We extend the security proof for continuous variable quantum key distributionprotocols using post selection to account for arbitrary eavesdropping attacksby employing the concept of an equiv- alent protocol where the post-selectionis implemented as a projective quantum measurement. We demonstrate that thesecurity can be calculated using only experimentally accessible quantities andfinally explicitly evaluate the performance for the case of a noisy Gaussianchannel in the limit of unbounded key length.
展开▼