An overview of quadrature-based quantum key distribution is provided. Beginning from the comparison between
single-photon schema and continuous variable schema, the article focuses on the classical and state-of-art
protocols. Protocols' main procedures and security analysis are introduced, which includes the methods under
individual attack and collective attack. Then recent development of unconditional security proof is introduced
including the optimality of Gaussian attack and de Finetti theorem. Introduction towards discrete modulated
schemas' security proof is also made. At last, the article discusses experimental realization of various protocols
and the main trend in this field.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.