Continuous‐variable quantum key distribution with Gaussian modulation—the theory of practical implementations
F Laudenbach, C Pacher, CHF Fung… - Advanced Quantum …, 2018 - Wiley Online Library
Quantum key distribution (QKD) using weak coherent states and homodyne detection is a
promising candidate for practical quantum‐cryptographic implementations due to its …
promising candidate for practical quantum‐cryptographic implementations due to its …
Gaussian quantum information
The science of quantum information has arisen over the last two decades centered on the
manipulation of individual quanta of information, known as quantum bits or qubits. Quantum …
manipulation of individual quanta of information, known as quantum bits or qubits. Quantum …
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …
mature technology, already fit for commercialization. It aims at the creation of a secret key …
Distributing secret keys with quantum continuous variables: principle, security and implementations
The ability to distribute secret keys between two parties with information-theoretic security,
that is regardless of the capacities of a malevolent eavesdropper, is one of the most …
that is regardless of the capacities of a malevolent eavesdropper, is one of the most …
Measurement-device-independent quantum secure direct communication
Quantum secure direct communication (QSDC) is a unique technique, which supports the
secure transmission of confidential information directly through a quantum channel without …
secure transmission of confidential information directly through a quantum channel without …
Asymptotic security of continuous-variable quantum key distribution with a discrete modulation
We establish a lower bound on the asymptotic secret key rate of continuous-variable
quantum key distribution with a discrete modulation of coherent states. The bound is valid …
quantum key distribution with a discrete modulation of coherent states. The bound is valid …
Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution
Continuous-variable quantum key distribution (CV QKD) protocols with discrete modulation
are interesting due to their experimental simplicity and their great potential for massive …
are interesting due to their experimental simplicity and their great potential for massive …
Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack
The security proofs of continuous-variable quantum key distribution are based on the
assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's …
assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's …
Finite-size analysis of a continuous-variable quantum key distribution
The goal of this paper is to extend the framework of finite-size analysis recently developed
for quantum key distribution to continuous-variable protocols. We do not solve this problem …
for quantum key distribution to continuous-variable protocols. We do not solve this problem …
Quantum key distribution over with an all-fiber continuous-variable system
We report on the implementation of a reverse-reconciliated coherent-state continuous-
variable quantum key distribution system, with which we generated secret keys at a rate of …
variable quantum key distribution system, with which we generated secret keys at a rate of …