Access the full text.
Sign up today, get DeepDyve free for 14 days.
F. Grosshans, N. Cerf, J. Wenger, R. Tualle-Brouri, P. Grangier (2003)
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variablesQuantum Inf. Comput., 3
(2010)
New J
B. Qi, Wen-sen Zhu, L. Qian, H. Lo (2010)
Feasibility of quantum key distribution through a dense wavelength division multiplexing networkNew Journal of Physics, 12
J. Müller-Quade, R. Renner (2009)
Composability in quantum cryptographyNew Journal of Physics, 11
(1984)
in Proceedings of IEEE International Conference on Computers
Anthony Leverrier, E. Karpov, P. Grangier, N. Cerf, N. Cerf (2009)
Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase spaceNew Journal of Physics, 11
R. Renner (2007)
Symmetry of large physical systems implies independence of subsystemsNature Physics, 3
M. Tomamichel, C. Lim, N. Gisin, R. Renner (2011)
Tight finite-key analysis for quantum cryptographyNature Communications, 3
and as an in
L. Sheridan, T. Le, V. Scarani (2010)
Finite-key security against coherent attacks in quantum key distributionNew Journal of Physics, 12
D. Stucki, N. Brunner, N. Gisin, V. Scarani, H. Zbinden (2005)
Fast and simple one-way quantum key distributionApplied Physics Letters, 87
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries of the protocols as well as the postselection technique introduced by Christandl, Koenig, and Renner ( Phys. Rev. Lett. 102 , 020504 ( 2009 ) PRLTAO 0031-9007 ).
Physical Review Letters – American Physical Society (APS)
Published: Jan 18, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.