We consider the security of continuous-variable quantum cryptography as we approach the classical limit, i.e., when the unknown preparation noise at the sender's station becomes significantly noisy or thermal (even by as much as 104 times greater than the variance of the vacuum mode). We show that, provided the channel transmission losses do not exceed 50%, the security of quantum cryptography is not dependent on the channel transmission, and is therefore incredibly robust against significant amounts of excess preparation noise. We extend these results to consider for the first time quantum cryptography at wavelengths considerably longer than optical and find that regions of security still exist all the way down to the microwave. © 2010 The...
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) ...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
Quantum physics allows for unconditionally secure communication through insecure communication chann...
We consider the security of continuous-variable quantum cryptography as we approach the classical li...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
Continuous variable (CV) quantum key distribution (QKD) provides a powerful setting for secure quant...
We consider the security of continuous-variable quantum key distribution using thermal (or noisy) Ga...
Security analyses of quantum cryptographic protocols typically rely on certain conditions; one such ...
In this paper we consider a scheme for cryptographic key distribution based on a variation of contin...
In this paper we consider a scheme for cryptographic key distribution based on a variation of contin...
5 pages, 1 figure. In v2 minor rewriting for clarity, references addedInternational audienceWe propo...
Here, we demonstrate that a practical Continuous Variables Quantum Key Distribution (CVQKD) protocol...
Due to a recent influx of attention, the field of quantum information is rapidly progressing towards...
Quantum cryptography has recently been extended to continuous-variable systems, such as the bosonic ...
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) ...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
Quantum physics allows for unconditionally secure communication through insecure communication chann...
We consider the security of continuous-variable quantum cryptography as we approach the classical li...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
Continuous variable (CV) quantum key distribution (QKD) provides a powerful setting for secure quant...
We consider the security of continuous-variable quantum key distribution using thermal (or noisy) Ga...
Security analyses of quantum cryptographic protocols typically rely on certain conditions; one such ...
In this paper we consider a scheme for cryptographic key distribution based on a variation of contin...
In this paper we consider a scheme for cryptographic key distribution based on a variation of contin...
5 pages, 1 figure. In v2 minor rewriting for clarity, references addedInternational audienceWe propo...
Here, we demonstrate that a practical Continuous Variables Quantum Key Distribution (CVQKD) protocol...
Due to a recent influx of attention, the field of quantum information is rapidly progressing towards...
Quantum cryptography has recently been extended to continuous-variable systems, such as the bosonic ...
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) ...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
Quantum physics allows for unconditionally secure communication through insecure communication chann...