2012
DOI: 10.1142/s0219749912500591
|View full text |Cite
|
Sign up to set email alerts
|

Security of a New Two-Way Continuous-Variable Quantum Key Distribution Protocol

Abstract: The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd and S. L. Braunstein, Nat. Phys. 4 (2008) 726] give the security against the collective attack on the condition of the tomography of the quantum channels. We propose a family of new two-way CV-QKD protocols and prove their security against collective entangling cloner attacks without the tomography of the quantum channels. The simulation result indicates that the new protocols maintain the s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
66
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
8
1

Relationship

4
5

Authors

Journals

citations
Cited by 31 publications
(66 citation statements)
references
References 40 publications
0
66
0
Order By: Relevance
“…Bob uses data, where µ is the parameter used to optimize Bob's estimator. This process is similar to the approach in the two-way CV-QKD protocols [33][34][35][36][37][38].…”
Section: A Non-gaussian Post-selection In Cv-mdi Qkdmentioning
confidence: 99%
“…Bob uses data, where µ is the parameter used to optimize Bob's estimator. This process is similar to the approach in the two-way CV-QKD protocols [33][34][35][36][37][38].…”
Section: A Non-gaussian Post-selection In Cv-mdi Qkdmentioning
confidence: 99%
“…The proposed scalar reconciliation eliminates the use of multidimensional spherical space along with the dimensional boundaries and can be used in arbitrary high dimensions. The scalar reconciliation process neither requires any physical-layer tomography [1][2][3][4][5][6][7][8], and only standard operations and calculations needed in the level of raw data. The method provides unconditional security, and allows a much easier implementation to maximize the extractable valuable binary information from the correlated raw data to significantly boost up the key rates and to improve the distance ranges of two-way CVQKD.…”
Section: Discussionmentioning
confidence: 99%
“…The two-way CVQKD systems were introduced for practical reasons to exceed the limitations of one-way CVQKD, such as low key rates and short communication distances [1][2][3][4][5][6][7][8]. The two-way CVQKD protocols exploit the benefits of multiple channel uses and allow the leak of only lower valuable information to the eavesdropper, and they are also …”
Section: Introductionmentioning
confidence: 99%
“…[10] where Alice sends squeezed states along one of the two quadratures and Bob performs homodyne detection. The security of the latter follows from a continuousvariable version of the entropic uncertainty principle [11] while that of the former protocol is established thanks to a recently developed Gaussian de Finetti theorem [12,13], [43].Establishing the security of two-way CVQKD, where Alice and Bob send quantum information back and forth through the channel, has been an outstanding goal in the field and partial progress was obtained in Refs [14][15][16][17][18][19][20][21]. However, to the best of our knowledge, none of these works has proven its security against general attacks in the composable setting.…”
mentioning
confidence: 99%