Teleportation-based continuous variable quantum cryptography
نویسندگان
چکیده
منابع مشابه
Information losses in continuous-variable quantum teleportation
Quantum teleportation allows the transmission of an unknown quantum state by combining the nonlocal quantum coherence of entangled states with the transmission of classical information obtained in a joint measurement of the unknown input state and one part of the entangled pair @1#. Ideally, the classical information transmitted contains no information about the input state, and the output stat...
متن کاملTeleportation using continuous variable quantum cloning machine
We show that an unknown quantum state in phase space can be teleported via three-mode entanglement generated by continuous variable quantum cloning machine (transformation). Further, proceeding with our teleportation protocol we are able to improve the fidelity of teleportation obtained by Loock et.al. [Phys.Rev.Lett. 84, 3482(2000)]. Also we study here the entanglement between the two output c...
متن کاملCriteria for Continuous-Variable Quantum Teleportation
We derive an experimentally testable criterion for the teleportation of quantum states of continuous variables. This criterion is especially relevant to the recent experiment of Furusawa et al. [Science 282, 706 (1998)] where an input-output fidelity of 0.58 ± 0.02 was achieved for optical coherent states. Our derivation demonstrates that fidelities greater than 1/2 could not have been achieved...
متن کامل0 Security of Continuous Variable Quantum Cryptography
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of CW light beams carry the key information. The presence of EPR type correlations provides the quantum protection. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of security. We...
متن کاملContinuous variable quantum cryptography using coherent states.
We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Information Processing
سال: 2017
ISSN: 1570-0755,1573-1332
DOI: 10.1007/s11128-016-1504-8