“…To date, numerous sub-protocols have been derived from the GG02 protocol [ 4 ], and their security has been theoretically demonstrated [ 5 , 6 ]. In addition, experimental investigations have also demonstrated the feasibility of the designed scheme [ 7 , 8 , 9 ]. However, there are still obstacles that restrict the implementation of the practical CVQKD system [ 10 , 11 ].…”