arXiv Analytics

Sign in

arXiv:1205.1497 [quant-ph]AbstractReferencesReviewsResources

Continuous-Variable Quantum Key Distribution with Entanglement in the Middle

Christian Weedbrook

Published 2012-05-07Version 1

We analyze the performance of continuous-variable quantum key distribution protocols where the entangled source originates not from one of the trusted parties, Alice or Bob, but from the malicious eavesdropper in the middle. This is in contrast to the typical simulations where Alice creates the entangled source and sends it over an insecure quantum channel to Bob. By using previous techniques and identifying certain error correction protocol equivalences, we show that Alice and Bob do not need to trust their source, and can still generate a positive key rate. Such a situation can occur in a quantum network where the untrusted source originated in between the two users.

Related articles: Most relevant | Search more
arXiv:1110.4617 [quant-ph] (Published 2011-10-20, updated 2013-04-15)
Continuous-Variable Quantum Key Distribution using Thermal States
arXiv:1005.0339 [quant-ph] (Published 2010-05-03, updated 2010-05-04)
Finite-size analysis of continuous-variable quantum key distribution
arXiv:0904.1694 [quant-ph] (Published 2009-04-10, updated 2010-01-21)
Feasibility of continuous-variable quantum key distribution with noisy coherent states