2015
DOI: 10.1038/ncomms9795
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

Abstract: Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
178
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 237 publications
(180 citation statements)
references
References 44 publications
0
178
0
2
Order By: Relevance
“…However, in practice we must modify these expressions, multiplying Alice and Bob's mutual information by a factor β < 1 to account for finite information reconciliation efficiency (see Supplement 1 for explicit calculations). Reconciliation efficiencies for CV-QKD have increased substantially in the past few years [55,56], with efficiencies of between 94% and 95.5% recently reported [42]. Here, we choose β 0.95.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in practice we must modify these expressions, multiplying Alice and Bob's mutual information by a factor β < 1 to account for finite information reconciliation efficiency (see Supplement 1 for explicit calculations). Reconciliation efficiencies for CV-QKD have increased substantially in the past few years [55,56], with efficiencies of between 94% and 95.5% recently reported [42]. Here, we choose β 0.95.…”
Section: Resultsmentioning
confidence: 99%
“…Protocols motivated by these hardware advantages have begun to appear. A direct extension [28] to the infinite-dimensional Hilbert spaces relevant for CV-QKD [41] has been applied to propose a discretized 1sDI-CV-QKD protocol that also accounts for finite-size effects [15,16], and a scheme independent of Bob's devices only has recently been demonstrated [42].…”
Section: Introductionmentioning
confidence: 99%
“…These protocols [9,10], which do not require single-photon detectors, are particularly appealing in terms of implementation [11] but their security is still far from being completely understood. Recently, a composable security proof for a CV protocol was obtained [12][13][14] from an entropic uncertainty principle [15] but the protocol requires the generation of squeezed states and is only moderately tolerant to losses. Other approaches to establish the security of a protocol typically consist of two independent steps: first a composable security proof valid against collective attacks, a restricted type of attacks where the quantum state shared by Alice and Bob protocol displays a tensor product structure, followed by an additional argument to obtain security against general attacks.…”
mentioning
confidence: 99%
“…In order to study solely the influence of a fading channel (for η 1,2 = 1) on the security of the CV QKD protocols, we look at the case of collective attacks conducted in case of noiseless channel ( atm = 0) and perfect post-processing accessible to trusted parties (β = 1, which is a theoretical limit, but recent protocols [27,37,43,44] are very close to it). Figure 1(b) depicts a positive key rate and it is dependency on the squeezing V s and modulation variance V m for various values of transmittance fluctuations Var( √ η) for η = 1/2.…”
Section: General Fading Channel Influencementioning
confidence: 99%