Noiseless amplification or attenuation are two heralded filtering operations that enable amplifying or de-amplifying a quantum state of light with no added noise, at the cost of a small success probability. We show that inserting such noiseless operations in a transmission line improves the performances of continuous-variable quantum key distribution over this line. Remarkably, these noiseless operations do not need to be physically implemented but can simply be simulated in the classical data postprocessing stage. Hence, virtual noiseless amplification or attenuation amounts to performing a Gaussian postselection, which enhances the secure range or tolerable excess noise while keeping the benefits of Gaussian security proofs. © 2012 Americ...
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigate...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states, wh...
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variab...
In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne de...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
In realistic continuous-variable quantum key distribution protocols, an eavesdropper may exploit the...
We present a protocol based on continuous-variable quantum teleportation and Gaussian postselection ...
We propose a modified no-switching continuous-variable quantum key distribution protocol by employin...
Photon subtraction can enhance the performance of continuous-variable quantum key distribution (CV Q...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
Source noise affects the security of continuous-variable quantum key distribution (CV QKD) and is di...
We show that the maximum transmission distance of continuous-variable quantum key distribution in pr...
By employing a nondeterministic noiseless linear amplifier, we propose to increase the maximum trans...
We extend the security analysis of continuous variable quantum-key-distribution protocols using a fa...
In this work we present a quantum key distribution protocol using continuous-variable non-Gaussian s...
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigate...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states, wh...
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variab...
In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne de...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
In realistic continuous-variable quantum key distribution protocols, an eavesdropper may exploit the...
We present a protocol based on continuous-variable quantum teleportation and Gaussian postselection ...
We propose a modified no-switching continuous-variable quantum key distribution protocol by employin...
Photon subtraction can enhance the performance of continuous-variable quantum key distribution (CV Q...
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne dete...
Source noise affects the security of continuous-variable quantum key distribution (CV QKD) and is di...
We show that the maximum transmission distance of continuous-variable quantum key distribution in pr...
By employing a nondeterministic noiseless linear amplifier, we propose to increase the maximum trans...
We extend the security analysis of continuous variable quantum-key-distribution protocols using a fa...
In this work we present a quantum key distribution protocol using continuous-variable non-Gaussian s...
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigate...
Quantum key distribution is a technique in which secret key bits are encoded into quantum states, wh...
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variab...