Computational Complexity of Continuous Variable Quantum Key Distribution

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computational Complexity of Present Schemes of Reverse Reconciliation Continuous Variable Quantum Key Distribution

The continuous variable quantum key distribution has been considered to have the potential to provide high secret key rate. However, in present experimental demonstrations, the secret key can be distilled only under very small loss rates. Here, by calculating explicitly the computational complexity with the channel transmission, we show that under high loss rate it is hard to distill the secret...

متن کامل

Single-quadrature continuous-variable quantum key distribution

Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two independent modulators for their implementations. Here, we propose and experimentally test a largel...

متن کامل

Security Thresholds of Multicarrier Continuous-Variable Quantum Key Distribution

We prove the secret key rate formulas and derive security threshold parameters of multi-carrier continuous-variable quantum key distribution (CVQKD). In a multicarrierCVQKD scenario, the Gaussian input quantum states of the legal parties are granulatedinto Gaussian subcarrier CVs (continuous-variables). The multicarrier communicationformulates Gaussian sub-channels from the ...

متن کامل

Subcarrier Domain of Multicarrier Continuous-Variable Quantum Key Distribution

We propose the subcarrier domain of multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs and the physical Gaussian link is divided into Gaussian subchannels. The sub-channels are dedicated for the conveying of the subcarrier CVs. The angular domain utilizes the phase-space angles of the G...

متن کامل

Security of continuous-variable quantum key distribution against general attacks.

We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2008

ISSN: 0018-9448

DOI: 10.1109/tit.2008.921889