Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD)

In recent research, there has been a significant focus on establishing robust quantum cryptography using the continuous-variable quantum key distribution (CV-QKD) protocol based on Gaussian modulation of coherent states (GMCS). Unlike more stable fiber channels, one challenge faced in free-space quantum channels is the complex transmittance characterized by varying atmospheric turbulence. This complexity poses difficulties in achieving high transmission rates and long-distance communication. In this article, we thoroughly evaluate the performance of the CV-QKD/GMCS system under the effect of individual attacks, considering homodyne detection with both direct and reverse reconciliation techniques. To address the issue of limited detector efficiency, we incorporate the phase-sensitive amplifier (PSA) as a compensating measure. The results show that the CV-QKD/GMCS system with PSA achieves a longer secure distance and a higher key rate compared to the system without PSA, considering both direct and reverse reconciliation algorithms. With an amplifier gain of 10, the reverse reconciliation algorithm achieves a secure distance of 5 km with a secret key rate of 10−1 bits/pulse. On the other hand, direct reconciliation reaches a secure distance of 2.82 km.


Introduction
Quantum key distribution (QKD) is a popular technique that gives two parties (Alice and Bob) the ability to construct a shared cryptographic secret key [1][2][3].This technique relies on the principles of quantum mechanics and the Heisenberg uncertainty principle to ensure the security of the key exchange, making it resistant to eavesdropping attacks [4].QKD has been widely studied and implemented in various communication systems, including fiber-optic networks and satellite-based communication systems.The QKD protocols are classified into two main categories: discrete variable (DV-QKD) and continuous variable (CV-QKD) [5].DV-QKD protocols use single photons to transmit information, while CV-QKD protocols use coherent states of light.The well-known standard DV-QKD protocols are BB84 [6], B92 [7], and SARG04 [8].On the other hand, the popular standard protocols for CV-QKD are presented by Ralph [9], Hillery [10], and Grosshans and Grangier [11].Recent studies show the continuous development of DV-QKD and CV-QKD [12][13][14][15][16][17][18][19][20][21].
This article focuses on utilizing free space as the transmission medium, taking into account the challenges posed by atmospheric attenuation and turbulence.Both of these factors can negatively impact the performance and reliability of QKD systems operating in free-space communication [22,23].Furthermore, using single-photon DV-QKD has solidly proven the effectiveness of quantum protocols previously tested only in limited terrestrial experiments.It has been shown that it is highly robust against channel noise compared to CV-QKD, making it particularly suitable for low-loss (low-noise) channels [24].On the other hand, the CV-QKD regime is perhaps most closely related to classical wireless communications and holds the potential to enhance communication performance, especially in the highly lossy channels addressed in this study [25].Therefore, implementing DV-QKD in a free-space communication scenario becomes significantly more complex and costly compared to CV-QKD due to the unique challenges posed in such an environment.Furthermore, the CV-QKD systems can convey more information per signal than DV-QKD.However, increasing the transmission distance in the CV-QKD system is one of the most important aspects of carrying out a security-proof assessment.This is because the performance of CV-QKD systems is more sensitive to losses and noise, which can significantly affect the quality of the quantum signals.Therefore, optimizing a CV-QKD system for a given transmission distance is crucial for achieving secure and efficient communication [26].One approach to optimize a CV-QKD system for a given transmission distance is to incorporate amplifiers, which can amplify the quantum signals [27].Another approach is to improve the quality of the quantum signals by using advanced modulation [28] and reconciliation techniques [29].
CV-QKD over a lossy channel with transmittance and excess noise is a challenging problem due to the impact of noise and losses on the quality of the transmitted quantum signal [30,31].In addition, the presence of excess noise in the channel can introduce additional errors and limit the achievable key rate.This can make it difficult to establish a secure key between the two parties, especially over long distances or in harsh environments.In order to overcome the challenges of the secret key rate (SKR) in QKD systems, several techniques have been developed, including optical preamplifiers [32,33], error correction [34], privacy amplification [35], advanced modulation [36,37], and encoding schemes [38,39].These techniques aim to enhance the overall performance and reliability of the transmission process.These techniques can help to improve the robustness and reliability of CV-QKD over lossy channels with transmittance and excess noise, making it possible to establish secure communication between the two parties.
In CV-QKD, it is important to analyze its security against possible attacks [40,41].One of the most significant sources of noise and disturbance in CV-QKD is the loss of quantum states during transmission through the communication channel.This loss limits Eve's ability to perform a collective attack, as the signal-to-noise ratio decreases with the distance of the channel [42].Furthermore, in a realistic collective attack, Eve requires considerable time and/or coherent operations to decode the stored ensemble and approach the Holevo information collectively.Therefore, the feasibility and success of a collective attack depend on the available resources and capabilities of Eve [43].In this context, an individual attack becomes the optimal eavesdropping attack for the no-switching/homodyne detection protocol (the attacker cannot switch or swap quantum states during the transmission process) [44].This attack occurs when Eve prepares her probe states individually, couples them to the signal states, and then immediately measures them individually [45].It allows Eve to steal some information about the signal states without disturbing them, which limits the ultimate security of quantum communication.The individual attack can be prevented using the switching protocol, where Alice and Bob randomly switch between different measurement bases to prevent Eve from gaining complete information about the signal states.Significant research has focused on applying individual attacks to QKD systems, resulting in satisfactory security performance [43,[46][47][48][49].In order to considerably improve the system performance, including the secret key rate (SKR) and propagation range, it is necessary to ensure the protocol security merely against individual attacks.Further-more, to improve performance and security drawbacks, post-amplifier and reconciliation techniques, as well as modulation and detection mechanisms, could be integrated within CV-QKD systems [50][51][52].This integration can lead to the development of more reliable and secure systems.Therefore, further research is required to optimize these components and achieve the practical implementation of CV-QKD for secure communication over long distances.
The main contribution of this study is to propose a system model for a CV-QKD system which employs the Gaussian modulation coherent states (GMCS) protocol.This system model is specifically designed to address the challenges associated with free-space quantum channels, particularly in the presence of individual attacks using a phase-sensitive amplifier (PSA) and homodyne detection (HD).By developing this system model, the study aims to improve the security and efficiency of quantum communication over long distances.This contribution is essential for enhancing the reliability and robustness of CV-QKD systems under individual attacks, paving the way for the practical implementation and optimization of quantum cryptography for secure long-distance communications.
The remainder of this work is divided into the following sections.The atmospheric quantum channel model is investigated over HD in Section 2. A general individual attack scenario then assesses the CV-QKD secret key rate.The system security is analyzed in Section 3, and the numerical evaluation of the system performance is given in Section 4. Finally, the conclusions are presented in Section 5.

Channel and System Models
This section presents the model of the atmospheric quantum channel considering weak turbulence.The block diagram of a prepare and measure-based GMCS-CVQKD protocol with HD will be discussed, assuming a general individual attack scenario.

Space Quantum Channel Model
Channel transmittance is a key measure of the quality of a communication channel.It refers to the fraction of the transmitted signal received by the receiver after it has traveled through the channel.It can impact the ability of the receiver to detect and interpret the transmitted signal accurately.The quality of the channel's transmittance can be affected by various factors, such as attenuation, noise, and distortion.The probability distribution of the transmission coefficient (PDTC) for the atmospheric channel in the free-space quantum communication is used efficiently to describe the optical beam propagation through the turbulent atmosphere.The PDTC model differs depending on the turbulence severity, distinguished through Rytov variance values [31].The general model of the PDTC in [31] assumes that a Gaussian elliptical beam propagates across an air channel characterized by isotropic turbulence, where it experiences wandering, broadening, and shape deformation into an elliptical.In a weak turbulence regime where beam-wandering losses are dominant, the distribution of the transmission coefficient simplifies to the log-negative generalized Rice distribution.If the beam fluctuates around the aperture center, this distribution reduces to the log-negative Weibull distribution [30].On the other hand, the beam broadens and deforms for the weak-to-moderate transition and strong turbulence, producing a smooth PDTC with a more problematic evaluation compared to the weak turbulence case [31,53].
In this work, it is assumed that (1) beam deflection is due to the imprecise adjustment of the radiation source; (2) the beam incidence is approximately normal to the aperture plane; and (3) a Gaussian beam is traveling through free space with a spot radius of W at the receiver end.
Given that the beam center undergoes a deflection of distance (r) from the aperture center, three scenarios can be identified regarding the projections of the optical beam spot with radius (W) on the photodetector plan with radius (a) as illustrated in Figure 1.The magnitude of the intersecting area between the beam spot and the photodetector plane will directly impact the amount of optical power that the photodetector can capture.The incomplete Weber integral is employed to calculate the transmission efficiency T 2 of a Gaussian beam propagating through the atmospheric channel as [30]: where I n [.] denotes the modified Bessel function of the first kind of the n-th order.In channels characterized by fluctuating loss, the transmission coefficient T is a real and positive random variable.Furthermore, it is implied that T ∈ [0, 1] to preserve the commutation relations.An approximate analytical expression of ( 1) is proposed in [30] and given by: where T 0 is the maximum value of T, R is the scale parameter, and Γ is the shape parameter.These three parameters are described as follows [30]: The spot radius W of the received beam, with optical wavelength λ, is calculated as [54]: where is the coherence length, k = 2π/λ is the optical wave number, the beam spot radius at Alice is W o , and the air link distance from Alice to Bob is d.For the weak to strong turbulence conditions, the value of the refractive index structure parameter C 2 n varies from 10 −17 m −2/3 to 10 −13 m −2/3 [54].Figure 2 illustrates the relationship between the transmission efficiency T 2 and the normalized beam-deflection distance r/a, considering various ratios of the received beam spot radius W relative to the detector radius a.By analyzing the graph, we can understand how the efficiency of transmission is influenced by the distance between the transmitter and receiver.This information is valuable in analyzing and optimizing CV-QKD systems in applications where these parameters play a significant role.

Mathematical Foundations of the Main Processes
The mathematical formulations provide a detailed foundation for understanding the processes involved in the GMCS protocol, homodyne detection, reconciliation algorithms, and the integration of PSA with homodyne detection.
(1) GMCS Protocol: The GMCS protocol is a fundamental method in CV-QKD systems, using coherent states of light modulated with Gaussian distributions to encode information in the quadratures of the light.In GMCS, the amplitude and phase of coherent light pulses are modulated with Gaussian-distributed random variables, defining the quantum states.This allows for efficient and high-dimensional encoding of quantum information in a continuous variable space [55,56]: where x and p are the quadrature of the coherent states |α⟩ with modulation variance V m and mean zero.(2) Homodyne Detection: Once the coherent states are modulated, they are transmitted through the quantum channel to the receiver.At the receiver's end, techniques such as homodyne detection are employed to measure the quadratures of the received coherent states.Homodyne detection measures the quadrature of the optical field as [57] xθ = x cos θ + p sin θ (8) where θ is the phase difference between the signal and the local oscillator.The output quadrature xout measured by the detector is related to the input quadrature xin and the vacuum noise quadrature xvac as follows: where η represents the detection efficiency.The total noise in the homodyne detection process combines both the detection inefficiency and the electronic noise ν el .It is given by: where g is the amplification gain.The total detection noise after PSA compensation can be expressed as [60]:

System Model
Figure 3 shows the schematic of a prepare and measure GMCS-CVQKD protocol over a free-space fading channel.A coherent optical source is used at the transmitter (Alice) to produce a train of coherent state pulses that are separated using an unbalanced beam splitter (UBS).Alice randomly chooses two values for the orthogonal quadrature P A and the in-phase quadrature X A for every signal pulse.This is achieved using two independent random number generators (RNGs) that produce zero-mean Gaussian distributed random variables (RVs) N, i.e., N ∼ N (0, V A ) where V A is Alice's modulation variance.An inphase-quadrature (IQ) modulator modulates the weak optical pulses, using the Gaussian RVs to introduce quantum signal pulses (QSPs).Now, Alice has finished preparing the QSPs of GMCS |X A + iP A |. On the other hand, the relatively stronger pulses are delayed to produce the phase reference pulses (PRPs).Then, she combines the QSPs and the PRPs into orthogonal polarization modes employing a polarization beam combiner (PBC) and transmits them to Bob using the transmitter telescope over the atmospheric quantum channel that has a transmittance T and noise X line .
At the receiver, a polarization beam splitter (PBS) separates the time-polarization multiplexing pulses: the QSPs and the PRPs.Bob utilizes homodyne detection (HD) for these two pulses.The required local oscillator (LO) is locally generated and is split using a balanced beam splitter (BBS) to accomplish coherent detection.The HD depends on measuring one of the two quadratures, either X or P, at random, i.e., not simultaneously.For this purpose, an RNG controls the phase modulators (PMs).A phase-sensitive amplifier (PSA) is useful for HD since it ideally enables noiseless amplification of the selected quadrature [60].The transimpedance amplifier (TIA) at the receiver front end amplifies the current, detected quadrature, at the HD output to an acceptable voltage level to drive the analog-to-digital converter (ADC).Alice and Bob have now completed the quantum states' transmission via a feasibly insecure atmospheric quantum channel.Finally, Alice's modulated data and Bob's measurement results are utilized to establish a trusted secure key during the classical post-processing procedure over an authenticated public channel.This procedure includes two main steps, a reconciliation process to retrieve an identical sequence of bits from the correlated data and a typical privacy amplification approach to distilling a finalized secret key from this sequence.

Security Analysis
This section explains and analyzes the usage of the PSA to improve the performance of the homodyne detector model and hence boost the system SKR.Section 3.1 discusses mathematically how the noise performance of the homodyne detector can be modified using the PSA.In Section 3.2, we provide a detailed analysis of the proposed system security under an Eve individual attack in an atmospheric channel for both direct and reverse reconciliation algorithms considering the properties of the free-space channel.

Compensation for Homodyne Detector Noise
In the proposed system, Bob is assumed to always amplify the quadrature that he has selected at random to measure.When the PSA is applied to compensate for the detector imperfections, the quadratures are asymmetrically affected by the amplification process, with the in-phase one amplified and the orthogonal one squeezed.If x is the target quadrature to be amplified, the amplification process can be represented as x → √ gx, p → 1/ √ gp, where g is the PSA gain, and for any value of g greater than one, the target quadrature is amplified.Accordingly, the detection-added noise for the homodyne detector is given as [60]: where the efficiency of a practical detector is η and the electronic noise variance is v el in shot noise units (SNUs).From (14), it is clear that the amplifier gain will compensate for the finite detector efficiency, hence reducing the detection noise and improving the secret key rate as will be numerically discussed in Section 4.

Secret Key Rate under Individual Attack
In an individual attack, Eve executes an independent and identically distributed (i.i.d.) attack on all pulses.This means that she creates separable ancilla states, each interacting individually with one coherent-state pulse sent by Alice in the quantum channel.She uses a quantum memory to store her states.After the sifting procedure, in HD, after Bob has exhibited the quadrature he selects to measure, she performs her measurements before the reconciliation process.Information reconciliation, defined as correcting errors while minimizing the information revealed to Eve, can be direct or reversed.In DR, Bob corrects his bits according to Alice's data, while in RR, Alice corrects her bits according to Bob's data [57].This subsection deduces the proposed system security for both DR and RR.

Direct Reconciliation
In the direct reconciliation (DR) scenario, Alice's sequence is used as the target to correct Bob's sequence.The expression for the DR secret key rate in [58] is modified to incorporate the free-space channel study and reconciliation efficiency.It is deduced as follows: where P is the link interruption probability caused by the angle-of-arrival fluctuations, for the case of weak turbulence considered in this article (P ≈ 0) [53].β is the reconciliation efficiency, I AB is the mutual information between Alice and Bob, and the mutual information between Alice and Eve is I AE .V A is Alice's modulation variance.The conditional variance between Alice and Bob is V A|B ; it denotes the variance in Alice's quadrature, either X A or P A , when measured by Bob.V A|E is the conditional variance between Alice and Eve, and it represents the variances in Eve's estimates of Bob's field quadratures.Both variances should be minimized by Bob and Eve, respectively.These variances are expressed as [58]: X = X line + X PSA hom /T is the total noise referred to the channel input and V = V A + 1. Regarding the channel input, the total channel-added noise is defined in SNU as X line = 1/T − 1 + ϵ [23], where ϵ is the free-space channel excess noise measured at the channel input.
Substituting ( 16) and ( 17) into (15), the DR secret key rate is formulated as follows: In perfect reconciliation, β = 1, the secret key rate reaches its maximum value as:

.2. Reverse Reconciliation
In the reverse reconciliation (RR) scenario, to correct Alice's sequence, Bob's sequence is used as the target.The expression for the RR secret key rate in [58] is similarly modified to incorporate the study of the free-space channel and reconciliation efficiency.It is deduced as follows: where I BA = I AB is the mutual information between Bob and Alice, I BE is the mutual information between Bob and Eve, V B|A is the conditional variance between Bob and Alice, V B|E is the conditional variance between Bob and Eve, and V B is Bob's modulation variance.They are accordingly expressed as: by substituting ( 21), (22), and ( 23) into (20), the expression of the RR secret key rate is obtained as: In perfect reconciliation, β = 1, the secret key rate reaches its maximum value as:

Signal-to-Noise Ratio (SNR)
In CV-QKD, the signal-to-noise ratio (SNR) is important because it affects the key rate that can be achieved over the channel.A higher SNR generally leads to a higher key rate, but this comes at the cost of increased power consumption and more complex modulation and detection techniques.As presented in (26), the choice of the modulation variance is important in order to determine the amount of noise that the signal can tolerate before it becomes too degraded to extract the secret key [61].A higher modulation variance can increase the SNR but also make the signal more vulnerable to noise and losses in the channel:

Numerical Results and Discussion
This section presents the numerical results that evaluate the impact of using the PSA in conjunction with the realistic homodyne detector of the system that was proposed in Section 2. These results are based on the analysis and derivations that were discussed in Section 4. For the representation of the GMCS/CVQKD protocol under individual attack in free space, the SKR is calculated in terms of the propagation range considering the channel transmittance and excess noise for DR and RR algorithms.All simulation parameters are summarized in Table 1.MathWorks-MATLAB-2021A is utilized for the simulation.The transmittance of the space quantum channel is introduced in Figure 4 as a decreasing of the beam propagation distance for different atmospheric turbulence cases, including weak (10 −17 ), moderate (5 × 10 −14 ), and strong (2 × 10 −13 ).For a distance smaller than 1 km, the transmittance is almost unaffected by turbulence variations and is greater than 0.9.The fluctuation in turbulence noticeably affects the transmittance over greater distances.For example, as the distance increased from 5 km to 10 km, the transmittance decreased by half as the turbulence changed from weak to strong.According to the beam size and aperture radius that were used in the simulation, the transmittance reached its half maximum at distances of 4 km, 3.5 km, and 2.6 km for weak, moderate, and strong turbulence, respectively.Those variations in the transmittance will be reflected in the SKR.In the simulation, the amplifier gain is set to the following values: 1 (representing the performance without an amplifier), 5, and 10.The perfect case is called perfect detection with zero noise, i.e., 100% detector efficiency, zero electronic noise, and no amplification.Figure 5 shows the improvement in the received SNR due to applying the PSA amplifier.As it can be seen, the SNR approach is very close to its perfect value when the amplifier gain g = 5 or 10.In (14), the homodyne detector adds noise after connecting the PSA, which tends to zero when the amplification gain is really high.As a result, an ideal PSA compensates for all imperfections in a practical homodyne detector, making their combination equivalent to a flawless detector from a system point of view.This approach is illustrated numerically in Figures 6 and 7, where the SKR line at g = 10 approximates the ideal detector line.In addition, the effects of the free-space channel transmittance, as well as excess noise, are taken into consideration.
Figures 6 and 7 show the secret key rate of the CV-QKD/GMCS system for the direct reconciliation and reverse reconciliation methods, respectively.The results demonstrate that the DR technique outperforms the RR approach in terms of both the gained SKR and the achievable transmission distance.These observations are made before accounting for the impact of the phase-sensitive amplifier (PSA) with a gain value of g = 1 as indicated by the blue curve.As discussed in [11], DR is preferred over RR when dealing with noisy channels.This preference aligns with our system's case, which does not incorporate PSA.The state is inverted when the PSA is coupled with the realistic homodyne detector, and the performance of the RR technique exceeds that of the DR, especially considering the propagation distance.When the amplifier gain g = 10, an SKR of 10 −2 bits/pulse can be sent over a distance of 7.8 km in the RR technique compared to only 3.2 km in the DR technique.Those figures also show that for RR, without the PSA, the maximum distance is limited to 1 km, which satisfies an SKR of 3.5 × 10 −2 bits/pulse.After coupling the PSA with gain equals 10, this distance is increased 5 times (5 km), corresponding to an increase of approximately 3 times (10 −1 ) in the achievable SKR.On the other hand, the limited distance of 1 km (corresponding to an SKR of 3 × 10 −1 ) for the DR algorithm is only doubled (2 km) after applying the PSA of gain 10, and its corresponding SKR (4 × 10 −1 ) is multiplied by a factor of 1.3 compared to the case without an amplifier.It can be concluded that RR introduces better performance in terms of the allowable transmission distance than DR when applying the PSA.The results shown in the previous figures are calculated under a weak turbulence regime (C 2 n = 10 −17 m −2/3 ).Next, we will evaluate the effect of turbulence variation on the system security using RR with the following values for the refractive index structure parameter C 2 n : 10 −17 m −2/3 , 5 × 10 −14 m −2/3 , and 2 × 10 −13 m −2/3 corresponding to weak, moderate, and strong turbulence respectively.It is worth noting that the PSA of gain = 10, as opposed to that of gain = 5, is very effective when considering the turbulence effect, where longer transmission distances are attained as the severity of the turbulence decreases as shown in Figure 8.

Conclusions
In this article, the performance of a GMCS/CV-QKD system is evaluated over a freespace optical channel under a general individual attack.This article assumes homodyne detection followed by either direct or reverse reconciliation mechanisms.The transmittance of the atmospheric quantum channel is considered, as well as its variation with the propagation distance.This article aimed to investigate the impact of atmospheric turbulence on the performance of quantum key distribution systems.The results show that the transmittance of the channel decreased with distance, leading to a reduction in the secure key rate.Employing a PSA to compensate for the finite efficiency of the homodyne detectors improves the achievable SKR and the available secure propagation range.The results reveal that comparing the system performance before and after using the PSA, in the case of the RR technique, the improvement in the system performance after coupling a PSA (with a gain of 10) in terms of the SKR and transmission distance is approximately 2.5 times that for the case of the DR.Therefore, it can be concluded that the use of PSA can significantly enhance the performance of homodyne-based QKD systems and that the RR technique is more sensitive to the use of PSA than the DR technique.However, further studies are needed to investigate the impact of amplifier compensation under other attacks, such as collective and coherent attacks.

Figure 1 .
Figure 1.Overlap scenarios between the beam spot (dashed circle) and the photodetector plan (solid circle).

Figure 2 .
Figure 2. Transmission efficiency versus normalized beam-deflection distance for different beam spot radii.

( 3 ) 4 )
Direct Reconciliation (DR) and Reverse Reconciliation (RR): DR and RR are two essential techniques used for error correction and privacy amplification.These techniques are important for ensuring that the quantum key generated between the sender (Alice) and the receiver (Bob) is identical, secure, and free from potential eavesdropping.In DD, the process starts with Alice sending her encoded quantum states to Bob through the quantum channel.Bob then measures the received states.In RR, the roles of Alice and Bob in the reconciliation process are reversed.The secure key length is given by[58] K DR = I(A; B) − I(A; E) Direct Reconciliation K RR = I(B; A) − I(B; E) Reverse Reconciliation(11) where I(A; B), I(A; E), I(B; A), and I(B; E) are the mutual information between Alice and Bob, Alice and Eve, Bob and Alice, and Bob and Eve, respectively.(Integration of PSA and HD: The integration of PSA with HD is used to enhance the performance of CV-QKD systems.PSA can amplify quantum signals while preserving their noise properties, making them particularly useful for compensating for detector imperfections and enhancing the overall detection process.The output quadratures after the amplification are given by[59]

Figure 4 .
Figure 4. Transmittance of the free-space channel versus air link distance for different turbulence regimes.

Figure 5 .
Figure 5.The behavior of SNR with different transmission distances as a function of the PSA gain.

Figure 6 .
Figure 6.SKR vs. channel distance for a protocol using HD and PSA with DR, the 'perfect secret key' corresponds to a perfect homodyne detector (η = 1, v el = 0, g = 1).

Figure 7 .
Figure 7. SKR vs. channel distance for a protocol using HD and PSA with RR, the 'perfect secret key' corresponds to a perfect homodyne detector (η = 1, v el = 0, g = 1).

Figure 8 .
Figure 8. SKR vs. channel distance in RR for different turbulence conditions using PSA with g = 5 and g = 10.