Two-way quantum cryptography with continuous variables: unconditional security and performances at different wavelengths

Author(s):  
Carlo Ottaviani ◽  
Stefano Pirandola
2015 ◽  
Vol 9 (12) ◽  
pp. 772-773 ◽  
Author(s):  
Feihu Xu ◽  
Marcos Curty ◽  
Bing Qi ◽  
Li Qian ◽  
Hoi-Kwong Lo

2015 ◽  
Vol 9 (12) ◽  
pp. 773-775 ◽  
Author(s):  
Stefano Pirandola ◽  
Carlo Ottaviani ◽  
Gaetana Spedalieri ◽  
Christian Weedbrook ◽  
Samuel L. Braunstein ◽  
...  

2002 ◽  
Vol 65 (3) ◽  
Author(s):  
Patrick Navez ◽  
Alessandra Gatti ◽  
Luigi A. Lugiato

2002 ◽  
Vol 2 (6) ◽  
pp. 434-442
Author(s):  
J. Larsson

Quantum Cryptography, or more accurately, Quantum Key Distribution (QKD) is based on using an unconditionally secure ``quantum channel'' to share a secret key among two users. A manufacturer of QKD devices could, intentionally or not, use a (semi-)classical channel instead of the quantum channel, which would remove the supposedly unconditional security. One example is the BB84 protocol, where the quantum channel can be implemented in polarization of single photons. Here, use of several photons instead of one to encode each bit of the key provides a similar but insecure system. For protocols based on violation of a Bell inequality (e.g., the Ekert protocol) the situation is somewhat different. While the possibility is mentioned by some authors, it is generally thought that an implementation of a (semi-)classical channel will differ significantly from that of a quantum channel. Here, a counterexample will be given using an identical physical setup as is used in photon-polarization Ekert QKD. Since the physical implementation is identical, a manufacturer may include this modification as a Trojan Horse in manufactured systems, to be activated at will by an eavesdropper. Thus, the old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device. Even when you do violate the Bell inequality.


2006 ◽  
Vol 6 (4&5) ◽  
pp. 326-335
Author(s):  
M. Legré ◽  
H. Zbinden ◽  
N. Gisin

We demonstrate an implementation of quantum key distribution with continuous variables based on a go-&-return configuration over distances up to 14km. This configuration leads to self-compensation of polarisation and phase fluctuations. We observe a high degree of stability of our set-up over many hours.


2014 ◽  
Vol 90 (4) ◽  
Author(s):  
Kevin Marshall ◽  
Christian Weedbrook

Sign in / Sign up

Export Citation Format

Share Document