2021
DOI: 10.1038/s41467-020-19916-1
|View full text |Cite
|
Sign up to set email alerts
|

Finite-size security of continuous-variable quantum key distribution with digital signal processing

Abstract: In comparison to conventional discrete-variable (DV) quantum key distribution (QKD), continuous-variable (CV) QKD with homodyne/heterodyne measurements has distinct advantages of lower-cost implementation and affinity to wavelength division multiplexing. On the other hand, its continuous nature makes it harder to accommodate to practical signal processing, which is always discretized, leading to lack of complete security proofs so far. Here we propose a tight and robust method of estimating fidelity of an opti… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
88
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(91 citation statements)
references
References 51 publications
2
88
1
Order By: Relevance
“…At the other end of the spectrum, it is tempting to drastically reduce the number of coherent states in the constellation to simplify as much as possible the hardware requirements of the protocols as well as the reconciliation procedure (where Alice and Bob extract a common raw key from their correlated data). Protocols with 2, 3 or 4 coherent states have been considered in the literature and are part of the general class of M -PSK (phaseshift keying) protocols where Alice sends coherent states of the form |α k = |αe 2πik/M for some α > 0 [2,16,17,25,28,30,33,39,47]. While M = 2 or 3 appear to be too small to yield good performance, the 4-PSK (also known as quadrature phase-shift keying, QPSK) modulation scheme has attracted some interest since it performs reasonably well, although quite far from a Gaussian modulation.…”
Section: Introduction and Main Resultsmentioning
confidence: 99%
“…At the other end of the spectrum, it is tempting to drastically reduce the number of coherent states in the constellation to simplify as much as possible the hardware requirements of the protocols as well as the reconciliation procedure (where Alice and Bob extract a common raw key from their correlated data). Protocols with 2, 3 or 4 coherent states have been considered in the literature and are part of the general class of M -PSK (phaseshift keying) protocols where Alice sends coherent states of the form |α k = |αe 2πik/M for some α > 0 [2,16,17,25,28,30,33,39,47]. While M = 2 or 3 appear to be too small to yield good performance, the 4-PSK (also known as quadrature phase-shift keying, QPSK) modulation scheme has attracted some interest since it performs reasonably well, although quite far from a Gaussian modulation.…”
Section: Introduction and Main Resultsmentioning
confidence: 99%
“…The future works include the optimization of the key rate of the discrete-modulation protocol in the short distance transmission by extending current state constellation or other new constellation design schemes [52], and finding better data postselection strategies [53,54]. Extending our security analysis to include the impact of finite-size is also an important future task [55][56][57]. In Fig.…”
Section: Discussionmentioning
confidence: 99%
“…Indeed, in the case of the first assumption, one would need an infinite amount of randomness to simulate the required Gaussian distribution, which is clearly not possible in practice. To overcome this gap, one solution is to consider the discrete approximation of Gaussian modulation [11], or alternatively, discrete-modulated CV-QKD protocols based on constellations of coherent states (or displaced thermal states) [12][13][14][15][16][17][18][19][20][21][22]. Moreover, working with discrete modulation protocols has another advantage, in that could significantly reduce the implementation complexity and computational resources required by the classical post-processing layer [5, 14-16, 23, 24].…”
Section: Introductionmentioning
confidence: 99%
“…An example of Gaussian-modulated CV-QKD is the aforementioned GG02 protocol [10], while some examples of discrete-modulated CV-QKD can be found in Refs. [11][12][13][14][15][16][17][18][19][20][21][22]. Finally, DV-QKD with homodyne detection includes Ref.…”
Section: Introductionmentioning
confidence: 99%