Skip to main content
Erschienen in: Quantum Information Processing 3/2017

01.03.2017

Teleportation-based continuous variable quantum cryptography

verfasst von: F. S. Luiz, Gustavo Rigolin

Erschienen in: Quantum Information Processing | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present a continuous variable (CV) quantum key distribution (QKD) scheme based on the CV quantum teleportation of coherent states that yields a raw secret key made up of discrete variables for both Alice and Bob. This protocol preserves the efficient detection schemes of current CV technology (no single-photon detection techniques) and, at the same time, has efficient error correction and privacy amplification schemes due to the binary modulation of the key. We show that for a certain type of incoherent attack, it is secure for almost any value of the transmittance of the optical line used by Alice to share entangled two-mode squeezed states with Bob (no 3 dB or 50% loss limitation characteristic of beam splitting attacks). The present CVQKD protocol works deterministically (no postselection needed) with efficient direct reconciliation techniques (no reverse reconciliation) in order to generate a secure key and beyond the 50% loss case at the incoherent attack level.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
Extensive reviews of the discrete variable protocols in [14] and their descendants can be found in [5, 6].
 
2
A discrete variable QKD scheme is based on the use of qubits or qudits (finite-dimensional Hilbert spaces) while a CVQKD scheme employs physical systems described by infinite-dimensional Hilbert spaces (such as coherent and squeezed states). Note, however, that in CVQKD protocols, the key can be modulated using either discrete or continuous alphabets/variables [36, 37]. In the present protocol, we use a discrete alphabet of coherent states to modulate the key and a two-mode squeezed state to teleport the coherent state from Alice to Bob. This is why we call our protocol a teleportation-based CVQKD scheme.
 
3
Note that the goals of the standard CV teleportation protocol [5153] as well as the one of Ref. [57] are not a secure transmission of quantum states. The generalized CV teleportation protocol of Ref. [57] is used here as a tool to the development of the present CVQKD scheme. Without the present modifications, the protocols given in Refs. [5153, 57] are not able to achieve a secure transmission of quantum states.
 
4
In other words, as we approach the value of \(50\%\) loss, either from above or below, the states reaching Bob and Eve become more and more equal and the key rate must necessary decrease, being exactly zero when we reach the \(50\%\) loss threshold since in this situation Bob and Eve have exactly the same state.
 
Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, p. 175 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, p. 175 (1984)
5.
Zurück zum Zitat Gisin, N., Ribordy, G., Tittle, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)ADSCrossRef Gisin, N., Ribordy, G., Tittle, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)ADSCrossRef
6.
Zurück zum Zitat Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)ADSCrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)ADSCrossRef
9.
Zurück zum Zitat Reid, M.D.: Quantum cryptography with a predetermined key, using continuous-variable Einstein–Podolsky–Rosen correlations. Phys. Rev. A 62, 062308 (2000)ADSCrossRef Reid, M.D.: Quantum cryptography with a predetermined key, using continuous-variable Einstein–Podolsky–Rosen correlations. Phys. Rev. A 62, 062308 (2000)ADSCrossRef
10.
Zurück zum Zitat Cerf, N.J., Lévy, M., Van Assche, G.: Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A 63, 052311 (2001)ADSCrossRef Cerf, N.J., Lévy, M., Van Assche, G.: Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A 63, 052311 (2001)ADSCrossRef
11.
Zurück zum Zitat Grosshans, F., Grangier, Ph: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88, 057902 (2002)ADSCrossRef Grosshans, F., Grangier, Ph: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88, 057902 (2002)ADSCrossRef
12.
Zurück zum Zitat Silberhorn, Ch., Ralph, T.C., Lütkenhaus, N., Leuchs, G.: Continuous variable quantum cryptography: beating the 3 dB loss limit. Phys. Rev. Lett. 89, 167901 (2002)ADSCrossRef Silberhorn, Ch., Ralph, T.C., Lütkenhaus, N., Leuchs, G.: Continuous variable quantum cryptography: beating the 3 dB loss limit. Phys. Rev. Lett. 89, 167901 (2002)ADSCrossRef
13.
Zurück zum Zitat Lorenz, S., Korolkova, N., Leuchs, G.: Continuous-variable quantum key distribution using polarization encoding and post selection. Appl. Phys. B 79, 273 (2004)CrossRef Lorenz, S., Korolkova, N., Leuchs, G.: Continuous-variable quantum key distribution using polarization encoding and post selection. Appl. Phys. B 79, 273 (2004)CrossRef
14.
Zurück zum Zitat Grosshans, F., Van Assche, G., Wenger, J., Brouri, R., Cerf, N.J., Grangier, Ph: Quantum key distribution using gaussian-modulated coherent states. Nature (London) 421, 238 (2003)ADSCrossRef Grosshans, F., Van Assche, G., Wenger, J., Brouri, R., Cerf, N.J., Grangier, Ph: Quantum key distribution using gaussian-modulated coherent states. Nature (London) 421, 238 (2003)ADSCrossRef
15.
Zurück zum Zitat Legré, M., Zbinden, H., Gisin, N.: Implementation of continuous variable quantum cryptography in optical fibres using a go-&-return configuration. Quantum Inf. Comput. 6, 326 (2006)MATH Legré, M., Zbinden, H., Gisin, N.: Implementation of continuous variable quantum cryptography in optical fibres using a go-&-return configuration. Quantum Inf. Comput. 6, 326 (2006)MATH
16.
Zurück zum Zitat Lodewyck, J., Debuisschert, T., Tualle-Brouri, R., Grangier, Ph: Controlling excess noise in fiber-optics continuous-variable quantum key distribution. Phys. Rev. A 72, 050303(R) (2005)ADSCrossRef Lodewyck, J., Debuisschert, T., Tualle-Brouri, R., Grangier, Ph: Controlling excess noise in fiber-optics continuous-variable quantum key distribution. Phys. Rev. A 72, 050303(R) (2005)ADSCrossRef
17.
Zurück zum Zitat Lodewyck, J., Bloch, M., García-Patrón, R., Fossier, S., Karpov, E., Diamanti, E., Debuisschert, T., Cerf, N.J., Tualle-Brouri, R., McLaughlin, S.W., Grangier, Ph: Quantum key distribution over 25km with an all-fiber continuous-variable system. Phys. Rev. A 76, 042305 (2007)ADSCrossRef Lodewyck, J., Bloch, M., García-Patrón, R., Fossier, S., Karpov, E., Diamanti, E., Debuisschert, T., Cerf, N.J., Tualle-Brouri, R., McLaughlin, S.W., Grangier, Ph: Quantum key distribution over 25km with an all-fiber continuous-variable system. Phys. Rev. A 76, 042305 (2007)ADSCrossRef
18.
Zurück zum Zitat Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, Ph, Diamanti, E.: Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 7, 378 (2013)ADSCrossRef Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, Ph, Diamanti, E.: Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 7, 378 (2013)ADSCrossRef
19.
Zurück zum Zitat Hirano, T., Yamanaka, H., Ashikaga, M., Konishi, T., Namiki, R.: Quantum cryptography using pulsed homodyne detection. Phys. Rev. A 68, 042331 (2003)ADSCrossRef Hirano, T., Yamanaka, H., Ashikaga, M., Konishi, T., Namiki, R.: Quantum cryptography using pulsed homodyne detection. Phys. Rev. A 68, 042331 (2003)ADSCrossRef
20.
Zurück zum Zitat Namiki, R., Hirano, T.: Security of quantum cryptography using balanced homodyne detection. Phys. Rev. A 67, 022308 (2003)ADSCrossRef Namiki, R., Hirano, T.: Security of quantum cryptography using balanced homodyne detection. Phys. Rev. A 67, 022308 (2003)ADSCrossRef
21.
Zurück zum Zitat Namiki, R., Hirano, T.: Practical limitation for continuous-variable quantum cryptography using coherent states. Phys. Rev. Lett. 92, 117901 (2004)ADSCrossRef Namiki, R., Hirano, T.: Practical limitation for continuous-variable quantum cryptography using coherent states. Phys. Rev. Lett. 92, 117901 (2004)ADSCrossRef
22.
Zurück zum Zitat Namiki, R., Hirano, T.: Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection. Phys. Rev. A 74, 032302 (2006)ADSCrossRef Namiki, R., Hirano, T.: Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection. Phys. Rev. A 74, 032302 (2006)ADSCrossRef
23.
Zurück zum Zitat Weedbrook, Ch., Lance, A.M., Bowen, W.P., Symul, Th, Ralph, T.C., Lam, P.K.: Quantum cryptography without switching. Phys. Rev. Lett. 93, 170504 (2004)ADSCrossRef Weedbrook, Ch., Lance, A.M., Bowen, W.P., Symul, Th, Ralph, T.C., Lam, P.K.: Quantum cryptography without switching. Phys. Rev. Lett. 93, 170504 (2004)ADSCrossRef
24.
Zurück zum Zitat Lance, A.M., Symul, Th, Sharma, V., Weedbrook, Ch., Ralph, T.C., Lam, P.K.: No-switching quantum key distribution using broadband modulated coherent light. Phys. Rev. Lett. 95, 180503 (2005)ADSCrossRef Lance, A.M., Symul, Th, Sharma, V., Weedbrook, Ch., Ralph, T.C., Lam, P.K.: No-switching quantum key distribution using broadband modulated coherent light. Phys. Rev. Lett. 95, 180503 (2005)ADSCrossRef
25.
Zurück zum Zitat Heid, M., Lütkenhaus, N.: Efficiency of coherent-state quantum cryptography in the presence of loss: influence of realistic error correction. Phys. Rev. A 73, 052316 (2006)ADSCrossRef Heid, M., Lütkenhaus, N.: Efficiency of coherent-state quantum cryptography in the presence of loss: influence of realistic error correction. Phys. Rev. A 73, 052316 (2006)ADSCrossRef
26.
Zurück zum Zitat Heid, M., Lütkenhaus, N.: Security of coherent-state quantum cryptography in the presence of Gaussian noise. Phys. Rev. A 76, 022313 (2007)ADSCrossRef Heid, M., Lütkenhaus, N.: Security of coherent-state quantum cryptography in the presence of Gaussian noise. Phys. Rev. A 76, 022313 (2007)ADSCrossRef
27.
Zurück zum Zitat Pirandola, S., Mancini, S., Lloyd, S., Braunstein, S.L.: Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 4, 726 (2008)CrossRef Pirandola, S., Mancini, S., Lloyd, S., Braunstein, S.L.: Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 4, 726 (2008)CrossRef
28.
Zurück zum Zitat García-Patrón, R., Cerf, N.J.: Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 102, 130501 (2009)ADSCrossRef García-Patrón, R., Cerf, N.J.: Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 102, 130501 (2009)ADSCrossRef
29.
Zurück zum Zitat Leverrier, A., Grangier, Ph: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 102, 180504 (2009)ADSCrossRef Leverrier, A., Grangier, Ph: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 102, 180504 (2009)ADSCrossRef
30.
Zurück zum Zitat Leverrier, A., Grangier, Ph: Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation. Phys. Rev. A 83, 042312 (2011)ADSCrossRef Leverrier, A., Grangier, Ph: Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation. Phys. Rev. A 83, 042312 (2011)ADSCrossRef
31.
Zurück zum Zitat Sych, D., Leuchs, G.: Coherent state quantum key distribution with multi letter phase-shift keying. New J. Phys. 12, 053019 (2010)ADSCrossRef Sych, D., Leuchs, G.: Coherent state quantum key distribution with multi letter phase-shift keying. New J. Phys. 12, 053019 (2010)ADSCrossRef
32.
Zurück zum Zitat Madsen, L.S., Usenko, V.C., Lassen, M., Filip, R., Andersen, U.L.: Continuous variable quantum key distribution with modulated entangled states. Nat. Commun. 3, 1083 (2012). doi:10.1038/ncomms2097 ADSCrossRef Madsen, L.S., Usenko, V.C., Lassen, M., Filip, R., Andersen, U.L.: Continuous variable quantum key distribution with modulated entangled states. Nat. Commun. 3, 1083 (2012). doi:10.​1038/​ncomms2097 ADSCrossRef
33.
Zurück zum Zitat Pirandola, S., Ottaviani, C., Spedalieri, G., Weedbrook, Ch., Braunstein, S.L., Lloyd, S., Gehring, T., Jacobsen, ChS, Andersen, U.L.: High-rate measurement-device-independent quantum cryptography. Nat. Photonics 9, 397 (2015)ADSCrossRef Pirandola, S., Ottaviani, C., Spedalieri, G., Weedbrook, Ch., Braunstein, S.L., Lloyd, S., Gehring, T., Jacobsen, ChS, Andersen, U.L.: High-rate measurement-device-independent quantum cryptography. Nat. Photonics 9, 397 (2015)ADSCrossRef
34.
Zurück zum Zitat Li, Z., Zhang, Y.-C., Xu, F., Peng, X., Guo, H.: Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052301 (2014)ADSCrossRef Li, Z., Zhang, Y.-C., Xu, F., Peng, X., Guo, H.: Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052301 (2014)ADSCrossRef
35.
Zurück zum Zitat Borelli, L.F.M., Aguiar, L.S., Roversi, J.A., Vidiella-Barranco, A.: Quantum key distribution using continuous-variable non-Gaussian states. Quantum Inf. Process. 15, 893 (2016)ADSMathSciNetCrossRefMATH Borelli, L.F.M., Aguiar, L.S., Roversi, J.A., Vidiella-Barranco, A.: Quantum key distribution using continuous-variable non-Gaussian states. Quantum Inf. Process. 15, 893 (2016)ADSMathSciNetCrossRefMATH
37.
Zurück zum Zitat Weedbrook, Ch., Pirandola, S., García-Patrón, R., Cerf, N.J., Ralph, T.C., Shapiro, J.H., Lloyd, S.: Gaussian quantum information. Rev. Mod. Phys. 84, 621 (2012)ADSCrossRef Weedbrook, Ch., Pirandola, S., García-Patrón, R., Cerf, N.J., Ralph, T.C., Shapiro, J.H., Lloyd, S.: Gaussian quantum information. Rev. Mod. Phys. 84, 621 (2012)ADSCrossRef
38.
Zurück zum Zitat Gottesman, D., Preskill, J.: Secure quantum key distribution using squeezed states. Phys. Rev. A 63, 022309 (2001)ADSCrossRef Gottesman, D., Preskill, J.: Secure quantum key distribution using squeezed states. Phys. Rev. A 63, 022309 (2001)ADSCrossRef
39.
Zurück zum Zitat Grosshans, F., Cerf, N.J.: Continuous-variable quantum cryptography is secure against non-Gaussian attacks. Phys. Rev. Lett. 92, 047905 (2004)ADSCrossRef Grosshans, F., Cerf, N.J.: Continuous-variable quantum cryptography is secure against non-Gaussian attacks. Phys. Rev. Lett. 92, 047905 (2004)ADSCrossRef
40.
Zurück zum Zitat Iblisdir, S., Van Assche, G., Cerf, N.J.: Security of quantum key distribution with coherent states and homodyne detection. Phys. Rev. Lett. 93, 170502 (2004)ADSCrossRef Iblisdir, S., Van Assche, G., Cerf, N.J.: Security of quantum key distribution with coherent states and homodyne detection. Phys. Rev. Lett. 93, 170502 (2004)ADSCrossRef
41.
Zurück zum Zitat Grosshans, F.: Collective attacks and unconditional security in continuous variable quantum key distribution. Phys. Rev. Lett. 94, 020504 (2005)ADSCrossRef Grosshans, F.: Collective attacks and unconditional security in continuous variable quantum key distribution. Phys. Rev. Lett. 94, 020504 (2005)ADSCrossRef
42.
Zurück zum Zitat Navascués, M., Acín, A.: Security bounds for continuous variables quantum key distribution. Phys. Rev. Lett. 94, 020505 (2005)ADSCrossRef Navascués, M., Acín, A.: Security bounds for continuous variables quantum key distribution. Phys. Rev. Lett. 94, 020505 (2005)ADSCrossRef
43.
Zurück zum Zitat Navascués, M., Grosshans, F., Acín, A.: Optimality of Gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 97, 190502 (2006)ADSCrossRef Navascués, M., Grosshans, F., Acín, A.: Optimality of Gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 97, 190502 (2006)ADSCrossRef
44.
Zurück zum Zitat García-Patrón, R., Cerf, N.J.: Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 97, 190503 (2006)ADSCrossRef García-Patrón, R., Cerf, N.J.: Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 97, 190503 (2006)ADSCrossRef
45.
Zurück zum Zitat Renner, R., Cirac, J.I.: de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 102, 110504 (2009)ADSCrossRef Renner, R., Cirac, J.I.: de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 102, 110504 (2009)ADSCrossRef
46.
Zurück zum Zitat Zhao, Y.-B., Heid, M., Rigas, J., Lütkenhaus, N.: Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks. Phys. Rev. A 79, 012307 (2009)ADSCrossRef Zhao, Y.-B., Heid, M., Rigas, J., Lütkenhaus, N.: Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks. Phys. Rev. A 79, 012307 (2009)ADSCrossRef
47.
Zurück zum Zitat Weedbrook, Ch., Pirandola, S., Lloyd, S., Ralph, T.C.: Quantum cryptography approaching the classical limit. Phys. Rev. Lett. 105, 110501 (2010)ADSCrossRef Weedbrook, Ch., Pirandola, S., Lloyd, S., Ralph, T.C.: Quantum cryptography approaching the classical limit. Phys. Rev. Lett. 105, 110501 (2010)ADSCrossRef
48.
Zurück zum Zitat Leverrier, A., García-Patrón, R., Renner, R., Cerf, N.J.: Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 110, 030502 (2013)ADSCrossRef Leverrier, A., García-Patrón, R., Renner, R., Cerf, N.J.: Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 110, 030502 (2013)ADSCrossRef
49.
Zurück zum Zitat Jouguet, P., Kunz-Jacques, S., Diamanti, E.: Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 87, 062313 (2013)ADSCrossRef Jouguet, P., Kunz-Jacques, S., Diamanti, E.: Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 87, 062313 (2013)ADSCrossRef
50.
Zurück zum Zitat Huang, J.-Z., Kunz-Jacques, S., Jouguet, P., Weedbrook, Ch., Yin, Z.-Q., Wang, Sh, Chen, W., Guo, G.-C., Han, Z.-F.: Quantum hacking on quantum key distribution using homodyne detection. Phys. Rev. A 89, 032304 (2014)ADSCrossRef Huang, J.-Z., Kunz-Jacques, S., Jouguet, P., Weedbrook, Ch., Yin, Z.-Q., Wang, Sh, Chen, W., Guo, G.-C., Han, Z.-F.: Quantum hacking on quantum key distribution using homodyne detection. Phys. Rev. A 89, 032304 (2014)ADSCrossRef
52.
Zurück zum Zitat Braunstein, S.L., Kimble, H.J.: Teleportation of continuous quantum variables. Phys. Rev. Lett. 80, 869 (1998)ADSCrossRef Braunstein, S.L., Kimble, H.J.: Teleportation of continuous quantum variables. Phys. Rev. Lett. 80, 869 (1998)ADSCrossRef
53.
Zurück zum Zitat Furusawa, A., Sørensen, J.L., Braunstein, S.L., Fuchs, C.A., Kimble, H.J., Polzik, E.S.: Unconditional quantum teleportation. Science 282, 706 (1998)ADSCrossRef Furusawa, A., Sørensen, J.L., Braunstein, S.L., Fuchs, C.A., Kimble, H.J., Polzik, E.S.: Unconditional quantum teleportation. Science 282, 706 (1998)ADSCrossRef
54.
Zurück zum Zitat Yoshino, K.-I., Aoki, T., Furusawa, A.: Generation of continuous-wave broadband entangled beams using periodically poled lithium niobate waveguides. Appl. Phys. Lett. 90, 041111 (2007)ADSCrossRef Yoshino, K.-I., Aoki, T., Furusawa, A.: Generation of continuous-wave broadband entangled beams using periodically poled lithium niobate waveguides. Appl. Phys. Lett. 90, 041111 (2007)ADSCrossRef
55.
Zurück zum Zitat Lee, N., Benichi, H., Takeno, Y., Takeda, Sh, Webb, J., Huntington, E., Furusawa, A.: Teleportation of nonclassical wave packets of light. Science 332, 330 (2011)ADSCrossRef Lee, N., Benichi, H., Takeno, Y., Takeda, Sh, Webb, J., Huntington, E., Furusawa, A.: Teleportation of nonclassical wave packets of light. Science 332, 330 (2011)ADSCrossRef
56.
Zurück zum Zitat Gordon, G., Rigolin, G.: Quantum cryptography using partially entangled states. Opt. Commun. 283, 184 (2010) Gordon, G., Rigolin, G.: Quantum cryptography using partially entangled states. Opt. Commun. 283, 184 (2010)
57.
Zurück zum Zitat Luiz, F.S., Rigolin, G.: Optimal continuous variable quantum teleportation protocol for realistic settings. Ann. Phys. 354, 409 (2015)ADSMathSciNetCrossRef Luiz, F.S., Rigolin, G.: Optimal continuous variable quantum teleportation protocol for realistic settings. Ann. Phys. 354, 409 (2015)ADSMathSciNetCrossRef
58.
Zurück zum Zitat Becir, A., Wahiddin, M.R.B.: Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement. Quantum Inf. Process. 12, 1155 (2013)ADSMathSciNetCrossRefMATH Becir, A., Wahiddin, M.R.B.: Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement. Quantum Inf. Process. 12, 1155 (2013)ADSMathSciNetCrossRefMATH
Metadaten
Titel
Teleportation-based continuous variable quantum cryptography
verfasst von
F. S. Luiz
Gustavo Rigolin
Publikationsdatum
01.03.2017
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 3/2017
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-016-1504-8

Weitere Artikel der Ausgabe 3/2017

Quantum Information Processing 3/2017 Zur Ausgabe

Neuer Inhalt