Composable security of two-way continuous-variable quantum key distribution without active symmetrization

被引:22
作者
Ghorai, Shouvik [1 ]
Diamanti, Eleni [1 ]
Leverrier, Anthony [2 ]
机构
[1] Sorbonne Univ, CNRS, LIP6, Paris, France
[2] Inria, Paris, France
基金
欧盟地平线“2020”;
关键词
CRYPTOGRAPHY; ENTANGLEMENT;
D O I
10.1103/PhysRevA.99.012311
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a general framework encompassing a number of continuous-variable quantum key distribution protocols, including standard one-way protocols, measurement-device-independent protocols, as well as some two-way protocols, or any other continuous-variable protocol involving only a Gaussian modulation of coherent states and heterodyne detection. The main interest of this framework is that the corresponding protocols are all covariant with respect to the action of the unitary group U(n), implying that their security can be established thanks to a Gaussian de Finetti reduction. In particular, we give a composable security proof of two-way continuous-variable quantum key distribution against general attacks. We also prove that no active symmetrization procedure is required for these protocols, which would otherwise make them prohibitively costly to implement.
引用
收藏
页数:11
相关论文
共 42 条
  • [1] Bennett C. H., 1984, P IEEE INT C COMP SY, V175
  • [2] Quantum distribution of Gaussian keys using squeezed states -: art. no. 052311
    Cerf, NJ
    Lévy, M
    Van Assche, G
    [J]. PHYSICAL REVIEW A, 2001, 63 (05) : 523111 - 523115
  • [3] One-and-a-half quantum de Finetti theorems
    Christandl, Matthias
    Koenig, Robert
    Mitchison, Graeme
    Renner, Renato
    [J]. COMMUNICATIONS IN MATHEMATICAL PHYSICS, 2007, 273 (02) : 473 - 498
  • [4] Postselection Technique for Quantum Channels with Applications to Quantum Cryptography
    Christandl, Matthias
    Koenig, Robert
    Renner, Renato
    [J]. PHYSICAL REVIEW LETTERS, 2009, 102 (02)
  • [5] Numerical approach for unstructured quantum key distribution
    Coles, Patrick J.
    Metodiev, Eric M.
    Lutkenhaus, Norbert
    [J]. NATURE COMMUNICATIONS, 2016, 7
  • [6] Distillation of secret key and entanglement from quantum states
    Devetak, I
    Winter, A
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2005, 461 (2053): : 207 - 235
  • [7] Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
    Diamanti, Eleni
    Leverrier, Anthony
    [J]. ENTROPY, 2015, 17 (09) : 6072 - 6092
  • [8] Dupuis F., ARXIV160701796
  • [9] Distilling Gaussian states with Gaussian operations is impossible
    Eisert, J
    Scheel, S
    Plenio, MB
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (13) : 137903 - 137903
  • [10] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663