Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks

Not Accessible

Your library or personal account may give you access

Abstract

We analyse the security and performance of a continuous variable quantum key distribution protocol using post selection, deriving results that are unconditionally secure in the sense of no longer restricting the eavesdroppers attack.

© 2011 Optical Society of America

PDF Article
More Like This
Continuous Variable Quantum Key Distribution: Security, Repeaters and Relativity

Nathan Walk, Timothy C. Ralph, Tony Downes, Thomas Symul, and Ping Koy Lam
QMF4 International Conference on Quantum Information (QIM) 2011

Security of Post-Selection based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Added Noise

Thomas Symul, Daniel J. Alton, Syed M. Assad, Andrew M. Lance, Christian Weedbrook, Timothy C. Ralph, and Ping Koy Lam
QWE6 Quantum-Atom Optics Downunder (QAO) 2007

Unconditional security of Gaussian post-selected continuous variable quantum key distribution

N. Walk, T. Symul, P.K. Lam, and T.C. Ralph
IB_5_4 International Quantum Electronics Conference (IQEC) 2013

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved