Access the full text.
Sign up today, get DeepDyve free for 14 days.
The assumption that detection and/or state preparation devices used for continuous‐variable quantum key distribution are beyond influence of potential eavesdroppers leads to a significant performance enhancement in terms of achievable key rate and transmission distance. A detailed and comprehensible derivation of the Holevo bound in this so‐called trusted‐device scenario is provided. Modeling an entangling‐cloner attack and using some basic algebraic matrix transformations, it is shown that the computation of the Holevo bound can be reduced to the solution of a quadratic equation. As an advantage of our derivation, the mathematical complexity of our solution does not increase with the number of trusted‐noise sources. Finally, a numerical evaluation of our results is provided, illustrating the counter‐intuitive fact that an appropriate amount of trusted‐receiver loss and noise can even be beneficial for the key rate.
Advanced Quantum Technologies – Wiley
Published: Nov 1, 2019
Keywords: ; ; ; ;
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.