9
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Floodlight quantum key distribution: Demonstrating a framework for high-rate secure communication

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references31

          • Record: found
          • Abstract: not found
          • Article: not found

          Design of capacity-approaching irregular low-density parity-check codes

            Bookmark
            • Record: found
            • Abstract: found
            • Article: found
            Is Open Access

            Quantum key distribution using gaussian-modulated coherent states

            , , (2003)
            Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.
              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Security of quantum key distribution using d-level systems

              , , (2001)
              We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all the d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.
                Bookmark

                Author and article information

                Journal
                PLRAAN
                Physical Review A
                Phys. Rev. A
                American Physical Society (APS)
                2469-9926
                2469-9934
                January 2017
                January 26 2017
                : 95
                : 1
                Article
                10.1103/PhysRevA.95.012332
                f0415dee-1206-4af0-b906-20b201629005
                © 2017

                http://link.aps.org/licenses/aps-default-license

                http://link.aps.org/licenses/aps-default-accepted-manuscript-license

                History

                Comments

                Comment on this article