6,910 research outputs found
Security of two-way quantum cryptography against asymmetric Gaussian attacks
Recently, we have shown the advantages of two-way quantum communications in
continuous variable quantum cryptography. Thanks to this new approach, two
honest users can achieve a non-trivial security enhancement as long as the
Gaussian interactions of an eavesdropper are independent and identical. In this
work, we consider asymmetric strategies where the Gaussian interactions can be
different and classically correlated. For several attacks of this kind, we
prove that the enhancement of security still holds when the two-way protocols
are used in direct reconciliation.Comment: Proceeding of the SPIE Conference "Quantum Communications and Quantum
Imaging VI" - San Diego 2008. This paper is connected with
arXiv:quant-ph/0611167 (for the last version see: Nature Physics 4, 726
(2008)
Security bounds for continuous variables quantum key distribution
Security bounds for key distribution protocols using coherent and squeezed
states and homodyne measurements are presented. These bounds refer to (i)
general attacks and (ii) collective attacks where Eve interacts individually
with the sent states, but delays her measurement until the end of the
reconciliation process. For the case of a lossy line and coherent states, it is
first proven that a secure key distribution is possible up to 1.9 dB of losses.
For the second scenario, the security bounds are the same as for the completely
incoherent attack.Comment: See also F. Grosshans, quant-ph/040714
Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States
A continuous variable ping-pong scheme, which is utilized to generate
deterministically private key, is proposed. The proposed scheme is implemented
physically by using Gaussian-modulated squeezed states. The deterministic way,
i.e., no basis reconciliation between two parties, leads a two-times efficiency
comparing to the standard quantum key distribution schemes. Especially, the
separate control mode does not need in the proposed scheme so that it is
simpler and more available than previous ping-pong schemes. The attacker may be
detected easily through the fidelity of the transmitted signal, and may not be
successful in the beam splitter attack strategy.Comment: 7 pages, 4figure
Security of coherent state quantum cryptography in the presence of Gaussian noise
We investigate the security against collective attacks of a continuous
variable quantum key distribution scheme in the asymptotic key limit for a
realistic setting. The quantum channel connecting the two honest parties is
assumed to be lossy and imposes Gaussian noise on the observed quadrature
distributions. Secret key rates are given for direct and reverse reconciliation
schemes including postselection in the collective attack scenario. The effect
of a non-ideal error correction and two-way communication in the classical
post-processing step is also taken into account.Comment: 12 pages, 5 figures updated version including two-way communication;
changed the definition of the excess noise to match the definition given
earlier (Phys. Rev. Lett. 92, 117901); submitted to PRA; presented at the 8th
International Conference on Quantum Communication, Measurement and Computing,
Tsukub
Key distillation from quantum channels using two-way communication protocols
We provide a general formalism to characterize the cryptographic properties
of quantum channels in the realistic scenario where the two honest parties
employ prepare and measure protocols and the known two-way communication
reconciliation techniques. We obtain a necessary and sufficient condition to
distill a secret key using this type of schemes for Pauli qubit channels and
generalized Pauli channels in higher dimension. Our results can be applied to
standard protocols such as BB84 or six-state, giving a critical error rate of
20% and 27.6%, respectively. We explore several possibilities to enlarge these
bounds, without any improvement. These results suggest that there may exist
weakly entangling channels useless for key distribution using prepare and
measure schemes.Comment: 21 page
Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction
We propose a method to improve the performance of two-way continuous-variable
quantum key distribution protocol by virtual photon subtraction. The Virtual
photon subtraction implemented via non-Gaussian post-selection not only
enhances the entanglement of two-mode squeezed vacuum state but also has
advantages in simplifying physical operation and promoting efficiency. In
two-way protocol, virtual photon subtraction could be applied on two sources
independently. Numerical simulations show that the optimal performance of
renovated two-way protocol is obtained with photon subtraction only used by
Alice. The transmission distance and tolerable excess noise are improved by
using the virtual photon subtraction with appropriate parameters. Moreover, the
tolerable excess noise maintains a high value with the increase of distance so
that the robustness of two-way continuous-variable quantum key distribution
system is significantly improved, especially at long transmission distance.Comment: 15 pages, 6 figure
Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation
We present a continuous-variable quantum key distribution protocol combining
a discrete modulation and reverse reconciliation. This protocol is proven
unconditionally secure and allows the distribution of secret keys over long
distances, thanks to a reverse reconciliation scheme efficient at very low
signal-to-noise ratio.Comment: 4 pages, 2 figure
- …