Secret key distillation across a quantum wiretap channel under restricted eavesdropping
@article{Pan2019SecretKD, title={Secret key distillation across a quantum wiretap channel under restricted eavesdropping}, author={Z. Pan and Kaushik P. Seshadreesan and William Clark and Mark R. Adcock and I. Djordjevic and J. Shapiro and S. Guha}, journal={ArXiv}, year={2019}, volume={abs/1903.03136} }
The theory of quantum cryptography aims to guarantee unconditional information-theoretic security against an omnipotent eavesdropper. In many practical scenarios, however, the assumption of an all-powerful adversary is excessive and can be relaxed considerably. In this paper we study secret key distillation across a lossy and noisy quantum wiretap channel between Alice and Bob, with a separately parameterized realistically lossy quantum channel to the eavesdropper Eve. We show that under such… Expand
Figures, Tables, and Topics from this paper
10 Citations
Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping
- Computer Science
- 2019 IEEE International Symposium on Information Theory (ISIT)
- 2019
- 7
- PDF
Secret key distillation over realistic satellite-to-satellite free-space channel: exclusion zone analysis
- Computer Science, Mathematics
- ArXiv
- 2020
- 1
- PDF
Quantum Keyless Privacy vs. Quantum Key Distribution for Space Links
- Computer Science, Physics
- ArXiv
- 2020
- PDF
Secret key distillation over satellite-to-satellite free-space optics channel with a limited-sized aperture eavesdropper in the same plane of the legitimate receiver
- Computer Science, Mathematics
- Optics express
- 2020
- 1
- PDF
Secret Key Distillation over Satellite-to-satellite Free-space Optics Channel with Eavesdropper Dynamic Positioning
- Computer Science, Mathematics
- ArXiv
- 2020
- PDF
Security of Satellite-Based CV-QKD under Realistic Assumptions
- Computer Science
- 2020 22nd International Conference on Transparent Optical Networks (ICTON)
- 2020
- 5
Optimized-Eight-State CV-QKD Protocol Outperforming Gaussian Modulation Based Protocols
- Physics
- IEEE Photonics Journal
- 2019
- 4
- PDF
References
SHOWING 1-10 OF 31 REFERENCES
Optimal realistic attacks in continuous-variable quantum key distribution
- Mathematics, Physics
- 2018
- 7
- PDF
Distillation of secret key and entanglement from quantum states
- Mathematics, Physics
- Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences
- 2005
- 479
- Highly Influential
- PDF
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
- Computer Science, Mathematics
- Entropy
- 2015
- 173
- PDF
Fundamental limits of repeaterless quantum communications
- Physics, Medicine
- Nature communications
- 2017
- 474
- Highly Influential
- PDF
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables
- Computer Science, Mathematics
- Quantum Inf. Comput.
- 2003
- 169
- PDF
Unconstrained Capacities of Quantum Key Distribution and Entanglement Distillation for Pure-Loss Bosonic Broadcast Channels.
- Computer Science, Physics
- Physical review letters
- 2017
- 15
- PDF
Unconstrained distillation capacities of a pure-loss bosonic broadcast channel
- Mathematics, Physics
- 2016 IEEE International Symposium on Information Theory (ISIT)
- 2016
- 13
- PDF
Converse Bounds for Private Communication Over Quantum Channels
- Computer Science, Mathematics
- IEEE Transactions on Information Theory
- 2017
- 101
- PDF