Continuous-Variable Quantum Cryptography is Secure against Non-Gaussian Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequent...

متن کامل

Optimality of Gaussian attacks in continuous-variable quantum cryptography.

We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

متن کامل

Security of continuous-variable quantum key distribution against general attacks.

We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries...

متن کامل

Quantum error correction of continuous-variable states against Gaussian noise

Continuous-variable quantum information protocols use quantum operations and measurements acting on states with continuous eigenvalue spectra to perform quantum information tasks such as quantum teleportation, quantum key distribution, and quantum processing [1]. An attraction of continuous-variable protocols is that many require only Gaussian states, operations, and measurements [2]—all of whi...

متن کامل

Security of Quantum Cryptography against Collective Attacks

We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review Letters

سال: 2004

ISSN: 0031-9007,1079-7114

DOI: 10.1103/physrevlett.92.047905