Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Security of Post-Selection Based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Added Noise

Open Access Open Access

Abstract

In realistic continuous variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection based scheme is still secure against both individual and collective Gaussian attacks in the presence of this excess noise. Article not available.

© 2007 Optical Society of America


More Like This
Security of Post-Selection based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Added Noise

Thomas Symul, Daniel J. Alton, Syed M. Assad, Andrew M. Lance, Christian Weedbrook, Timothy C. Ralph, and Ping Koy Lam
QWE6 Quantum-Atom Optics Downunder (QAO) 2007

Unconditional security of Gaussian post-selected continuous variable quantum key distribution

N. Walk, T. Symul, P.K. Lam, and T.C. Ralph
IB_5_4 International Quantum Electronics Conference (IQEC) 2013

Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks

Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.