Performance analysis of continuous-variable quantum key distribution using non-Gaussian states

12/19/2021
by   L. S. Aguiar, et al.
0

In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states, the coherent states having one photon added and then one photon subtracted (PASCS). We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol with Gaussian modulation, which in turn is unconditionally secure. Our results for a four-state protocol show that the PASCS always outperforms the equivalent coherent states protocol under the same environmental conditions. Interestingly, we find that for the protocol using discrete-modulated PASCS, the noisier the line, the better will be its performance compared to the protocol using coherent states. Thus, our proposal proves to be advantageous for performing quantum key distribution in non-ideal situations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/09/2019

Second-order coding rates for key distillation in quantum key distribution

The security of quantum key distribution has traditionally been analyzed...
research
11/10/2022

Probabilistic amplitude shaping for continuous-variable quantum key distribution with discrete modulation

To achieve the maximum information transfer and face a possible eavesdro...
research
02/15/2023

Quantum Public Key Distribution using Randomized Glauber States

State-of-the-art Quantum Key Distribution (QKD) is based on the uncertai...
research
01/24/2022

Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution

Continuous-variable quantum key distribution (CV QKD) with discrete modu...
research
08/02/2019

Continuous-Variable Quantum Key Distribution with a Real Local Oscillator and without Auxiliary Signals

Continuous-variable quantum key distribution (CV-QKD) is realized with c...
research
11/27/2017

Composable Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

Quantum Cryptography uses the counter-intuitive properties of Quantum Me...
research
10/25/2019

Intercept-Resend Emulation Attacks Against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys

Optical physical unclonable keys are currently considered to be rather p...

Please sign up or login with your details

Forgot password? Click here to reset