Abstract
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of quantum limited, CW light beams carry the key information. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of the security and efficiency of the scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Wiesner, Sigact News, 15, 78 (1983), C. H. Bennett and G. Brassard, Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing (Bangalore), 175 (1984).
C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).
A. K. Ekart, Phys. Rev. Lett. 67, 661 (1991).
W. T. Buttler et al, Phys. Rev. A57, 2379 (1998).
H. Zbinden et al, Appl. Phys.B 67, 743 (1998).
Y. Mu et al, Opt. Comm. 123, 344 (1996).
T. C. Ralph, Phys. Rev. A 61 010303(R) (1999).
M. Hillery, Phys. Rev. A 61 022309 (2000).
M. D. Reid, Phys. Rev. A 62 062308 (2000).
Ch. Silberhorn, N. Korolkova and G. Leuchs, Phys. Rev. Lett. 88, 167902 (2002).
T. C. Ralph, Phys. Rev. A 62 062306 (2000).
D. Gottesman and J. Preskill, Phys. Rev. A 63, 022309 (2001).
N. J. Cerf, M. Levy, G. Van Assche, Phys. Rev. A 63, 052311 (2001).
F. Grosshans and P. Grangier, Phys. Rev. Lett. 88 057902 (2002).
D. F. Walls and G. J. Milburn, Quantum Optics (Springer-Verlag, Berlin, 1994).
C. A. Fuchs and A. Peres, Phys. Rev. A 53, 2038 (1996)
C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu and A. Peres, Phys. Rev. A 56, 1163 (1997)
I. Cirac and N. Gisin, Phys. Lett.A 229, 1 (1997).
D. Mayers, Advances in Cryptology, Proceedings of Crypto’ 96, 343 (Springer-Verlag, 1996).
H.-K. Lo and H. F. Chau, Science 283, 2050 (1999).
We only explicitly consider individual eavesdropper attacks here.
C. E. Shannon, Bell System Tech. J. 27, 623 (1948).
Y. Yamamoto and H. A. Haus, Rev. Mod. Phys., 58, 1001 (1986).
E. Arthurs and M. S. Goodman, Phys. Rev. Lett. 60, 2447 (1988).
A. Yariv, Optical Electronics in Modern Communications (Oxford University Press, 5th Edition, New York 1997).
U. M. Maurer, IEEE Trans. Inf. Theo. 39, 1733 (1993).
C. H. Bennett, G. Brassard, C. Crepeau and U. M. Maurer, IEEE Trans. Inf. Theo. 41, 1915 (1995).
M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, Cambridge 2000).
This is a stronger assumption about Eve’s capabilities than was used in assessing the effect of losses in Ref. [10].
Ch. Silberhorn, T. C. Ralph, N. Lütkenhaus, G. Leuchs, quant-ph/0204064 (2002).
F. Grosshans, P. Grangier, quant-ph/0204127 (2002).
A. Einstein, B. Podolsky and N. Rosen, Phys. Rev. 47, 777 (1935).
G. Yeoman and S. M. Barnett, Journal Mod. Opt. 40, 1497 (1993).
T. C. Ralph and P. K. Lam, Phys. Rev. Lett. 81, 5668 (1998).
Z. Y Ou, S. F. Pereira, H. J. Kimble, and K. C. Peng, Phys. Rev. Lett. 68, 3663 (1992).
S. M. Barnett and S. J. D. Phoenix, Phil. Trans. R. Soc. Lond. A 354, 793 (1996).
L. Vaidman, Phys. Rev. A 49, 1473 (1994).
S. L. Braunstein and H. J. Kimble, Phys. Rev. Lett. 80, 869 (1998).
A Furusawa, J L Sorensen, S L. Braunstein, C A Fuchs, H J Kimble and E S Polzik, Science, 282, 706 (1998).
The gain condition λopt corresponds to the point of maximum signal transfer on the T-V graph of Reference [32]
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Kluwer Academic Publishers
About this chapter
Cite this chapter
Ralph, T.C. (2003). Quantum Key Distribution with Continuous Variables in Optics. In: Braunstein, S.L., Pati, A.K. (eds) Quantum Information with Continuous Variables. Springer, Dordrecht. https://doi.org/10.1007/978-94-015-1258-9_21
Download citation
DOI: https://doi.org/10.1007/978-94-015-1258-9_21
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-6255-0
Online ISBN: 978-94-015-1258-9
eBook Packages: Springer Book Archive