Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks
نویسندگان
چکیده
منابع مشابه
Security of continuous-variable quantum key distribution against general attacks.
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries...
متن کاملImplementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a fi...
متن کاملImplementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement
Tobias Gehring, 2 Vitus Händchen, Jörg Duhme, Fabian Furrer, Torsten Franz, 5 Christoph Pacher, Reinhard F. Werner, and Roman Schnabel 7, ∗ Max-Planck-Institut für Gravitationsphysik (Albert-Einstein-Institut) and Institut für Gravitationsphysik, Leibniz Universität Hannover, Callinstraße 38, 30167 Hannover, Germany Department of Physics, Technical University of Denmark, Fysikvej, 2800 Kgs. Lyn...
متن کاملSecurity Thresholds of Multicarrier Continuous-Variable Quantum Key Distribution
We prove the secret key rate formulas and derive security threshold parameters of multi-carrier continuous-variable quantum key distribution (CVQKD). In a multicarrierCVQKD scenario, the Gaussian input quantum states of the legal parties are granulatedinto Gaussian subcarrier CVs (continuous-variables). The multicarrier communicationformulates Gaussian sub-channels from the ...
متن کاملSecurity against individual attacks for realistic quantum key distribution
The first complete protocol for quantum key distribution (qkd) has been introduced by Bennett and Brassard in 1984 [1] following earlier ideas by Wiesner [2]. Since then, this protocol (BB84 for short) has been implemented by several groups [3–13]. For an overview containing more details about the background, the experimental implementation and the classical evaluation procedure see for example...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2012
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.109.100502