Soft-Decoding Reverse Reconciliation in Discrete-Modulation CV-QKD
Origlia, Secondini
In continuous-variable quantum key distribution, information reconciliation is required to extract a shared secret key from correlated random variables obtained through the quantum channel. Reverse reconciliation (RR) is generally preferred, since the eavesdropper has less information about Bob's measurements than about Alice's transmitted symbols. When discrete modulation formats are employed, however, soft information is available only at Bob's side, while Alice has access only to hard information (her transmitted sequence). This forces her to rely on hard-decision decoding to recover Bob's key.
In this work, we introduce a novel RR technique for PAM (and QAM) in which Bob discloses a carefully designed soft metric to help Alice recover Bob's key, while leaking no additional information about the key to an eavesdropper. We assess the performance of the proposed technique in terms of achievable secret key rate (SKR) and its bounds, showing that the achievable SKR closely approaches the upper bound, with a significant gain over hard-decision RR. Finally, we implement the scheme at the coded level using binary LDPC codes with belief-propagation decoding, assess its bit-error rate through numerical simulations, compare the observed gain with theoretical predictions from the achievable SKR, and discuss the residual gap.
academic
Soft-Decoding Reverse Reconciliation in Discrete-Modulation CV-QKD
In continuous-variable quantum key distribution (CV-QKD), information reconciliation is employed to extract shared keys from correlated random variables obtained from quantum channels. Reverse reconciliation (RR) is generally preferred because the eavesdropper has less information about Bob's measurement results than about Alice's transmitted symbols. However, when discrete modulation formats are adopted, soft information is only available at Bob's end, while Alice can only access hard information (her transmitted sequence), forcing her to rely on hard-decision decoding to recover Bob's key. This paper introduces a novel RR technique for PAM (and QAM) in which Bob discloses carefully designed soft metrics to assist Alice in recovering Bob's key while not leaking additional information about the key to an eavesdropper.
Security Requirements: RR is superior to DR in security since the eavesdropper has less information about received data than transmitted data
Efficiency Issues: Traditional RR suffers from substantially lower efficiency than theoretical limits due to lack of soft information
Practical Considerations: Discrete modulation is more readily implementable in practical CV-QKD systems, but reconciliation efficiency needs improvement
Proposed RRS Scheme: Designed a novel reverse reconciliation soft-decoding scheme (RRS) where Bob discloses carefully constructed soft metrics N to assist Alice
Theoretical Analysis: Established an information-theoretic framework for RRS and proved optimality under the constraint I(X̂;N)=0
Performance Bounds: Derived upper and lower bounds on achievable key rates for RRS: I(X̂;X) ≤ I(X̂;X|N) ≤ I(X;Y)
Practical Implementation: Implemented a complete coding-level scheme based on LDPC codes and belief propagation decoding
Comprehensive Evaluation: Verified scheme effectiveness through theoretical analysis and numerical simulations
Input: Alice transmits PAM symbols X; Bob receives Y = X + W (W is Gaussian noise)
Output: Alice and Bob obtain identical key sequences
Constraint: Soft metrics N disclosed by Bob must not leak information about key X̂ to eavesdroppers
The paper cites 25 relevant references covering quantum key distribution, information theory, error-correcting codes, and other important works across multiple domains, providing solid theoretical foundation for the research.