4,322 research outputs found

    Quantum key distribution using polarized coherent states

    Full text link
    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators S^i\hat{S}_i (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.Comment: Inclusion of a discussion about noise not controlled by Eve; inclusion of a figure. A simplified version of this paper was submitted to a Conference in Brazil (XXVII ENFMC) in 16/02/200

    Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense

    Full text link
    We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in the conditions of Gaussian lossy and noisy channels. The influence of such a noise on the security of Gaussian quantum cryptography can be crucial, even despite the fact that a noise is trusted, due to a strongly nonlinear behavior of the quantum entropies involved in the security analysis. We recapitulate the known effect of the preparation noise in both direct and reverse-reconciliation protocols, as well as the detection noise in the reverse-reconciliation scenario. As a new result, we show the negative role of the trusted detection noise in the direct-reconciliation scheme. We also describe the role of the trusted preparation or detection noise added at the reference side of the protocols in improving the robustness of the protocols to the channel noise, confirming the positive effect for the coherent-state reverse-reconciliation protocol. Finally, we address the combined effect of trusted noise added both in the source and the detector.Comment: 25 pages, 9 figure

    Witnessing effective entanglement over a 2km fiber channel

    Full text link
    We present a fiber-based continuous-variable quantum key distribution system. In the scheme, a quantum signal of two non-orthogonal weak optical coherent states is sent through a fiber-based quantum channel. The receiver simultaneously measures conjugate quadratures of the light using two homodyne detectors. From the measured Q-function of the transmitted signal, we estimate the attenuation and the excess noise caused by the channel. The estimated excess noise originating from the channel and the channel attenuation including the quantum efficiency of the detection setup is investigated with respect to the detection of effective entanglement. The local oscillator is considered in the verification. We witness effective entanglement with a channel length of up to 2km.Comment: 11 pages, 5 figure

    Continuous variable quantum cryptography using coherent states

    Get PDF
    We propose several methods for quantum key distribution (QKD) based upon the generation and transmission of random distributions of coherent or squeezed states, and we show that they are are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50 %, but they do not rely on "non-classical" features such as squeezing. Their security is a direct consequence of the no-cloning theorem, that limits the signal to noise ratio of possible quantum measurements on the transmission line. Our approach can also be used for evaluating various QKD protocols using light with gaussian statistics.Comment: 5 pages, 1 figure. In v2 minor rewriting for clarity, references adde

    Quantum Key Distribution using Continuous-variable non-Gaussian States

    Full text link
    In this work we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the Photon Added then Subtracted Coherent States (PASCS) in which one photon is added and subsequently one photon is subtracted. We analyze the performance of our protocol, compared to a coherent state based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.Comment: We have included an analysis of the simultaneous quadrature measurement attack plus 2 figures; we have also clarified some point
    • …
    corecore