Next Article in Journal
Optimal Base Wavelet Selection for ECG Noise Reduction Using a Comprehensive Entropy Criterion
Next Article in Special Issue
Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense
Previous Article in Journal
Self-Similar Solutions of Rényi’s Entropy and the Concavity of Its Entropy Power
Previous Article in Special Issue
Unconditionally Secure Quantum Signatures
Article Menu

Export Article

Open AccessReview
Entropy 2015, 17(9), 6072-6092; doi:10.3390/e17096072

Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

1
Laboratoire Traitement et Communication de l'Information, CNRS, Telecom ParisTech, 23 avenue d'Italie, Paris 75013, France
2
Inria, EPI SECRET, B.P. 105, Le Chesnay Cedex 78153, France
*
Author to whom correspondence should be addressed.
Academic Editor: Stefano Pirandola
Received: 16 June 2015 / Revised: 24 August 2015 / Accepted: 27 August 2015 / Published: 31 August 2015
(This article belongs to the Special Issue Quantum Cryptography)
View Full-Text   |   Download PDF [370 KB, uploaded 31 August 2015]   |  

Abstract

The ability to distribute secret keys between two parties with information-theoretic security, that is regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far-reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit-based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field. View Full-Text
Keywords: quantum key distribution; quantum information; quantum cryptography; quantum optics; security quantum key distribution; quantum information; quantum cryptography; quantum optics; security
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Diamanti, E.; Leverrier, A. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations. Entropy 2015, 17, 6072-6092.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top