ﻻ يوجد ملخص باللغة العربية
In this work, a comparison study between unidimensional (UD) coherent-state and UD squeeze-state protocols is performed in the continuous variable quantum key distribution domain. First, the UD squeeze-state protocol is proposed and the equivalence between the prepare-and-measure and entanglement-based schemes of UD squeeze-state protocol is proved. Then, the security of the UD squeeze-state protocol under collective attack in realistic conditions is analyzed. Lastly, the performances of the two UD protocols are analyzed. Based on the uniform expressions established in our study, the squeeze-state and coherent-state protocols can be analyzed simultaneously. Our results show that the UD squeeze-state protocols are quite different from the two-dimensional protocols in that the UD squeeze-state protocols have a poorer performance compared with UD coherent-state protocols, which is opposite in the case of two-dimensional protocols.
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we show that switching is not required for coherent state continuous variable quantum key distribution. We show
Information reconciliation is crucial for continuous-variable quantum key distribution (CV-QKD) because its performance affects the secret key rate and maximal secure transmission distance. Fixed-rate error correction codes limit the potential applic
We investigate the performance of several continuous-variable quantum key distribution protocols in the presence of fading channels. These are lossy channels whose transmissivity changes according to a probability distribution. This is typical in com
Continuous-variable quantum key distribution (CV-QKD) with discrete modulation has received widespread attentions because of its experimental simplicity, lower-cost implementation and ease to multiplex with classical optical communication. Recently,
In this paper we study the protocol implementation and property analysis for several practical quantum secret sharing (QSS) schemes with continuous variable graph state (CVGS). For each QSS scheme, an implementation protocol is designed according to