2003
DOI: 10.1103/physreva.67.022308
|View full text |Cite
|
Sign up to set email alerts
|

Security of quantum cryptography using balanced homodyne detection

Abstract: In this paper we investigate the security of a quantum cryptographic scheme which utilizes balanced homodyne detection and weak coherent pulses (WCP). The performance of the system is mainly characterized by the intensity of the WCP and postselected threshold. Two of the simplest intercept and resend eavesdropping attacks are analyzed. The secure key gain for a given loss is also discussed in terms of the pulse intensity and threshold.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

1
71
0

Year Published

2003
2003
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 66 publications
(72 citation statements)
references
References 27 publications
(48 reference statements)
1
71
0
Order By: Relevance
“…These values demonstrate the excellent performance of balanced homodyne detection. For a given value of n sig there exists an optimal X + (X − ) that maximizes the product of the effective detection efficiency and the mutual information between Alice and Bob [20].…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…These values demonstrate the excellent performance of balanced homodyne detection. For a given value of n sig there exists an optimal X + (X − ) that maximizes the product of the effective detection efficiency and the mutual information between Alice and Bob [20].…”
mentioning
confidence: 99%
“…Here we stress the advantage of the homodyne scheme that permits the measurement of quadrature amplitude distributions. A detailed analysis is presented in a separate paper [20]. In the intercept-resend eavesdropping strategy, Eve intercepts selected light pulses and mea-sures them, and then sends an appropriate state to Bob.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the security analysis including experimental imperfections seems to become qualitatively different from that of the discrete schemes. * Electric address: namiki@qo.phys.gakushuin.ac.jpIn our previous work [9] we estimated G of a hybrid type scheme applying a postselection [8] for a given loss, provided Eve performs quadrature measurement for the lost part of the signal. In this case it is shown that G can be positive if the loss is less than unity by setting a large postselection threshold.…”
mentioning
confidence: 99%
“…The second one is an intercept-resend attack. It imposes a practical loss limit on every coherent state scheme.The protocol we study here is a four state protocol using phase modulation of weak coherent pulse and balanced homodyne detection applying a postselection process [8,9]. Alice randomly chooses one of the four coherent states | √ ne imπ/2 with the pulse intensity (the mean photon number per pulse) n > 0, m = 0, 1, 2, 3 and sends it to Bob.…”
mentioning
confidence: 99%