Symul, Thomas; Alton, Daniel; Assad, Syed; Lance, Andrew; Weedbrook, C; Ralph, Timothy Cameron; Lam, Ping Koy
In realistic continuous-variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection-based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection-based scheme is still secure against...[Show more]
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.