logo
ResearchBunny Logo
Practical continuous-variable quantum key distribution with composable security

Physics

Practical continuous-variable quantum key distribution with composable security

N. Jain, H. Chin, et al.

Explore the groundbreaking continuous-variable quantum key distribution system developed by Nitin Jain, Hou-Man Chin, and their team, which produces composable keys with an impressive security against collective attacks. This innovative approach marks a pivotal advancement towards making quantum communication practical and efficient.

00:00
00:00
~3 min • Beginner • English
Abstract
A quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure. Furthermore, the theoretical proof responsible for security analysis and key generation should cater to the number N of the distributed quantum states being finite in practice. Continuous-variable (CV) QKD based on coherent states, despite being a suitable candidate for integration in the telecom infrastructure, has so far been unable to demonstrate composability as existing proofs require a rather large N for successful key generation. Here we report a Gaussian-modulated coherent state CVQKD system that is able to overcome these challenges and can generate composable keys secure against collective attacks with N ≈ 2 × 10^8 coherent states. With this advance, possible due to improvements to the security proof and a fast, yet low-noise and highly stable system operation, CVQKD implementations take a significant step towards their discrete-variable counterparts in practicality, performance, and security.
Publisher
Nature Communications
Published On
Aug 12, 2022
Authors
Nitin Jain, Hou-Man Chin, Hossein Mani, Cosmo Lupo, Dino Solar Nikolic, Arne Kordts, Stefano Pirandola, Thomas Brochmann Pedersen, Matthias Kolb, Bernhard Ömer, Christoph Pacher, Tobias Gehring, Ulrik L. Andersen
Tags
Quantum Key Distribution
Continuous-variable
Composable keys
Security
Gaussian-modulated coherent states
Collective attacks
Stable operation
Listen, Learn & Level Up
Over 10,000 hours of research content in 25+ fields, available in 12+ languages.
No more digging through PDFs, just hit play and absorb the world's latest research in your language, on your time.
listen to research audio papers with researchbunny