2021
DOI: 10.1109/jphot.2021.3064057
|View full text |Cite
|
Sign up to set email alerts
|

Trans-Media Continuous-Variable Quantum Key Distribution via Untrusted Entanglement Source

Abstract: We propose a continuous-variable quantum key distribution (CVQKD) scheme based on the atmosphere-to-seawater channel. In particular, an untrusted entanglement source (two modes of the compressed vacuum state, TMSV) is deployed on the surface of the seawater, each mode of TMSV is sent to one of the two legitimate parts, respectively. In this way, we can establish a transmedia CVQKD link between the atmosphere and the underwater. Meanwhile, a suitable non-Gaussian operation, namely photon subtraction, is introdu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…However, real continuous-variable quantum key distribution (CVQKD) [3][4][5][6] systems face security vulnerabilities due to some deviations between the theoretical assumptions and the implementation, which gives Eve the opportunity to compromise security by stealing information from legitimate parties. The eavesdroppers can employ wavelength attacks [7,8], calibration attacks [9,10], local-oscillation (LO) intensity attacks [11], homodyne-detector-blinding attacks [12], saturation attacks [13], and other attack strategies to compromise the safety of the GMCS CV-QKD.…”
Section: Introductionmentioning
confidence: 99%
“…However, real continuous-variable quantum key distribution (CVQKD) [3][4][5][6] systems face security vulnerabilities due to some deviations between the theoretical assumptions and the implementation, which gives Eve the opportunity to compromise security by stealing information from legitimate parties. The eavesdroppers can employ wavelength attacks [7,8], calibration attacks [9,10], local-oscillation (LO) intensity attacks [11], homodyne-detector-blinding attacks [12], saturation attacks [13], and other attack strategies to compromise the safety of the GMCS CV-QKD.…”
Section: Introductionmentioning
confidence: 99%
“…In our previous study, we split the satellite to submarine channel in two through a third party, allowing quantum pulses to be transmitted in two separate channels. [7][8][9] It is worth noting that the addi-tion of a third party will undoubtedly increase the complexity of the system, which will pose a threat to the stability of the satellite-to-submarine CVQKD scheme. In addition, from the perspective of confidentiality, the existence of a third party is likely to reveal the physical location of the submarine.…”
Section: Introductionmentioning
confidence: 99%
“…Continuous variable systems, which are quantum systems with infinite dimensional Hilbert spaces, have been an important platform for quantum cryptography, quantum information and quantum computation [Edwards & Belavkin, 2005, van Handel, Stockton, & Mabuchi, 2005, James, Nurdin, & Petersen, 2008, Wiseman & Milburn, 2010, Nurdin, Petersen, & James, 2012, Pan, Zhang, & James, 2016, Ma, Woolley, Petersen, & Yamamoto, 2018, Gao, Zhang, & Petersen, 2020, Gao, Dong, Petersen, & Ding, 2020,Ghalaii, Ottaviani, Kumar, Pirandola, & Razavi, 2021, Zhang & Pan, 2020, Gao, Dong, Petersen, & Ding, 2021, Guo, Peng, Liao, & Wang, 2021. Gaussian states, which include a wide and important class of quantum states such as vacuum states, squeezed vacuum, squeezed coherent states, quasi-free states and ground states of some free Hamiltonians, are the basis for various continuous variable quantum information processing [De ⋆ The material in this paper was not presented at any conference.…”
Section: Introductionmentioning
confidence: 99%