Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coh...
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | en_US |
Published: |
Institute of Electrical and Electronics Engineers
2010
|
Online Access: | http://hdl.handle.net/1721.1/60056 |
_version_ | 1826206876388294656 |
---|---|
author | Pirandola, Stefano Mancini, Stefano Lloyd, Seth Braunstein, Samuel L. |
author2 | Massachusetts Institute of Technology. Department of Mechanical Engineering |
author_facet | Massachusetts Institute of Technology. Department of Mechanical Engineering Pirandola, Stefano Mancini, Stefano Lloyd, Seth Braunstein, Samuel L. |
author_sort | Pirandola, Stefano |
collection | MIT |
description | We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines. |
first_indexed | 2024-09-23T13:39:37Z |
format | Article |
id | mit-1721.1/60056 |
institution | Massachusetts Institute of Technology |
language | en_US |
last_indexed | 2024-09-23T13:39:37Z |
publishDate | 2010 |
publisher | Institute of Electrical and Electronics Engineers |
record_format | dspace |
spelling | mit-1721.1/600562022-10-01T16:22:08Z Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines Pirandola, Stefano Mancini, Stefano Lloyd, Seth Braunstein, Samuel L. Massachusetts Institute of Technology. Department of Mechanical Engineering Massachusetts Institute of Technology. Research Laboratory of Electronics Lloyd, Seth Pirandola, Stefano Lloyd, Seth We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines. Sixth Framework Programme (European Commission) (Marie Curie Outgoing International Fellowship) W.M. Keck Foundation (Center for extreme Quantum Information Theory (xQIT)) Consorzio Nazionale Interuniversitario per le Scienze Fisiche della Materia (CNISM) 2010-12-02T14:38:53Z 2010-12-02T14:38:53Z 2009-02 2009-02 Article http://purl.org/eprint/type/ConferencePaper 978-1-4244-3349-0 http://hdl.handle.net/1721.1/60056 Pirandola, S. et al. “Eavesdropping of Two-Way Coherent-State Quantum Cryptography via Gaussian Quantum Cloning Machines.” Quantum, Nano and Micro Technologies, 2009. ICQNM '09. Third International Conference on. 2009. 38-41. © Copyright 2009 IEEE en_US http://dx.doi.org/10.1109/ICQNM.2009.8 Third International Conference on Quantum, Nano and Micro Technologies, 2009. ICQNM '09. Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. application/pdf Institute of Electrical and Electronics Engineers IEEE |
spellingShingle | Pirandola, Stefano Mancini, Stefano Lloyd, Seth Braunstein, Samuel L. Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines |
title | Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines |
title_full | Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines |
title_fullStr | Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines |
title_full_unstemmed | Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines |
title_short | Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines |
title_sort | eavesdropping of two way coherent state quantum cryptography via gaussian quantum cloning machines |
url | http://hdl.handle.net/1721.1/60056 |
work_keys_str_mv | AT pirandolastefano eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines AT mancinistefano eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines AT lloydseth eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines AT braunsteinsamuell eavesdroppingoftwowaycoherentstatequantumcryptographyviagaussianquantumcloningmachines |