92,323 research outputs found
Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution
As quantum key distribution becomes a mature technology, it appears clearly
that some assumptions made in the security proofs cannot be justified in
practical implementations. This might open the door to possible side-channel
attacks. We examine several discrepancies between theoretical models and
experimental setups in the case of continuous-variable quantum key
distribution. We study in particular the impact of an imperfect modulation on
the security of Gaussian protocols and show that approximating the theoretical
Gaussian modulation with a discrete one is sufficient in practice. We also
address the issue of properly calibrating the detection setup, and in
particular the value of the shot noise. Finally, we consider the influence of
phase noise in the preparation stage of the protocol and argue that taking this
noise into account can improve the secret key rate because this source of noise
is not controlled by the eavesdropper.Comment: 4 figure
Quantum cryptography with an ideal local relay
We consider two remote parties connected to a relay by two quantum channels.
To generate a secret key, they transmit coherent states to the relay, where the
states are subject to a continuous-variable (CV) Bell detection. We study the
ideal case where Alice's channel is lossless, i.e., the relay is locally
situated in her lab and the Bell detection is performed with unit efficiency.
This configuration allows us to explore the optimal performances achievable by
CV measurement-device-independent (MDI) quantum key distribution (QKD). This
corresponds to the limit of a trusted local relay, where the detection loss can
be re-scaled. Our theoretical analysis is confirmed by an experimental
simulation where 10^-4 secret bits per use can potentially be distributed at
170km assuming ideal reconciliation.Comment: in Proceedings of the SPIE Security + Defence 2015 conference on
Quantum Information Science and Technology, Toulouse, France (21-24 September
2015) - Paper 9648-4
Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables
We study the impact of finite-size effects on the key rate of
continuous-variable (CV) measurement-device-independent (MDI) quantum key
distribution (QKD). Inspired by the parameter estimation technique developed in
[Rupert \textit{et al.} Phys. Rev. A \textbf{90}, 062310 (2014)]~we adapt it to
study CV-MDI-QKD and, assuming realistic experimental conditions, we analyze
the impact of finite-size effects on the key rate. We find that, increasing the
block-size, the performance of the protocol converges towards the ideal one,
and that block-sizes between and data points can already
provide a key rate bit/use over metropolitan distances.Comment: 10 pages, 3 figures, typos corrected, abstract and intro modified,
references adde
Entangled Quantum Key Distribution with a Biased Basis Choice
We investigate a quantum key distribution (QKD) scheme which utilizes a
biased basis choice in order to increase the efficiency of the scheme. The
optimal bias between the two measurement bases, a more refined error analysis,
and finite key size effects are all studied in order to assure the security of
the final key generated with the system. We then implement the scheme in a
local entangled QKD system that uses polarization entangled photon pairs to
securely distribute the key. A 50/50 non-polarizing beamsplitter with different
optical attenuators is used to simulate a variable beamsplitter in order to
allow us to study the operation of the system for different biases. Over 6
hours of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were
able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550
secure key bits per raw key bit for the unbiased case. This represents an
increase in the efficiency of the key generation rate by 79%.Comment: v2: Revised paper based on referee reports, Theory section was
revised (primarily regarding finite key effects), Results section almost
completely rewritten with more experimental data. 16 pages, 5 figures. v1: 14
pages, 6 figures, higher resolution figures will be available in the
published articl
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
The ability to distribute secret keys between two parties with
information-theoretic security, that is, regardless of the capacities of a
malevolent eavesdropper, is one of the most celebrated results in the field of
quantum information processing and communication. Indeed, quantum key
distribution illustrates the power of encoding information on the quantum
properties of light and has far reaching implications in high-security
applications. Today, quantum key distribution systems operate in real-world
conditions and are commercially available. As with most quantum information
protocols, quantum key distribution was first designed for qubits, the
individual quanta of information. However, the use of quantum continuous
variables for this task presents important advantages with respect to qubit
based protocols, in particular from a practical point of view, since it allows
for simple implementations that require only standard telecommunication
technology. In this review article, we describe the principle of
continuous-variable quantum key distribution, focusing in particular on
protocols based on coherent states. We discuss the security of these protocols
and report on the state-of-the-art in experimental implementations, including
the issue of side-channel attacks. We conclude with promising perspectives in
this research field.Comment: 21 pages, 2 figures, 1 tabl
- …