Notes on a Continuous-Variable Quantum Key Distribution Scheme

We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limita...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of the Physical Society of Japan 2017-09, Vol.86 (9), p.1
Hauptverfasser: Ichikawa, Tsubasa, Hirano, Takuya, Matsubara, Takuto, Ono, Motoharu, Namiki, Ryo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 9
container_start_page 1
container_title Journal of the Physical Society of Japan
container_volume 86
creator Ichikawa, Tsubasa
Hirano, Takuya
Matsubara, Takuto
Ono, Motoharu
Namiki, Ryo
description We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.
doi_str_mv 10.7566/JPSJ.86.094001
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1932038944</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1932038944</sourcerecordid><originalsourceid>FETCH-LOGICAL-p183t-5427945c1b433e564b22df2bc06c18bc4481c670f3c12ed12b0b32dbcd5eb9053</originalsourceid><addsrcrecordid>eNotjTtPwzAYAC0EEqGwMltidvg-vxIvSCg8S8VDBdYqdhyRqo1LbA_8eyrBdMvpjpBzhLJSWl_OX5fzstYlGAmAB6RAISsmoRKHpAAQyAygOiYnMa4BuEIuC3L1HJKPNIy0pU0Y0zDmkCP7bKehtRtP33I7prylT_6H3gwxTYPNadjrS_flt_6UHPXtJvqzf87Ix93te_PAFi_3j831gu2wFokpySsjlUMrhfBKS8t513PrQDusrZOyRqcr6IVD7jvkFqzgnXWd8taAEjNy8dfdTeE7-5hW65Cncb9coREcRG2kFL_Faknr</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1932038944</pqid></control><display><type>article</type><title>Notes on a Continuous-Variable Quantum Key Distribution Scheme</title><source>Alma/SFX Local Collection</source><creator>Ichikawa, Tsubasa ; Hirano, Takuya ; Matsubara, Takuto ; Ono, Motoharu ; Namiki, Ryo</creator><creatorcontrib>Ichikawa, Tsubasa ; Hirano, Takuya ; Matsubara, Takuto ; Ono, Motoharu ; Namiki, Ryo</creatorcontrib><description>We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.</description><identifier>ISSN: 0031-9015</identifier><identifier>EISSN: 1347-4073</identifier><identifier>DOI: 10.7566/JPSJ.86.094001</identifier><language>eng</language><publisher>Tokyo: The Physical Society of Japan</publisher><subject>Continuity (mathematics) ; Eavesdropping ; Measurement ; Quantum cryptography ; Quantum phenomena ; Quantum physics ; Signal transmission ; Variables</subject><ispartof>Journal of the Physical Society of Japan, 2017-09, Vol.86 (9), p.1</ispartof><rights>Copyright The Physical Society of Japan Sep 15, 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Ichikawa, Tsubasa</creatorcontrib><creatorcontrib>Hirano, Takuya</creatorcontrib><creatorcontrib>Matsubara, Takuto</creatorcontrib><creatorcontrib>Ono, Motoharu</creatorcontrib><creatorcontrib>Namiki, Ryo</creatorcontrib><title>Notes on a Continuous-Variable Quantum Key Distribution Scheme</title><title>Journal of the Physical Society of Japan</title><description>We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.</description><subject>Continuity (mathematics)</subject><subject>Eavesdropping</subject><subject>Measurement</subject><subject>Quantum cryptography</subject><subject>Quantum phenomena</subject><subject>Quantum physics</subject><subject>Signal transmission</subject><subject>Variables</subject><issn>0031-9015</issn><issn>1347-4073</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNotjTtPwzAYAC0EEqGwMltidvg-vxIvSCg8S8VDBdYqdhyRqo1LbA_8eyrBdMvpjpBzhLJSWl_OX5fzstYlGAmAB6RAISsmoRKHpAAQyAygOiYnMa4BuEIuC3L1HJKPNIy0pU0Y0zDmkCP7bKehtRtP33I7prylT_6H3gwxTYPNadjrS_flt_6UHPXtJvqzf87Ix93te_PAFi_3j831gu2wFokpySsjlUMrhfBKS8t513PrQDusrZOyRqcr6IVD7jvkFqzgnXWd8taAEjNy8dfdTeE7-5hW65Cncb9coREcRG2kFL_Faknr</recordid><startdate>20170915</startdate><enddate>20170915</enddate><creator>Ichikawa, Tsubasa</creator><creator>Hirano, Takuya</creator><creator>Matsubara, Takuto</creator><creator>Ono, Motoharu</creator><creator>Namiki, Ryo</creator><general>The Physical Society of Japan</general><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20170915</creationdate><title>Notes on a Continuous-Variable Quantum Key Distribution Scheme</title><author>Ichikawa, Tsubasa ; Hirano, Takuya ; Matsubara, Takuto ; Ono, Motoharu ; Namiki, Ryo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p183t-5427945c1b433e564b22df2bc06c18bc4481c670f3c12ed12b0b32dbcd5eb9053</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Continuity (mathematics)</topic><topic>Eavesdropping</topic><topic>Measurement</topic><topic>Quantum cryptography</topic><topic>Quantum phenomena</topic><topic>Quantum physics</topic><topic>Signal transmission</topic><topic>Variables</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ichikawa, Tsubasa</creatorcontrib><creatorcontrib>Hirano, Takuya</creatorcontrib><creatorcontrib>Matsubara, Takuto</creatorcontrib><creatorcontrib>Ono, Motoharu</creatorcontrib><creatorcontrib>Namiki, Ryo</creatorcontrib><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Journal of the Physical Society of Japan</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ichikawa, Tsubasa</au><au>Hirano, Takuya</au><au>Matsubara, Takuto</au><au>Ono, Motoharu</au><au>Namiki, Ryo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Notes on a Continuous-Variable Quantum Key Distribution Scheme</atitle><jtitle>Journal of the Physical Society of Japan</jtitle><date>2017-09-15</date><risdate>2017</risdate><volume>86</volume><issue>9</issue><spage>1</spage><pages>1-</pages><issn>0031-9015</issn><eissn>1347-4073</eissn><abstract>We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.</abstract><cop>Tokyo</cop><pub>The Physical Society of Japan</pub><doi>10.7566/JPSJ.86.094001</doi></addata></record>
fulltext fulltext
identifier ISSN: 0031-9015
ispartof Journal of the Physical Society of Japan, 2017-09, Vol.86 (9), p.1
issn 0031-9015
1347-4073
language eng
recordid cdi_proquest_journals_1932038944
source Alma/SFX Local Collection
subjects Continuity (mathematics)
Eavesdropping
Measurement
Quantum cryptography
Quantum phenomena
Quantum physics
Signal transmission
Variables
title Notes on a Continuous-Variable Quantum Key Distribution Scheme
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T06%3A46%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Notes%20on%20a%20Continuous-Variable%20Quantum%20Key%20Distribution%20Scheme&rft.jtitle=Journal%20of%20the%20Physical%20Society%20of%20Japan&rft.au=Ichikawa,%20Tsubasa&rft.date=2017-09-15&rft.volume=86&rft.issue=9&rft.spage=1&rft.pages=1-&rft.issn=0031-9015&rft.eissn=1347-4073&rft_id=info:doi/10.7566/JPSJ.86.094001&rft_dat=%3Cproquest%3E1932038944%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1932038944&rft_id=info:pmid/&rfr_iscdi=true