Security aspects of quantum key distribution with sub-Poisson light
نویسندگان
چکیده
The security of quantum key distribution with sub-Poisson light sources is investigated. It is shown that a quantitative analysis of the security of such sources requires only two measured values, the efficiency and second-order correlation. These two numbers represent figures of merit, which characterize the performance of such light sources. We show that sub-Poisson light sources can offer significant improvements in communication rate over Poisson light in the presence of realistic experimental imperfections. We also investigate the amount of channel loss that can be tolerated for secure communication to be possible, and show that this only depends on the second-order correlation, provided the device efficiency exceeds a critical value. If this critical efficiency is exceeded, an inefficient source can perform as well as an efficient one at sufficiently high channel losses.
منابع مشابه
Quantum Information Processing with Non-classical Light
Quantum information processing (QIP) is a field concerned with technological applications of quantum mechanical phenonomena. In many cases, photons are an ideal quantum system for such applications. Photons exhibit superb coherence properties, are robust to environmental noise, and can be transmitted over long distances. One of the main difficulties of photon based quantum information processin...
متن کاملDistributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
The ability to distribute secret keys between two parties with information-theoretic security, that is regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far-reach...
متن کامل0 Security of Continuous Variable Quantum Cryptography
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of CW light beams carry the key information. The presence of EPR type correlations provides the quantum protection. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of security. We...
متن کاملSome Aspects of Quantum Cryptography and Network Security
Quantum mechanics is the current best description of the world as we know it. Experiments have shown that quantum predictions are accurate up ten places of decimal. In quantum cryptography much work has been devoted to the study of Quantum Key Distribution (QKD). The purpose of QKD is to securely distribute secret keys between the users in a network. As a result, several quantum cryptographic p...
متن کاملQuantum cloning and key distribution with continuous variables
Quantum information with continuous variables is a paradigm which has attracted a growing interest lately, as a consequence of the prospect for high-rate quantum communication systems that may result from the use of standard telecommunication components. After introducing the concept of quantum continuous variables in optics, we turn to the fundamental impossibility of cloning continuous-variab...
متن کامل