scispace - formally typeset
Open AccessJournal ArticleDOI

Security proof of continuous-variable quantum key distribution using three coherent states

Kamil Bradler, +1 more
- 06 Feb 2018 - 
- Vol. 97, Iss: 2, pp 022310
TLDR
In this paper, a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection is proposed.
Abstract
We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

read more

Citations
More filters
Journal ArticleDOI

Secure quantum key distribution with realistic devices

TL;DR: This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
Journal ArticleDOI

Asymptotic security of continuous-variable quantum key distribution with a discrete modulation

TL;DR: In this paper, a lower bound on the secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states was established, which is valid against collective attacks and is obtained by formulating the problem as a semidefinite program.
Journal ArticleDOI

Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution

TL;DR: A new analysis demonstrates that discrete-modulated CV QKD, a quantum key establishment protocol, can become a cost-effective tool for securing current classical and future quantum networks over long distances.
References
More filters
Journal ArticleDOI

The security of practical quantum key distribution

TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Journal ArticleDOI

Gaussian quantum information

TL;DR: This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.
Journal ArticleDOI

Decoy State Quantum Key Distribution

TL;DR: The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Journal ArticleDOI

Measurement-Device-Independent Quantum Key Distribution

TL;DR: The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD.
Journal ArticleDOI

Beating the photon-number-splitting attack in practical quantum cryptography.

TL;DR: An efficient method is proposed to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action.
Related Papers (5)