Access the full text.
Sign up today, get DeepDyve free for 14 days.
Anthony Leverrier, P. Grangier (2008)
Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.Physical review letters, 102 18
C. Weedbrook, A. Lance, W. Bowen, T. Symul, T. Ralph, P. Lam (2005)
Coherent-state quantum key distribution without random basis switchingPhysical Review A, 73
F. Grosshans, N. Cerf, J. Wenger, R. Tualle-Brouri, P. Grangier (2003)
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variablesQuantum Inf. Comput., 3
R. Renner, J. Cirac (2008)
De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.Physical review letters, 102 11
A. Furusawa, J. Sørensen, S. Braunstein, C. Fuchs, H. Kimble, E. Polzik (1998)
Unconditional quantum teleportationScience, 282 5389
Vladyslav Usenko, R. Filip (2009)
Feasibility of continuous-variable quantum key distribution with noisy coherent statesPhysical Review A, 81
S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, P. Grangier (2008)
Improvement of continuous-variable quantum key distribution systems by using optical preamplifiersJournal of Physics B: Atomic, Molecular and Optical Physics, 42
Takuya Hirano, H. Yamanaka, M. Ashikaga, T. Konishi, Ryo Namiki (2000)
Quantum cryptography using pulsed homodyne detectionPhysical Review A, 68
J. Sudjana, Loïck Magnin, R. García-Patrón, N. Cerf (2007)
Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switchingPhysical Review A, 76
M. Navascués, F. Grosshans, A. Acín (2006)
Optimality of Gaussian attacks in continuous-variable quantum cryptography.Physical review letters, 97 19
C. Weedbrook, A. Lance, W. Bowen, T. Symul, T. Ralph, P. Lam (2004)
Quantum cryptography without switching.Physical review letters, 93 17
F. Grosshans, N. Cerf (2003)
Continuous-variable quantum cryptography is secure against non-Gaussian attacks.Physical review letters, 92 4
F. Grosshans, P. Grangier (2001)
Continuous variable quantum cryptography using coherent states.Physical review letters, 88 5
S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, P. Grangier (2009)
Improvement of continuous-variable quantum key distribution systems by using optical preamplifiersMol. Opt. Phys., 42
F. Grosshans, G. Assche, J. Wenger, R. Brouri, N. Cerf, P. Grangier (2003)
Quantum key distribution using gaussian-modulated coherent statesNature, 421
J. Eisert, M. Plenio (2003)
Introduction to the basics of entanglement theory in continuous-variable systemsInternational Journal of Quantum Information, 01
C. Silberhorn, T. Ralph, N. Lütkenhaus, G. Leuchs (2002)
Continuous variable quantum cryptography: beating the 3 dB loss limit.Physical review letters, 89 16
C. Shannon (1949)
Communication theory of secrecy systemsBell Syst. Tech. J., 28
J. Wrighton, J. Dufty (2008)
Kinetic theory for electron dynamics near a positive ionJournal of Statistical Mechanics: Theory and Experiment, 2008
J. Lodewyck, M. Bloch, R. García-Patrón, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. Cerf, R. Tualle-Brouri, S. McLaughlin, P. Grangier (2007)
Quantum key distribution over 25 km with an all-fiber continuous-variable systemPhysical Review A, 76
R. García-Patrón, N. Cerf (2006)
Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.Physical review letters, 97 19
J. Lodewyck, P. Grangier (2007)
Tight bound on the coherent-state quantum key distribution with heterodyne detectionPhysical Review A, 76
A new method to quantify the eavesdropper’s accessible information on continuous variable quantum key distribution for protocols implementing homodyne and heterodyne detections is introduced. We have derived upper bounds for the eavesdropping collective attacks on general continuous variable quantum key distribution protocols. Our focus is especially on deriving bounds which are Gaussian optimal for Eve collective attacks that involve non maximally entanglement (i.e. Alice and Bob use non maximally entangled states or non-Gaussian modulation for their quantum key distribution protocols). The new bounds derived are tight for all continuous variable quantum key distribution protocols. We show that the eavesdropper’s accessible information is independent of the initial correlation between Alice and Bob modes in reverse reconciliation scheme, while in direct reconciliation scheme, Eve information is given as a function of Alice and Bob initial correlation.
Quantum Information Processing – Springer Journals
Published: Aug 4, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.