2015
DOI: 10.1103/physrevx.5.041010
|View full text |Cite
|
Sign up to set email alerts
|

Self-Referenced Continuous-Variable Quantum Key Distribution Protocol

Abstract: We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne d… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
236
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 195 publications
(238 citation statements)
references
References 43 publications
1
236
0
1
Order By: Relevance
“…We use Eq. (16) and Eq. (17) to perform numerical evaluation ofT sat andξ sat , in order to study the impact of the saturation attack.…”
Section: Analysis and Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We use Eq. (16) and Eq. (17) to perform numerical evaluation ofT sat andξ sat , in order to study the impact of the saturation attack.…”
Section: Analysis and Simulation Resultsmentioning
confidence: 99%
“…While all previous attacks on CV-QKD had focused on local oscillator manipulation and biasing excess noise evaluation, our attack has no influence on the local oscillator, and can thus not be ruled out by generating the local oscillator locally [15,16]. It is therefore important to propose practical solutions against this attack, and we have presented in detail two effective counter-measures based on post-selection, that can be implemented without requiring any modification at the hardware level.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Fortunately Bennett-Brassard (BB84) [1] pointed out how to use the properties of quantum mechanics for the purpose of the cryptography, independently rediscovered by Ekert (E91) using entanglement states [2] a few years later, which was the beginning of quantum key distribution (QKD), and had been proven to be unconditionally secure [3] when both parties are quantum. So far, there are many quantum key distribution (QKD) schemes have already been put forward [4,5,6,7,8,9].…”
Section: Introductionmentioning
confidence: 99%