Distributing secret keys with quantum continuous variables: principle, security and implementations
From MaRDI portal
Abstract: The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.
Cites work
- scientific article; zbMATH DE number 5320213 (Why is no real title available?)
- A Mathematical Theory of Communication
- Coherent state quantum key distribution with multi letter phase-shift keying
- Distillation of secret key and entanglement from quantum states
- Key Recycling in Authentication
- Min- and max-entropy in infinite dimensions
- Position-momentum uncertainty relations in the presence of quantum memory
- Proposed experiment to test local hidden-variable theories
- SECURITY OF QUANTUM KEY DISTRIBUTION
Cited in
(8)- Photonic hybrid state entanglement swapping using cat state superpositions
- Phase estimation and compensation for continuous-variable quantum key distribution
- Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states
- High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction
- Longer distance continuous variable quantum key distribution protocol with photon subtraction at the receiver
- Quantum cryptography: key distribution and beyond
- A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication
- Discrete-modulation continuous-variable quantum key distribution with a high key rate
This page was built for publication: Distributing secret keys with quantum continuous variables: principle, security and implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q296411)