16,174 research outputs found

    Collective attacks and unconditional security in continuous variable quantum key distribution

    Full text link
    We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et. al. [quant-ph/0402131] to obtain unconditionally secure rates for these protocols.Comment: Minor orthographic and grammatical correction

    Internal Realism and the Reality of God

    Get PDF
    How do religions refer to reality in their language and symbols, and which reality do they envisage and encounter? on the basis of some examples of an understanding of religion without reference to reality, I first answer the question of what ”realism’ is. realism has been an opposite concept to nominalism, idealism, empiricism and antirealism. The paper concentrates especially on the most recent formation of realism in opposition to antirealism. In a second section the consequences for philosophy of religion and theology are considered. How the reality, as it is considered in philosophy of religion and in theology, has to be characterised, if and how this reality is relevant for human beings, and what its relation is to everything else, can only be answered and clarified in a presentation in a language that is specific for this reality, the reality of God

    Reverse reconciliation protocols for quantum cryptography with continuous variables

    Get PDF
    We introduce new quantum key distribution protocols using quantum continuous variables, that are secure against individual attacks for any transmission of the optical line between Alice and Bob. In particular, it is not required that this transmission is larger than 50 %. Though squeezing or entanglement may be helpful, they are not required, and there is no need for quantum memories or entanglement purification. These protocols can thus be implemented using coherent states and homodyne detection, and they may be more efficient than usual protocols using quantum discrete variables.Comment: 5 pages, no figur

    Covariants, Invariant Subsets, and First Integrals

    Full text link
    Let kk be an algebraically closed field of characteristic 0, and let VV be a finite-dimensional vector space. Let End(V)End(V) be the semigroup of all polynomial endomorphisms of VV. Let EE be a subset of End(V)End(V) which is a linear subspace and also a semi-subgroup. Both End(V)End(V) and EE are ind-varieties which act on VV in the obvious way. In this paper, we study important aspects of such actions. We assign to EE a linear subspace DED_{E} of the vector fields on VV. A subvariety XX of VV is said to DED_{E} -invariant if h(x)h(x) is in the tangent space of xx for all hh in DED_{E} and xx in XX. We show that XX is DED_{E} -invariant if and only if it is the union of EE-orbits. For such XX, we define first integrals and construct a quotient space for the EE-action. An important case occurs when GG is an algebraic subgroup of GL(VGL(V) and EE consists of the GG-equivariant polynomial endomorphisms. In this case, the associated DED_{E} is the space the GG-invariant vector fields. A significant question here is whether there are non-constant GG-invariant first integrals on XX. As examples, we study the adjoint representation, orbit closures of highest weight vectors, and representations of the additive group. We also look at finite-dimensional irreducible representations of SL2 and its nullcone

    Optimality of Gaussian Attacks in Continuous Variable Quantum Cryptography

    Get PDF
    We analyze the asymptotic security of the family of Gaussian modulated Quantum Key Distribution protocols for Continuous Variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.Comment: See also R. Garcia-Patron and N. Cerf, quant-ph/060803

    An integrality theorem of Grosshans over arbitrary base ring

    Full text link
    We revisit a theorem of Grosshans and show that it holds over arbitrary commutative base ring kk. One considers a split reductive group scheme GG acting on a kk-algebra AA and leaving invariant a subalgebra RR. If RU=AUR^U=A^U then the conclusion is that AA is integral over RR.Comment: 5 pages; final versio

    Unidimensional continuous-variable quantum key distribution

    Full text link
    We propose the continuous-variable quantum key distribution protocol based on the Gaussian modulation of a single quadrature of the coherent states of light, which is aimed to provide simplified implementation compared to the symmetrically modulated Gaussian coherent-state protocols. The protocol waives the necessity in phase quadrature modulation and the corresponding channel transmittance estimation. The security of the protocol against collective attacks in a generally phase-sensitive Gaussian channels is analyzed and is shown achievable upon certain conditions. Robustness of the protocol to channel imperfections is compared to that of the symmetrical coherent-state protocol. The simplified unidimensional protocol is shown possible at a reasonable quantitative cost in terms of key rate and of tolerable channel excess noise.Comment: 7 pages, 5 figures, close to the published versio
    • …
    corecore