Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Experimental demonstration of

long-distance continuous-variable quantum key distribution

Paul Jouguet,1, 2 Sébastien Kunz-Jacques,2 Anthony Leverrier,3 Philippe Grangier,4 and Eleni Diamanti1
1
LTCI, CNRS - Telecom ParisTech, 46 rue Barrault, 75013 Paris, France
2
SeQureNet, 23 avenue d’Italie, 75013 Paris, France
3
Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland
4
Laboratoire Charles Fabry de l’Institut d’Optique - CNRS - Univ. Paris-Sud 11,
2 avenue Augustin Fresnel, Campus Polytechnique, 91127 Palaiseau, France

Distributing secret keys with information- photon-counting technology can be replaced by homo-
theoretic security is arguably one of the most dyne detection techniques that are widely used in clas-
important achievements of the field of quantum sical optical communications. Furthermore, recent re-
arXiv:1210.6216v1 [quant-ph] 23 Oct 2012

information processing and communications [1]. sults suggest that these systems will be compatible with
The rapid progress in this field has enabled quan- standard wavelength division multiplexed telecommuni-
tum key distribution (QKD) in real-world con- cation networks [20]. Despite these attractive features,
ditions [2, 3] and commercial devices are now CVQKD schemes require complex post-processing pro-
readily available. QKD systems based on con- cedures, mostly related to error correction. These have
tinuous variables [4] present the major advantage hindered their operation over more than 25 km of opti-
that they only require standard telecommunica- cal fibre [5–7], a communication span that may be in-
tion technology, and in particular, that they do sufficient for network cryptographic applications. Fur-
not use photon counters. However, these systems thermore, implementations so far were based on security
were considered up till now unsuitable for long- proofs valid in the asymptotic limit of infinitely large
distance communication [5–7]. Here, we over- data blocks, while the finite size of real data must be
come all previous limitations and demonstrate for taken into account according to more complete security
the first time continuous-variable quantum key proofs [21–23].
distribution over 80 km of optical fibre. The Here we demonstrate the distribution of secret keys
demonstration includes all aspects of a practi- over a distance of 80 km, using continuous variables and
cal scenario, with real-time generation of secret security proofs compatible with the use of data blocks of
keys, stable operation in a regular environment, finite size for the generation of the secret key. This re-
and use of finite-size data blocks for secret in- markable range improvement was made possible by a sys-
formation computation and key distillation. Our tem operation in a regime of signal-to-noise ratios (SNR)
results correspond to an implementation guaran- between one and two orders of magnitude lower than in
teeing the strongest level of security for QKD re- earlier implementations. In fact, it was previously over-
ported to date for such long distances and pave looked that techniques developed for error correction of
the way to practical applications of secure quan- Gaussian signals [24] can perform very close to the opti-
tum communications. mal bounds for very low SNR. Implementing such error-
Long-distance experiments in quantum information correction codes at high speed and in an optical envi-
science, and in particular for quantum key distribution ronment featuring excellent stability hence enabling the
(QKD), are of utmost importance for future technologi- acquisition of large data blocks, allowed us to reach pa-
cal applications. Such experiments will allow the integra- rameter regions that were previously inaccessible. This
tion of quantum devices in current secure infrastructures was a key element for the present experiments.
and in future networks based on quantum repeaters [8]. In the experimental setup, shown in Figure 1, we im-
The quest for long-distance QKD in the last years has plement the standard GG02 coherent-state continuous-
led to several successful demonstrations [9–13], however variable QKD protocol described in [25]. The sender,
improving security guarantees and performance in practi- Alice, prepares coherent states with a Gaussian modula-
cal conditions in these implementations remains an issue. tion and sends them to the receiver, Bob, who measures
These experiments use discrete-variable or distributed- either one of the quadratures with a homodyne detec-
phase-reference protocols [1], where the key information tion system. A reverse reconciliation scheme, in which
is encoded on properties of single photons. Alternatively, Alice and Bob use Bob’s data to establish the secret key
in the so-called continuous-variable (CV) QKD proto- [14], is used. In practice, coherent light pulses with a
cols [4], light carries continuous information such as the duration of 100 ns and a repetition rate of 1 MHz are
value of the quadrature of a coherent state. Such pro- generated by a 1550 nm laser diode and split into a weak
tocols have been implemented in a great variety of situ- signal and a strong local oscillator (LO), which provides
ations [5–7, 14–19]. Their key feature is that dedicated the required phase reference. The signal pulses are then
2

Figure 1: Optical layout of the long-distance CVQKD prototype. Alice sends to Bob 100 ns coherent light pulses generated
by a 1550 nm telecom laser diode pulsed with a frequency of 1 MHz. These pulses are split into a weak signal and a strong
local oscillator (LO) with an unbalanced coupler. The signal pulse is modulated with a centered Gaussian distribution using an
amplitude and a phase modulator. The variance is controlled using a coarse variable attenuator and the amplitude modulator.
The signal pulse is 200 ns delayed with respect to the LO pulse using a 20 m delay line and a Faraday mirror. Both pulses are
multiplexed with orthogonal polarization using a polarizing beamsplitter (PBS). The time and polarization multiplexed pulses
are then sent through the channel. They are demultiplexed on Bob’s side with another PBS combined with active polarization
control. A second delay line on Bob’s side allows for time superposition of signal and LO pulses. After demultiplexing, the
signal and LO interfere on a shot-noise limited balanced pulsed homodyne detector. A phase modulator on the LO path allows
for random choice of the measured signal quadrature.

randomly modulated in both quadratures using an am- mal, thanks, for instance, to an infinite-dimensional ver-
plitude and a phase modulator, and transmitted together sion of de Finetti’s theorem [29], or to an adaptation of
with the LO pulses in a single fibre using time and po- the so-called postselection technique [30] to continuous-
larization multiplexing techniques. At the receiver’s side, variable protocols [31]. Security proofs combining arbi-
the pulses interfere on a homodyne detector, whose out- trary attacks and finite-size effects are presently actively
put is proportional to the signal quadrature selected by studied [31, 32]. Here, we consider the security proofs
a phase modulator placed at Bob’s local oscillator path. pertaining to collective attacks [22], taking also into ac-
Due to a highly improved design with respect to previ- count finite-size effects. The Gaussian modulation used
ous implementations, the setup presents an excellent sta- in the implemented protocol maximizes the mutual infor-
bility, ensured by several feedback controls. Polarization mation between Alice and Bob, thus offering an optimal
drifts occurring in the quantum channel are compensated theoretical key rate against such attacks. However, it is
using a dynamic polarization controller. The beamsplit- hard to reconcile correlated Gaussian variables, especially
ter placed at the entrance of Bob’s apparatus aims at at low signal-to-noise ratios, which are inherent in exper-
generating from the LO pulse a clock signal that is inde- iments over long distances. Indeed, the secure distance
pendent of the polarization state. Then, the homodyne of previous demonstrations of fiber-based CVQKD [5, 7]
detection statistics and an appropriate algorithm allow was limited to about 25 km because no efficient error-
us to maintain an optimal polarization state at the out- correction procedure was available at low SNR. Here, we
put of the channel. The photodiode on Alice’s signal use the multidimensional reconciliation protocol of [24],
path is used for amplitude modulator feedback to cor- which transforms a Gaussian channel into a virtual bi-
rect alterations of the required voltage settings induced nary modulation channel, with a capacity loss that is
by temperature variations, while the homodyne detection very low at low SNR. This enables the use of error-
output provides the feedback for the phase modulators. correction codes designed for the Binary Input Additive
White Gaussian Noise Channel (BIAWGNC) whose typ-
The security of the implemented protocol is well estab- ical efficiencies for arbitrarily low SNR are of 0.95 ex-
lished against collective attacks, both in the asymptotic tracted bit per theoretically available bit [33]. This leads
[26–28] and in the finite-size regime [22, 23]. Moreover, to a significant extension of the secure distance.
collective attacks are shown to be asymptotically opti-
3

Let us now look at the parameters that are relevant for Asymptotic theoretical key rate
the extraction of the secret key. Due to the Gaussian op- 100000
Finite-size (109 ) theoretical key rate
Finite-size (108 ) theoretical key rate
timality theorem, Alice and Bob’s two-mode state at the Asymptotic experimental points
output of the quantum channel is fully characterized by Finite-size (109 ) experimental points
Finite-size (108 ) experimental points
Alice’s modulation variance VA , the channel transmission

Key rate (bit/s)


10000 Ref [19]
T and the excess noise ξ, which is added by the channel. Ref [5]

Both VA and ξ are expressed in shot noise units. These Ref [6]

parameters, together with the shot noise, are estimated


in real time using a parameter estimation process, dur- 1000

ing which a fraction of the samples is randomly chosen


and revealed. The other parameters used to compute an
estimate of the secret information that can be extracted 100
from the shared data, namely the electronic noise vel and 0 20 40 60 80 100
Distance (km)
the efficiency of the homodyne detection η, are measured
during a calibration procedure that takes place before
the deployment of the system and that is assumed to be Figure 2: Key rate produced by the system after error correc-
performed in a secure environment. Since we have access tion and privacy amplification during 24 hours with a SNR of
1.1 on Bob’s side at 25 km (5.0 dB losses), a SNR of 0.17 at
to high-efficiency error-correction codes only for specific
53 km (10.6 dB losses), and a SNR of 0.08 on Bob’s side at
values of the signal-to-noise ratio, the modulation vari- 80.5 km (16.1 dB losses). In red, the rate is calculated assum-
ance VA is adjusted in real time in order to be at all ing an eavesdropper able to perform collective attacks in the
times as close as possible to the SNR corresponding to asymptotic regime. This rate is also valid against arbitrary
the threshold of an available code. When there are sev- attacks. In green (resp. blue), the rate is calculated assuming
eral codes available with VA in its allowed range (roughly an eavesdropper able to perform collective attacks taking into
between 1 and 10 shot noise units on Alice’s side), the account finite-size effects with block size 109 (resp. 108 ) and
security parameter  = 10−10 . The odd shape of the curves
one corresponding to the higher key rate is chosen.
results from the use of a small set of error-correcting codes
The privacy amplification step allows us to extract optimized to perform data reconciliation in specific ranges
the secret information from the identical strings shared of SNR. The homodyne detection is characterized by an effi-
by Alice and Bob after the error-correction procedure. ciency η = 0.552, known with uncertainty ∆η = 0.025, and an
In addition to the amount of data revealed during the electronic noise variance vel = 0.015, known with uncertainty
error-correction step, we compute an upper bound on ∆vel = 0.002. For comparison, previous state-of-the-art ex-
the eavesdropper’s information on the corrected string for perimental results are shown [5, 6, 17]: they are all restricted
to distances below 25 km, and do not take finite-size effects
collective attacks in both the asymptotic regime, where into account.
all the experimental parameters are assumed to be known
with an infinite precision, and in the finite-size regime,
where the transmission and the excess noise are estimated 53 km and a few hundreds of bits/s at 80.5 km.
over large data pulse sets (≥ 108 pulses). The stability of The results corresponding to the finite-size regime are
our system allows us to obtain a positive secret key rate of particular interest because of their relevance for prac-
at long distances in both regimes. tical applications. Indeed, obtaining an infinite precision
Long-distance secret key generation results for the in parameter estimation as required in the asymptotic
asymptotic and finite-size regimes are shown in Figure case is, in practice, impossible. We can further eluci-
2. Secret keys were produced by the experimental sys- date the results corresponding to the finite-size case by
tem at 25 km (5.0 dB losses), 53 km (10.6 dB losses), investigating the impact on the secret key rate of the
and 80.5 km (16.1 dB losses) of standard optical fibre. uncertainty on the value of the excess noise. Figure 3
The key rate was computed during 24 hours at all dis- shows the experimental excess noise measured on blocks
tances. A sifting procedure reveals 50% of the raw key of size 108 during 24 hours at a distance of 53 km. More-
for parameter estimation, while 50% of the optical pulses over, for each data point, a worst-case estimator of the
have also been discarded for shot noise estimation that excess noise compatible with the experimental data is in-
is performed in real time. The fraction of light pulses dicated. The probability that the true value of the excess
effectively used for generating the key is thus 25 %. The noise is underestimated by the estimator because of sta-
failure probability of the error correction is roughly 10%, tistical fluctuations is less than 10−10 . For comparison,
which corresponds to the amount of sifted key that is the worst-case estimator for a block size of 106 is also dis-
discarded. The error correction is performed using Low played and is clearly incompatible with the extraction of
Density Parity Check (LDPC) codes with a Graphic Pro- a secret key rate, thus showing that a very large block size
cessing Unit (GPU) decoder, which features a speed of is required to achieve long-distance QKD. These results
several Mbits/s [34]. The final secret key rates range illustrate the significance of the excess noise estimation
from more than 10 kbits/s at 25 km to a few kbits/s at for system performance. They also confirm the excellent
4

0.01 correction techniques using GPUs can deal with raw key
Excess noise and worst-case estimator (108 )
Worst-case excess noise estimator (106 )
rates of up to 10 Mbits/s, and even better rates are possi-
0.008
Null key rate threshold ble using multiple devices. However, a key rate limitation
Excess noise (shot noise units)

is imposed by the fact that both the sifting procedure


and the multidimensional reconciliation scheme require
0.006
transmitting a large amount of classical data between
Alice and Bob, so increasing the optical rate too much
0.004 would lead to the saturation of the network link. Finally,
the ultimate secure distance that can be reached by our
0.002
system is determined by the excess noise present in the
setup, which sets a fundamental limit to the attainable
system performance. In this respect, recent protocols
0
0 4 8 12 16 20 24
using “noiseless amplification” [35] or its “virtual” im-
Time (hours) plementation [36, 37] might be promising.

Figure 3: Experimental excess noise measured during 24


hours with a SNR of 0.17 on Bob’s side. For this measure- METHODS
ment we used 53 km of standard optical fibre corresponding
to 10.6 dB losses. The red + correspond to measurements Experimental details: Our experiment is a one-way
performed on blocks of size 108 , each one corresponding to implementation, where Alice sends to Bob coherent light
roughly 6 minutes of data acquisition, and indicate the ex- pulses with a 100 ns duration and 1 MHz repetition
perimental measured excess noise (lower point) as well as the
worst-case estimator for the excess noise (upper point) com-
rate generated by a 1550 nm pulsed telecom laser diode.
patible with this data up to a probability of 10−10 . This These pulses are split into a weak signal and a strong
worst-case estimator is the value used to compute the secret local oscillator (LO) with an unbalanced coupler. The
key rate when finite-size effects are taken into account. For implemented protocol uses Gaussian modulation of co-
comparison, the green × correspond to the worst-case esti- herent states [25]: the signal is randomly modulated in
mator if the estimation was performed on blocks of size 106 . both quadratures using an amplitude and a phase modu-
The blue line indicates the maximal value of excess noise that lator. The signal pulses are then attenuated by a variable
allows for a positive secret key rate. Even without any exper-
imental noise, no secret key could be extracted at 53 km with
attenuator such that the signal power belongs to a range
a parameter estimation on blocks of size 106 . allowing to control the variance of the Gaussian distri-
bution exiting Alice’s device using a photodiode and an
appropriate feedback algorithm. A second variable at-
tenuator lowers the signal level to a few shot noise units.
stability of our system, since the excess noise maintains
The signal and LO are then transmitted through the
low values, even in this very low SNR regime required by
optical fibre without overlap using time and polarization
the security proof, and with very large data blocks.
multiplexing. Delay lines of 200 ns, composed of a 20-m
We have demonstrated, for the first time, that long- single-mode fibre followed by a Faraday mirror, are used
distance quantum key distribution can be achieved with for the time multiplexing. Polarization multiplexing is
continuous variables, using only standard telecommuni- achieved using polarization beam splitters (PBS). After
cation components. Furthermore, we obtain a positive demultiplexing, the signal and LO interfere on a shot-
secret key rate over long distances even when taking into noise limited balanced pulsed homodyne detector (HD).
account finite-size effects. This was made possible by The electric signal coming from the HD is proportional to
exploring a parameter region, namely the region of low the signal quadrature Xφ , where φ is the relative phase
signal-to-noise ratios, which was entirely inaccessible in between the signal and the LO, which can be controlled
previous implementations. Our results correspond to a using the phase modulator on Bob’s LO path according
practical implementation guaranteeing the strongest level to the Gaussian protocol [25].
of security reported for QKD at such long distances and Feedback controls are implemented to allow for a sta-
show that continuous-variable quantum key distribution ble operation of the system over a large number of pulses
can be useful in long-range secure quantum communica- (≥ 108 ). Polarization drifts occurring in the quantum
tions and network cryptographic applications. channel are corrected using a dynamic polarization con-
To conclude, let us discuss possible further improve- troller that finds an optimal polarization state at the out-
ments of our implementation. The current repetition rate put of the channel. The photodiode on Alice’s signal path
of 1 MHz can be increased by shortening the pulse dura- is used for the feedback control of Alice’s amplitude mod-
tion and the time-multiplexing period, as well as the ho- ulator. On Bob’s side, the homodyne detection output is
modyne detection data sampling period, using high speed sensitive to phase and can be used to control Alice’s and
and high precision data acquisition cards. Current error- Bob’s phase modulators.
5

Security conditions: The implemented protocol re- by random Toeplitz matrices aggregated corrected key
quires an exact Gaussian modulation, which is impossi- blocks. This can be done very efficiently with input
ble to achieve [23]. In practice, this is approximated by a blocks of size 109 : a throughput above 40 Mb/s is ob-
truncated discretized modulation with parameters com- tained with one core of a Core i7-920 processor for a rate
patible with a security proof against collective attacks. of 10−3 secret key bit per raw key bit.
This is done with almost optimal randomness consump- Hardware stability: Hardware stability over a long
tion using source coding techniques. period of time is necessary to extract secret keys from
The efficiency and the variance of the electronic noise blocks of size greater than 109 , as is required to take into
of the homodyne detection are assumed to be calibrated account finite-size effects for distances above 50 km [23].
in a secure laboratory. We evaluate confidence intervals A limitation to the long-term hardware stability in [5, 7]
for these values and we compute the eavesdropper’s cor- was the clock reliability on the receiver’s side, because
responding information taking calibrated values uncer- of its dependence on the polarization control. We use a
tainties into account [23]. splitter and a dedicated electronic circuit and obtain a
Multidimensional reconciliation: The error- considerably less noisy and hence more reliable clock.
correction step is divided into two parts. First, Bob di-
vides his data into vectors y of size 8 and for each, draws
a binary vector u of the same size at random; u is the ACKNOWLEDGMENTS
reference for the key after the error correction. Then Bob
computes r = y · u (where the vectors are interpreted as This research was supported by the French Na-
octonions, see [24] for details) and sends it to Alice who tional Research Agency, through the FREQUENCY
obtains v = x−1 · r = x−1 · y · u, that is a noisy version of (ANR-09-BLAN-0410) and HIPERCOM (2011-CHRI-
Bob’s binary modulated vector u, with a noise close to a 006) projects, and by the European Union through the
Gaussian noise. Interestingly, it can be shown that the project Q-CERT (FP7-PEOPLE-2009-IAPP). P.J. ac-
classical data r, available to Eve, does not leak any infor- knowledges support from the ANRT (Agence Nationale
mation about the binary vector u [24]. The second step de la Recherche et de la Technologie). A.L. was sup-
of the error-correction protocol consists in forming vec- ported by the SNF through the National Centre of Com-
tors of size 220 on Alice’s and Bob’s sides (corresponding petence in Research “Quantum Science and Technology”.
to 217 pairs of such vectors u, v) and to use multi-edge
LDPC codes to correct all the errors [33]. The amount of
data revealed during this step is subtracted from the se-
cret information previously computed. We use Graphics
[1] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf,
Processing Unit (GPU) decoding [34] to obtain a decod-
M. Dušek, N. Lütkenhaus, and M. Peev, Rev. Mod. Phys.
ing speed compatible with real-time data-processing. 81, 1301 (2009).
Post-processing performance: The error- [2] M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda,
correction is performed using low-SNR multi-edge W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati,
Low Density Parity Check (LDPC) codes [33]. High J. F. Dynes, et al., New J. Phys. 11, 075001 (2009).
efficiencies are obtained when operating very close to [3] M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus,
the maximum amount of noise a code can correct. K. Wakui, M. Takeoka, A. Tanaka, K. Yoshino,
Y. Nambu, S. Takahashi, et al., Opt. Express 19, 10387
We achieve speeds up to several Mbits/s [34] using an
(2011).
OpenCL implementation of Belief Propagation with [4] C. Weedbrook, S. Pirandola, R. Garcı́a-Patrón, N. J.
flooding schedule on an AMD Tahiti Graphics Proces- Cerf, T. Ralph, J. Shapiro, and S. Lloyd, Rev. Mod.
sor. The huge parallelism provided by GPUs allows Phys. 84, 621 (2012).
to overcome the computational complexity of CVQKD [5] S. Fossier, E. Diamanti, T. Debuisschert, A. Villing,
pointed out in [38]. R. Tualle-Brouri, and P. Grangier, New J. Phys. 11,
Puncturing and shortening of LDPC codes allow to 045023 (2009).
[6] Q. Dinh Xuan, Z. Zhang, and P. Voss, Opt. Express 17,
modify the rate of a code while maintaining a high effi- 24244 (2009).
ciency over a SNR range. We use a technique proposed in [7] P. Jouguet, S. Kunz-Jacques, T. Debuisschert, S. Fossier,
[39] that consists in adapting the code rate with the sum E. Diamanti, R. Alléaume, R. Tualle-Brouri, P. Grangier,
of punctured and shortened bits equal to a constant value A. Leverrier, P. Pache, et al., Opt. Express 20, 14030
determined as the maximum number of punctured bits (2012).
one can use with a given code without any significant [8] H.-J. Briegel, W. Dr, J. I. Cirac, and P. Zoller, Phys.
efficiency loss (approximately 10% of the code length). Rev. Lett. 81, 5932 (1998).
[9] H. Takesue, S.-W. Nam, Q. Zhang, R. H. Hadfield,
This is particularly convenient since the input size of the T. Honjo, K. Tamaki, and Y. Yamamoto, Nature Photon.
error correction is constant; only the output size of the 1, 343 (2007).
corrected key depends on the number of shortened bits. [10] D. Rosenberg, C. G. Peterson, J. W. Harrington, P. R.
Privacy amplification is performed by multiplying Rice, N. Dallmann, K. T. Tyagi, K. P. McCabe, S. Nam,
6

B. Baek, R. H. Hadfield, et al., New J. Phys. 11, 045009 P. Grangier, Phys. Rev. A 77, 042325 (2008).
(2009). [25] F. Grosshans and P. Grangier, Phys. Rev. Lett. 88,
[11] D. Stucki, N. Walenta, F. Vannel, R. T. Thew, N. Gisin, 057902 (2002).
H. Zbinden, S. Gray, C. R. Towery, and S. Ten, New J. [26] R. Garcı́a-Patrón and N. J. Cerf, Phys. Rev. Lett. 97,
Phys. 11, 075003 (2009). 190503 (2006).
[12] A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and [27] M. Navascués, F. Grosshans, and A. Acı́n, Phys. Rev.
A. J. Shields, Appl. Phys. Lett. 96, 161102 (2010). Lett. 97, 190502 (2006).
[13] S. Wang, W. Chen, J.-F. Guo, Z.-Q. Yin, H.-W. Li, [28] S. Pirandola, S. Braunstein, and S. Lloyd, Phys. Rev.
Z. Zhou, G.-C. Guo, and Z.-F. Han, Opt. Lett. 37, 1008 Lett. 101, 200504 (2008).
(2012). [29] R. Renner and J. I. Cirac, Phys. Rev. Lett. 102, 110504
[14] F. Grosshans, G. V. Assche, J. Wenger, R. Brouri, N. J. (2009).
Cerf, and P. Grangier, Nature 421, 238 (2003). [30] M. Christandl, R. König, and R. Renner, Phys. Rev.
[15] S. Lorenz, J. Rigas, M. Heid, U. L. Andersen, N. Lütken- Lett. 102, 020504 (2009).
haus, and G. Leuchs, Phys. Rev. A 74, 042326 (2006). [31] A. Leverrier, R. Garcı́a-Patrón, R. Renner, and N. J.
[16] B. Qi, L.-L. Huang, L. Qian, and H.-K. Lo, Phys. Rev. Cerf, Arxiv preprint arXiv:1208.4920 (2012).
A 76, 052323 (2007). [32] F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz,
[17] J. Lodewyck, M. Bloch, R. Garcı́a-Patrón, S. Fossier, M. Tomamichel, and R. F. Werner, Phys. Rev. Lett. 109,
E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, 100502 (2012).
R. Tualle-Brouri, S. W. McLaughlin, et al., Phys. Rev. [33] P. Jouguet, S. Kunz-Jacques, and A. Leverrier, Phys.
A 76, 042305 (2007). Rev. A 84, 062317 (2011).
[18] T. Symul, D. J. Alton, S. M. Assad, A. M. Lance, [34] P. Jouguet and S. Kunz-Jacques, Arxiv preprint
C. Weedbrook, T. C. Ralph, and P.-K. Lam, Phys. Rev. arXiv:1204.5882 (2012).
A 76, 030303 (2007). [35] R. Blandino, A. Leverrier, M. Barbieri, J. Etesse,
[19] Y. Shen, H. Zou, L. Tian, P. Chen, and J. Yuan, Phys. P. Grangier, and R. Tualle-Brouri, Phys. Rev. A 86,
Rev. A 82, 022317 (2010). 012327 (2012).
[20] B. Qi, W. Zhu, L. Qian, and H.-K. Lo, New J. Phys. 12, [36] J. Fiurasek and N. J. Cerf, Arxiv preprint
103042 (2010). arXiv:1205.6933 (2012).
[21] V. Scarani and R. Renner, Phys. Rev. Lett. 100, 200501 [37] N. Walk, T. Symul, P.-K. Lam, and T. C. Ralph, Arxiv
(2008). preprint arXiv:1206.0936 (2012).
[22] A. Leverrier, F. Grosshans, and P. Grangier, Phys. Rev. [38] Y.-B. Zhao, Y.-Z. Gui, J.-J. Chen, Z.-F. Han, and G.-C.
A 81, 062343 (2010). Guo, IEEE Trans. Inf. Theor. 54, 2803 (2008).
[23] P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Lev- [39] J. Martinez-Mateo, D. Elkouss, and V. Martin, Quantum
errier, Phys. Rev. A 86, 032309 (2012). Information and Computation 12, 791 (2012).
[24] A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and

You might also like