Inviting an author to review:
Find an author and click ‘Invite to review selected article’ near their name.
Search for authorsSearch for similar articles
1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Analysis of imperfections in practical continuous-variable quantum key distribution

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references25

          • Record: found
          • Abstract: not found
          • Article: not found

          The security of practical quantum key distribution

            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Quantum key distribution using gaussian-modulated coherent states

            Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Hacking commercial quantum cryptography systems by tailored bright illumination

                Bookmark

                Author and article information

                Journal
                PLRAAN
                Physical Review A
                Phys. Rev. A
                American Physical Society (APS)
                1050-2947
                1094-1622
                September 2012
                September 10 2012
                : 86
                : 3
                Article
                10.1103/PhysRevA.86.032309
                caea6285-fcae-4c43-b817-9fea42387b20
                © 2012

                http://link.aps.org/licenses/aps-default-license

                History

                Comments

                Comment on this article