{"title":"高斯调制的子载波连续变量量子密钥分发:可组合安全性分析","authors":"R. Goncharov, A. Kiselev, E. Samsonov, V. Egorov","doi":"10.18287/2412-6179-co-1225","DOIUrl":null,"url":null,"abstract":"In this paper, we continue the study of the quantum cryptographic GG02 protocol, performed using the approach based on the subcarrier waves. We modify the scheme via heterodyne detection and perform security analysis for the full trusted hardware noise model in the presence of collective attacks with finite-key effects. It is shown that the system can potentially distribute the key even if the level of losses in the channel is above 9 dB. This result is consistent with the general technical level and comply with modern standards of practical CV-QKD systems. Finally, the system under consideration fully meets the criterion of composability.","PeriodicalId":46692,"journal":{"name":"Computer Optics","volume":"58 1","pages":""},"PeriodicalIF":1.1000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Subcarrier wave continuous-variable quantum key distribution with Gaussian modulation: composable security analysis\",\"authors\":\"R. Goncharov, A. Kiselev, E. Samsonov, V. Egorov\",\"doi\":\"10.18287/2412-6179-co-1225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we continue the study of the quantum cryptographic GG02 protocol, performed using the approach based on the subcarrier waves. We modify the scheme via heterodyne detection and perform security analysis for the full trusted hardware noise model in the presence of collective attacks with finite-key effects. It is shown that the system can potentially distribute the key even if the level of losses in the channel is above 9 dB. This result is consistent with the general technical level and comply with modern standards of practical CV-QKD systems. Finally, the system under consideration fully meets the criterion of composability.\",\"PeriodicalId\":46692,\"journal\":{\"name\":\"Computer Optics\",\"volume\":\"58 1\",\"pages\":\"\"},\"PeriodicalIF\":1.1000,\"publicationDate\":\"2023-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Optics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18287/2412-6179-co-1225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"OPTICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Optics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18287/2412-6179-co-1225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"OPTICS","Score":null,"Total":0}
Subcarrier wave continuous-variable quantum key distribution with Gaussian modulation: composable security analysis
In this paper, we continue the study of the quantum cryptographic GG02 protocol, performed using the approach based on the subcarrier waves. We modify the scheme via heterodyne detection and perform security analysis for the full trusted hardware noise model in the presence of collective attacks with finite-key effects. It is shown that the system can potentially distribute the key even if the level of losses in the channel is above 9 dB. This result is consistent with the general technical level and comply with modern standards of practical CV-QKD systems. Finally, the system under consideration fully meets the criterion of composability.
期刊介绍:
The journal is intended for researchers and specialists active in the following research areas: Diffractive Optics; Information Optical Technology; Nanophotonics and Optics of Nanostructures; Image Analysis & Understanding; Information Coding & Security; Earth Remote Sensing Technologies; Hyperspectral Data Analysis; Numerical Methods for Optics and Image Processing; Intelligent Video Analysis. The journal "Computer Optics" has been published since 1987. Published 6 issues per year.