Quantum key distribution using gaussian-modulated coherent states

被引:1186
作者
Grosshans, F
Van Assche, G
Wenger, J
Brouri, R
Cerf, NJ
Grangier, P [1 ]
机构
[1] Inst Opt, CNRS, UMR 8501, Lab Charles Fabry, F-91403 Orsay, France
[2] Free Univ Brussels, Ecole Polytech, B-1050 Brussels, Belgium
关键词
D O I
10.1038/nature01289
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Quantum continuous variables(1) are being explored(2-14) as an alternative means to implement quantum key distribution, which is usually based on single photon counting(15). The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required(13). Complete secret key extraction is achieved using a reverse reconciliation(14) technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.
引用
收藏
页码:238 / 241
页数:4
相关论文
共 30 条
  • [1] Quantum key distribution with continuous variables
    Bencheikh, K.
    Symul, Th.
    Jankovic, A.
    Levenson, J.A.
    [J]. Journal of Modern Optics, 2001, 48 (13 SPEC.) : 1903 - 1920
  • [2] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [3] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [4] BRASSARD G, 1993, LECT NOTES COMPUTER, P411
  • [5] BRAUNSTEIN SL, QUANTUM INFORMATION
  • [6] BUTTLER WT, 2002, QUANTPH0203096
  • [7] Cloning of continuous quantum variables
    Cerf, NJ
    Ipe, A
    Rottenberg, X
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (08) : 1754 - 1757
  • [8] Cloning and cryptography with quantum continuous variables
    Cerf, NJ
    Iblisdir, S
    Van Assche, G
    [J]. EUROPEAN PHYSICAL JOURNAL D, 2002, 18 (02) : 211 - 218
  • [9] Quantum distribution of Gaussian keys using squeezed states -: art. no. 052311
    Cerf, NJ
    Lévy, M
    Van Assche, G
    [J]. PHYSICAL REVIEW A, 2001, 63 (05) : 523111 - 523115
  • [10] Optimal N-to-M cloning of conjugate quantum variables -: art. no. 040301
    Cerf, NJ
    Iblisdir, S
    [J]. PHYSICAL REVIEW A, 2000, 62 (04): : 3