1,368 research outputs found
Generic Security Proof of Quantum Key Exchange using Squeezed States
Recently, a Quantum Key Exchange protocol that uses squeezed states was
presented by Gottesman and Preskill. In this paper we give a generic security
proof for this protocol. The method used for this generic security proof is
based on recent work by Christiandl, Renner and Ekert.Comment: 5 pages, 7 figures, accepted at IEEE ISIT 200
The Security of Practical Quantum Key Distribution
Quantum key distribution (QKD) is the first quantum information task to reach
the level of mature technology, already fit for commercialization. It aims at
the creation of a secret key between authorized partners connected by a quantum
channel and a classical authenticated channel. The security of the key can in
principle be guaranteed without putting any restriction on the eavesdropper's
power.
The first two sections provide a concise up-to-date review of QKD, biased
toward the practical side. The rest of the paper presents the essential
theoretical tools that have been developed to assess the security of the main
experimental platforms (discrete variables, continuous variables and
distributed-phase-reference protocols).Comment: Identical to the published version, up to cosmetic editorial change
Virtual Entanglement and Reconciliation Protocols for Quantum Cryptography with Continuous Variables
We discuss quantum key distribution protocols using quantum continuous
variables. We show that such protocols can be made secure against individual
gaussian attacks regardless the transmission of the optical line between Alice
and Bob. This is achieved by reversing the reconciliation procedure subsequent
to the quantum transmission, that is, using Bob's instead of Alice's data to
build the key. Although squeezing or entanglement may be helpful to improve the
resistance to noise, they are not required for the protocols to remain secure
with high losses. Therefore, these protocols can be implemented very simply by
transmitting coherent states and performing homodyne detection. Here, we show
that entanglement nevertheless plays a crucial role in the security analysis of
coherent state protocols. Every cryptographic protocol based on displaced
gaussian states turns out to be equivalent to an entanglement-based protocol,
even though no entanglement is actually present. This equivalence even holds in
the absence of squeezing, for coherent state protocols. This ``virtual''
entanglement is important to assess the security of these protocols as it
provides an upper bound on the mutual information between Alice and Bob if they
had used entanglement. The resulting security criteria are compared to the
separability criterion for bipartite gaussian variables. It appears that the
security thresholds are well within the entanglement region. This supports the
idea that coherent state quantum cryptography may be unconditionally secure.Comment: 18 pages, 6 figures. Submitted to QI
Gaussian Quantum Information
The science of quantum information has arisen over the last two decades
centered on the manipulation of individual quanta of information, known as
quantum bits or qubits. Quantum computers, quantum cryptography and quantum
teleportation are among the most celebrated ideas that have emerged from this
new field. It was realized later on that using continuous-variable quantum
information carriers, instead of qubits, constitutes an extremely powerful
alternative approach to quantum information processing. This review focuses on
continuous-variable quantum information processes that rely on any combination
of Gaussian states, Gaussian operations, and Gaussian measurements.
Interestingly, such a restriction to the Gaussian realm comes with various
benefits, since on the theoretical side, simple analytical tools are available
and, on the experimental side, optical components effecting Gaussian processes
are readily available in the laboratory. Yet, Gaussian quantum information
processing opens the way to a wide variety of tasks and applications, including
quantum communication, quantum cryptography, quantum computation, quantum
teleportation, and quantum state and channel discrimination. This review
reports on the state of the art in this field, ranging from the basic
theoretical tools and landmark experimental realizations to the most recent
successful developments.Comment: 51 pages, 7 figures, submitted to Reviews of Modern Physic
Entanglement in continuous variable systems: Recent advances and current perspectives
We review the theory of continuous-variable entanglement with special
emphasis on foundational aspects, conceptual structures, and mathematical
methods. Much attention is devoted to the discussion of separability criteria
and entanglement properties of Gaussian states, for their great practical
relevance in applications to quantum optics and quantum information, as well as
for the very clean framework that they allow for the study of the structure of
nonlocal correlations. We give a self-contained introduction to phase-space and
symplectic methods in the study of Gaussian states of infinite-dimensional
bosonic systems. We review the most important results on the separability and
distillability of Gaussian states and discuss the main properties of bipartite
entanglement. These include the extremal entanglement, minimal and maximal, of
two-mode mixed Gaussian states, the ordering of two-mode Gaussian states
according to different measures of entanglement, the unitary (reversible)
localization, and the scaling of bipartite entanglement in multimode Gaussian
states. We then discuss recent advances in the understanding of entanglement
sharing in multimode Gaussian states, including the proof of the monogamy
inequality of distributed entanglement for all Gaussian states, and its
consequences for the characterization of multipartite entanglement. We finally
review recent advances and discuss possible perspectives on the qualification
and quantification of entanglement in non Gaussian states, a field of research
that is to a large extent yet to be explored.Comment: 61 pages, 7 figures, 3 tables; Published as Topical Review in J.
Phys. A, Special Issue on Quantum Information, Communication, Computation and
Cryptography (v3: few typos corrected
Reconciliation of a Quantum-Distributed Gaussian Key
Two parties, Alice and Bob, wish to distill a binary secret key out of a list
of correlated variables that they share after running a quantum key
distribution protocol based on continuous-spectrum quantum carriers. We present
a novel construction that allows the legitimate parties to get equal bit
strings out of correlated variables by using a classical channel, with as few
leaked information as possible. This opens the way to securely correcting
non-binary key elements. In particular, the construction is refined to the case
of Gaussian variables as it applies directly to recent continuous-variable
protocols for quantum key distribution.Comment: 8 pages, 4 figures. Submitted to the IEEE for possible publication.
Revised version to improve its clarit
Entanglement of a Single Spin-1 Object: An Example of Ubiquitous Entanglement
Using a single spin-1 object as an example, we discuss a recent approach to
quantum entanglement. The key idea of the approach consists in presetting of
basic observables in the very definition of quantum system. Specification of
basic observables defines the dynamic symmetry of the system. Entangled states
of the system are then interpreted as states with maximal amount of uncertainty
of all basic observables. The approach gives purely physical picture of
entanglement. In particular, it separates principle physical properties of
entanglement from inessential. Within the model example under consideration, we
show relativity of entanglement with respect to dynamic symmetry and argue
existence of single-particle entanglement. A number of physical examples are
considered.Comment: 12 pages, 2 figure : title has been changed, paper is re-organized,
new section "Violation of Bell-type condition by single spin-1" is adde
- …