# Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

@article{Diamanti2015DistributingSK, title={Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations}, author={Eleni Diamanti and Anthony Leverrier}, journal={Entropy}, year={2015}, volume={17}, pages={6072-6092} }

The ability to distribute secret keys between two parties with information-theoretic security, that is regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far-reaching implications in high-security applications. Today, quantum key distribution systems operate in…

## 213 Citations

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

- Computer ScienceNature communications
- 2015

The implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light and is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector.

Quantum communication with coherent states of light

- Computer Science, PhysicsPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
- 2017

Recent developments in quantum key distribution (QKD) are reviewed in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKd for bridging long distances by building upon existing optical satellite links.

Quantum Information Protocols with Gaussian States of Light

- Computer Science, Physics
- 2016

This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource of Gaussian states, and introduces the idea of measurement device independence for continuous variable states and presents a proof-of-principle implementation of this protocol.

Security proof of continuous-variable quantum key distribution using three coherent states

- Computer Science
- 2018

A thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate is presented and this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing.

User-defined quantum key distribution

- Computer Science
- 2018

A protocol design framework that allows one to securely construct the protocol using arbitrary non-orthogonal states, which solves the security challenge of discrete-modulated coherent states, but also achieves high performance with no more than 256 coherent states.

Advances in Quantum Cryptography

- Computer Science
- 2019

This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.

Discrete-variable quantum key distribution with homodyne detection

- Computer ScienceQuantum
- 2022

The proposed protocol has two highly practical features: it does not require the honest parties to share the same reference phase (as required in CV-QKD) and the selection of decoding basis can be performed after measurement, and it is proved the security of the proposed protocol in the asymptotic limit under the assumption of collective attacks.

Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources

- Computer Science, Mathematicsnpj Quantum Information
- 2021

This paper provides simple security proofs for continuous variable quantum key distribution systems with intensity fluctuating sources that are simple to implement without any hardware adjustment and able to provide secure secret keys in the finite-size scenario.

Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution.

- Computer SciencePhysical review letters
- 2018

This work shows that continuous-variable QKD is not subject to this constraint as the whole raw keys can be used for both parameter estimation and secret key generation, without compromising the security.

The security implications of quantum cryptography and quantum computing

- Computer ScienceNetw. Secur.
- 2020

## References

SHOWING 1-10 OF 115 REFERENCES

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

- Computer ScienceNature communications
- 2015

The implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light and is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector.

High-rate measurement-device-independent quantum cryptography

- Computer Science
- 2015

A coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved, is designed and proposed.

Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables

- Computer Science, PhysicsQuantum Inf. Comput.
- 2003

It is shown that quantum key distribution protocols using quantum continuous variables can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob, and supports the idea that coherent state quantum cryptography may be unconditionally secure.

Quantum cryptography: Public key distribution and coin tossing

- Computer ScienceTheor. Comput. Sci.
- 2014

Towards On-Chip Continuous-Variable Quantum Key Distribution

- Computer Science
- 2015

The photonic integration of QKD devices can play a crucial role in this direction by reducing their size and cost by several orders of magnitude.

The security of practical quantum key distribution

- Computer Science
- 2009

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration

- Computer Science
- 2015

This work analyzes symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners.

Field test of a continuous-variable quantum key distribution prototype

- Computer Science
- 2009

A prototype that implements a continuous-variable quantum key distribution protocol based on coherent states and reverse reconciliation, which uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation.

Calibration Attack and Defense in Continuous Variable Quantum Key Distribution

- Physics, Computer Science2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference
- 2007

It is shown that this allows Eve to implement an intercepte resend attack forbiding QKD as soon as the losses are above 3dB, and simple countermeasures are given to this new class of attacks.

Gaussian quantum information

- Physics, Computer Science
- 2012

This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.