Continuous-Variable Quantum Key Distribution Protocols Over Noisy Channels

Similar documents
Continuous Variable Quantum Key Distribution with a Noisy Laser

Deterministic secure communications using two-mode squeezed states

Fundamental Security Issues in Continuous Variable Quantum Key Distribution

Security bounds for the eavesdropping collective attacks on general CV-QKD protocols

arxiv: v2 [quant-ph] 4 Sep 2007

arxiv:quant-ph/ v2 7 Nov 2001

Quantum key distribution over 25 km with an all-fiber continuous-variable system

QCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume

Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States

Problem Set: TT Quantum Information

Experimental continuous-variable cloning of partial quantum information

Ping Pong Protocol & Auto-compensation

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

arxiv: v2 [quant-ph] 24 Jan 2011

High rate quantum cryptography with untrusted relay: Theory and experiment

Practical Quantum Key Distribution

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light

Quantum Information Transfer and Processing Miloslav Dušek

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Quantum key distribution for the lazy and careless

Trojan-horse attacks on quantum-key-distribution systems

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum key distribution with 2-bit quantum codes

TWO-LAYER QUANTUM KEY DISTRIBUTION

CV-QKD with Gaussian and non-gaussian Entangled States over Satellite-based Channels

Lectures on Quantum Optics and Quantum Information

Continuous-variable quantum key distribution with a locally generated local oscillator

Experimental realization of quantum cryptography communication in free space

Security of Quantum Key Distribution with Imperfect Devices

Security and implementation of differential phase shift quantum key distribution systems

arxiv: v2 [quant-ph] 17 Apr 2018

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

SUPPLEMENTARY INFORMATION

Key distillation from quantum channels using two-way communication protocols

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Fundamental rate-loss tradeoff for optical quantum key distribution

Continuous-Variable Quantum Key Distribution with Gaussian Modulation The Theory of Practical Implementations

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing (DIQIP)

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Key Distribution. The Starting Point

Practical quantum-key. key- distribution post-processing

arxiv:quant-ph/ v1 25 Dec 2006

arxiv: v2 [quant-ph] 8 Feb 2013

Security of quantum-key-distribution protocols using two-way classical communication or weak coherent pulses

Schemes to generate entangled photon pairs via spontaneous parametric down conversion

Realization of B92 QKD protocol using id3100 Clavis 2 system

QUANTUM KEY DISTRIBUTION PROTOCOLS WITH HIGH RATES AND LOW COSTS

Continuous-variable quantum key distribution with non-gaussian quantum catalysis

Quantification of Gaussian quantum steering. Gerardo Adesso

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

What is possible to do with noisy quantum computers?

arxiv:quant-ph/ v1 13 Jan 2003

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography

arxiv: v2 [quant-ph] 9 Jun 2017

APPLICATIONS. Quantum Communications

Reconciliation of a Quantum-Distributed Gaussian Key

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Introduction to Quantum Key Distribution

Proposal for a loophole-free Bell test using homodyne detection

PROGRESS IN OPTICS VOLUME 4 9. E. Wolf

Quantum key distribution

1 1D Schrödinger equation: Particle in an infinite box

arxiv:quant-ph/ v1 6 Dec 2005

Novel Side Channel Attacks in Continuous Variable Quantum Key Distribution arxiv: v2 [quant-ph] 18 Jun 2015

A Guide to Experiments in Quantum Optics

1 1D Schrödinger equation: Particle in an infinite box

arxiv:quant-ph/ v2 17 Sep 2002

Quantum Cryptography. Marshall Roth March 9, 2007

Entanglement swapping using nondegenerate optical parametric amplifier

arxiv:quant-ph/ v1 13 Mar 2007

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

LECTURE NOTES ON Quantum Cryptography

SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES

Quantum Hadamard channels (I)

FIG. 16: A Mach Zehnder interferometer consists of two symmetric beam splitters BS1 and BS2

A semi-device-independent framework based on natural physical assumptions

Continuous-variable quantum information processing

Pulsed squeezed vacuum measurements without homodyning

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Squeezed Light and Quantum Imaging with Four-Wave Mixing in Hot Atoms

Entanglement and information

Chapter 14: Quantum Information Theory and Photonic Communications

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Quantum Cryptography

ON THE POSSIBILITY OF USING OPTICAL Y-SPLITTER IN QUANTUM RANDOM NUMBER GENERATION SYSTEMS BASED ON FLUCTUATIONS OF VACUUM

arxiv: v1 [quant-ph] 30 Sep 2018

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

Transcription:

Continuous-Variable Quantum Key Distribution Protocols Over Noisy Channels The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher García-Patrón, Raúl, and Nicolas J. Cerf. Continuous-Variable Quantum Key Distribution Protocols Over Noisy Channels. Physical Review Letters 102.13 (2009): 130501. 2009 The American Physical Society. http://dx.doi.org/10.1103/physrevlett.102.130501 American Physical Society Version Final published version Accessed Fri Mar 15 18:35:47 EDT 2019 Citable Link Terms of Use Detailed Terms http://hdl.handle.net/1721.1/51735 Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.

Continuous-Variable Quantum Key Distribution Protocols Over Noisy Channels Raúl García-Patrón 1,2 and Nicolas J. Cerf 1 1 QuIC, Ecole Polytechnique, CP 165, Université Libre de Bruxelles, 1050 Bruxelles, Belgium 2 Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139, USA (Received 24 June 2008; published 31 March 2009) A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne detection is introduced and shown to attain higher secret key rates over a noisy line than any other oneway Gaussian protocol. This increased resistance to channel noise can be understood as resulting from purposely adding noise to the signal that is converted into the secret key. This notion of noise-enhanced tolerance to noise also provides a better physical insight into the poorly understood discrepancies between the previously defined families of Gaussian protocols. DOI: 10.1103/PhysRevLett.102.130501 PACS numbers: 03.67.Dd, 42.50. p Quantum key distribution (QKD) is a prominent application of quantum information sciences, enabling two partners (Alice and Bob) to share a secret key, which in turn allows them to communicate with full security. A particular class of QKD protocols based on the Gaussian modulation of Gaussian states has attracted much attention over the past years because its associated (homodyne or heterodyne) detection scheme offers the prospect of very high key rates [1]. In these so-called continuous-variable (CV) protocols, the data which make the key are encoded into continuous-spectrum quantum observables, namely, the quadrature components of a mode of the light field. These protocols fall to date into three families, depending on which states and detection schemes are used. In the first one, Alice uses a source of squeezed states that are randomly displaced along the squeezed quadrature, while Bob performs homodyne detection [2]. The experimental implementation is much simplified with the second one, which is based at Alice s side on coherent states modulated in both quadratures instead of squeezed states modulated along a single quadrature [3]. This second protocol was first demonstrated experimentally in Ref. [4], while its implementation with optical telecom components was reported in Ref. [5]. In the third protocol, Alice still uses coherent states but Bob performs heterodyne instead of homodyne detection, measuring both quadratures together, hence eliminating the need for an active random basis choice [6]. In this Letter, we introduce a fourth CV QKD protocol based on squeezed states and heterodyne detection, which, surprisingly, happens to outperform all previous Gaussian protocols when the noise level in the quantum channel is high. This hitherto overlooked protocol, completing the family of Gaussian protocols, had not been found earlier because, at first sight, it serves no purpose measuring both quadratures when only one of them (the squeezed quadrature) carries the key. This striking effect can, however, be understood by exploring the analogy with qubit-based QKD and realizing that adding some noise on the data of the appropriate partner during the error-correction phase may result in an increase of the secret key rate [7]. We indeed can explain the improved resistance to noise of our new protocol by using its equivalence with the first protocol, based on squeezed states and homodyne measurement, supplemented with noisy postprocessing. This analysis also allows us to construct the family of optimal Gaussian protocols with respect to channel excess noise. It has been known after Ref. [7] that the performance of qubit-based QKD protocols can be increased by having Alice adding some noise to her data in the error-correction phase. This additional classical noise makes the protocol more robust against noise in the quantum channel because it is more detrimental to Eve than to Bob. More precisely, for each quantum channel, there is an optimal level of noise that Alice should add in order to maximize the secret key rate. An explanation of this phenomena can be found in Ref. [8] using an entanglement-based description of BB84 together with a modified version of Shor-Preskill s unconditional security proof [9]. Note that entangled-based CV QKD protocols have also been introduced in Ref. [10], but entanglement will only be used in what follows as a tool to analyze all four prepare-and-measure protocols on the same footing. We shall show that this counterintuitive effect of noise also appears, though in disguise, in the case of CV QKD protocols. This is not straightforward, however, because of the distinction that exists between direct reconciliation (DR) and reverse reconciliation (RR), a feature which plays a central role in CV QKD. In contrast to qubit-based QKD, it is indeed crucial to specify whether Alice or Bob is the reference during the error-correction postprocessing phase. In DR, Alice plays this role and the maximal achievable range is known to be 3 db; in RR, there is no theoretical limitation to this range [4]. In the following, we will focus on the security of CV QKD against collective attacks, where Eve interacts individually with each signal pulse sent by Alice but applies a joint measurement at the end of the classical postprocessing stage. Studying this class of attacks is 0031-9007=09=102(13)=130501(4) 130501-1 Ó 2009 The American Physical Society

sufficient to prove unconditional security of qubit-based QKD protocols [11], and we take for granted here the conjecture that the same holds for CV QKD [12]. In addition, we restrict our study to Gaussian collective attacks as they are known to be optimal [12]. Furthermore, we consider RR as it works over longer distances. The corollary is that Alice s and Bob s roles must be interchanged when analyzing the tolerance to noise (indeed, qubit-based QKD uses DR). This leads us to introduce a fourth Gaussian protocol. Protocol. The first stage consists in quantum communication over the quantum channel, characterized by the transmittivity T and added noise variance referred to the input C. Alice generates a random bit r and a real number a drawn from a Gaussian distribution GðaÞ of variance V a. Subsequently, she generates a squeezed vacuum state of covariance matrix diagð1=v; VÞ and displaces it by an amount (a; 0); see Fig. 1. Before sending the state together with the local oscillator through the quantum channel, she applies a random dephasing of ¼ r=2 to the state. This dephasing is equivalent to randomly choosing to squeeze and displace either the x or p quadrature, as in Ref. [2]. Averaging the output states over GðaÞ gives the same (thermal) state for r ¼ 0 and r ¼ 1, which prevents Eve from extracting information on which quadrature was selected by Alice. This imposes the constraint V a þ 1=V ¼ V on Alice s modulation. The quantum signal and local oscillator can be transmitted over the same fiber by using a time multiplexing technique, as in Ref. [13]. At Bob s station, the signal is first demultiplexed and subsequently measured by a standard heterodyne measurement, as shown in Fig. 1. The use of heterodyning makes the random number generator on Bob s side unnecessary since there is no need to switch between the measurements of conjugated bases, just as in Ref. [6]. After repeating these steps many times, Alice ends up with a long string of data a correlated with Bob s heterodyne data (b x ;b p ). The second stage is the classical postprocessing stage, which serves to extract the secret key. It starts by Alice revealing the string of random bits r encoding her chosen quadratures and Bob keeping as his final string of data b the measurements (b x or b p ) matching Alice s choices. This step is followed by the channel estimation, where Alice and Bob reveal a fraction of their data in order to estimate T and C, which allows them to bound Eve s information. Subsequently, Alice and Bob apply a RR algorithm, such as low-density parity-check codes [13] combined with a discretization operation. This operation outputs two perfectly correlated binary strings. Finally, both partners apply a privacy amplification algorithm based, e.g., on hash functions [13], which produces a shared binary secret key from their perfectly correlated data. As shown in Ref. [7], the achievable RR secret key rate reads K ¼ Iða:bÞ Sðb:EÞ; (1) where Iða:bÞ is the Shannon information between Alice and Bob s data while Sðb:EÞ is Eve s information on b given by the Holevo quantity Sðb:EÞ ¼Sð E Þ R dbpðbþsð b E Þ. Given that Eve can be assumed to hold the purification of the system and that Gaussian attacks are optimal, we can directly compute K from the covariance matrix AB inferred from the channel estimation. Tolerance to noise. In Fig. 2(a), we show that this new protocol performs better than all previous RR protocols in LASER Alice a r Bob b x Squeezer D(a) F1 F 2 BSHT SHG OPA π/2 M Channel M b p BS 1 LO A BS 2 LO π/2 FIG. 1 (color online). Proposed experimental implementation of the new protocol. The source (Alice) is based on a master laser beam. A fraction of it is extracted to make the local oscillator (LO), while the rest is converted into second harmonic in a nonlinear crystal (SHG). After spectral filtering (F 1 ), the second harmonic beam pumps an optical parametric amplifier (OPA) which generates a squeezed vacuum state. Following the filtering of the second harmonic (F 2 ), this squeezed state is displaced by a. This is done by mixing the state on a beam splitter of high transmittivity (T HT 99% for BS HT ) with a coherent state of intensity a 2 =ð1 T HT Þ, extracted from the LO. The attenuation (A) thus depends on a, which is distributed according to a Gaussian distribution GðaÞ of variance V a. Before time multiplexing (M) the quantum signal with the LO, Alice applies a phase shift ¼ r=2 to it depending on the value of the random bit r. Then, the two components of the time multiplexed signal travel to Bob through the same fiber, thereby avoiding a spurious dephasing between the signal and LO. At Bob s station, the two components are demultiplexed (M 0 ), and the quantum signal is heterodyne measured. The latter measurement consists in splitting the quantum signal (and LO) in two with the balanced beam splitters ( ), and then homodyning each beam. The LO used in the second measurement is dephased by =2 in order to measure the conjugate quadrature. Each homodyne detector is composed of a balanced beam splitter ( ) and a pair of highly efficient photodiodes; the difference of the photocurrents gives the quadratures b x and b p. 130501-2

Tolerable excess noise (ε) 1 0.8 0.6 0.4 0.2 10 0 a) b) 0 0 5 10 15 20 Secret Key Rate (bits/pulse) 10-3 FIG. 2. (a) Tolerable excess noise (in shot-noise units) as a function of the channel losses (in db) for RR protocols: new (solid line), squeezed states and homodyning (dashed line) [2], coherent states and homodyning (dotted line) [3], coherent states and heterodyning protocol (dash-dotted line) [6]. The optimal protocol with Bob s added noise D is also shown (crosses). The curves are plotted for V!1. (b) Secret key rates as a function of the channel losses (in db) for RR protocols: new (solid line), squeezed states and homodyning protocol (dashed line) [2]. The curves are plotted for an excess noise ¼ 0:5 and V ¼ 40. terms of tolerable excess noise, i.e., the lowest ¼ C ð1 TÞ=T that gives a zero secret key rate. In realistic implementations of CV QKD, the excess noise generally comes from the laser s phase noise and imperfections in the modulation, as discussed in Ref. [5], so that it can be considered as approximately independent of the length of the fiber. The higher tolerable does not mean, however, that the new protocol gives higher rates regardless of the channel transmittivity. As shown in Fig. 2(b), it is only for losses higher than a given threshold that it gives a higher secret key rate than the protocol of Ref. [2]. In the new protocol, Bob disregards either b x or b p during the postprocessing stage, depending on Alice s quadrature choice r. This is equivalent to tracing out the mode that is not used in Bob s heterodyne measurement, so that the new protocol can be viewed as a noisy version of the protocol based on squeezed states and homodyne measurement [2] where Bob inserts a balanced beam splitter before his measurement. The losses induced by this beam splitter translate into noise once Bob classically amplifies his outcome to match the initial signal. Therefore, we have a clear demonstration that adding noise that is not controlled by Eve on Bob s side can be beneficial in CV QKD for a RR protocol. Interestingly, this effect has a counterpart in DR which remained unnoticed to date although it is visible with known protocols. We indeed observe in Ref. [14] that the homodyne protocol based on coherent states gives a better tolerance to excess noise in DR than that based on squeezed states. The reason is that the former protocol [3] can actually be viewed as a noisy version of the latter protocol [2], where the noise is now added by the same mechanism but on Alice s side in the entanglement-based equivalent scheme; see Fig. 3. In this scheme, coherent 10-1 10-2 a A EPR V Alice states are prepared by Alice applying an heterodyne measurement, which can be viewed as a noisy homodyne measurement. We thus conclude that there is a beneficial effect of noise if added on the reference side of error correction (Alice in DR and Bob in RR). Clearly, adding noise on the other side is always detrimental as it decreases the information between the authorized parties without affecting the eavesdropper s information. Optimal protocol. We now generalize the above new RR protocol to optimally resist against an arbitrary channel noise. In Fig. 3, we exhibit an entanglement-based description of CV QKD protocols, where Bob replaces his heterodyne measurement by an ideal homodyne measurement preceded by a general Gaussian phase-insensitive added noise. This models the following physical situations: (i) inefficient homodyne detection with efficiency T B and electronic noise variance v ¼ð1 T B ÞðN 1Þ; (ii) perfect homodyne detection followed by a classical Gaussian added noise of variance D ¼ð1 T B ÞN=T B ; (iii) any combination of the previous cases giving the same D. The secret key rate can be calculated using the following technique. First we use the fact that Eve s system E purifies AB, that is, SðEÞ ¼SðABÞ. Secondly, after Bob s projective measurement yielding b, the system AEFG being pure, we have SðEjbÞ ¼SðAFGjbÞ. For Gaussian states SðAFGjbÞ is the same for all b s, being just a function of the covariance matrix AB. Thus, we obtain, K ¼ Iða:bÞ SðABÞþSðAFGjbÞ; (2) which can be calculated from the covariance matrix AB ¼ EPR N Τ B B Τ, χ c b F E Bob FIG. 3 (color online). Entanglement-based description of the new protocol with general Gaussian added noise on Bob s side. The source of squeezed states on Alice s side is replaced by an entangled pair (EPR) of variance V, followed by a homodyne measurement of mode A. The other mode is sent to Bob through the quantum channel. Before Bob s homodyne detection, the state received by Bob is mixed with a thermal state (half of an EPR pair) of variance N on a beam splitter of transmittivity T B [ D ¼ð1 T B ÞN=T B ]. xi z ; (3) z yi p where x ¼ V, y ¼ TðV þ C Þ, z ¼ ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi TðV 2 1Þ, I ¼ diagð1; 1Þ, and ¼ diagð1; 1Þ. The information between Alice and Bob reads Eve G 130501-3

Secret Key Rate (bits/pulse) 10 0 10-1 10-2 (a) 10-3 Optimal Input Noise χ D 0 FIG. 4. (a) Optimal secret key rates as a function of the channel losses (db) for a fixed excess noise ¼ 0:5 (solid line) compared to the protocol based on squeezed states and homodyning [2] (dotted line) and the new protocol proposed here (dashed line). (b) Optimal choice of D (in shot-noise units) that maximizes the secret key rate. The curves are plotted for V ¼ 40. Iða:bÞ ¼ 1 V þ 2 log ; (4) þ 1=V where ¼ C þ D =T. Then, SðABÞ is a function of the symplectic eigenvalues 1;2 of AB which reads SðABÞ ¼Gðð 1 1Þ=2Þ þ Gðð 2 1Þ=2Þ; (5) where GðxÞ ¼ðx þ 1Þ logðx þ 1Þ xlogx is the von Neumann entropy of a thermal state and 2 1;2 ¼ 1 p ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 4D 2 : (6) 2 Here, we have used the notation ¼ x 2 þ y 2 2z 2 and D ¼ xy z 2. Finally, SðAFGjbÞ is a function of the symplectic eigenvalues 3;4 similar to (5) where 2 3;4 are solutions of the second order polynomial 4 A 2 þ B ¼ 0 with A ¼ 1 ½y þ xd þ y þ D Š (7) D B ¼ D ½x þ y þ D DŠ: (8) D By tuning Bob s added noise D, it is possible to maximize the secret key rate, as shown in Fig. 4. More importantly, the resulting family of optimal protocols exhibit the highest tolerance to noise among all Gaussian CV QKD protocols, as demonstrated in Fig. 2(a) (crosses). Note that although Bob s heterodyne measurement is useful to get an insight on this enhanced tolerance to noise, Bob eventually disregards one of the two quadratures in the actual protocol. Thus, up to a factor of 2 in the key rate, he may as well apply a (noisy) homodyne measurement and keep the outcome only when he has measured the right quadrature. Finally, instead of using a random numbers generator to generate the noise D, it is certainly more 2 1.5 1 0.5 (b) interesting for Bob to do it physically by tuning the efficiency of his detector. Conclusion. We have proposed a new CV QKD protocol using squeezed states and heterodyne detection, which outperforms all known Gaussian protocols in terms of resistance to noise. This enhanced robustness can be interpreted as the continuous-variable counterpart of the effect, first described in Ref. [7], that adding noise in the error-correction postprocessing phase may increase the secret key rate of one-way qubit-based protocols. Then, we have studied the impact of a general Gaussian phaseinsensitive noise on the secret key rate, and have shown that for each quantum channel (characterized by its transmittivity T and added noise variance C ), there is an optimal noise D that Bob must add to maximize the secret key rate. The resulting protocol also exhibits the highest resistance to noise among all Gaussian protocols. This noise-enhanced tolerance to noise is particularly interesting for reverse-reconciliation CV QKD protocols, which work over larger distances, but, interestingly, it also has an analogue for direct-reconciliation protocols. This gives a physical explanation to the previously observed but poorly understood discrepancies between the efficiencies of Gaussian protocols. We acknowledge financial support from the EU under projects COMPAS and SECOQC, from the Belgian foundation FRIA, and from the W. M. Keck Foundation Center for Extreme Quantum Information Theory. [1] N. J. Cerf and P. Grangier, J. Opt. Soc. Am. B 24, 324 (2007). [2] N. J. Cerf, M. Lévy, and G. Van Assche, Phys. Rev. A 63, 052311 (2001). [3] F. Grosshans and P. Grangier, Phys. Rev. Lett. 88, 057902 (2002). [4] F. Grosshans et al., Nature (London) 421, 238 (2003). [5] J. Lodewyck, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, Phys. Rev. A 72, 050303(R) (2005). [6] C. Weedbrook et al., Phys. Rev. Lett. 93, 170504 (2004); S. Lorenz et al., Appl. Phys. B 79, 273 (2004). [7] R. Renner, N. Gisin, and B. Kraus, Phys. Rev. A 72, 012332 (2005). [8] J. M. Renes and G. Smith, Phys. Rev. Lett. 98, 020502 (2007). [9] P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000). [10] C. Silberhorn, N. Korolkova, and G. Leuchs, Phys. Rev. Lett. 88, 167902 (2002). [11] R. Renner, Nature Phys. 3, 645 (2007). [12] M. Navascués, F. Grosshans, and A. Acín, Phys. Rev. Lett. 97, 190502 (2006); R. García-Patrón and N. J. Cerf, Phys. Rev. Lett. 97, 190503 (2006). [13] J. Lodewyck et al., Phys. Rev. A 76, 042305 (2007). [14] M. Navascués and A. Acín, Phys. Rev. Lett. 94, 020505 (2005). 130501-4