Security of continuous-variable quantum cryptography with Gaussian postselection
-
Altmetric Citations
Walk, N; Ralph, Timothy Cameron; Symul, Thomas; Lam, Ping Koy
Description
We extend the security analysis of continuous variable quantum-key- distribution protocols using a family of post selection schemes to account for arbitrary eavesdropping attacks. We show that the postselection protocol is equivalent to a virtual entanglement-based protocol including a distillation stage. We introduce a particular 'Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally, we explicitly evaluate the...[Show more]
dc.contributor.author | Walk, N | |
---|---|---|
dc.contributor.author | Ralph, Timothy Cameron | |
dc.contributor.author | Symul, Thomas | |
dc.contributor.author | Lam, Ping Koy | |
dc.date.accessioned | 2015-12-13T22:17:08Z | |
dc.identifier.issn | 1050-2947 | |
dc.identifier.uri | http://hdl.handle.net/1885/71002 | |
dc.description.abstract | We extend the security analysis of continuous variable quantum-key- distribution protocols using a family of post selection schemes to account for arbitrary eavesdropping attacks. We show that the postselection protocol is equivalent to a virtual entanglement-based protocol including a distillation stage. We introduce a particular 'Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally, we explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length and find improvements over all pre-existing continuous variable protocols in realistic regimes. | |
dc.publisher | American Physical Society | |
dc.rights | Author/s retain copyright | |
dc.source | Physical Review A: Atomic, Molecular and Optical Physics | |
dc.subject | Keywords: Continuous variables; Eavesdropping attacks; Gaussian channels; Gaussians; Key lengths; Quantum-key- distribution protocol; Security analysis; Selection scheme; Distillation; Quantum cryptography; Security systems; Telecommunication; Gaussian distribution | |
dc.title | Security of continuous-variable quantum cryptography with Gaussian postselection | |
dc.type | Journal article | |
local.description.notes | Imported from ARIES | |
local.identifier.citationvolume | 87 | |
dc.date.issued | 2013 | |
local.identifier.absfor | 020500 - OPTICAL PHYSICS | |
local.identifier.ariespublication | f5625xPUB2509 | |
local.type.status | Published Version | |
local.contributor.affiliation | Walk, N, University of Queensland | |
local.contributor.affiliation | Ralph, Timothy Cameron, University of Queensland | |
local.contributor.affiliation | Symul, Thomas, College of Physical and Mathematical Sciences, ANU | |
local.contributor.affiliation | Lam, Ping Koy, College of Physical and Mathematical Sciences, ANU | |
local.bibliographicCitation.issue | 2 | |
local.bibliographicCitation.startpage | 1 | |
local.bibliographicCitation.lastpage | 4 | |
local.identifier.doi | 10.1103/PhysRevA.87.020303 | |
dc.date.updated | 2016-02-24T08:59:38Z | |
local.identifier.scopusID | 2-s2.0-84874518934 | |
local.identifier.thomsonID | 000315268400001 | |
dcterms.accessRights | Open Access | |
Collections | ANU Research Publications |
Download
File | Description | Size | Format | Image |
---|---|---|---|---|
01_Walk_Security_of_2013.pdf | 119.19 kB | Adobe PDF |
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.
Updated: 17 November 2022/ Responsible Officer: University Librarian/ Page Contact: Library Systems & Web Coordinator