About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Preprint article ยท Conference paper

Quantum cryptography with an ideal local relay

In Proceedings of Spie โ€” 2015, Volume 9648, pp. 96480Z-96480Z-4
From

University of York1

Department of Physics, Technical University of Denmark2

Quantum Physics and Information Technology, Department of Physics, Technical University of Denmark3

We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay is locally in her lab and the Bell detection is perfomed with unit efficiency.

This configuration allows us to explore the optimal performances achievable by CV measurement-device-independent quantum key distribution. This corresponds to the limit of a trusted local relay, where the detection loss can be re-scaled. Our theoretical analysis is confirmed by an experimental simulation where 10-4 secret bits per use can potentially be distributed at 170km assuming ideal reconciliation.

Language: English
Publisher: SPIE - International Society for Optical Engineering
Year: 2015
Pages: 96480Z-96480Z-4
Proceedings: Electro-Optical and Infrared Systems: Technology and Applications XII; and Quantum Information Science and Technology
Series: Proceedings of Spie - the International Society for Optical Engineering
ISBN: 1628418583 and 9781628418583
ISSN: 1996756x and 0277786x
Types: Preprint article and Conference paper
DOI: 10.1117/12.2202662
ORCIDs: Gehring, Tobias , Jacobsen, Christian Scheffmann and Andersen, Ulrik Lund
Keywords

quant-ph

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis