2018
DOI: 10.1103/physreva.97.052327
|View full text |Cite
|
Sign up to set email alerts
|

Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

Abstract: Article:Lupo, Cosmo orcid.org/0000-0002-5227-4009, Ottaviani, Carlo orcid.org/0000-0002-0032-3999, Papanastasiou, Panagiotis et al. (1 more We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reductio… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
92
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 98 publications
(92 citation statements)
references
References 40 publications
0
92
0
Order By: Relevance
“…Quite soon CV versions of MDI-QKD were proposed based on similar ideas of entanglement swapping [25][26][27]. These protocols have also been studied theoretically [28][29][30] and realized experimentally [25]. How-ever, the maximal transmission distances were found to be unsatisfactory as compared to DV-MDI-QKD.…”
Section: Introductionmentioning
confidence: 99%
“…Quite soon CV versions of MDI-QKD were proposed based on similar ideas of entanglement swapping [25][26][27]. These protocols have also been studied theoretically [28][29][30] and realized experimentally [25]. How-ever, the maximal transmission distances were found to be unsatisfactory as compared to DV-MDI-QKD.…”
Section: Introductionmentioning
confidence: 99%
“…[27][28][29], assuming measurementdevice-independence (MDI) [30,31] as a counter-measure against detectors' side-channel attacks, have extended the concept of CV-QKD to end-to-end network implementations [32]. For most of these protocols, not only experiments were shown [27,[33][34][35][36][37][38][39][40], but also their security analysis has been gradually refined to incorporate finite-size effects [41][42][43] and composable aspects [44][45][46].…”
mentioning
confidence: 99%
“…No third-parties can obtain the secret information, even though the measurement results are published, thus all side-channel attacks targeted at the detectors are eliminated. This form of communication works well for striking a balance between the grade of security [34,35] and practicability, and it is particularly suitable for long-distance transmission [36] and for multiuser communication across a star topology network [37,38].…”
Section: Introductionmentioning
confidence: 99%