Analysis of imperfections in practical continuous-variable quantum key distribution

P Jouguet, S Kunz-Jacques, E Diamanti… - Physical Review A …, 2012 - APS
As quantum key distribution becomes a mature technology, it appears clearly that some
assumptions made in the security proofs cannot be justified in practical implementations …

Feasibility of continuous-variable quantum key distribution with noisy coherent states

VC Usenko, R Filip - Physical Review A—Atomic, Molecular, and Optical …, 2010 - APS
We address security of the quantum key distribution scheme based on the noisy modulation
of coherent states and investigate how it is robust against noise in the modulation regardless …

Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution

P Jouguet, S Kunz-Jacques, E Diamanti - Physical Review A—Atomic …, 2013 - APS
Establishing an information-theoretic secret key between two parties using a quantum key
distribution (QKD) system is only possible when an accurate characterization of the quantum …

Unambiguous state discrimination in quantum cryptography with weak coherent states

M Dušek, M Jahma, N Lütkenhaus - Physical Review A, 2000 - APS
The use of linearly independent signal states in realistic implementations of quantum key
distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Unconditional security of practical quantum key distribution

H Inamori, N Lütkenhaus, D Mayers - The European Physical Journal D, 2007 - Springer
We present a complete protocol for BB84 quantum key distribution for a realistic setting
(noise, loss, multi-photon signals of the source) that covers many of todays experimental …

Security against individual attacks for realistic quantum key distribution

N Lütkenhaus - Physical Review A, 2000 - APS
I prove the security of quantum key distribution against individual attacks for realistic signals
sources, including weak coherent pulses and down-conversion sources. The proof applies …

Unidimensional continuous-variable quantum key distribution

VC Usenko, F Grosshans - Physical Review A, 2015 - APS
We propose the continuous-variable quantum key distribution protocol based on the
Gaussian modulation of a single quadrature of the coherent states of light, which is aimed to …

Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

N Lütkenhaus, M Jahma - New Journal of Physics, 2002 - iopscience.iop.org
Quantum key distribution can be performed with practical signal sources such as weak
coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can …

Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers

S Fossier, E Diamanti, T Debuisschert… - Journal of Physics B …, 2009 - iopscience.iop.org
Continuous-variable quantum key distribution protocols have been implemented recently,
based on Gaussian modulation of the quadratures of coherent states. A present limitation of …