Notes on a Continuous-Variable Quantum Key Distribution Scheme
We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limita...
Gespeichert in:
Veröffentlicht in: | Journal of the Physical Society of Japan 2017-09, Vol.86 (9), p.1 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 9 |
container_start_page | 1 |
container_title | Journal of the Physical Society of Japan |
container_volume | 86 |
creator | Ichikawa, Tsubasa Hirano, Takuya Matsubara, Takuto Ono, Motoharu Namiki, Ryo |
description | We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios. |
doi_str_mv | 10.7566/JPSJ.86.094001 |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1932038944</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1932038944</sourcerecordid><originalsourceid>FETCH-LOGICAL-p183t-5427945c1b433e564b22df2bc06c18bc4481c670f3c12ed12b0b32dbcd5eb9053</originalsourceid><addsrcrecordid>eNotjTtPwzAYAC0EEqGwMltidvg-vxIvSCg8S8VDBdYqdhyRqo1LbA_8eyrBdMvpjpBzhLJSWl_OX5fzstYlGAmAB6RAISsmoRKHpAAQyAygOiYnMa4BuEIuC3L1HJKPNIy0pU0Y0zDmkCP7bKehtRtP33I7prylT_6H3gwxTYPNadjrS_flt_6UHPXtJvqzf87Ix93te_PAFi_3j831gu2wFokpySsjlUMrhfBKS8t513PrQDusrZOyRqcr6IVD7jvkFqzgnXWd8taAEjNy8dfdTeE7-5hW65Cncb9coREcRG2kFL_Faknr</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1932038944</pqid></control><display><type>article</type><title>Notes on a Continuous-Variable Quantum Key Distribution Scheme</title><source>Alma/SFX Local Collection</source><creator>Ichikawa, Tsubasa ; Hirano, Takuya ; Matsubara, Takuto ; Ono, Motoharu ; Namiki, Ryo</creator><creatorcontrib>Ichikawa, Tsubasa ; Hirano, Takuya ; Matsubara, Takuto ; Ono, Motoharu ; Namiki, Ryo</creatorcontrib><description>We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.</description><identifier>ISSN: 0031-9015</identifier><identifier>EISSN: 1347-4073</identifier><identifier>DOI: 10.7566/JPSJ.86.094001</identifier><language>eng</language><publisher>Tokyo: The Physical Society of Japan</publisher><subject>Continuity (mathematics) ; Eavesdropping ; Measurement ; Quantum cryptography ; Quantum phenomena ; Quantum physics ; Signal transmission ; Variables</subject><ispartof>Journal of the Physical Society of Japan, 2017-09, Vol.86 (9), p.1</ispartof><rights>Copyright The Physical Society of Japan Sep 15, 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Ichikawa, Tsubasa</creatorcontrib><creatorcontrib>Hirano, Takuya</creatorcontrib><creatorcontrib>Matsubara, Takuto</creatorcontrib><creatorcontrib>Ono, Motoharu</creatorcontrib><creatorcontrib>Namiki, Ryo</creatorcontrib><title>Notes on a Continuous-Variable Quantum Key Distribution Scheme</title><title>Journal of the Physical Society of Japan</title><description>We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.</description><subject>Continuity (mathematics)</subject><subject>Eavesdropping</subject><subject>Measurement</subject><subject>Quantum cryptography</subject><subject>Quantum phenomena</subject><subject>Quantum physics</subject><subject>Signal transmission</subject><subject>Variables</subject><issn>0031-9015</issn><issn>1347-4073</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNotjTtPwzAYAC0EEqGwMltidvg-vxIvSCg8S8VDBdYqdhyRqo1LbA_8eyrBdMvpjpBzhLJSWl_OX5fzstYlGAmAB6RAISsmoRKHpAAQyAygOiYnMa4BuEIuC3L1HJKPNIy0pU0Y0zDmkCP7bKehtRtP33I7prylT_6H3gwxTYPNadjrS_flt_6UHPXtJvqzf87Ix93te_PAFi_3j831gu2wFokpySsjlUMrhfBKS8t513PrQDusrZOyRqcr6IVD7jvkFqzgnXWd8taAEjNy8dfdTeE7-5hW65Cncb9coREcRG2kFL_Faknr</recordid><startdate>20170915</startdate><enddate>20170915</enddate><creator>Ichikawa, Tsubasa</creator><creator>Hirano, Takuya</creator><creator>Matsubara, Takuto</creator><creator>Ono, Motoharu</creator><creator>Namiki, Ryo</creator><general>The Physical Society of Japan</general><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20170915</creationdate><title>Notes on a Continuous-Variable Quantum Key Distribution Scheme</title><author>Ichikawa, Tsubasa ; Hirano, Takuya ; Matsubara, Takuto ; Ono, Motoharu ; Namiki, Ryo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p183t-5427945c1b433e564b22df2bc06c18bc4481c670f3c12ed12b0b32dbcd5eb9053</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Continuity (mathematics)</topic><topic>Eavesdropping</topic><topic>Measurement</topic><topic>Quantum cryptography</topic><topic>Quantum phenomena</topic><topic>Quantum physics</topic><topic>Signal transmission</topic><topic>Variables</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ichikawa, Tsubasa</creatorcontrib><creatorcontrib>Hirano, Takuya</creatorcontrib><creatorcontrib>Matsubara, Takuto</creatorcontrib><creatorcontrib>Ono, Motoharu</creatorcontrib><creatorcontrib>Namiki, Ryo</creatorcontrib><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Journal of the Physical Society of Japan</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ichikawa, Tsubasa</au><au>Hirano, Takuya</au><au>Matsubara, Takuto</au><au>Ono, Motoharu</au><au>Namiki, Ryo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Notes on a Continuous-Variable Quantum Key Distribution Scheme</atitle><jtitle>Journal of the Physical Society of Japan</jtitle><date>2017-09-15</date><risdate>2017</risdate><volume>86</volume><issue>9</issue><spage>1</spage><pages>1-</pages><issn>0031-9015</issn><eissn>1347-4073</eissn><abstract>We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.</abstract><cop>Tokyo</cop><pub>The Physical Society of Japan</pub><doi>10.7566/JPSJ.86.094001</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0031-9015 |
ispartof | Journal of the Physical Society of Japan, 2017-09, Vol.86 (9), p.1 |
issn | 0031-9015 1347-4073 |
language | eng |
recordid | cdi_proquest_journals_1932038944 |
source | Alma/SFX Local Collection |
subjects | Continuity (mathematics) Eavesdropping Measurement Quantum cryptography Quantum phenomena Quantum physics Signal transmission Variables |
title | Notes on a Continuous-Variable Quantum Key Distribution Scheme |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T06%3A46%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Notes%20on%20a%20Continuous-Variable%20Quantum%20Key%20Distribution%20Scheme&rft.jtitle=Journal%20of%20the%20Physical%20Society%20of%20Japan&rft.au=Ichikawa,%20Tsubasa&rft.date=2017-09-15&rft.volume=86&rft.issue=9&rft.spage=1&rft.pages=1-&rft.issn=0031-9015&rft.eissn=1347-4073&rft_id=info:doi/10.7566/JPSJ.86.094001&rft_dat=%3Cproquest%3E1932038944%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1932038944&rft_id=info:pmid/&rfr_iscdi=true |