Distributing secret keys with quantum continuous variables: principle, security and implementations
From MaRDI portal
Publication:296411
DOI10.3390/E17096072zbMATH Open1338.81160arXiv1506.02888OpenAlexW1910706370WikidataQ62045704 ScholiaQ62045704MaRDI QIDQ296411FDOQ296411
Authors: Eleni Diamanti, Anthony Leverrier
Publication date: 15 June 2016
Published in: Entropy (Search for Journal in Brave)
Abstract: The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.
Full work available at URL: https://arxiv.org/abs/1506.02888
Cites Work
- A Mathematical Theory of Communication
- Proposed experiment to test local hidden-variable theories
- Key Recycling in Authentication
- Title not available (Why is that?)
- Distillation of secret key and entanglement from quantum states
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Position-momentum uncertainty relations in the presence of quantum memory
- Coherent state quantum key distribution with multi letter phase-shift keying
- Min- and max-entropy in infinite dimensions
Cited In (8)
- Phase estimation and compensation for continuous-variable quantum key distribution
- Photonic hybrid state entanglement swapping using cat state superpositions
- High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction
- A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication
- Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states
- Discrete-modulation continuous-variable quantum key distribution with a high key rate
- Longer distance continuous variable quantum key distribution protocol with photon subtraction at the receiver
- Quantum cryptography: key distribution and beyond
This page was built for publication: Distributing secret keys with quantum continuous variables: principle, security and implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q296411)