Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Continuous Variable Quantum Key Distribution: Security, Repeaters and Relativity

Not Accessible

Your library or personal account may give you access

Abstract

We prove security of a continuous variable quantum key distribution protocol using post selection against non-Gaussian eavesdropper attacks. We discuss CV repeater protocols based on noiseless amplification. We analyze CV QKD between non-inertial, relativistic observers.

© 2011 Optical Society of America

PDF Article
More Like This
Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks

Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011

Unconditional security of Gaussian post-selected continuous variable quantum key distribution

N. Walk, T. Symul, P.K. Lam, and T.C. Ralph
IB_5_4 International Quantum Electronics Conference (IQEC) 2013

Security of Post-Selection based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Added Noise

Thomas Symul, Daniel J. Alton, Syed M. Assad, Andrew M. Lance, Christian Weedbrook, Timothy C. Ralph, and Ping Koy Lam
QWE6 Quantum-Atom Optics Downunder (QAO) 2007

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved