This thesis deals with a detailed study of the unconditional security of Continuous-Variable (CV) Quantum Key Distribution (QKD). We consider general communication architectures based on both point-to-point and end-to-end principle. For the first case we develop an extensive analysis of the unconditional security of both one-way and two-way protocol under several eavesdropping conditions. We describe an effective post-processing strategy, to apply to one-way communications, that allows to neutralise general coherent attacks. This result motivates us to formulate the conjecture that the "de Finettization" of the classical data, typically adopted in the asymptotic limit of many signals exchanged in order to reduce the attacks from...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
International audienceThe ability to distribute secret keys between two parties with information-the...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
We consider two-way continuous-variable quantum key distribution, studying its security against gene...
We consider two-way continuous-variable quantum key distribution, studying its security against gene...
The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, ...
A fully general approach to the security analysis of continuous-variable quantum key distribution (C...
We present here an information theoretic study of Gaussian collective attacks on the continuous vari...
International audienceWe present a general framework encompassing a number of continuous-variable qu...
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states ...
International audienceWe prove the security of Gaussian continuous-variable quantum key distribution...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
This thesis is concerned with the study and analysis of two quantum cryptographic protocols: quantum...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
International audienceThe ability to distribute secret keys between two parties with information-the...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
We consider two-way continuous-variable quantum key distribution, studying its security against gene...
We consider two-way continuous-variable quantum key distribution, studying its security against gene...
The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, ...
A fully general approach to the security analysis of continuous-variable quantum key distribution (C...
We present here an information theoretic study of Gaussian collective attacks on the continuous vari...
International audienceWe present a general framework encompassing a number of continuous-variable qu...
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states ...
International audienceWe prove the security of Gaussian continuous-variable quantum key distribution...
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of cw li...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
The ability to distribute secret keys between two parties with information-theoretic security, that ...
This thesis is concerned with the study and analysis of two quantum cryptographic protocols: quantum...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...
International audienceThe ability to distribute secret keys between two parties with information-the...
We provide a security analysis for continuous variable quantum key distribution protocols based on t...