Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

@article{Diamanti2015DistributingSK,
  title={Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations},
  author={Eleni Diamanti and Anthony Leverrier},
  journal={Entropy},
  year={2015},
  volume={17},
  pages={6072-6092}
}
The ability to distribute secret keys between two parties with information-theoretic security, that is regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far-reaching implications in high-security applications. Today, quantum key distribution systems operate in… 

Figures and Tables from this paper

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
TLDR
The implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light and is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector.
Quantum communication with coherent states of light
TLDR
Recent developments in quantum key distribution (QKD) are reviewed in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKd for bridging long distances by building upon existing optical satellite links.
Quantum Information Protocols with Gaussian States of Light
TLDR
This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource of Gaussian states, and introduces the idea of measurement device independence for continuous variable states and presents a proof-of-principle implementation of this protocol.
Security proof of continuous-variable quantum key distribution using three coherent states
TLDR
A thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate is presented and this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing.
User-defined quantum key distribution
TLDR
A protocol design framework that allows one to securely construct the protocol using arbitrary non-orthogonal states, which solves the security challenge of discrete-modulated coherent states, but also achieves high performance with no more than 256 coherent states.
Advances in Quantum Cryptography
TLDR
This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Discrete-variable quantum key distribution with homodyne detection
TLDR
The proposed protocol has two highly practical features: it does not require the honest parties to share the same reference phase (as required in CV-QKD) and the selection of decoding basis can be performed after measurement, and it is proved the security of the proposed protocol in the asymptotic limit under the assumption of collective attacks.
Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources
TLDR
This paper provides simple security proofs for continuous variable quantum key distribution systems with intensity fluctuating sources that are simple to implement without any hardware adjustment and able to provide secure secret keys in the finite-size scenario.
Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution.
TLDR
This work shows that continuous-variable QKD is not subject to this constraint as the whole raw keys can be used for both parameter estimation and secret key generation, without compromising the security.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 115 REFERENCES
Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
TLDR
The implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light and is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector.
High-rate measurement-device-independent quantum cryptography
TLDR
A coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved, is designed and proposed.
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables
TLDR
It is shown that quantum key distribution protocols using quantum continuous variables can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob, and supports the idea that coherent state quantum cryptography may be unconditionally secure.
Quantum cryptography: Public key distribution and coin tossing
Towards On-Chip Continuous-Variable Quantum Key Distribution
TLDR
The photonic integration of QKD devices can play a crucial role in this direction by reducing their size and cost by several orders of magnitude.
The security of practical quantum key distribution
TLDR
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration
TLDR
This work analyzes symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners.
Field test of a continuous-variable quantum key distribution prototype
TLDR
A prototype that implements a continuous-variable quantum key distribution protocol based on coherent states and reverse reconciliation, which uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation.
Calibration Attack and Defense in Continuous Variable Quantum Key Distribution
  • A. Ferenczi, P. Grangier, F. Grosshans
  • Physics, Computer Science
    2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference
  • 2007
TLDR
It is shown that this allows Eve to implement an intercepte resend attack forbiding QKD as soon as the losses are above 3dB, and simple countermeasures are given to this new class of attacks.
Gaussian quantum information
TLDR
This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.
...
1
2
3
4
5
...