32 research outputs found

    Converse bounds for private communication over quantum channels

    Get PDF
    This paper establishes several converse bounds on the private transmission capabilities of a quantum channel. The main conceptual development builds firmly on the notion of a private state, which is a powerful, uniquely quantum method for simplifying the tripartite picture of privacy involving local operations and public classical communication to a bipartite picture of quantum privacy involving local operations and classical communication. This approach has previously led to some of the strongest upper bounds on secret key rates, including the squashed entanglement and the relative entropy of entanglement. Here we use this approach along with a "privacy test" to establish a general meta-converse bound for private communication, which has a number of applications. The meta-converse allows for proving that any quantum channel's relative entropy of entanglement is a strong converse rate for private communication. For covariant channels, the meta-converse also leads to second-order expansions of relative entropy of entanglement bounds for private communication rates. For such channels, the bounds also apply to the private communication setting in which the sender and receiver are assisted by unlimited public classical communication, and as such, they are relevant for establishing various converse bounds for quantum key distribution protocols conducted over these channels. We find precise characterizations for several channels of interest and apply the methods to establish several converse bounds on the private transmission capabilities of all phase-insensitive bosonic channels.Comment: v3: 53 pages, 3 figures, final version accepted for publication in IEEE Transactions on Information Theor

    Converse bounds for private communication over quantum channels

    Full text link
    © 1963-2012 IEEE. This paper establishes several converse bounds on the private transmission capabilities of a quantum channel. The main conceptual development builds firmly on the notion of a private state, which is a powerful, uniquely quantum method for simplifying the tripartite picture of privacy involving local operations and public classical communication to a bipartite picture of quantum privacy involving local operations and classical communication. This approach has previously led to some of the strongest upper bounds on secret key rates, including the squashed entanglement and the relative entropy of entanglement. Here, we use this approach along with a 'privacy test' to establish a general meta-converse bound for private communication, which has a number of applications. The meta-converse allows for proving that any quantum channel's relative entropy of entanglement is a strong converse rate for private communication. For covariant channels, the meta-converse also leads to second-order expansions of relative entropy of entanglement bounds for private communication rates. For such channels, the bounds also apply to the private communication setting in which the sender and the receiver are assisted by unlimited public classical communication, and as such, they are relevant for establishing various converse bounds for quantum key distribution protocols conducted over these channels. We find precise characterizations for several channels of interest and apply the methods to establish converse bounds on the private transmission capabilities of all phase-insensitive bosonic channels

    Converse Bounds for Private Communication Over Quantum Channels

    Get PDF
    This paper establishes several converse bounds on the private transmission capabilities of a quantum channel. The main conceptual development builds firmly on the notion of a private state, which is a powerful, uniquely quantum method for simplifying the tripartite picture of privacy involving local operations and public classical communication to a bipartite picture of quantum privacy involving local operations and classical communication. This approach has previously led to some of the strongest upper bounds on secret key rates, including the squashed entanglement and the relative entropy of entanglement. Here, we use this approach along with a “privacy test” to establish a general meta-converse bound for private communication, which has a number of applications. The meta-converse allows for proving that any quantum channel’s relative entropy of entanglement is a strong converse rate for private communication. For covariant channels, the meta-converse also leads to second-order expansions of relative entropy of entanglement bounds for private communication rates. For such channels, the bounds also apply to the private communication setting in which the sender and the receiver are assisted by unlimited public classical communication, and as such, they are relevant for establishing various converse bounds for quantum key distribution protocols conducted over these channels. We find precise characterizations for several channels of interest and apply the methods to establish converse bounds on the private transmission capabilities of all phase-insensitive bosonic channels

    Photonic Engineering for CV-QKD over Earth-Satellite Channels

    Full text link
    Quantum Key Distribution (QKD) via satellite offers up the possibility of unconditionally secure communications on a global scale. Increasing the secret key rate in such systems, via photonic engineering at the source, is a topic of much ongoing research. In this work we investigate the use of photon-added states and photon-subtracted states, derived from two mode squeezed vacuum states, as examples of such photonic engineering. Specifically, we determine which engineered-photonic state provides for better QKD performance when implemented over channels connecting terrestrial receivers with Low-Earth-Orbit satellites. We quantify the impact the number of photons that are added or subtracted has, and highlight the role played by the adopted model for atmospheric turbulence and loss on the predicted key rates. Our results are presented in terms of the complexity of deployment used, with the simplest deployments ignoring any estimate of the channel, and the more sophisticated deployments involving a feedback loop that is used to optimize the key rate for each channel estimation. The optimal quantum state is identified for each deployment scenario investigated.Comment: Updated reference lis

    Optimal secure quantum teleportation of coherent states of light

    Get PDF
    We investigate quantum teleportation of ensembles of coherent states of light with a Gaussian distributed displacement in phase space. Recently, the following general question has been addressed in [P. Liuzzo-Scorpo et al., arXiv:1705.03017]: Given a limited amount of entanglement and mean energy available as resources, what is the maximal fidelity that can be achieved on average in the teleportation of such an alphabet of states? Here, we consider a variation of this question, where Einstein-Podolsky-Rosen steering is used as a resource rather than plain entanglement. We provide a solution by means of an optimisation within the space of Gaussian quantum channels, which allows for an intuitive visualisation of the problem. We first show that not all channels are accessible with a finite degree of steering, and then prove that practical schemes relying on asymmetric two-mode Gaussian states enable one to reach the maximal fidelity at the border with the inaccessible region. Our results provide a rigorous quantitative assessment of steering as a resource for secure quantum teleportation beyond the so-called no-cloning threshold. The schemes we propose can be readily implemented experimentally by a conventional Braunstein-Kimble continuous variable teleportation protocol involving homodyne detections and corrective displacements with an optimally tuned gain. These protocols can be integrated as elementary building blocks in quantum networks, for reliable storage and transmission of quantum optical states

    Floodlight quantum key distribution: Demonstrating a framework for high-rate secure communication

    Get PDF
    Floodlight quantum key distribution (FL-QKD) is a radically different QKD paradigm that can achieve gigabit-per-second secret-key rates over metropolitan area distances without multiplexing [Q. Zhuang et al., Phys. Rev. A 94, 012322 (2016)]. It is a two-way protocol that transmits many photons per bit duration and employs a high-gain optical amplifier, neither of which can be utilized by existing QKD protocols, to mitigate channel loss. FL-QKD uses an optical bandwidth that is substantially larger than the modulation rate and performs decoding with a unique broadband homodyne receiver. Essential to FL-QKD is Alice's injection of photons from a photon-pair source—in addition to the light used for key generation—into the light she sends to Bob. This injection enables Alice and Bob to quantify Eve's intrusion and thus secure FL-QKD against collective attacks. Our proof-of-concept experiment included 10 dB propagation loss—equivalent to 50 km of low-loss fiber—and achieved a 55 Mbit/s secret-key rate (SKR) for a 100 Mbit/s modulation rate, as compared to the state-of-the-art system's 1 Mbit/s SKR for a 1 Gbit/s modulation rate [M. Lucamarini et al., Opt. Express 21, 24550 (2013)], representing ∼500-fold and ∼50 fold improvements in secret-key efficiency (bits per channel use) and SKR (bits per second), respectively.United States. Office of Naval Research (Grant N00014-13-1-0774)United States. Air Force Office of Scientific Research (Grant FA9550-14-1-0052)United States. Army Research Office (United States. Defense Advanced Research Projects Agency. Quiness Program. Grant W31P4Q-12-1-0019)United States. Office of Naval Research. Defense University Research Instrumentation Program (Grant N00014-14-1-0808

    Quantum reading capacity: General definition and bounds

    Get PDF
    Quantum reading refers to the task of reading out classical information stored in a read-only memory device. In any such protocol, the transmitter and receiver are in the same physical location, and the goal of such a protocol is to use these devices (modeled by independent quantum channels), coupled with a quantum strategy, to read out as much information as possible from a memory device, such as a CD or DVD. As a consequence of the physical setup of quantum reading, the most natural and general definition for quantum reading capacity should allow for an adaptive operation after each call to the channel, and this is how we define quantum reading capacity in this paper. We also establish several bounds on quantum reading capacity, and we introduce an environment-parametrized memory cell with associated environment states, delivering second-order and strong converse bounds for its quantum reading capacity. We calculate the quantum reading capacities for some exemplary memory cells, including a thermal memory cell, a qudit erasure memory cell, and a qudit depolarizing memory cell. We finally provide an explicit example to illustrate the advantage of using an adaptive strategy in the context of zero-error quantum reading capacity.Comment: v3: 17 pages, 2 figures, final version published in IEEE Transactions on Information Theor

    Resonant Multilevel Amplitude Damping Channels

    Get PDF
    We introduce a new set of quantum channels: resonant multilevel amplitude damping (ReMAD) channels. Among other instances, they can describe energy dissipation effects in multilevel atomic systems induced by the interaction with a zero-temperature bosonic environment. At variance with the already known class of multilevel amplitude damping (MAD) channels, this new class of maps allows the presence of an environment unable to discriminate transitions with identical energy gaps. After characterizing the algebra of their composition rules, by analyzing the qutrit case, we show that this new set of channels can exhibit degradability and antidegradability in vast regions of the allowed parameter space. There we compute their quantum capacity and private classical capacity. We show that these capacities can be computed exactly also in regions of the parameter space where the channels aren't degradable nor antidegradable
    corecore