Abstract
In realistic continuous variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection based scheme is still secure against both individual and collective Gaussian attacks in the presence of this excess noise.
© 2007 Optical Society of America
PDF ArticleMore Like This
Thomas Symul, Daniel J. Alton, Syed M. Assad, Andrew M. Lance, Christian Weedbrook, Timothy C. Ralph, and Ping Koy Lam
QThC2 Quantum-Atom Optics Downunder (QAO) 2007
Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011
N. Walk, T. Symul, P.K. Lam, and T.C. Ralph
IB_5_4 International Quantum Electronics Conference (IQEC) 2013