2017
DOI: 10.1117/12.2250213
|View full text |Cite
|
Sign up to set email alerts
|

High-speed continuous-variable quantum key distribution over atmospheric turbulent channels

Abstract: We experimentally demonstrate a RF-assisted four-state continuous-variable quantum key distribution (CV-QKD) system in the presence of turbulence. The atmospheric turbulence channel is emulated by two spatial light modulators (SLMs) on which two randomly generated azimuthal phase patterns are recorded yielding Andrews' azimuthal phase spectrum. Frequency and phase locking are not required in our system thanks to the proposed digital phase noise cancellation (PNC) stage. Besides, the transmittance fluctuation c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…In this paper, we have addressed a long-standing open problem in continuous-variable quantum key distribution (CV-QKD), by establishing a security proof for discretemodulation protocols. Even though many experiments have been performed on discrete-modulation CV-QKD with multiple constellation points (see, e.g., [56][57][58]), no security proofs have been available for them, and the expected key-rate calculations reported based on measured homodyne statistics have been based on assuming Gaussian attacks, which are not known to be optimal for discrete-modulation CV-QKD. We have introduced a discrete-modulation protocol and then obtained rigorous lower bounds on the secret-key rates, secure against collective attacks in the asymptotic key-length regime.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, we have addressed a long-standing open problem in continuous-variable quantum key distribution (CV-QKD), by establishing a security proof for discretemodulation protocols. Even though many experiments have been performed on discrete-modulation CV-QKD with multiple constellation points (see, e.g., [56][57][58]), no security proofs have been available for them, and the expected key-rate calculations reported based on measured homodyne statistics have been based on assuming Gaussian attacks, which are not known to be optimal for discrete-modulation CV-QKD. We have introduced a discrete-modulation protocol and then obtained rigorous lower bounds on the secret-key rates, secure against collective attacks in the asymptotic key-length regime.…”
Section: Discussionmentioning
confidence: 99%