A Continuous Variable Quantum Key Distribution Protocol Based on Entanglement Swapping of Quasi-Bell Entangled Coherent States

2014 ◽  
Vol 53 (9) ◽  
pp. 3173-3190 ◽  
Author(s):  
Li Dong ◽  
Jun-Xi Wang ◽  
Xiao-Ming Xiu ◽  
Dan Li ◽  
Ya-Jun Gao ◽  
...  
2012 ◽  
Vol 10 (01) ◽  
pp. 1250004 ◽  
Author(s):  
A. BECIR ◽  
F. A. A. EL-ORANY ◽  
M. R. B. WAHIDDIN

We propose a continuous variable quantum key distribution protocol based on discrete modulation of eight-state coherent states. We present a rigorous security proof against the collective attacks by taking into consideration the realistic lossy and noisy quantum channel, the imperfect detector efficiency, and the detector electronic noise. This protocol shows high tolerance against excess noise and promises to achieve over 100 km distance of optical fiber.


Entropy ◽  
2019 ◽  
Vol 21 (11) ◽  
pp. 1100 ◽  
Author(s):  
Luyu Huang ◽  
Yichen Zhang ◽  
Ziyang Chen ◽  
Song Yu

A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions.


2015 ◽  
Vol 5 (4) ◽  
Author(s):  
Daniel B. S. Soh ◽  
Constantin Brif ◽  
Patrick J. Coles ◽  
Norbert Lütkenhaus ◽  
Ryan M. Camacho ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document