2008
DOI: 10.1038/nphys1018
|View full text |Cite
|
Sign up to set email alerts
|

Continuous-variable quantum cryptography using two-way quantum communication

Abstract: Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret key rates, even in the presence of strong losses in the quantum communication channel. Despite this robustness to loss, their security can be affected by more general … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

2
328
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 231 publications
(330 citation statements)
references
References 44 publications
2
328
0
Order By: Relevance
“…We will also extend our upper bound to the more general scenario of QKD using a two-way quantum channel with unlimited public discussion, which was discussed recently in ref. 15. Finally, we will compare our upper bound and the best-known lower bound to the rate achievable by the BB84 and the CV-GG02 protocols under best-case operating conditions as well as compare with the performance of these protocols under realistic operating conditions.…”
mentioning
confidence: 99%
“…We will also extend our upper bound to the more general scenario of QKD using a two-way quantum channel with unlimited public discussion, which was discussed recently in ref. 15. Finally, we will compare our upper bound and the best-known lower bound to the rate achievable by the BB84 and the CV-GG02 protocols under best-case operating conditions as well as compare with the performance of these protocols under realistic operating conditions.…”
mentioning
confidence: 99%
“…03.67.Dd, 03.67.Hk, 89.70.Cf Introduction -Quantum key distribution (QKD) using continuous variables (CV) [1,2] allows two people, Alice and Bob, to generate a secure key which can be used to encrypt messages. CV-QKD protocols using Gaussian modulation [3][4][5][6][7][8], initially begin with Alice preparing a number of randomly displaced pure coherent states and sending them over an insecure quantum channel to Bob. Generally, it is assumed that Alice's states must be pure quantum states to a good approximation otherwise her ability to perform QKD will rapidly become compromised.…”
mentioning
confidence: 99%
“…CV-QKD protocols using Gaussian modulation [3][4][5][6][7][8], initially begin with Alice preparing a number of randomly displaced pure coherent states and sending them over an insecure quantum channel to Bob. Generally, it is assumed that Alice's states must be pure quantum states to a good approximation otherwise her ability to perform QKD will rapidly become compromised.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Conversely, when the errors in EM is higher, it is likely the case that LM05 may not perform better than BB84 except for possible very small error rates. We conclude saying that a finite key analysis would be enlightening also for two-way QKD in the framework of continuous variable [29].…”
Section: Discussionmentioning
confidence: 86%