Continuous Variable Quantum Key Distribution: Security, Repeaters and Relativity

Nathan Walk, Timothy Cameron Ralph, Tony Downes, Thomas Symul, Ping Lam

Research output: Chapter in Book/Report/Conference proceedingMeeting Abstract

Abstract

We prove security of a continuous variable quantum key distribution protocol using post selection against non-Gaussian eavesdropper attacks. We discuss CV repeater protocols based on noiseless amplification. We analyze CV QKD between non-inertial, relativistic observers.
Original languageEnglish
Title of host publicationProceedings of the International Conference on Quantum Information, ICQI 2011
Subtitle of host publicationOSA Technical Digest
PublisherOptica Publishing Group
DOIs
Publication statusPublished - 2011
EventInternational Conference on Quantum Information, ICQI 2011 - University of Ottawa, Ottawa, Canada
Duration: 6 Jun 20118 Jun 2011
Conference number: 4th
https://opg.optica.org/conference.cfm?meetingid=10&yr=2011
https://opticaorgdev.blob.core.windows.net/media/optica/media/osa.media/meetings/archives/2011/2011_icqi_qim_archive.pdf

Conference

ConferenceInternational Conference on Quantum Information, ICQI 2011
Abbreviated titleICQI 2011
Country/TerritoryCanada
CityOttawa
Period6/06/118/06/11
OtherThe 4th International Conference on Quantum Information will be held June 6-8, 2011 (with participants gathering Sunday, June 5) at the campus of the University of Ottawa, Ottawa, Canada.

Quantum information is an exciting, rapidly growing area of scientific interest and development, attracting cutting-edge theoretical and experimental research worldwide. Entanglement is a key resource for quantum information and quantum computing, whereas decoherence is the main adversary. Optical methods play a key role in many implementations of quantum information. The meeting will concentrate on entanglement, decoherence and optical methods, but contributions from all areas of quantum information science are welcome.
Internet address

Fingerprint

Dive into the research topics of 'Continuous Variable Quantum Key Distribution: Security, Repeaters and Relativity'. Together they form a unique fingerprint.

Cite this