Book contents
- Frontmatter
- Contents
- Foreword
- Preface
- Acknowledgments
- 1 Introduction
- 2 Classical cryptography
- 3 Information theory
- 4 Quantum information theory
- 5 Cryptosystems based on quantum key distribution
- 6 General results on secret-key distillation
- 7 Privacy amplification using hash functions
- 8 Reconciliation
- 9 Non-binary reconciliation
- 10 The BB84 protocol
- 11 Protocols with continuous variables
- 12 Security analysis of quantum key distribution
- Appendix symbols and abbreviations
- Bibliography
- Index
11 - Protocols with continuous variables
Published online by Cambridge University Press: 04 August 2010
- Frontmatter
- Contents
- Foreword
- Preface
- Acknowledgments
- 1 Introduction
- 2 Classical cryptography
- 3 Information theory
- 4 Quantum information theory
- 5 Cryptosystems based on quantum key distribution
- 6 General results on secret-key distillation
- 7 Privacy amplification using hash functions
- 8 Reconciliation
- 9 Non-binary reconciliation
- 10 The BB84 protocol
- 11 Protocols with continuous variables
- 12 Security analysis of quantum key distribution
- Appendix symbols and abbreviations
- Bibliography
- Index
Summary
The discrete modulation of quantum states as in BB84 stems fairly naturally from the need to produce zeroes and ones for the final secret key. But since secret-key distillation can also process continuous key elements, there is no reason not to investigate the continuous modulation of quantum states. In fact, continuous-variable protocols are fairly elegant alternatives to their discrete counterparts and allow for high secret key rates.
In this chapter, I describe two important QKD protocols involving continuous variables: first a protocol involving the Gaussian modulation of squeezed states and then a protocol with coherent states. These QKD protocols must be seen as a source of Gaussian key elements, from which we can extract a secret key. Finally, I detail the implementation of the protocol with coherent states.
From discrete to continuous variables
In the scope of continuous-variable QKD, we focus on quantum states that are represented in a continuous Hilbert space, of which their most notable examples are the coherent and squeezed states.
The BB84 protocol was designed with single photon states in mind. The coherent states, much easier to produce, are used only as an approximation of single photon states.
- Type
- Chapter
- Information
- Quantum Cryptography and Secret-Key Distillation , pp. 183 - 204Publisher: Cambridge University PressPrint publication year: 2006