A continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol using squeezed states is proposed where the two legitimate partners send Gaussian-modulated squeezed states to an untrusted third party to realize the measurement. Security analysis shows that the protocol can not only defend all detector side channels, but also attain higher secret key rates than the coherent-state-based protocol. We also present a method to improve the squeezed-state CV-MDI QKD protocol by adding proper Gaussian noise to the reconciliation side. It is found that there is an optimal added noise to optimize the performance of the protocol in terms of both key rates and maximal transmission distances. The resulting protocol sh...
One crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In all known ...
The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, ...
Quantum key distribution enables two remote parties to grow a shared key, which they can use for unc...
We propose a continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD...
Continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) allows remo...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to ...
We present a rigorous security analysis of continuous-variable measurement-device-independent quantu...
The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in pr...
A continuous variable ping-pong scheme, which is utilized to generate deterministically private key,...
Quantum key distribution (QKD) is fundamentally different from most classical key distribution schem...
We prove the secret key rate formulas and derive security threshold parameters of multicarrier conti...
Quantum continuous variables are being explored as an alternative means to implement quantum key dis...
5 pages, 1 figure. In v2 minor rewriting for clarity, references addedInternational audienceWe propo...
One crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In all known ...
The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, ...
Quantum key distribution enables two remote parties to grow a shared key, which they can use for unc...
We propose a continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD...
Continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) allows remo...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to ...
We present a rigorous security analysis of continuous-variable measurement-device-independent quantu...
The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in pr...
A continuous variable ping-pong scheme, which is utilized to generate deterministically private key,...
Quantum key distribution (QKD) is fundamentally different from most classical key distribution schem...
We prove the secret key rate formulas and derive security threshold parameters of multicarrier conti...
Quantum continuous variables are being explored as an alternative means to implement quantum key dis...
5 pages, 1 figure. In v2 minor rewriting for clarity, references addedInternational audienceWe propo...
One crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In all known ...
The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, ...
Quantum key distribution enables two remote parties to grow a shared key, which they can use for unc...