Abstract. In this paper, we consider continuous-variable quantum key distribution with a discrete modulation, either binary or quaternary. We establish the security of these protocols against the class of collective attacks that induce a linear quantum channel. In particular, all Gaussian attacks are taken into account, as well as linear attacks which add a non-Gaussian noise. We give lower bounds for the secret key rate using extremality properties of Gaussian states. ar X i
International audienceWe prove the security of Gaussian continuous-variable quantum key distribution...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
We present here an information theoretic study of Gaussian collective attacks on the continuous vari...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) ...
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key dist...
International audienceWe establish a lower bound on the asymptotic secret key rate of continuous-var...
International audienceWe establish a lower bound on the asymptotic secret key rate of continuous-var...
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states ...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states whi...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states, wh...
We investigate the security against collective attacks of a continuous variable quantum key distribu...
International audienceWe prove the security of Gaussian continuous-variable quantum key distribution...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
We present here an information theoretic study of Gaussian collective attacks on the continuous vari...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) ...
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key dist...
International audienceWe establish a lower bound on the asymptotic secret key rate of continuous-var...
International audienceWe establish a lower bound on the asymptotic secret key rate of continuous-var...
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states ...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states whi...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states, wh...
We investigate the security against collective attacks of a continuous variable quantum key distribu...
International audienceWe prove the security of Gaussian continuous-variable quantum key distribution...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...