# Modulation leakage-free continuous-variable quantum key distribution

@inproceedings{Hajomer2022ModulationLC, title={Modulation leakage-free continuous-variable quantum key distribution}, author={Adnan A. E. Hajomer and Nitin Jain and Hossein Mani and Hou-Man Chin and Ulirk L. Andersen and Tobias Gehrin}, year={2022} }

Distributing cryptographic keys over public channels in a way that can provide information-theoretic security is the holy grail for secure communication. This can be achieved by exploiting quantum me-chanical principles in so-called quantum key distribution (QKD). Continuous-variable (CV) QKD based on coherent states, in particular, is an attractive scheme for secure communication since it requires only standard telecommunication technology that can operate at room temperature. However, a…

## References

SHOWING 1-10 OF 36 REFERENCES

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

- Computer ScienceNature communications
- 2015

The implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light and is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector.

Modulation leakage vulnerability in continuous-variable quantum key distribution

- Computer ScienceQuantum Science and Technology
- 2021

It is shown that the leakage reduces the range over which secret key can be obtained, and can even lead to a security breach, if disregarded, in a system that uses an optical in-phase and quadrature modulator to implement a single sideband encoding scheme.

Continuous-variable quantum key distribution with a leakage from state preparation

- Physics, Computer Science
- 2017

It is demonstrated that coherent-state protocol is immune to side-channel signal state leakage prior to modulation, while the squeezed- state protocol is vulnerable to such attacks, becoming more sensitive to the noise in the channel.

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

- Computer Science, Physics
- 2013

A wavelength attack is proposed which can allow the eavesdropper to control the intensity transmission of Bob’s beam splitter by switching the wavelength of the input light and renders all of the final key shared between legitimate parties insecure, even if they have monitored the intensity of the local oscillator.

Preventing Calibration Attacks on the Local Oscillator in Continuous-Variable Quantum Key Distribution

- Computer Science, Physics
- 2013

This work proposes and provides experimental evidence of an attack targeting the local oscillator calibration routine of a continuous-variable QKD system and describes the loophole, which can be used to perform successfully an intercept-resend attack.

The security of practical quantum key distribution

- Computer Science
- 2009

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

- Computer Science, MathematicsNature communications
- 2011

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

Continuous variable quantum cryptography using coherent states.

- Physics, Computer SciencePhysical review letters
- 2002

We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against…

Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

- Computer Science
- 2016

A saturation model that matches experimental measurements on the homodyne detection is proposed and used to study the impact of the saturation attack on parameter estimation in CVQKD and it is demonstrated that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter.

Long-Distance Continuous-Variable Quantum Key Distribution over 202.81 km of Fiber.

- PhysicsPhysical review letters
- 2020

This record-breaking implementation of the continuous-variable quantum key distribution doubles the previous distance record and shows the road for long-distance and large-scale secure quantum key Distribution using room-temperature standard telecom components.