Loading…

Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations

Quantum key distribution (QKD) using weak coherent states and homodyne detection is a promising candidate for practical quantum‐cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protoc...

Full description

Saved in:
Bibliographic Details
Published in:Advanced quantum technologies (Online) 2018-08, Vol.1 (1), p.n/a
Main Authors: Laudenbach, Fabian, Pacher, Christoph, Fung, Chi‐Hang Fred, Poppe, Andreas, Peev, Momtchil, Schrenk, Bernhard, Hentschel, Michael, Walther, Philip, Hübel, Hannes
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Quantum key distribution (QKD) using weak coherent states and homodyne detection is a promising candidate for practical quantum‐cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protocol, the security analysis of this method is rather involved compared to discrete‐variable QKD. This article reviews the theoretical foundations of continuous‐variable quantum key distribution (CV‐QKD) with Gaussian modulation and rederives the essential relations from scratch in a pedagogical way. The aim of this paper is to be as comprehensive and self‐contained as possible in order to be well intelligible even for readers with little pre‐knowledge on the subject. Although the present article is a theoretical discussion of CV‐QKD, its focus lies on practical implementations, taking into account various kinds of hardware imperfections and suggesting practical methods to perform the security analysis subsequent to the key exchange. Apart from a review of well‐known results, this manuscript presents a set of new original noise models which are helpful to get an estimate of how well a given set of hardware will perform in practice. This tutorial paper provides an introduction to the mathematical tools and methods used for the security analysis of quantum key distribution with continuous variables (CV‐QKD), a promising contender for widely used implementations of information‐theoretically secure cryptography. The paper particularly pays attention to the influence of inevitable hardware imperfections on the experimental performance.
ISSN:2511-9044
2511-9044
DOI:10.1002/qute.201800011