Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security of continuous-variable quantum cryptography with Gaussian postselection

Security of continuous-variable quantum cryptography with Gaussian postselection We extend the security analysis of continuous variable quantum-key-distribution protocols using a family of post selection schemes to account for arbitrary eavesdropping attacks. We show that the postselection protocol is equivalent to a virtual entanglement-based protocol including a distillation stage. We introduce a particular ‘Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally, we explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length and find improvements over all pre-existing continuous variable protocols in realistic regimes. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Physical Review A American Physical Society (APS)

Security of continuous-variable quantum cryptography with Gaussian postselection

4 pages

Loading next page...
 
/lp/american-physical-society-aps/security-of-continuous-variable-quantum-cryptography-with-gaussian-HUMi0DcPDV

References (8)

Publisher
American Physical Society (APS)
Copyright
©2013 American Physical Society
ISSN
1050-2947
DOI
10.1103/PhysRevA.87.020303
Publisher site
See Article on Publisher Site

Abstract

We extend the security analysis of continuous variable quantum-key-distribution protocols using a family of post selection schemes to account for arbitrary eavesdropping attacks. We show that the postselection protocol is equivalent to a virtual entanglement-based protocol including a distillation stage. We introduce a particular ‘Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally, we explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length and find improvements over all pre-existing continuous variable protocols in realistic regimes.

Journal

Physical Review AAmerican Physical Society (APS)

Published: Feb 21, 2013

There are no references for this article.