pith. machine review for the scientific record. sign in

arxiv: 2604.27943 · v2 · submitted 2026-04-30 · 🪐 quant-ph

Recognition: unknown

Adaptable Continuous Variable Quantum Network with Finite Size Security

Authors on Pith no claims yet

Pith reviewed 2026-05-07 06:27 UTC · model grok-4.3

classification 🪐 quant-ph
keywords continuous-variable quantum key distributionmulti-user quantum networkfinite-size securitysecret key ratecoherent statesquantum access networkreverse reconciliation
0
0 comments X

The pith

An active 1:4 continuous-variable quantum network generates secret keys at 0.19 bits per channel use over 11 km channels in the finite-size regime.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

This paper demonstrates an experimental multi-user continuous-variable quantum key distribution network that supports four simultaneous users on shared fiber links. By exchanging 1.25 billion coherent states on each 11 km channel, the setup produces a total secret key rate of 0.19 bits per channel use while applying finite-size security bounds. The authors also introduce adaptable protocols that let individual users choose different security levels and key rates without rebuilding the network. These results matter because they show how quantum-secure communication can scale to multiple parties using ordinary telecom equipment instead of specialized hardware.

Core claim

An active 1:4 multi-user CV quantum network is experimentally realized in the finite-size regime by exchanging 1.25·10^9 coherent states on each 11 km quantum channel, yielding secret key generation totaling 1.9·10^{-1} bits per channel use, with adaptable CV-QN protocols that allow operation under varying security and key rate requirements of individual users.

What carries the argument

The active 1:4 multi-user continuous-variable quantum network employing coherent-state modulation, reverse reconciliation, and finite-size security analysis on 11 km channels.

Load-bearing premise

The experimental setup has no unaccounted losses or side-channel vulnerabilities and the finite-size security analysis holds under standard CV-QKD assumptions of Gaussian modulation and trusted devices.

What would settle it

An independent test that measures the observed key rate under controlled side-channel or eavesdropping conditions and checks whether it stays within the reported finite-size security bounds would confirm or refute the result.

Figures

Figures reproduced from arXiv: 2604.27943 by Adnan A.E. Hajomer, Akash nag Oruganti, Huy Q. Nguyen, Ivan Derkach, Runjia Zhang, Tobias Gehring, Ulrik L. Andersen, Vladyslav C. Usenko.

Figure 1
Figure 1. Figure 1: (a) Trust assumptions of different broadcasting CV-QKD protocols in access CV-QKD network. Dashed areas indicate ele￾ments that are not trusted under respective protocol. Under the trusted protocol quantum channels are not trusted, while users have a varying degree of trust between them. The collaborative protocol relies on measured results of other users to be kept private from Eve, while their detectors … view at source ↗
Figure 2
Figure 2. Figure 2: A continuous variable quantum access network in action in the lab. (a) State preparation station comprises a signal laser, a digital-to-analog converter (DAC), an IQ modulator stabilized by an automatic bias controller (ABC), as well as a variable optical attenuator (VOA) and an isolator. (b) State distribution is assisted with a 1 : 4 splitter which splits the coherent states, forming a quantum broadcasti… view at source ↗
Figure 3
Figure 3. Figure 3: Finite-size secret key rates as a function of the total number of exchanged quantum signals for the different trust scenarios considered in the multi-user CV-QKD network. The solid curves correspond to the finite-size secret key rates, while the dashed horizontal lines indicate the corresponding asymptotic secret key rates. (Left) Trusted-user scenario, where non-reference users are assumed trusted and exc… view at source ↗
read the original abstract

In recent years, continuous-variable quantum key distribution (CV-QKD) has become a promising paradigm for enabling secure communication among multiple end users sharing the same telecommunication backbone. CV-QKD with reverse reconciliation naturally enables scalability from conventional point-to-point links to quantum access networks based on passive quantum broadcasting channels. Here, we report an experimental demonstration on an active $1:4$ multi-user CV quantum network (QN) in the finite-size regime. With $1.25\cdot10^9$ coherent states exchanged on each $11\text{km}$ quantum channel, the highest performance for secret key generation totaling $1.9\cdot10^{-1}$ bits/channel use. Furthermore, we investigate adaptable CV-QN protocols that comprehensively allow network operation in various security and key rates requirements of individual users. The results establish the practical security of CV-QN compatible with existing telecommunication for broad deployment, and allowing additional degree of freedom for connected end users in existing infrastructures.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

1 major / 3 minor

Summary. The manuscript reports an experimental demonstration of an active 1:4 multi-user continuous-variable quantum key distribution (CV-QKD) network operating in the finite-size regime. Using 1.25×10^9 coherent states exchanged over each of four 11 km channels, the authors achieve a secret key rate of 1.9×10^{-1} bits per channel use under reverse reconciliation. The work further develops adaptable CV-QN protocols that permit per-user tuning of security parameters and key rates while remaining compatible with existing telecommunication infrastructure.

Significance. If the finite-size security analysis is shown to be composably sound under the shared-transmitter architecture, the result would constitute a notable experimental milestone for scalable CV quantum networks. It supplies concrete, replicable parameters (block size, distance, modulation) and demonstrates practical adaptability, both of which are valuable for moving CV-QKD beyond point-to-point links. The experimental achievement itself is a strength; the central claim, however, hinges on whether multi-user correlations are properly bounded.

major comments (1)
  1. [Security analysis / finite-size key-rate calculation] The headline finite-size key rate of 1.9×10^{-1} bits/channel use is obtained by applying standard single-link CV-QKD bounds (Renner-style smoothing plus parameter-estimation penalty) separately to each of the four channels. In an active 1:4 network the four data sets share the same transmitter, modulation hardware, and possibly the same local oscillator; any common-mode fluctuation therefore correlates the quadrature estimates. The manuscript must specify, in the security-analysis section, whether a joint covariance-matrix estimation or an explicit union bound over the four channels was performed. If the four bounds were simply multiplied by the reported block size without this adjustment, the composable key rate is at risk of being overstated by an amount comparable to the finite-size correction itself.
minor comments (3)
  1. [Abstract and Experimental Results] The abstract states that the key rate is “totaling 1.9·10^{-1} bits/channel use” without clarifying whether this figure is per channel or an aggregate across the four users; the experimental-results section should state the per-user rates explicitly.
  2. [Experimental Results] No error bars, data-exclusion criteria, or channel-characterization statistics (e.g., excess noise, transmittance fluctuations) are mentioned in the abstract or summary tables. These must be supplied in the main text or supplementary material so that the reported key rate can be independently verified.
  3. [Adaptable Protocol Description] Notation for the adaptable protocol parameters (security thresholds, reconciliation efficiency per user) is introduced without a compact summary table; a single table listing the tunable parameters and the resulting key-rate/security trade-offs would improve readability.

Simulated Author's Rebuttal

1 responses · 0 unresolved

We thank the referee for their thorough review and constructive comments. We address the single major comment on the finite-size security analysis below. We agree that additional rigor is warranted and will revise the manuscript accordingly.

read point-by-point responses
  1. Referee: [Security analysis / finite-size key-rate calculation] The headline finite-size key rate of 1.9×10^{-1} bits/channel use is obtained by applying standard single-link CV-QKD bounds (Renner-style smoothing plus parameter-estimation penalty) separately to each of the four channels. In an active 1:4 network the four data sets share the same transmitter, modulation hardware, and possibly the same local oscillator; any common-mode fluctuation therefore correlates the quadrature estimates. The manuscript must specify, in the security-analysis section, whether a joint covariance-matrix estimation or an explicit union bound over the four channels was performed. If the four bounds were simply multiplied by the reported block size without this adjustment, the composable key rate is at risk of being overstated by an amount comparable to the finite-size correction itself.

    Authors: We thank the referee for identifying this important point. Our original analysis applied the standard single-link finite-size bounds independently to each of the four channels. While each receiver employs an independent local oscillator and the modulation sequences for the four channels are generated and applied in temporally separated intervals with independent randomness, we acknowledge that a shared transmitter could in principle introduce weak correlations. To ensure composable security, we will revise the security-analysis section to explicitly apply a union bound over the four channels for the parameter-estimation failure probability (scaling ε_PE by a factor of 4). Given the block size of 1.25×10^9, this adjustment changes the reported key rate by less than 0.5 %. We will also add a short paragraph justifying why a full joint covariance-matrix estimation is unnecessary under our experimental conditions. This is a partial revision: the experimental data and core protocol remain unchanged, but the security proof will be strengthened and the key-rate number will be updated with the corrected bound. revision: partial

Circularity Check

0 steps flagged

No significant circularity in experimental key-rate reporting

full rationale

The manuscript reports measured secret-key rates from an experimental 1:4 active CV-QN setup using 1.25·10^9 exchanged coherent states per 11 km link. The finite-size analysis applies standard CV-QKD parameter estimation and Renner-style bounds to the observed quadrature data. No load-bearing equation or protocol step is shown to reduce, by the paper's own definitions or self-citations, to a fitted parameter that is then re-labeled as a prediction. The central performance figure (1.9·10^{-1} bits/channel use) is extracted directly from the experimental block statistics rather than derived tautologically from prior assumptions or author-specific uniqueness theorems. Any potential multi-user covariance correlations constitute a correctness or composability concern, not a circularity in the derivation chain itself.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

Abstract-only review; central claim rests on standard CV-QKD domain assumptions (Gaussian states, reverse reconciliation, finite-size statistical analysis) that are not explicitly listed but are conventional in the field. No free parameters or invented entities are identifiable from the abstract.

axioms (2)
  • domain assumption Standard CV-QKD assumptions including Gaussian modulation, reverse reconciliation, and trusted devices hold for the network.
    Typical background for CV-QKD protocols referenced in the abstract.
  • domain assumption Finite-size effects are correctly accounted for in the secret key rate calculation.
    Explicitly invoked by the paper's focus on the finite-size regime.

pith-pipeline@v0.9.0 · 5494 in / 1393 out tokens · 92625 ms · 2026-05-07T06:27:06.747630+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

34 extracted references · 4 canonical work pages

  1. [1]

    Continuous-variable quan- tum communication,

    V. C. Usenko, A. Acín, R. Alléaume,et al., “Continuous-variable quan- tum communication,” Rev. Mod. Phys.98, 015003 (2026)

  2. [2]

    Shor’s algorithm is possible with as few as 10,000 reconfigurable atomic qubits (2026)

    M. Cain, Q. Xu, R. King,et al., “Shor’s algorithm is possible with as few as 10,000 reconfigurable atomic qubits,” arXiv preprint arXiv:2603.28627 (2026)

  3. [3]

    Continuous-variable quantum passive optical network,

    A. A. Hajomer, I. Derkach, R. Filip,et al., “Continuous-variable quantum passive optical network,” Light. Sci. & Appl.13, 291 (2024)

  4. [4]

    Experimental demonstration of a quantum downstream access network in continuous variable quantum key dis- tribution with a local local oscillator,

    D. Qi, X. Wang, Z. Liet al., “Experimental demonstration of a quantum downstream access network in continuous variable quantum key dis- tribution with a local local oscillator,” Photonics Res.12, 1262–1273 (2024)

  5. [5]

    High-rate point-to-multipoint quantum key distribution using coherent states,

    Y . Bian, Y .-C. Zhang, C. Zhou,et al., “High-rate point-to-multipoint quantum key distribution using coherent states,” arXiv preprint arXiv:2302.02391 (2023)

  6. [6]

    Integrated quantum communication network and vibration sensing in optical fibers,

    S. Liu, Y . Tian, Y . Zhang,et al., “Integrated quantum communication network and vibration sensing in optical fibers,” Optica11(2024)

  7. [7]

    Long-distance continuous- variable quantum key distribution by controlling excess noise,

    D. Huang, P . Huang, D. Lin, and G. Zeng, “Long-distance continuous- variable quantum key distribution by controlling excess noise,” Sci. Reports6, 19201 (2016)

  8. [8]

    Continuous-variable quantum key distribution with 1 Mbps secure key rate,

    D. Huang, D. Lin, C. Wang,et al., “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express23, 17511– 17519 (2015)

  9. [9]

    Long-distance continuous- variable quantum key distribution over 202.81 km of fiber,

    Y .-C. Zhang, Z. Chen, S. Pirandola,et al., “Long-distance continuous- variable quantum key distribution over 202.81 km of fiber,” Phys. Rev. Lett.125, 010502 (2020)

  10. [10]

    High-speed continuous-variable quantum key distribution without sending a local oscillator,

    D. Huang, P . Huang, D. Lin,et al., “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40, 3695–3698 (2015)

  11. [11]

    Continuous-variable Quantum Key Distri- bution protocols with a discrete modulation,

    A. Leverrier and P . Grangier, “Continuous-variable Quantum Key Distri- bution protocols with a discrete modulation,” (2010). ArXiv:1002.4083 [quant-ph]

  12. [12]

    Coexistence of continuous- variable quantum key distribution and classical data over 120-km fiber,

    A. Hajomer, I. Derkach, V. Usenko,et al., “Coexistence of continuous- variable quantum key distribution and classical data over 120-km fiber,” arXiv preprint arXiv:2502.17388 (2025)

  13. [13]

    Analysis of imperfections in practical continuous-variable quantum key distribution,

    P . Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfections in practical continuous-variable quantum key distribution,” Phys. Rev. A86, 032309 (2012)

  14. [14]

    Feasibility of quantum key distribution through a dense wavelength division multiplexing network,

    B. Qi, W. Zhu, L. Qian, and H.-K. Lo, “Feasibility of quantum key distribution through a dense wavelength division multiplexing network,” New J. Phys.12, 103042 (2010)

  15. [15]

    Experimental demon- stration of long-distance continuous-variable quantum key distribution,

    P . Jouguet, S. Kunz-Jacques, A. Leverrier,et al., “Experimental demon- stration of long-distance continuous-variable quantum key distribution,” Nat. photonics7, 378–381 (2013)

  16. [16]

    Coexistence of continuous vari- able qkd with intense dwdm classical channels,

    R. Kumar, H. Qin, and R. Alléaume, “Coexistence of continuous vari- able qkd with intense dwdm classical channels,” New J. Phys.17, 043027 (2015)

  17. [17]

    Practical continuous-variable quan- tum key distribution with composable security,

    N. Jain, H.-M. Chin, H. Mani,et al., “Practical continuous-variable quan- tum key distribution with composable security,” Nat. communications 13, 4740 (2022). Research Article 7 Table 3.Quantitative comparison with other reported Gaussian modulated 1-to-N CV network against collective attack. We take the maximum total SKR totaling all users supported by t...

  18. [18]

    1 : 2 (2) 25+5 0.89×10 −2 No collaborative protocol

  19. [19]

    1 : 8 (8) 10+1 3.1×10 −2 No trust protocol

  20. [20]

    1 : 16 (4) 5+1 2×10 −3 No trust protocol

  21. [21]

    Digital synchronization for continuous-variable quantum key distribution,

    H.-M. Chin, N. Jain, U. L. Andersen,et al., “Digital synchronization for continuous-variable quantum key distribution,” Quantum Sci. & Technol. 7, 045006 (2022)

  22. [22]

    Finite-size security for discrete- modulated continuous-variable quantum key distribution protocols,

    F . Kanitschar, I. George, J. Lin,et al., “Finite-size security for discrete- modulated continuous-variable quantum key distribution protocols,” PRX Quantum4, 040306 (2023)

  23. [23]

    Experimental composable key distribution using discrete-modulated continuous variable quantum cryptography,

    A. A. Hajomer, F . Kanitschar, N. Jain,et al., “Experimental composable key distribution using discrete-modulated continuous variable quantum cryptography,” Light. Sci. & Appl.14, 255 (2025)

  24. [24]

    Quantum cryptography on multiuser optical fibre networks,

    P . D. Townsend, “Quantum cryptography on multiuser optical fibre networks,” Nature385, 47–49 (1997)

  25. [25]

    A quantum access network,

    B. Fröhlich, J. F . Dynes, M. Lucamarini,et al., “A quantum access network,” Nature501, 69–72 (2013)

  26. [26]

    Approaching the key rate limit in continuous-variable quantum key distribution network,

    Y . Bian, Y . Zhang, S. Yu,et al., “Approaching the key rate limit in continuous-variable quantum key distribution network,” Phys. Rev. Lett. 136, 080801 (2026)

  27. [27]

    Realizing a downstream-access network using continuous-variable quantum key distribution,

    Y . Huang, T. Shen, X. Wang,et al., “Realizing a downstream-access network using continuous-variable quantum key distribution,” Phys. Rev. Appl.16, 064051 (2021)

  28. [28]

    High-rate 16-node quantum access network based on a passive optical network,

    Y . Pan, Y . Bian, Y . Li,et al., “High-rate 16-node quantum access network based on a passive optical network,” Optica12, 953–960 (2025)

  29. [29]

    Multiuser quantum key distribution using quotient graph states derived from continuous-variable dual-rail cluster states,

    A. n. Oruganti, “Multiuser quantum key distribution using quotient graph states derived from continuous-variable dual-rail cluster states,” Phys. Rev. Appl.24, 054049 (2025)

  30. [30]

    Unconstrained capacities of quantum key distribution and entanglement distillation for pure-loss bosonic broadcast channels,

    M. Takeoka, K. P . Seshadreesan, and M. M. Wilde, “Unconstrained capacities of quantum key distribution and entanglement distillation for pure-loss bosonic broadcast channels,” Phys. review letters119, 150501 (2017)

  31. [31]

    Gaussian quan- tum information,

    C. Weedbrook, S. Pirandola, R. García-Patrón,et al., “Gaussian quan- tum information,” Rev. modern physics84, 621–669 (2012)

  32. [32]

    Finite-size analysis of a continuous-variable quantum key distribution,

    A. Leverrier, F . Grosshans, and P . Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A81, 062343 (2010)

  33. [33]

    Machine learning aided carrier recovery in continuous-variable quantum key distribution,

    H.-M. Chin, N. Jain, D. Zibar,et al., “Machine learning aided carrier recovery in continuous-variable quantum key distribution,” npj Quantum Inf7, 20 (2021)

  34. [34]

    Long-distance continuous- variable quantum key distribution over 100-km fiber with local local oscillator,

    A. A. E. Hajomer, I. Derkach, N. Jain,et al., “Long-distance continuous- variable quantum key distribution over 100-km fiber with local local oscillator,” Sci. Adv.10, eadi9474 (2024). Research Article 8 A. JOINT KEY RATE DECOMPOSITION Decomposition of the joint key rate into individual user contributions for all user orders. Each row corresponds to a dif...