Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines

We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coh...

Full description

Bibliographic Details
Main Authors: Pirandola, Stefano, Mancini, Stefano, Lloyd, Seth, Braunstein, Samuel L.
Other Authors: Massachusetts Institute of Technology. Department of Mechanical Engineering
Format: Article
Language:en_US
Published: Institute of Electrical and Electronics Engineers 2010
Online Access:http://hdl.handle.net/1721.1/60056
_version_ 1826206876388294656
author Pirandola, Stefano
Mancini, Stefano
Lloyd, Seth
Braunstein, Samuel L.
author2 Massachusetts Institute of Technology. Department of Mechanical Engineering
author_facet Massachusetts Institute of Technology. Department of Mechanical Engineering
Pirandola, Stefano
Mancini, Stefano
Lloyd, Seth
Braunstein, Samuel L.
author_sort Pirandola, Stefano
collection MIT
description We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.
first_indexed 2024-09-23T13:39:37Z
format Article
id mit-1721.1/60056
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T13:39:37Z
publishDate 2010
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling mit-1721.1/600562022-10-01T16:22:08Z Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines Pirandola, Stefano Mancini, Stefano Lloyd, Seth Braunstein, Samuel L. Massachusetts Institute of Technology. Department of Mechanical Engineering Massachusetts Institute of Technology. Research Laboratory of Electronics Lloyd, Seth Pirandola, Stefano Lloyd, Seth We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines. Sixth Framework Programme (European Commission) (Marie Curie Outgoing International Fellowship) W.M. Keck Foundation (Center for extreme Quantum Information Theory (xQIT)) Consorzio Nazionale Interuniversitario per le Scienze Fisiche della Materia (CNISM) 2010-12-02T14:38:53Z 2010-12-02T14:38:53Z 2009-02 2009-02 Article http://purl.org/eprint/type/ConferencePaper 978-1-4244-3349-0 http://hdl.handle.net/1721.1/60056 Pirandola, S. et al. “Eavesdropping of Two-Way Coherent-State Quantum Cryptography via Gaussian Quantum Cloning Machines.” Quantum, Nano and Micro Technologies, 2009. ICQNM '09. Third International Conference on. 2009. 38-41. © Copyright 2009 IEEE en_US http://dx.doi.org/10.1109/ICQNM.2009.8 Third International Conference on Quantum, Nano and Micro Technologies, 2009. ICQNM '09. Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. application/pdf Institute of Electrical and Electronics Engineers IEEE
spellingShingle Pirandola, Stefano
Mancini, Stefano
Lloyd, Seth
Braunstein, Samuel L.
Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
title Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
title_full Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
title_fullStr Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
title_full_unstemmed Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
title_short Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
title_sort eavesdropping of two way coherent state quantum cryptography via gaussian quantum cloning machines
url http://hdl.handle.net/1721.1/60056
work_keys_str_mv AT pirandolastefano eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines
AT mancinistefano eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines
AT lloydseth eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines
AT braunsteinsamuell eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines