Continuous-variable quantum cryptography using two-way quantum communication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret key rates, even in the presence of strong losses ...

متن کامل

Information on the paper “ Continuous variable quantum cryptography using two - way quantum communication ”

Stefano Pirandola, Stefano Mancini, Seth Lloyd, 3 and Samuel L. Braunstein Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge MA 02139, USA Dipartimento di Fisica & CNISM, Università di Camerino, Camerino 62032, Italy Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge MA 02139, USA Department of Computer Science, University o...

متن کامل

Continuous variable quantum cryptography using coherent states.

We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such ...

متن کامل

0 Security of Continuous Variable Quantum Cryptography

We discuss a quantum key distribution scheme in which small phase and amplitude modulations of CW light beams carry the key information. The presence of EPR type correlations provides the quantum protection. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of security. We...

متن کامل

Practical limitation for continuous-variable quantum cryptography using coherent States.

In this Letter, first, we investigate the security of a continuous-variable quantum cryptographic scheme with a postselection process against individual beam splitting attack. It is shown that the scheme can be secure in the presence of the transmission loss owing to the postselection. Second, we provide a loss limit for continuous-variable quantum cryptography using coherent states taking into...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Physics

سال: 2008

ISSN: 1745-2473,1745-2481

DOI: 10.1038/nphys1018