis to confirm that the total excess noise remains within the GMCS bounds. The low excess noise value already reflects all experimental impairments, including turbulence and pilot effects, but the added decomposition and model will make the applicability of the asymptotic GMCS key-rate formula explicit. revision: yes

Circularity Check

0 steps flagged

No significant circularity; equivalence proof and key-rate derivation are independent of experimental fits.

full rationale

The paper presents a theoretical proof of PSP-GMCS equivalence via temporal-mode theory as a self-contained mathematical step prior to any data fitting or experimental validation. The asymptotic key rate is then obtained by substituting the resulting covariance matrix into the standard GMCS security formula, with measured excess noise serving only as an empirical check rather than an input that defines the model. No self-definitional loops, fitted parameters renamed as predictions, or load-bearing self-citations that reduce the central claim to its own outputs are present. The derivation chain remains externally verifiable against existing GMCS proofs once the temporal-mode equivalence is accepted on its own terms.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The central claims rest on an unexpanded theoretical equivalence between PSP and GMCS protocols and on experimental assumptions about excess noise under turbulence; no free parameters or new entities are explicitly listed in the abstract.

axioms (1)
  • domain assumption Equivalence of PSP and GMCS protocols under temporal-mode theory
    Stated as a theoretical proof in the abstract without further detail.

pith-pipeline@v0.9.0 · 5519 in / 1150 out tokens · 60427 ms · 2026-05-08T03:08:44.303254+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

42 extracted references · 23 canonical work pages

  1. [1]

    F.Grosshans,P.Grangier,ContinuousVariableQuantumCryptographyUsingCoherentStates. Phys. Rev. Lett.88, 057902 (2002), doi:10.1103/PhysRevLett.88.057902,https://link. aps.org/doi/10.1103/PhysRevLett.88.057902

  2. [2]

    S.Pirandola,R.Laurenza,C.Ottaviani,L.Banchi,Fundamentallimitsofrepeaterlessquantum communications.Nature communications8(1), 15043 (2017)

  3. [3]

    Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation

    A. Leverrier, P. Grangier, Unconditional Security Proof of Long-Distance Continuous- Variable Quantum Key Distribution with Discrete Modulation.Phys. Rev. Lett.102, 180504 (2009), doi:10.1103/PhysRevLett.102.180504,https://link.aps.org/doi/10. 1103/PhysRevLett.102.180504

  4. [4]

    Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    Z. Zhang, C. Chen, Q. Zhuang, F. N. C. Wong, J. H. Shapiro, Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel.Quantum ScienceandTechnology3(2),025007(2018),doi:10.1088/2058-9565/aab623,https://dx. doi.org/10.1088/2058-9565/aab623

  5. [5]

    Huang,et al., Realizing a Downstream-Access Network Using Continuous-Variable Quan- tum Key Distribution.Phys

    Y. Huang,et al., Realizing a Downstream-Access Network Using Continuous-Variable Quan- tum Key Distribution.Phys. Rev. Appl.16, 064051 (2021), doi:10.1103/PhysRevApplied.16. 064051,https://link.aps.org/doi/10.1103/PhysRevApplied.16.064051

  6. [6]

    Y.Xu,T.Wang,H.Zhao,P.Huang,G.Zeng,Round-tripmulti-bandquantumaccessnetwork. Photon. Res.11(8), 1449–1464 (2023), doi:10.1364/PRJ.492448,https://opg.optica. org/prj/abstract.cfm?URI=prj-11-8-1449

  7. [7]

    G.Zhang,etal.,Anintegratedsiliconphotonicchipplatformforcontinuous-variablequantum key distribution.Nature Photonics13(12), 839–842 (2019)

  8. [8]

    002,https://www.sciencedirect.com/science/article/pii/S2667325820300108

    H.Guo,Z.Li,S.Yu,Y.Zhang,Towardpracticalquantumkeydistributionusingtelecomcompo- nents.FundamentalResearch1(1),96–98(2021),doi:https://doi.org/10.1016/j.fmre.2020.12. 002,https://www.sciencedirect.com/science/article/pii/S2667325820300108. 21

  9. [9]

    Weedbrook,et al., Quantum Cryptography Without Switching.Phys

    C. Weedbrook,et al., Quantum Cryptography Without Switching.Phys. Rev. Lett.93, 170504 (2004), doi:10.1103/PhysRevLett.93.170504,https://link.aps.org/doi/10. 1103/PhysRevLett.93.170504

  10. [10]

    B.Qi,P.Lougovski,R.Pooser,W.Grice,M.Bobrek,GeneratingtheLocalOscillator“Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection.Phys. Rev. X5, 041009 (2015), doi:10.1103/PhysRevX.5.041009,https://link.aps.org/doi/10. 1103/PhysRevX.5.041009

  11. [11]

    Huang, P

    D. Huang, P. Huang, D. Lin, C. Wang, G. Zeng, High-speed continuous-variable quan- tum key distribution without sending a local oscillator.Opt. Lett.40(16), 3695–3698 (2015), doi:10.1364/OL.40.003695,https://opg.optica.org/ol/abstract.cfm?URI= ol-40-16-3695

  12. [12]

    Available: https://link.aps.org/doi/10.1103/PhysRevA

    P. Huang, J. Huang, Z. Zhang, G. Zeng, Quantum key distribution using basis encoding of Gaussian-modulatedcoherentstates.Phys.Rev.A97,042311(2018), doi:10.1103/PhysRevA. 97.042311,https://link.aps.org/doi/10.1103/PhysRevA.97.042311

  13. [13]

    S. Wang, P. Huang, T. Wang, G. Zeng, Feasibility of All-Day Quantum Communication with Coherent Detection.Phys. Rev. Appl.12, 024041 (2019), doi:10.1103/PhysRevApplied.12. 024041,https://link.aps.org/doi/10.1103/PhysRevApplied.12.024041

  14. [14]

    Furrer,et al., Continuous Variable Quantum Key Distribution: Finite-Key Analy- sis of Composable Security against Coherent Attacks.Phys

    F. Furrer,et al., Continuous Variable Quantum Key Distribution: Finite-Key Analy- sis of Composable Security against Coherent Attacks.Phys. Rev. Lett.109, 100502 (2012), doi:10.1103/PhysRevLett.109.100502,https://link.aps.org/doi/10.1103/ PhysRevLett.109.100502

  15. [15]

    Structural relaxation made simple.Phys

    M. Navascués, F. Grosshans, A. Acín, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography.Phys. Rev. Lett.97, 190502 (2006), doi:10.1103/PhysRevLett.97. 190502,https://link.aps.org/doi/10.1103/PhysRevLett.97.190502

  16. [16]

    Renner, J

    R. Renner, J. I. Cirac, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography.Phys. Rev. Lett.102, 22 110504 (2009), doi:10.1103/PhysRevLett.102.110504,https://link.aps.org/doi/10. 1103/PhysRevLett.102.110504

  17. [17]

    J.Lodewyck,etal.,Quantumkeydistributionover25 kmwithanall-fibercontinuous-variable system.Phys. Rev. A76, 042305 (2007), doi:10.1103/PhysRevA.76.042305,https://link. aps.org/doi/10.1103/PhysRevA.76.042305

  18. [18]

    Jouguet, S

    P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, E. Diamanti, Experimental demonstra- tion of long-distance continuous-variable quantum key distribution.Nature photonics7(5), 378–381 (2013)

  19. [19]

    Huang, P

    D. Huang, P. Huang, D. Lin, G. Zeng, Long-distance continuous-variable quantum key distri- bution by controlling excess noise.Scientific reports6(1), 19201 (2016)

  20. [20]

    Zhang,et al., Continuous-variable QKD over 50 km commercial fiber.Quantum Science and Technology4(3), 035006 (2019)

    Y. Zhang,et al., Continuous-variable QKD over 50 km commercial fiber.Quantum Science and Technology4(3), 035006 (2019)

  21. [21]

    Y.Zhang,etal.,Long-DistanceContinuous-VariableQuantumKeyDistributionover202.81km of Fiber.Phys. Rev. Lett.125, 010502 (2020), doi:10.1103/PhysRevLett.125.010502,https: //link.aps.org/doi/10.1103/PhysRevLett.125.010502

  22. [22]

    Pi,et al., Sub-Mbps key-rate continuous-variable quantum key distribution with local local oscillator over 100-km fiber.Opt

    Y. Pi,et al., Sub-Mbps key-rate continuous-variable quantum key distribution with local local oscillator over 100-km fiber.Opt. Lett.48(7), 1766–1769 (2023), doi:10.1364/OL.485913, https://opg.optica.org/ol/abstract.cfm?URI=ol-48-7-1766

  23. [23]

    A. A. E. Hajomer,et al., Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator.Science Advances10(1), eadi9474 (2024), doi:10. 1126/sciadv.adi9474,https://www.science.org/doi/abs/10.1126/sciadv.adi9474

  24. [24]

    Ma, S.-H

    X.-C. Ma, S.-H. Sun, M.-S. Jiang, L.-M. Liang, Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems.Physical Review A—Atomic, Molecular, and Optical Physics88(2), 022339 (2013)

  25. [25]

    P.Jouguet,S.Kunz-Jacques,E.Diamanti,Preventingcalibrationattacksonthelocaloscillator in continuous-variable quantum key distribution.Physical Review A—Atomic, Molecular, and Optical Physics87(6), 062313 (2013). 23

  26. [26]

    A.A.E.Hajomer,etal.,Continuous-variablequantumkeydistributionat10 GBaud using an integrated photonic-electronic receiver.Optica11(9), 1197–1204 (2024), doi:10.1364/OPTICA.530080,https://opg.optica.org/optica/abstract.cfm?URI= optica-11-9-1197

  27. [27]

    B.Qi,P.G.Evans,W.P.Grice,PassivestatepreparationintheGaussian-modulatedcoherent- states quantum key distribution.Phys. Rev. A97, 012317 (2018), doi:10.1103/PhysRevA.97. 012317,https://link.aps.org/doi/10.1103/PhysRevA.97.012317

  28. [28]

    Qi,et al., Experimental Passive-State Preparation for Continuous-Variable Quantum Com- munications.Phys

    B. Qi,et al., Experimental Passive-State Preparation for Continuous-Variable Quantum Com- munications.Phys. Rev. Appl.13, 054065 (2020), doi:10.1103/PhysRevApplied.13.054065, https://link.aps.org/doi/10.1103/PhysRevApplied.13.054065

  29. [29]

    Huang,et al., Experimental continuous-variable quantum key distribution using a thermal source.New Journal of Physics23(11), 113028 (2021)

    P. Huang,et al., Experimental continuous-variable quantum key distribution using a thermal source.New Journal of Physics23(11), 113028 (2021)

  30. [30]

    X. Wu, Y. Wang, Y. Guo, H. Zhong, D. Huang, Passive continuous-variable quantum key distribution using a locally generated local oscillator.Phys. Rev. A103, 032604 (2021), doi: 10.1103/PhysRevA.103.032604,https://link.aps.org/doi/10.1103/PhysRevA.103. 032604

  31. [31]

    Zhang, P

    M. Zhang, P. Huang, P. Wang, S. Wei, G. Zeng, Experimental free-space continuous-variable quantum key distribution with thermal source.Optics Letters48(5), 1184–1187 (2023)

  32. [32]

    F.Ji,P.Huang,T.Wang,X.Jiang,G.Zeng,Gbpskeyratepassive-state-preparationcontinuous- variable quantum key distribution within an access-network area.Photonics Research12(7), 1485–1493 (2024)

  33. [33]

    X. Wu, Y. Wang, Y. Guo, H. Zhong, D. Huang, Passive continuous-variable quantum key distribution using a locally generated local oscillator.Physical Review A103(3), 032604 (2021)

  34. [34]

    Weisskopf, E

    V. Weisskopf, E. Wigner, Berechnung der natürlichen Linienbreite auf Grund der Diracschen Lichttheorie.Zeitschrift fur Physik63(1-2), 54–73 (1930). 24

  35. [35]

    M. O. Scully, M. S. Zubairy,Quantum optics(Cambridge university press) (1997)

  36. [36]

    M.Raymer,Z.Li,I.Walmsley,TemporalquantumfluctuationsinstimulatedRamanscattering: Coherent-modes description.Physical review letters63(15), 1586 (1989)

  37. [37]

    K.Blow,R.Loudon,S.J.Phoenix,T.Shepherd,Continuumfieldsinquantumoptics.Physical Review A42(7), 4102 (1990)

  38. [38]

    Fabre, N

    C. Fabre, N. Treps, Modes and states in quantum optics.Reviews of Modern Physics92(3), 035005 (2020)

  39. [39]

    M. G. Raymer, I. A. Walmsley, Temporal modes in quantum optics: then and now.Physica Scripta95(6), 064002 (2020), doi:10.1088/1402-4896/ab6153,https://dx.doi.org/10. 1088/1402-4896/ab6153

  40. [40]

    Z. Chen, X. Wang, S. Yu, Z. Li, H. Guo, Continuous-mode quantum key distribution with digital signal processing.npj Quantum Information9(1), 28 (2023)

  41. [41]

    Xu,et al., Robust continuous-variable quantum key distribution in the finite-size regime

    Y. Xu,et al., Robust continuous-variable quantum key distribution in the finite-size regime. Photonics Research12(11), 2549–2558 (2024)

  42. [42]

    Acknowledgments We thank our colleagues for their contributions to the work cited

    A.A.Hajomer,etal.,Long-distancecontinuous-variablequantumkeydistributionover100-km fiber with local local oscillator.Science Advances10(1), eadi9474 (2024). Acknowledgments We thank our colleagues for their contributions to the work cited. Funding:This work was supported by Quantum Science and Technology-National Science and TechnologyMajorProject(GrantNo...