Skip navigation
Skip navigation

Security of continuous-variable quantum cryptography with Gaussian postselection

Walk, N; Ralph, Timothy Cameron; Symul, Thomas; Lam, Ping Koy

Description

We extend the security analysis of continuous variable quantum-key- distribution protocols using a family of post selection schemes to account for arbitrary eavesdropping attacks. We show that the postselection protocol is equivalent to a virtual entanglement-based protocol including a distillation stage. We introduce a particular 'Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally, we explicitly evaluate the...[Show more]

dc.contributor.authorWalk, N
dc.contributor.authorRalph, Timothy Cameron
dc.contributor.authorSymul, Thomas
dc.contributor.authorLam, Ping Koy
dc.date.accessioned2015-12-13T22:17:08Z
dc.identifier.issn1050-2947
dc.identifier.urihttp://hdl.handle.net/1885/71002
dc.description.abstractWe extend the security analysis of continuous variable quantum-key- distribution protocols using a family of post selection schemes to account for arbitrary eavesdropping attacks. We show that the postselection protocol is equivalent to a virtual entanglement-based protocol including a distillation stage. We introduce a particular 'Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally, we explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length and find improvements over all pre-existing continuous variable protocols in realistic regimes.
dc.publisherAmerican Physical Society
dc.rightsAuthor/s retain copyright
dc.sourcePhysical Review A: Atomic, Molecular and Optical Physics
dc.subjectKeywords: Continuous variables; Eavesdropping attacks; Gaussian channels; Gaussians; Key lengths; Quantum-key- distribution protocol; Security analysis; Selection scheme; Distillation; Quantum cryptography; Security systems; Telecommunication; Gaussian distribution
dc.titleSecurity of continuous-variable quantum cryptography with Gaussian postselection
dc.typeJournal article
local.description.notesImported from ARIES
local.identifier.citationvolume87
dc.date.issued2013
local.identifier.absfor020500 - OPTICAL PHYSICS
local.identifier.ariespublicationf5625xPUB2509
local.type.statusPublished Version
local.contributor.affiliationWalk, N, University of Queensland
local.contributor.affiliationRalph, Timothy Cameron, University of Queensland
local.contributor.affiliationSymul, Thomas, College of Physical and Mathematical Sciences, ANU
local.contributor.affiliationLam, Ping Koy, College of Physical and Mathematical Sciences, ANU
local.bibliographicCitation.issue2
local.bibliographicCitation.startpage1
local.bibliographicCitation.lastpage4
local.identifier.doi10.1103/PhysRevA.87.020303
dc.date.updated2016-02-24T08:59:38Z
local.identifier.scopusID2-s2.0-84874518934
local.identifier.thomsonID000315268400001
dcterms.accessRightsOpen Access
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_Walk_Security_of_2013.pdf119.19 kBAdobe PDF


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator