2020
DOI: 10.1038/s41598-020-66948-0
|View full text |Cite
|
Sign up to set email alerts
|

Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis

Abstract: In this paper we report a continuous-variable quantum key distribution protocol using multimode coherent states generated on subcarrier frequencies of the optical spectrum. We propose a coherent detection scheme where power from a carrier wave is used as a local oscillator. We compose a mathematical model of the proposed scheme and perform its security analysis in the finite-size regime using fully quantum asymptotic equipartition property technique. We calculate a lower bound on the secret key rate for the sy… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 45 publications
0
10
0
1
Order By: Relevance
“…The other branch gives priority to simplicity of the modulation and uses a very small (usually two to four) number of amplitudes [25][26][27][28] . As for the security analysis, the status is more or less similar to the Gaussian constellation case, and current security proofs are either in the asymptotic regime against collective attacks [29][30][31][32] or in the finite-size regime but against more restrictive attacks 33,34 . Hence, regardless of approaches, a complete security proof of CV QKD in the finite-size regime against general attacks has been a crucial step yet to be achieved.…”
mentioning
confidence: 99%
“…The other branch gives priority to simplicity of the modulation and uses a very small (usually two to four) number of amplitudes [25][26][27][28] . As for the security analysis, the status is more or less similar to the Gaussian constellation case, and current security proofs are either in the asymptotic regime against collective attacks [29][30][31][32] or in the finite-size regime but against more restrictive attacks 33,34 . Hence, regardless of approaches, a complete security proof of CV QKD in the finite-size regime against general attacks has been a crucial step yet to be achieved.…”
mentioning
confidence: 99%
“…The mathematical model presented in this subsection describes the classic case as the most understandable. A similar model in terms of quantum mechanics, which is more justified for the description of QKD systems, is presented in [26].…”
Section: Detection Modelmentioning
confidence: 99%
“…Due to the active development of novel QKD systems using non-standard states of light there is a necessity to upgrade existing detection schemes. The subcarrier wave (SCW) QKD [19,20,21,22,23,24,25,26] is striking example of such a system. A defining property of subcarrier wave QKD is the method for quantum state encoding.…”
Section: Introductionmentioning
confidence: 99%
“…In SCW QKD protocols [15][16][17][18][19][20] multimode weak coherent states are generated by electro-optic phase modulation. As a result, sideband spectrum is formed with its phase, relative to the initial carrier field, containing the quantum information [21][22][23] (detailed descriptions of SCW DV-QKD and CV-QKD protocols can be found in [15] and [20], respectively). The main advantages of SCW QKD are the simplification of the phase shift matching between Alice and Bob and lack of complex interference schemes and efficient usage of the channel's bandwidth.…”
Section: Introductionmentioning
confidence: 99%