2021
DOI: 10.48550/arxiv.2107.06110
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Tight Secure Key Rates for CV-QKD with 8PSK Modulation

Florian Kanitschar,
Christoph Pacher

Abstract: We use a recent numerical security proof approach to calculate tight secure key rates in the presence of collective attacks for a continuous-variable (CV) eight-state phase-shift keying (8PSK) protocol with heterodyne detection in the asymptotic limit. The results are compared to achievable secure key rates of a QPSK protocol obtained with the same security proof technique. Furthermore, we investigate the influence of radial postselection on the secure key rate and examine a recently suggested strategy to redu… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…This allows QKD channels to be more effectively integrated into existing communication networks. In CV-QKD, discrete modulation technology has attracted much attention [26,[34][35][36][37][38][39][40][41][42][43][44] because of its ability to reduce the requirements for modulation devices. However, due to the lack of symmetry, the security proof of discrete modulation CV-QKD also mainly relies on numerical methods [37][38][39][40][41][42]45].Unfortunately, calculating a secure key rate by numerical methods requires minimizing a convex function over all eavesdropping attacks related with the experimental data [46,47].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…This allows QKD channels to be more effectively integrated into existing communication networks. In CV-QKD, discrete modulation technology has attracted much attention [26,[34][35][36][37][38][39][40][41][42][43][44] because of its ability to reduce the requirements for modulation devices. However, due to the lack of symmetry, the security proof of discrete modulation CV-QKD also mainly relies on numerical methods [37][38][39][40][41][42]45].Unfortunately, calculating a secure key rate by numerical methods requires minimizing a convex function over all eavesdropping attacks related with the experimental data [46,47].…”
mentioning
confidence: 99%
“…In CV-QKD, discrete modulation technology has attracted much attention [26,[34][35][36][37][38][39][40][41][42][43][44] because of its ability to reduce the requirements for modulation devices. However, due to the lack of symmetry, the security proof of discrete modulation CV-QKD also mainly relies on numerical methods [37][38][39][40][41][42]45].…”
mentioning
confidence: 99%