2018
DOI: 10.1007/s11128-018-2118-0
|View full text |Cite
|
Sign up to set email alerts
|

Advantages of the coherent state compared with squeezed state in unidimensional continuous variable quantum key distribution

Abstract: In this work, a comparison study between unidimensional (UD) coherent-state and UD squeeze-state protocols is performed in the continuous variable quantum key distribution domain. First, the UD squeeze-state protocol is proposed, and the equivalence between the prepare-and-measure and entanglement-based schemes of UD squeezestate protocol is proved. Then, the security of the UD squeeze-state protocol under collective attack in realistic conditions is analyzed. Lastly, the performances of the two UD protocols a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 40 publications
0
4
0
Order By: Relevance
“…The PM scheme and the entanglement-based (EB) scheme of the UD CV-QKD protocol using coherent states are illustrated separately in figure 2(a) and figure 2(b). The equivalence between the two schemes in the UD CV-QKD protocols has been proved in [27], and the detailed calculation process of secret key rates can be found in [25].…”
Section: Ud Cv-qkd Protocol Using Coherent Statesmentioning
confidence: 99%
See 1 more Smart Citation
“…The PM scheme and the entanglement-based (EB) scheme of the UD CV-QKD protocol using coherent states are illustrated separately in figure 2(a) and figure 2(b). The equivalence between the two schemes in the UD CV-QKD protocols has been proved in [27], and the detailed calculation process of secret key rates can be found in [25].…”
Section: Ud Cv-qkd Protocol Using Coherent Statesmentioning
confidence: 99%
“…Compared with the Gaussian-modulated protocols, the features of the UD CV-QKD protocols include easy modulation, low cost, and only a small number of random numbers required [26]. Moreover, the performance of the UD coherent-state CV-QKD protocol is comparable to the Gaussian-modulated coherent-state protocol under the condition of low thermal excess noise [27]. Therefore, the UD CV-QKD protocol using coherent states has a clear potential for application to various scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…This asymmetric modulation can effectively simplify the implementation at the transmitter and significantly enhance the practicability of CVQKD. Recently, while original UD-CVQKD protocol has been studied in-depth both theoretically and experimentally [15][16][17][18][19], the scheme is further generalized to the squeezed state case [20,21] as well as the discrete modulation scheme [22]. In addition, the unidimensional continuous variable measurementdevice-independent QKD (CV-MDI QKD) protocol [23] and the unidimensional two-way CVQKD protocol [24] were proposed to simplify the system realization.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum key distribution (QKD) [1][2][3] is a primary application of quantum cryptography, which enables two remote legitimate communication parties, Alice and Bob, to share random secret key sequences [4][5][6] in public channel preventing the eavesdropper Eve by physical laws [7][8][9][10]. There are two research fields for QKD, i.e., discrete-variable QKD(DVQKD) and continuous-variable QKD (CVQKD) [11][12][13][14]. In DVQKD, information is encoded on properties of single photon, and it uses single-photon detector at the receiver side.…”
Section: Introductionmentioning
confidence: 99%