Teleportation-based continuous variable quantum cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information losses in continuous-variable quantum teleportation

Quantum teleportation allows the transmission of an unknown quantum state by combining the nonlocal quantum coherence of entangled states with the transmission of classical information obtained in a joint measurement of the unknown input state and one part of the entangled pair @1#. Ideally, the classical information transmitted contains no information about the input state, and the output stat...

متن کامل

Teleportation using continuous variable quantum cloning machine

We show that an unknown quantum state in phase space can be teleported via three-mode entanglement generated by continuous variable quantum cloning machine (transformation). Further, proceeding with our teleportation protocol we are able to improve the fidelity of teleportation obtained by Loock et.al. [Phys.Rev.Lett. 84, 3482(2000)]. Also we study here the entanglement between the two output c...

متن کامل

Criteria for Continuous-Variable Quantum Teleportation

We derive an experimentally testable criterion for the teleportation of quantum states of continuous variables. This criterion is especially relevant to the recent experiment of Furusawa et al. [Science 282, 706 (1998)] where an input-output fidelity of 0.58 ± 0.02 was achieved for optical coherent states. Our derivation demonstrates that fidelities greater than 1/2 could not have been achieved...

متن کامل

0 Security of Continuous Variable Quantum Cryptography

We discuss a quantum key distribution scheme in which small phase and amplitude modulations of CW light beams carry the key information. The presence of EPR type correlations provides the quantum protection. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of security. We...

متن کامل

Continuous variable quantum cryptography using coherent states.

We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum Information Processing

سال: 2017

ISSN: 1570-0755,1573-1332

DOI: 10.1007/s11128-016-1504-8