Analysis of imperfections in practical continuous-variable quantum key distribution

161Citations
Citations of this article
71Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As quantum key distribution becomes a mature technology, it appears clearly that some assumptions made in the security proofs cannot be justified in practical implementations. This might open the door to possible side-channel attacks. We examine several discrepancies between theoretical models and experimental setups in the case of continuous-variable quantum key distribution. We study in particular the impact of an imperfect modulation on the security of Gaussian protocols and show that approximating the theoretical Gaussian modulation with a discrete one is sufficient in practice. We also address the issue of properly calibrating the detection setup and in particular the value of the shot noise. Finally, we consider the influence of phase noise in the preparation stage of the protocol and argue that taking this noise into account can improve the secret key rate because this source of noise is not controlled by the eavesdropper. © 2012 American Physical Society.

Cite

CITATION STYLE

APA

Jouguet, P., Kunz-Jacques, S., Diamanti, E., & Leverrier, A. (2012). Analysis of imperfections in practical continuous-variable quantum key distribution. Physical Review A - Atomic, Molecular, and Optical Physics, 86(3). https://doi.org/10.1103/PhysRevA.86.032309

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free