22,389 research outputs found
Gaussian Quantum Information
The science of quantum information has arisen over the last two decades
centered on the manipulation of individual quanta of information, known as
quantum bits or qubits. Quantum computers, quantum cryptography and quantum
teleportation are among the most celebrated ideas that have emerged from this
new field. It was realized later on that using continuous-variable quantum
information carriers, instead of qubits, constitutes an extremely powerful
alternative approach to quantum information processing. This review focuses on
continuous-variable quantum information processes that rely on any combination
of Gaussian states, Gaussian operations, and Gaussian measurements.
Interestingly, such a restriction to the Gaussian realm comes with various
benefits, since on the theoretical side, simple analytical tools are available
and, on the experimental side, optical components effecting Gaussian processes
are readily available in the laboratory. Yet, Gaussian quantum information
processing opens the way to a wide variety of tasks and applications, including
quantum communication, quantum cryptography, quantum computation, quantum
teleportation, and quantum state and channel discrimination. This review
reports on the state of the art in this field, ranging from the basic
theoretical tools and landmark experimental realizations to the most recent
successful developments.Comment: 51 pages, 7 figures, submitted to Reviews of Modern Physic
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
A general scheme for information interception in the ping pong protocol
The existence of an undetectable eavesdropping of dense coded information has
been already demonstrated by Pavi\v{c}i\'c for the quantum direct communication
based on the ping-pong paradigm. However, a) the explicit scheme of the circuit
is only given and no design rules are provided, b) the existence of losses is
implicitly assumed, c) the attack has been formulated against qubit based
protocol only and it is not clear whether it can be adapted to higher
dimensional systems. These deficiencies are removed in the presented
contribution. A new generic eavesdropping scheme built on a firm theoretical
background is proposed. In contrast to the previous approach, it does not refer
to the properties of the vacuum state, so it is fully consistent with the
absence of losses assumption. Moreover, the scheme applies to the communication
paradigm based on signal particles of any dimensionality. It is also shown that
some well known attacks are special cases of the proposed scheme.Comment: 10 pages, 4 figure
Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense
We address the role of the phase-insensitive trusted preparation and
detection noise in the security of a continuous-variable quantum key
distribution, considering the Gaussian protocols on the basis of coherent and
squeezed states and studying them in the conditions of Gaussian lossy and noisy
channels. The influence of such a noise on the security of Gaussian quantum
cryptography can be crucial, even despite the fact that a noise is trusted, due
to a strongly nonlinear behavior of the quantum entropies involved in the
security analysis. We recapitulate the known effect of the preparation noise in
both direct and reverse-reconciliation protocols, as well as the detection
noise in the reverse-reconciliation scenario. As a new result, we show the
negative role of the trusted detection noise in the direct-reconciliation
scheme. We also describe the role of the trusted preparation or detection noise
added at the reference side of the protocols in improving the robustness of the
protocols to the channel noise, confirming the positive effect for the
coherent-state reverse-reconciliation protocol. Finally, we address the
combined effect of trusted noise added both in the source and the detector.Comment: 25 pages, 9 figure
Complete elimination of information leakage in continuous-variable quantum communication channels
In all lossy communication channels realized to date, information is
inevitably leaked to a potential eavesdropper. Here we present a communication
protocol that does not allow for any information leakage to a potential
eavesdropper in a purely lossy channel. By encoding information into a
restricted Gaussian alphabet of squeezed states we show, both theoretically and
experimentally, that the Holevo information between the eavesdropper and the
intended recipient can be exactly zero in a purely lossy channel while
minimized in a noisy channel. This result is of fundamental interest, but might
also have practical implications in extending the distance of secure quantum
key distribution.Comment: 9 pages, 5 figure
- …