Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • CLEO/Europe and IQEC 2007 Conference Digest
  • (Optica Publishing Group, 2007),
  • paper IC6_5

Continuous Variable Quantum Cryptography: Post-Selection with Thermal Noise

Not Accessible

Your library or personal account may give you access

Abstract

Continuous variable Quantum Key Distribution (CVQKD) utilizes bright beams to establish secure communication between two parties via an optical quantum channel such as an optical fiber. One of the main protocols that are practical and promising involves a selection process after the transmission of quantum states, called post-selection based CVQKD. The security of CVQKD using post-selection has been investigated both theoretically [1] and demonstrated experimentally [2]. However, it was subject to one fundamental assumption, namely that the quantum channel must have strictly zero excess noise (i.e. it is shot-noise-limited). In reality, nonlinearities in optical fibers and classical noise of laser beams commonly introduce Gaussian excess noise.

© 2007 IEEE

PDF Article
More Like This
Security of Post-Selection based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Added Noise

Thomas Symul, Daniel J. Alton, Syed M. Assad, Andrew M. Lance, Christian Weedbrook, Timothy C. Ralph, and Ping Koy Lam
QWE6 Quantum-Atom Optics Downunder (QAO) 2007

Security of Post-Selection Based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Added Noise

Thomas Symul, Daniel J. Alton, Syed M. Assad, Andrew M. Lance, Christian Weedbrook, Timothy C. Ralph, and Ping Koy Lam
QThC2 Quantum-Atom Optics Downunder (QAO) 2007

Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks

Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.