Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

0 Security of Continuous Variable Quantum Cryptography

We discuss a quantum key distribution scheme in which small phase and amplitude modulations of CW light beams carry the key information. The presence of EPR type correlations provides the quantum protection. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of security. We...

متن کامل

Continuous variable quantum cryptography using coherent states.

We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such ...

متن کامل

Implementation of continuous variable quantum cryptography in optical fibres using a go-&-return configuration

It has been demonstrated theoretically that several protocols of quantum key distribution (QKD) based on continuous variables allow one to achieve a large quantum bit rate. Some implementations of those protocols have already shown the potential of this technique [1, 2]. However, the efficiency of those protocols is very sensitive to losses and the reconciliation protocols aren’t efficient enou...

متن کامل

Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret key rates, even in the presence of strong losses ...

متن کامل

Continuous variable quantum cryptography: beating the 3 dB loss limit.

We demonstrate that secure quantum key distribution systems based on continuous variable implementations can operate beyond the apparent 3 dB loss limit that is implied by the beam splitting attack. The loss limit was established for standard minimum uncertainty states such as coherent states. We show that, by an appropriate postselection mechanism, we can enter a region where Eve's knowledge o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2015

ISSN: 1050-2947,1094-1622

DOI: 10.1103/physreva.91.022320