DeepAI AI Chat
Log In Sign Up

Performance analysis of continuous-variable quantum key distribution using non-Gaussian states

12/19/2021
by   L. S. Aguiar, et al.
University of Campinas
0

In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states, the coherent states having one photon added and then one photon subtracted (PASCS). We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol with Gaussian modulation, which in turn is unconditionally secure. Our results for a four-state protocol show that the PASCS always outperforms the equivalent coherent states protocol under the same environmental conditions. Interestingly, we find that for the protocol using discrete-modulated PASCS, the noisier the line, the better will be its performance compared to the protocol using coherent states. Thus, our proposal proves to be advantageous for performing quantum key distribution in non-ideal situations.

READ FULL TEXT

page 1

page 2

page 3

page 4

10/09/2019

Second-order coding rates for key distillation in quantum key distribution

The security of quantum key distribution has traditionally been analyzed...
11/10/2022

Probabilistic amplitude shaping for continuous-variable quantum key distribution with discrete modulation

To achieve the maximum information transfer and face a possible eavesdro...
02/15/2023

Quantum Public Key Distribution using Randomized Glauber States

State-of-the-art Quantum Key Distribution (QKD) is based on the uncertai...
01/24/2022

Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution

Continuous-variable quantum key distribution (CV QKD) with discrete modu...
08/02/2019

Continuous-Variable Quantum Key Distribution with a Real Local Oscillator and without Auxiliary Signals

Continuous-variable quantum key distribution (CV-QKD) is realized with c...
11/27/2017

Composable Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

Quantum Cryptography uses the counter-intuitive properties of Quantum Me...