Chrome Extension
WeChat Mini Program
Use on ChatGLM

Shaped Constellation Continuous Variable Quantum Key Distribution: Concepts, Methods and Experimental Validation

JOURNAL OF LIGHTWAVE TECHNOLOGY(2024)

Nokia Bell Labs | Barcelona Inst Sci & Technol | Inria Paris | Sorbonne Univ | Univ Paris Saclay

Cited 5|Views19
Abstract
Quantum key distribution (QKD) enables the establishment of secret keys between users connected via a channel vulnerable to eavesdropping, with information-theoretic security, that is, independently of the power of a malevolent party (Scarani et al., 2009). QKD systems based on the encoding of the key information on continuous variables (CV), such as the values of the quadrature components of coherent states (Weedbrook et al., 2012), (Diamanti and Leverrier, 2015), present the major advantage that they only require standard telecommunication technology. However, the most general security proofs for CV-QKD required until now the use of Gaussian modulation by the transmitter, complicating practical implementations (Jouguet et al., 2013), (Zhang et al., 2020), (Jain et al., 2022). Here, we experimentally implement a protocol that allows for arbitrary, Gaussian-like, discrete modulations, whose security is based on a theoretical proof that applies generally to such situations (Denys et al., 2021). These modulation formats are compatible with the use of powerful tools of coherent optical telecommunication, allowing our system to reach an estimated performance of tens of megabit per second secret key rates over 25 km.
More
Translated text
Key words
Modulation,Protocols,Security,Quadrature amplitude modulation,Noise,Standards,Symbols,Coherent detection,modulation formats,quantum key distribution
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper

要点】:本文提出了一个基于连续变量量子密钥分发(CVQKD)的新的 shaped constellation 协议,该协议可以使用非高斯模态,通过实验验证了该协议的可行性。

方法】:文章采用了一种新的 shaping 方法,通过理论证明,实现了任意、类似高斯的特定的离散调制。

实验】:实验使用了一个兼容强有力光通信工具的 CVQKD 系统,在 25 公里长的距离上,实现了每秒数十兆比特的密钥分发速率。