We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et. al. [quant-ph/0402131] to obtain unconditionally secure rates for these protocols
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states whi...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
Abstract. In this paper, we consider continuous-variable quantum key distribution with a discrete mo...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We investigate the security against collective attacks of a continuous variable quantum key distribu...
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) ...
This thesis deals with a detailed study of the unconditional security of Continuous-Variable (CV) Q...
International audienceEstablishing the security of continuous-variable quantum key distribution agai...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states, wh...
A fully general approach to the security analysis of continuous-variable quantum key distribution (C...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
An intercept-resend attack on a continuous-variable quantum key distribution protocol is investigate...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states whi...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
Abstract. In this paper, we consider continuous-variable quantum key distribution with a discrete mo...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum k...
We investigate the security against collective attacks of a continuous variable quantum key distribu...
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) ...
This thesis deals with a detailed study of the unconditional security of Continuous-Variable (CV) Q...
International audienceEstablishing the security of continuous-variable quantum key distribution agai...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states, wh...
A fully general approach to the security analysis of continuous-variable quantum key distribution (C...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
An intercept-resend attack on a continuous-variable quantum key distribution protocol is investigate...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states whi...
6 pages, 5 figuresInternational audienceWe propose the continuous-variable quantum key distribution ...