Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
AbstractThe ability to distribute secret keys between two parties with information-theoretic security, that is regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far-reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit-based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field. View Full-Text
Share & Cite This Article
Diamanti, E.; Leverrier, A. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations. Entropy 2015, 17, 6072-6092.
Diamanti E, Leverrier A. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations. Entropy. 2015; 17(9):6072-6092.Chicago/Turabian Style
Diamanti, Eleni; Leverrier, Anthony. 2015. "Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations." Entropy 17, no. 9: 6072-6092.