92,323 research outputs found

    Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution

    Full text link
    As quantum key distribution becomes a mature technology, it appears clearly that some assumptions made in the security proofs cannot be justified in practical implementations. This might open the door to possible side-channel attacks. We examine several discrepancies between theoretical models and experimental setups in the case of continuous-variable quantum key distribution. We study in particular the impact of an imperfect modulation on the security of Gaussian protocols and show that approximating the theoretical Gaussian modulation with a discrete one is sufficient in practice. We also address the issue of properly calibrating the detection setup, and in particular the value of the shot noise. Finally, we consider the influence of phase noise in the preparation stage of the protocol and argue that taking this noise into account can improve the secret key rate because this source of noise is not controlled by the eavesdropper.Comment: 4 figure

    Quantum cryptography with an ideal local relay

    Get PDF
    We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay is locally situated in her lab and the Bell detection is performed with unit efficiency. This configuration allows us to explore the optimal performances achievable by CV measurement-device-independent (MDI) quantum key distribution (QKD). This corresponds to the limit of a trusted local relay, where the detection loss can be re-scaled. Our theoretical analysis is confirmed by an experimental simulation where 10^-4 secret bits per use can potentially be distributed at 170km assuming ideal reconciliation.Comment: in Proceedings of the SPIE Security + Defence 2015 conference on Quantum Information Science and Technology, Toulouse, France (21-24 September 2015) - Paper 9648-4

    Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables

    Get PDF
    We study the impact of finite-size effects on the key rate of continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD). Inspired by the parameter estimation technique developed in [Rupert \textit{et al.} Phys. Rev. A \textbf{90}, 062310 (2014)]~we adapt it to study CV-MDI-QKD and, assuming realistic experimental conditions, we analyze the impact of finite-size effects on the key rate. We find that, increasing the block-size, the performance of the protocol converges towards the ideal one, and that block-sizes between 10610^{6} and 10910^{9} data points can already provide a key rate 102\sim10^{-2} bit/use over metropolitan distances.Comment: 10 pages, 3 figures, typos corrected, abstract and intro modified, references adde

    Entangled Quantum Key Distribution with a Biased Basis Choice

    Full text link
    We investigate a quantum key distribution (QKD) scheme which utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis, and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter with different optical attenuators is used to simulate a variable beamsplitter in order to allow us to study the operation of the system for different biases. Over 6 hours of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.Comment: v2: Revised paper based on referee reports, Theory section was revised (primarily regarding finite key effects), Results section almost completely rewritten with more experimental data. 16 pages, 5 figures. v1: 14 pages, 6 figures, higher resolution figures will be available in the published articl

    Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    Full text link
    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.Comment: 21 pages, 2 figures, 1 tabl
    corecore