Отрывок: In this case, the Holevo bound can be estimated as follows EB E E|B ,S S   (8) 2 2 1 1 1 1log log , 2 2 2 2 i i i i i v v v vS                  (9) where S is the von Neumann entropy and vi is the symplectic eigenvalue of the corresponding covariance matrix. Subscripts show predestination: "A" stands for Alice, "B" stands for Bob, and "E" stands for Eve. Vertical bar determine...
Полная запись метаданных
Поле DC Значение Язык
dc.contributor.authorGoncharov, R.K.-
dc.contributor.authorKiselev, A.D.-
dc.contributor.authorSamsonov, E.O.-
dc.contributor.authorEgorov, V.I.-
dc.date.accessioned2023-05-04 10:59:31-
dc.date.available2023-05-04 10:59:31-
dc.date.issued2023-06-
dc.identifierDspace\SGAU\20230424\103210ru
dc.identifierDspace\SGAU\20230426\103210ru
dc.identifierDspace\SGAU\20230503\103210ru
dc.identifier.citationGoncharov, R.K. Subcarrier wave continuous-variable quantum key distribution with Gaussian modulation: composable security analysis / R.K. Goncharov, A.D. Kiselev, E.O. Samsonov, V.I. Egorov // Computer Optics. – 2023. – Vol. 47(3). – P. 374-380. – DOI: 10.18287/2412-6179-CO-1225.ru
dc.identifier.urihttps://dx.doi.org/10.18287/2412-6179-CO-1225-
dc.identifier.urihttp://repo.ssau.ru/handle/Zhurnal-Komputernaya-optika/Subcarrier-wave-continuousvariable-quantum-key-distribution-with-Gaussian-modulation-composable-security-analysis-103210-
dc.description.abstractIn this paper, we continue the study of the quantum cryptographic GG02 protocol, performed using the approach based on the subcarrier waves. We modify the scheme via heterodyne detection and perform security analysis for the full trusted hardware noise model in the presence of collective attacks with finite-key effects. It is shown that the system can potentially distribute the key even if the level of losses in the channel is above 9 dB. This result is consistent with the general technical level and comply with modern standards of practical CV-QKD systems. Finally, the system under consideration fully meets the criterion of composability.ru
dc.description.sponsorshipThe work was done by Leading Research Center "National Center for Quantum Internet" of ITMO University by order of JSCo Russian Railways.ru
dc.language.isoenru
dc.publisherСамарский национальный исследовательский университетru
dc.relation.ispartofseries47;3-
dc.subjectcontinuous variablesru
dc.subjectsubcarrier wavesru
dc.subjectquantum key distributionru
dc.titleSubcarrier wave continuous-variable quantum key distribution with Gaussian modulation: composable security analysisru
dc.typeArticleru
dc.textpartIn this case, the Holevo bound can be estimated as follows EB E E|B ,S S   (8) 2 2 1 1 1 1log log , 2 2 2 2 i i i i i v v v vS                  (9) where S is the von Neumann entropy and vi is the symplectic eigenvalue of the corresponding covariance matrix. Subscripts show predestination: "A" stands for Alice, "B" stands for Bob, and "E" stands for Eve. Vertical bar determine...-
dc.classindex.scsti29.31.01-
Располагается в коллекциях: Журнал "Компьютерная оптика"

Файлы этого ресурса:
Файл Описание Размер Формат  
2412-6179_2023_47_3_374-380.pdfОсновная статья843.7 kBAdobe PDFПросмотреть/Открыть



Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.