2015
DOI: 10.1103/physrevx.5.041009
|View full text |Cite
|
Sign up to set email alerts
|

Generating the Local Oscillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection

Abstract: Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and limit the potential applications of CV-QKD. In this paper, we propose and demonstrate a pilot-aided feedforward data recovery … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
246
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 211 publications
(250 citation statements)
references
References 42 publications
3
246
0
1
Order By: Relevance
“…43 Further progress continues to be pursued, targeting also higher efficiency, which is currently around 60% for fibre-coupled detectors at telecom wavelengths. 42 Furthermore, as shown in Figure 1c, a practical issue in these systems is that the strong phase reference pulse (or local oscillator) needs to be transmitted together with the signal at high clock rates; recent proposals that avoid this and use instead a local oscillator generated at Bob's site [58][59][60] are promising and will lead to more practical, high performance implementations.…”
Section: Major Challenges In Performance and Costmentioning
confidence: 99%
“…43 Further progress continues to be pursued, targeting also higher efficiency, which is currently around 60% for fibre-coupled detectors at telecom wavelengths. 42 Furthermore, as shown in Figure 1c, a practical issue in these systems is that the strong phase reference pulse (or local oscillator) needs to be transmitted together with the signal at high clock rates; recent proposals that avoid this and use instead a local oscillator generated at Bob's site [58][59][60] are promising and will lead to more practical, high performance implementations.…”
Section: Major Challenges In Performance and Costmentioning
confidence: 99%
“…While all previous attacks on CV-QKD had focused on local oscillator manipulation and biasing excess noise evaluation, our attack has no influence on the local oscillator, and can thus not be ruled out by generating the local oscillator locally [15,16]. It is therefore important to propose practical solutions against this attack, and we have presented in detail two effective counter-measures based on post-selection, that can be implemented without requiring any modification at the hardware level.…”
Section: Discussionmentioning
confidence: 99%
“…Hence the LO can be accessed, and thus manipulated by an attacker in practical implementations. It is important to note that the LO can in principle be generated locally at Bob side, as demonstrated in recent proof-of-principle experiments [15,16], where the LO is phase-locked with the quantum signals emitted by Alice. However, phase-locking two distant lasers brings more complexity and noise and all practical CV-QKD full demonstrations have so far been performed with a "public" LO.…”
Section: Practical Security Issues: Loopholes and Attacks In Cv-qkdmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the ignorance of the nonlocal arrangement of LO will lead to wavelength attacks [14], calibration attacks [15] and LO fluctuation attacks [16], which are all related to the loopholes of LO. Therefore, self-referenced CVQKD without sending an LO is proposed, and it can effectively remove the loopholes introduced by the LO transmission [17]. Nevertheless, in the real-life experiments, it is a hard problem to realize content detection for two separate lasers, since model illustrated in Figure 1, we can depict the scheme as follows.…”
Section: Introductionmentioning
confidence: 99%