pith. machine review for the scientific record. sign in

arxiv: 1002.4083 · v2 · submitted 2010-02-22 · 🪐 quant-ph

Recognition: unknown

Continuous-variable Quantum Key Distribution protocols with a discrete modulation

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords attacksquantumcontinuous-variablediscretedistributiongaussianlinearmodulation
0
0 comments X
read the original abstract

In this paper, we consider continuous-variable quantum key distribution with a discrete modulation, either binary or quaternary. We establish the security of these protocols against the class of collective attacks that induce a linear quantum channel. In particular, all Gaussian attacks are taken into account, as well as linear attacks which add a non-Gaussian noise. We give lower bounds for the secret key rate using extremality properties of Gaussian states.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Adaptable Continuous Variable Quantum Network with Finite Size Security

    quant-ph 2026-04 unverdicted novelty 6.0

    Experimental demonstration of an active 1:4 CV-QKD quantum network in the finite-size regime with adaptable protocols achieving 0.19 bits per channel use over 11 km channels.