scholarly journals Experimental Implementation of Non-Gaussian Attacks on a Continuous-Variable Quantum-Key-Distribution System

2007 ◽  
Vol 98 (3) ◽  
Author(s):  
Jérôme Lodewyck ◽  
Thierry Debuisschert ◽  
Raúl García-Patrón ◽  
Rosa Tualle-Brouri ◽  
Nicolas J. Cerf ◽  
...  
2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Shengjun Ren ◽  
Shuai Yang ◽  
Adrian Wonfor ◽  
Ian White ◽  
Richard Penty

AbstractWe present an experimental demonstration of the feasibility of the first 20 + Mb/s Gaussian modulated coherent state continuous variable quantum key distribution system with a locally generated local oscillator at the receiver (LLO-CVQKD). To increase the signal repetition rate, and hence the potential secure key rate, we equip our system with high-performance, wideband devices and design the components to support high repetition rate operation. We have successfully trialed the signal repetition rate as high as 500 MHz. To reduce the system complexity and correct for any phase shift during transmission, reference pulses are interleaved with quantum signals at Alice. Customized monitoring software has been developed, allowing all parameters to be controlled in real-time without any physical setup modification. We introduce a system-level noise model analysis at high bandwidth and propose a new ‘combined-optimization’ technique to optimize system parameters simultaneously to high precision. We use the measured excess noise, to predict that the system is capable of realizing a record 26.9 Mb/s key generation in the asymptotic regime over a 15 km signal mode fibre. We further demonstrate the potential for an even faster implementation.


2016 ◽  
Vol 93 (1) ◽  
Author(s):  
Zhengyu Li ◽  
Yichen Zhang ◽  
Xiangyu Wang ◽  
Bingjie Xu ◽  
Xiang Peng ◽  
...  

2010 ◽  
Vol 08 (05) ◽  
pp. 779-786
Author(s):  
SHENG ZHANG ◽  
JIAN WANG ◽  
CHAO-JING TANG ◽  
QUAN ZHANG

We present a new non-Gaussian quantum key distribution (QKD) protocol using squeezed states. Compared with a binary modulation, the efficiency can be improved when a four alphabetic letters modulation is chosen. We then analyze the security of the protocol under a collective entangling cloner attack, which is a powerful attack strategy in continuous variable QKD. We also show how the modulation coefficient affects the key rate, then the key rate can be maximized by choosing an optimal coefficient.


Author(s):  
Tobias A. Eriksson ◽  
Ruben S. Luís ◽  
Kadir Gümüş ◽  
Georg Rademacher ◽  
Benjamin J. Puttnam ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document