Security proof of continuous-variable quantum key distribution using three coherent states
TLDR
In this paper, a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection is proposed.Abstract:
We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.read more
Citations
More filters
Journal ArticleDOI
Advances in quantum cryptography
Stefano Pirandola,Ulrik L. Andersen,Leonardo Banchi,Mario Berta,Darius Bunandar,Roger Colbeck,Dirk Englund,Tobias Gehring,Cosmo Lupo,Carlo Ottaviani,Jason Pereira,Mohsen Razavi,Jesni Shamsul Shaari,Marco Tomamichel,Vladyslav C. Usenko,Giuseppe Vallone,Paolo Villoresi,Petros Wallden +17 more
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Journal ArticleDOI
Secure quantum key distribution with realistic devices
TL;DR: This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
Journal ArticleDOI
Advances in Quantum Cryptography
Stefano Pirandola,Ulrik L. Andersen,Leonardo Banchi,Mario Berta,Darius Bunandar,Roger Colbeck,Dirk Englund,Tobias Gehring,Cosmo Lupo,Carlo Ottaviani,Jason Pereira,Mohsen Razavi,Jesni Shamsul Shaari,Marco Tomamichel,Vladyslav C. Usenko,Giuseppe Vallone,Paolo Villoresi,Petros Wallden +17 more
TL;DR: Quantum cryptography is arguably the fastest growing area in quantum information science as mentioned in this paper, and many quantum key distribution protocols have been proposed, both theoretically and experimentally, over the last few decades.
Journal ArticleDOI
Asymptotic security of continuous-variable quantum key distribution with a discrete modulation
TL;DR: In this paper, a lower bound on the secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states was established, which is valid against collective attacks and is obtained by formulating the problem as a semidefinite program.
Journal ArticleDOI
Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution
TL;DR: A new analysis demonstrates that discrete-modulated CV QKD, a quantum key establishment protocol, can become a cost-effective tool for securing current classical and future quantum networks over long distances.
References
More filters
Journal ArticleDOI
The security of practical quantum key distribution
Valerio Scarani,Helle Bechmann-Pasquinucci,Nicolas J. Cerf,Miloslav Dušek,Norbert Lütkenhaus,Momtchil Peev +5 more
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Journal ArticleDOI
Gaussian quantum information
Christian Weedbrook,Stefano Pirandola,Raúl García-Patrón,Nicolas J. Cerf,Timothy C. Ralph,Jeffrey H. Shapiro,Seth Lloyd +6 more
TL;DR: This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.
Journal ArticleDOI
Decoy State Quantum Key Distribution
TL;DR: The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Journal ArticleDOI
Measurement-Device-Independent Quantum Key Distribution
TL;DR: The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD.
Journal ArticleDOI
Beating the photon-number-splitting attack in practical quantum cryptography.
TL;DR: An efficient method is proposed to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action.