Loading…
Continuous‐Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations
Quantum key distribution (QKD) using weak coherent states and homodyne detection is a promising candidate for practical quantum‐cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protoc...
Saved in:
Published in: | Advanced quantum technologies (Online) 2018-08, Vol.1 (1), p.n/a |
---|---|
Main Authors: | , , , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Quantum key distribution (QKD) using weak coherent states and homodyne detection is a promising candidate for practical quantum‐cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protocol, the security analysis of this method is rather involved compared to discrete‐variable QKD. This article reviews the theoretical foundations of continuous‐variable quantum key distribution (CV‐QKD) with Gaussian modulation and rederives the essential relations from scratch in a pedagogical way. The aim of this paper is to be as comprehensive and self‐contained as possible in order to be well intelligible even for readers with little pre‐knowledge on the subject. Although the present article is a theoretical discussion of CV‐QKD, its focus lies on practical implementations, taking into account various kinds of hardware imperfections and suggesting practical methods to perform the security analysis subsequent to the key exchange. Apart from a review of well‐known results, this manuscript presents a set of new original noise models which are helpful to get an estimate of how well a given set of hardware will perform in practice.
This tutorial paper provides an introduction to the mathematical tools and methods used for the security analysis of quantum key distribution with continuous variables (CV‐QKD), a promising contender for widely used implementations of information‐theoretically secure cryptography. The paper particularly pays attention to the influence of inevitable hardware imperfections on the experimental performance. |
---|---|
ISSN: | 2511-9044 2511-9044 |
DOI: | 10.1002/qute.201800011 |