{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:44:31Z","timestamp":1775771071248,"version":"3.50.1"},"reference-count":93,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2020,5,10]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>In a multicarrier continuous\u2010variable quantum key distribution (CVQKD) protocol, the information is granulated into Gaussian subcarrier CVs and the physical Gaussian link is divided into Gaussian sub\u2010channels. Here, we propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous\u2010variable quantum key distribution. The analysis covers the study of the distribution of the sub\u2010channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub\u2010channel selection and formulation of the transmittance coefficients and show a reduced complexity progressive sub\u2010channel scanning method. We define a framework to evaluate the statistical properties of the information flowing processes in multicarrier CVQKD protocols. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the adaptive multicarrier quadrature division\u2010multiuser quadrature allocation (AMQD\u2010MQA) multiple\u2010access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.<\/jats:p>","DOI":"10.1002\/dac.4314","type":"journal-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T08:29:35Z","timestamp":1581323375000},"update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Order statistics and random matrix theory of multicarrier continuous\u2010variable quantum key distribution"],"prefix":"10.1002","volume":"33","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-4209-7619","authenticated-orcid":false,"given":"Laszlo","family":"Gyongyosi","sequence":"first","affiliation":[{"name":"School of Electronics and Computer Science University of Southampton  Southampton UK"},{"name":"Department of Networked Systems and Services Budapest University of Technology and Economics  Budapest Hungary"},{"name":"MTA\u2010BME Information Systems Research Group Hungarian Academy of Sciences  Budapest Hungary"}]}],"member":"311","published-online":{"date-parts":[[2020,2,10]]},"reference":[{"key":"e_1_2_15_2_1","unstructured":"Pirandola S.et al.Advances in quantum cryptography arXiv:1906.01645(2019)."},{"key":"e_1_2_15_3_1","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab3f66"},{"key":"e_1_2_15_4_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.047905"},{"key":"e_1_2_15_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature01289"},{"key":"e_1_2_15_6_1","first-page":"535","article-title":"Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables","volume":"3","author":"Grosshans F","year":"2003","journal-title":"Quant Inf Comp"},{"key":"e_1_2_15_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.97.190502"},{"key":"e_1_2_15_8_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.97.190503"},{"key":"e_1_2_15_9_1","unstructured":"PirandolaS.Capacities of repeater\u2010assisted quantum communications. arXiv:1601.00966 (2016)."},{"key":"e_1_2_15_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-019-0147-3"},{"key":"e_1_2_15_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/532169a"},{"key":"e_1_2_15_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2786748"},{"key":"e_1_2_15_13_1","unstructured":"Grosshans F.andGrangier P.Reverse reconciliation protocols for quantum cryptography with continuous variables arXiv:quant\u2010ph\/0204127v1(2002)."},{"key":"e_1_2_15_14_1","doi-asserted-by":"crossref","unstructured":"Pirandola S. Mancini S. Lloyd S.andBraunstein S. L.Continuous variable quantum cryptography using two\u2010way quantum communication arXiv:quant\u2010ph\/0611167v3(2008).","DOI":"10.1038\/nphys1018"},{"key":"e_1_2_15_15_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/10\/103035"},{"key":"e_1_2_15_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2018.07.006"},{"key":"e_1_2_15_17_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.050503"},{"key":"e_1_2_15_18_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.79.052327"},{"key":"e_1_2_15_19_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.101.200504"},{"key":"e_1_2_15_20_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.105.110501"},{"key":"e_1_2_15_21_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.84.621"},{"key":"e_1_2_15_22_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749912500591"},{"key":"e_1_2_15_23_1","doi-asserted-by":"publisher","DOI":"10.1088\/0953-4075\/46\/8\/085501"},{"key":"e_1_2_15_24_1","doi-asserted-by":"crossref","unstructured":"Jouguet P. Kunz\u2010Jacques S. Leverrier A. Grangier P.andDiamanti E.Experimental demonstration of long\u2010distance continuous\u2010variable quantum key distribution arXiv:1210.6216v1(2012).","DOI":"10.1103\/PhysRevA.86.032309"},{"key":"e_1_2_15_25_1","first-page":"283","volume-title":"Quantum Computing and Communications\u00a0\u2013\u00a0An Engineering Approach","author":"Imre S","year":"2005"},{"key":"e_1_2_15_26_1","first-page":"6","volume-title":"Quantum Information Theory and Quantum Statistics","author":"Petz D","year":"2008"},{"key":"e_1_2_15_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118648919"},{"key":"e_1_2_15_28_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.110.030502"},{"key":"e_1_2_15_29_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.110504"},{"key":"e_1_2_15_30_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.100502"},{"key":"e_1_2_15_31_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.114.070501"},{"key":"e_1_2_15_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.822618"},{"key":"e_1_2_15_33_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.042312"},{"key":"e_1_2_15_34_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.180504"},{"key":"e_1_2_15_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10955-006-9076-0"},{"key":"e_1_2_15_36_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.042305"},{"key":"e_1_2_15_37_1","doi-asserted-by":"crossref","unstructured":"Qi B.andLim C. C. W.Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillator arXiv:1708.08742v1(2017).","DOI":"10.1103\/PhysRevApplied.9.054008"},{"key":"e_1_2_15_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/app8010087"},{"key":"e_1_2_15_39_1","doi-asserted-by":"crossref","unstructured":"Gyongyosi L.andImre S.Singular layer transmission for continuous\u2010variable quantum key distribution IEEE Photonics Conference (IPC) 2014 IEEE DOI:https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/IPCon.2014.6995246(2014).","DOI":"10.1109\/IPCon.2014.6995246"},{"key":"e_1_2_15_40_1","unstructured":"Gyongyosi L.andImre S.Proc. SPIE 9377 Advances in Photonics of Quantum Computing Memory and Communication VIII 937711 (March 4 2015; doi:10.1117\/12.2076532)"},{"key":"e_1_2_15_41_1","doi-asserted-by":"crossref","unstructured":"Gyongyosi L.Diversity extraction for multicarrier continuous\u2010variable quantum key distribution Proceedings of the 2016 24th European Signal Processing Conference (EUSIPCO 2016) (2016).","DOI":"10.1109\/EUSIPCO.2016.7760294"},{"key":"e_1_2_15_42_1","unstructured":"Gyongyosi L.andImre S.https:\/\/linproxy.fan.workers.dev:443\/http\/proceedings.spiedigitallibrary.org\/proceeding.aspx?articleid=2195505"},{"key":"e_1_2_15_43_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.55.1613"},{"key":"e_1_2_15_44_1","doi-asserted-by":"crossref","unstructured":"Lloyd S.The universe as quantum computer a computable universe: understanding and exploring nature as computation H. Zenil ed. World Scientific Singapore arXiv:1312.4455v1(2013).","DOI":"10.1142\/9789814374309_0001"},{"key":"e_1_2_15_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039111.1039118"},{"key":"e_1_2_15_46_1","unstructured":"Lloyd S. Mohseni M.andRebentrost P.Quantum algorithms for supervised and unsupervised machine learning.arXiv:1307.0411(2013)."},{"key":"e_1_2_15_47_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphys3029"},{"key":"e_1_2_15_48_1","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms15043"},{"key":"e_1_2_15_49_1","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aac394"},{"key":"e_1_2_15_50_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.96.032318"},{"key":"e_1_2_15_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6576338"},{"key":"e_1_2_15_52_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.112.250501"},{"key":"e_1_2_15_53_1","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b"},{"key":"e_1_2_15_54_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.52.R2493"},{"key":"e_1_2_15_55_1","first-page":"195","volume":"549","author":"Biamonte J","year":"2017","journal-title":"Quantum Machine Learning Nature"},{"issue":"1","key":"e_1_2_15_56_1","first-page":"1","article-title":"Continuous\u2010variable quantum key distribution with Gaussian modulation \u2013 The theory of practical implementations","volume":"1","author":"Laudenbach F","year":"2018","journal-title":"Adv Quantum Technol"},{"key":"e_1_2_15_57_1","doi-asserted-by":"crossref","unstructured":"Gyongyosi L.andImre S.Long\u2010distance continuous\u2010variable quantum key distribution with advanced reconciliation of a Gaussian modulation Proceedings of SPIE Photonics West OPTO 2013(2013).","DOI":"10.1364\/FIO.2013.FW2C.5"},{"key":"e_1_2_15_58_1","doi-asserted-by":"crossref","unstructured":"Gyongyosi L.andImre S.Gaussian quadrature inference for multicarrier continuous\u2010variable quantum key distribution SPIE Quantum Information and Computation XIV 17\u201021 Apr 2016 Baltimore Maryland USA (2016).","DOI":"10.1117\/12.2223482"},{"key":"e_1_2_15_59_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aam9288"},{"key":"e_1_2_15_60_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-08-06-79"},{"key":"e_1_2_15_61_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1666-5"},{"key":"e_1_2_15_62_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23458"},{"key":"e_1_2_15_63_1","unstructured":"Aaronson S.andChen L.Complexity\u2010theoretic foundations of quantum supremacy experiments.Proceedings of the 32nd Computational Complexity Conference CCC'17 pages 22:1\u201022:67 (2017)."},{"key":"e_1_2_15_64_1","unstructured":"Farhi E. Goldstone J. Gutmann S.andNeven H.Quantum algorithms for fixed qubit architectures.arXiv:1703.06199v1(2017)."},{"key":"e_1_2_15_65_1","unstructured":"Farhi E.andNeven H.Classification with quantum neural networks on near term processors arXiv:1802.06002v1(2018)."},{"key":"e_1_2_15_66_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213"},{"key":"e_1_2_15_67_1","unstructured":"Middlet D.An Introduction to Statistical Communication Theory: An IEEE Press Classic Reissue Hardcover IEEE ISBN\u201010: 0780311787 ISBN\u201013: 978\u20100780311787 (1960)."},{"key":"e_1_2_15_68_1","volume-title":"Fundamentals of Statistical Signal Processing","author":"Kay S","year":"2013"},{"issue":"2","key":"e_1_2_15_69_1","first-page":"14","article-title":"A survey on quantum key distribution","author":"Gyongyosi L","year":"2019","journal-title":"Infocom J"},{"key":"e_1_2_15_70_1","unstructured":"Gyongyosi L.andImre S.Adaptive Gaussian quadrature detection for continuous\u2010variable quantum key distribution Proceedings Volume 9762 Advances in Photonics of Quantum Computing Memory and Communication IX; 97620E; doi:https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1117\/12.2211743(2016)."},{"key":"e_1_2_15_71_1","unstructured":"Gyongyosi L.andImre S.Proceedings Volume 8997 Advances in Photonics of Quantum Computing Memory and Communication VII; 89970C; doi:https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1117\/12.2038532(2014)."},{"key":"e_1_2_15_72_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118337462"},{"key":"e_1_2_15_73_1","doi-asserted-by":"crossref","unstructured":"Gyongyosi L.andImre S.Multidimensional manifold extraction for multicarrier continuous\u2010variable quantum key distribution SPIE Quantum Information and Computation XIII 20\u201024 Apr 2015 Baltimore Maryland USA (2015).","DOI":"10.1109\/EUSIPCO.2016.7760294"},{"key":"e_1_2_15_74_1","doi-asserted-by":"publisher","DOI":"10.1002\/cta.2347"},{"key":"e_1_2_15_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.010"},{"key":"e_1_2_15_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2147-8"},{"key":"e_1_2_15_77_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.97.052328"},{"key":"e_1_2_15_78_1","first-page":"1","article-title":"Multicarrier continuous\u2010variable quantum key distribution","author":"Gyongyosi L","year":"2020","journal-title":"Theoret Comput Sci"},{"key":"e_1_2_15_79_1","first-page":"e3865","article-title":"Secret key rate proof of multicarrier continuous\u2010variable quantum key distribution","author":"Gyongyosi L","year":"2018","journal-title":"Int J Commun Syst"},{"key":"e_1_2_15_80_1","first-page":"1","article-title":"Diversity space of multicarrier continuous\u2010variable quantum key distribution","author":"Gyongyosi L","year":"2019","journal-title":"Int J Commun Syst"},{"key":"e_1_2_15_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40509-019-00183-9"},{"key":"e_1_2_15_82_1","first-page":"1","article-title":"Statistical quadrature evolution by inference for multicarrier continuous\u2010variable quantum key distribution","author":"Gyongyosi L","year":"2019","journal-title":"Quantum Studies: Mathematics and Foundations, Springer Nature"},{"key":"e_1_2_15_83_1","first-page":"35","article-title":"Singular value decomposition assisted multicarrier continuous\u2010variable quantum key distribution","author":"Gyongyosi L","year":"2019","journal-title":"Theoret Comput Sci"},{"key":"e_1_2_15_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4152"},{"key":"e_1_2_15_85_1","doi-asserted-by":"crossref","unstructured":"Gyongyosi L.andImre S.Adaptive multicarrier quadrature division modulation for long\u2010distance continuous\u2010variable quantum key distribution Proc. SPIE 9123 Quantum Information and Computation XII 912307 (May 22 2014); doi:10.1117\/12.2050095 From Conference Volume 9123 Quantum Information and Computation XII Baltimore Maryland USA (2014).","DOI":"10.1117\/12.2050095"},{"key":"e_1_2_15_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10955-019-02404-2"},{"key":"e_1_2_15_87_1","first-page":"1","article-title":"Secret key rate adaption for multicarrier continuous\u2010variable quantum key distribution","author":"Gyongyosi L","year":"2019","journal-title":"SN Comput Sci Nature"},{"key":"e_1_2_15_88_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139043328"},{"key":"e_1_2_15_89_1","unstructured":"Chow P. S.Bandwidth optimized digital transmission techniques for spectrally shaped channels with impulse noise Ph. D. thesis Stanford University (1993)."},{"key":"e_1_2_15_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937077"},{"key":"e_1_2_15_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374879-9.00010-1"},{"key":"e_1_2_15_92_1","unstructured":"Zhang W.The Role of Correlation in Communication Over Fading Channels PhD Thesis Notre Dame Indiana(2006)."},{"key":"e_1_2_15_93_1","doi-asserted-by":"publisher","DOI":"10.1561\/0100000001"},{"key":"e_1_2_15_94_1","first-page":"1","article-title":"Random matrix theory","author":"Edelman A","year":"2005","journal-title":"Acta Numerica"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.4314","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.4314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T01:20:13Z","timestamp":1694049613000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.4314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,10]]},"references-count":93,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,5,10]]}},"alternative-id":["10.1002\/dac.4314"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1002\/dac.4314","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,10]]},"assertion":[{"value":"2019-09-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e4314"}}