Continuous-Variable Quantum Cryptography is Secure against Non-Gaussian Attacks
نویسندگان
چکیده
منابع مشابه
Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequent...
متن کاملOptimality of Gaussian attacks in continuous-variable quantum cryptography.
We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.
متن کاملSecurity of continuous-variable quantum key distribution against general attacks.
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries...
متن کاملQuantum error correction of continuous-variable states against Gaussian noise
Continuous-variable quantum information protocols use quantum operations and measurements acting on states with continuous eigenvalue spectra to perform quantum information tasks such as quantum teleportation, quantum key distribution, and quantum processing [1]. An attraction of continuous-variable protocols is that many require only Gaussian states, operations, and measurements [2]—all of whi...
متن کاملSecurity of Quantum Cryptography against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2004
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.92.047905