Security proof of continuous-variable quantum key distribution using three coherent states

K Brádler, C Weedbrook - Physical Review A, 2018 - APS
We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security
proof based on three coherent states and homodyne detection. Previous work had …

Second-order coding rates for key distillation in quantum key distribution

S Khatri, E Kaur, S Guha, MM Wilde - arXiv preprint arXiv:1910.03883, 2019 - arxiv.org
The security of quantum key distribution has traditionally been analyzed in either the
asymptotic or non-asymptotic regimes. In this paper, we provide a bridge between these two …

Optimal realistic attacks in continuous-variable quantum key distribution

N Hosseinidehaj, N Walk, TC Ralph - Physical Review A, 2019 - APS
Quantum cryptographic protocols are typically analyzed by assuming that potential
opponents can carry out all physical operations, an assumption which grants capabilities far …

Collective Attacks and Unconditional Security in Continuous Variable Quantum<? format?> Key Distribution

F Grosshans - Physical review letters, 2005 - APS
We present here an information theoretic study of Gaussian collective attacks on the
continuous variable key distribution protocols based on Gaussian modulation of coherent …

Tight bound on the coherent-state quantum key distribution with heterodyne detection

J Lodewyck, P Grangier - Physical Review A—Atomic, Molecular, and Optical …, 2007 - APS
We propose an upper bound for the eavesdropper's information in the direct and reverse
reconciliated coherent states quantum key distribution protocols with heterodyne detection …

Multidimensional reconciliation for a continuous-variable quantum key distribution

A Leverrier, R Alléaume, J Boutros, G Zémor… - Physical Review A …, 2008 - APS
We propose a method for extracting an errorless secret key in a continuous-variable
quantum key distribution protocol, which is based on Gaussian modulation of coherent …

Security of continuous-variable quantum cryptography with Gaussian postselection

N Walk, TC Ralph, T Symul, PK Lam - Physical Review A—Atomic, Molecular …, 2013 - APS
We extend the security analysis of continuous variable quantum-key-distribution protocols
using a family of post selection schemes to account for arbitrary eavesdropping attacks. We …

Security of quantum key distribution with coherent states and homodyne detection

S Iblisdir, G Van Assche, NJ Cerf - Physical review letters, 2004 - APS
We assess the security of a quantum key distribution protocol relying on the transmission of
Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be …

Feasibility of continuous-variable quantum key distribution with noisy coherent states

VC Usenko, R Filip - Physical Review A—Atomic, Molecular, and Optical …, 2010 - APS
We address security of the quantum key distribution scheme based on the noisy modulation
of coherent states and investigate how it is robust against noise in the modulation regardless …

Asymptotic security of discrete-modulation protocols for continuous-variable quantum key distribution

E Kaur, S Guha, MM Wilde - Physical Review A, 2021 - APS
We consider discrete-modulation protocols for continuous-variable quantum key distribution
(CV-QKD) that employ a modulation constellation consisting of a finite number of coherent …