2007
DOI: 10.1103/physreva.76.030303
|View full text |Cite
|
Sign up to set email alerts
|

Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise

Abstract: In realistic continuous variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection based scheme is still secure against both individual… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 39 publications
(32 citation statements)
references
References 22 publications
0
32
0
Order By: Relevance
“…Therefore, a subtler analysis has to be carried out to obtain tighter bounds. Here we present the basic security analysis for the postselection protocol against collective entangling cloner attacks (Heid and Lütkenhaus, 2007;Symul et al, 2007). When Bob performs homodyne detection, the mutual information between Alice and Bob for a given pair of variables (|a q(p) |, |b|) is given by Shannon's formula for a binary channel (Shannon, 1948) I(a : b) = 1 + p e log p e + (1 − p e ) log(1 − p e ) .…”
Section: B Postselectionmentioning
confidence: 99%
“…Therefore, a subtler analysis has to be carried out to obtain tighter bounds. Here we present the basic security analysis for the postselection protocol against collective entangling cloner attacks (Heid and Lütkenhaus, 2007;Symul et al, 2007). When Bob performs homodyne detection, the mutual information between Alice and Bob for a given pair of variables (|a q(p) |, |b|) is given by Shannon's formula for a binary channel (Shannon, 1948) I(a : b) = 1 + p e log p e + (1 − p e ) log(1 − p e ) .…”
Section: B Postselectionmentioning
confidence: 99%
“…Different proposals for CV QKD have been put forward, either based on singlemode coherent [3,4] and squeezed [5][6][7][8][9][10][11] signals or EinsteinPodolsy-Rosen (EPR) correlated beams [12,13]. Experimental demonstrations have been reported for coherent [3,4,[14][15][16], squeezed [10], and EPR beams-based [13] protocols, and unconditional security proofs have also been investigated [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…The homodyne detection is a well-established quantitative method to measure the quadrature-amplitude operator of the signal field [27,28] or implement the continuous variable quantum cryptography [29,30]. A simple illustration of the homodyne detection is shown in Fig.…”
Section: B Prp Imperfectionmentioning
confidence: 99%