Composable security of two-way continuous-variable quantum key distribution without active symmetrization

被引:23
作者
Ghorai, Shouvik [1 ]
Diamanti, Eleni [1 ]
Leverrier, Anthony [2 ]
机构
[1] Sorbonne Univ, CNRS, LIP6, Paris, France
[2] Inria, Paris, France
基金
欧盟地平线“2020”;
关键词
CRYPTOGRAPHY; ENTANGLEMENT;
D O I
10.1103/PhysRevA.99.012311
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a general framework encompassing a number of continuous-variable quantum key distribution protocols, including standard one-way protocols, measurement-device-independent protocols, as well as some two-way protocols, or any other continuous-variable protocol involving only a Gaussian modulation of coherent states and heterodyne detection. The main interest of this framework is that the corresponding protocols are all covariant with respect to the action of the unitary group U(n), implying that their security can be established thanks to a Gaussian de Finetti reduction. In particular, we give a composable security proof of two-way continuous-variable quantum key distribution against general attacks. We also prove that no active symmetrization procedure is required for these protocols, which would otherwise make them prohibitively costly to implement.
引用
收藏
页数:11
相关论文
共 42 条
[41]   Additive Classical Capacity of Quantum Channels Assisted by Noisy Entanglement [J].
Zhuang, Quntao ;
Zhu, Elton Yechao ;
Shor, Peter W. .
PHYSICAL REVIEW LETTERS, 2017, 118 (20)
[42]   Floodlight quantum key distribution: A practical route to gigabit-per-second secret-key rates [J].
Zhuang, Quntao ;
Zhang, Zheshen ;
Dove, Justin ;
Wong, Franco N. C. ;
Shapiro, Jeffrey H. .
PHYSICAL REVIEW A, 2016, 94 (01)