2003
DOI: 10.26421/qic3.s-6
|View full text |Cite
|
Sign up to set email alerts
|

Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables

Abstract: We discuss quantum key distribution protocols using quantum continuous variables. We show that such protocols can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob. %while other ones require that the line transmission is larger than 50%. This is achieved by reversing the reconciliation procedure subsequent to the quantum transmission, that is, using Bob's instead of Alice's data to build the key. Although squeezing or entanglement may be he… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
259
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 190 publications
(263 citation statements)
references
References 6 publications
4
259
0
Order By: Relevance
“…It is therefore necessary to find some indirect approach in order to get some bounds on Z = tr(ρ C). Protocols with a Gaussian modulation (of Gaussian states) are an exception: in this case, one can easily compute this covariance matrix, and in particular the value of Z = tr(ρ C) from the data observed in the PM protocol [14]. The reason for this is that the measurement performed by Alice in the EB protocol is a Gaussian measurement, and therefore the observed statistics are sufficient to infer the covariance matrix.…”
Section: Entanglement-based Protocol and Devetak-winter Boundmentioning
confidence: 99%
See 4 more Smart Citations
“…It is therefore necessary to find some indirect approach in order to get some bounds on Z = tr(ρ C). Protocols with a Gaussian modulation (of Gaussian states) are an exception: in this case, one can easily compute this covariance matrix, and in particular the value of Z = tr(ρ C) from the data observed in the PM protocol [14]. The reason for this is that the measurement performed by Alice in the EB protocol is a Gaussian measurement, and therefore the observed statistics are sufficient to infer the covariance matrix.…”
Section: Entanglement-based Protocol and Devetak-winter Boundmentioning
confidence: 99%
“…In this section, we show that the formula from Eqn. (14) gives the standard value for a Gaussian modulation [10]. Let us consider a modulation such that τ G has n photons on average:…”
Section: The Gaussian Modulationmentioning
confidence: 99%
See 3 more Smart Citations