Continuous-variable QKD with post-selection is secure

Abstract

Post-selection is a standard part of discrete variable QKD protocols, however attempts to prove security when post-selection is deployed in continuous variable QKD protocols have until now been limited. Here, by using a carefully tailored post-selection protocol, we prove unconditional security and show that significant performance improvements are achieved.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,758

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

  • Only published works are available at libraries.

Similar books and articles

Manipulation and the causes of evolution.Kenneth Reisman & Patrick Forber - 2005 - Philosophy of Science 72 (5):1113-1123.
A more pluralist typology of selection processes.Bence Nanay - 2001 - Behavioral and Brain Sciences 24 (3):547-548.
Selecting between intelligent options.Roi Cohen Kadosh, Vincent Walsh & Avishai Henik - 2007 - Behavioral and Brain Sciences 30 (2):155-155.
Semi-post algebras.Nguyen Cat Ho & Helena Rasiowa - 1987 - Studia Logica 46 (2):149 - 160.

Analytics

Added to PP
2017-10-17

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references