Abstract
We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Braunstein, S.L., van Loock, P.: Rev. Mod. Phys. 77, 513 (2005)
Hillery, M.: Phys. Rev. A. 61, 022309 (2000); Ralph, T.C.: Phys. Rev. A 61, 010303(R) (2000)
Grosshans, F., Grangier, P.: Phys. Rev. Lett. 88, 057902 (2002); Grosshans, F., et al.: Nature 421, 238 (2003)
Weedbrook, C., et al.: Phys. Rev. Lett. 93, 170504 (2004); Lance, A.M., et al.: Phys. Rev. Lett. 95, 180503 (2005)
Pirandola, S., Braunstein, S.L., Lloyd, S.: Phys. Rev. Lett. 101, 200504 (2008)
Pirandola, S., Garcia-Patron, R., Braunstein, S.L., Lloyd, S.: Phys. Rev. Lett. 102, 050503 (2009)
Pirandola, S., Mancini, S., Lloyd, S., Braunstein, S.L.: Nature Physics 4, 726 (2008)
Pirandola, S., et al.: Europhys. Lett. 84, 20013 (2008); arXiv:0903.0750
Holevo, A.S.: Probl. Inform. Transm. 43, 1 (2007)
Serafini, A., et al.: Phys. Rev. A 71, 012320 (2005)
Caruso, F., et al.: New Journal of Physics 8, 310 (2006); Caruso, F., Giovannetti, V.: Phys. Rev. A 74, 062307 (2006)
In particular, class C describes an attenuator for 0 < τ< 1 and an amplifier for τ> 1. Class B 2 includes the ideal channel for r = 0
Cerf, N.J., et al.: Phys. Rev. Lett. 85, 1754 (2000)
A physical representation is a unitary dilation of the quantum channel where the environmental state ρ E can be (generally) mixed [11] (see also Ref. [21]). It is not unique up to partial isometries, except when it coincides with a Stinespring dilation (i.e., ρ E is pure)
The class B 2 is the unique class which is neither anti-degradable nor degradable [9]
Devetak, I., Shor, P.W.: Commun. Math. Phys. 256, 287 (2005)
Grosshans, F., et al.: Quant. Inf. and Comp. 3, 535 (2003)
In Fig. 2 the discontinuity of \( \varepsilon ^{\blacktriangleleft }=\varepsilon ^{\blacktriangleleft }(\tau )\) at τ= 0 is due to the limit μ→ + ∞, taken for every finite and non-zero τ. For every finite μ, the curve converges to zero in a continuous way
Filip, R.: Phys. Rev. A 77, 032347 (2008)
Notice that, in order to be optimal in DR, the individual OGC attack ignores the measurement of the anticlone. It is not known if such a further measurement can be useful in the eavesdropping of the protocol in RR
Holevo, A.S.: Probl. Inform. Transm. Inform. 8, 63 (1972); Lindblad, G.: Commun. Math. Phys. 48, 116 (1976)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pirandola, S., Braunstein, S.L., Lloyd, S. (2009). On the Security and Degradability of Gaussian Channels. In: Childs, A., Mosca, M. (eds) Theory of Quantum Computation, Communication, and Cryptography. TQC 2009. Lecture Notes in Computer Science, vol 5906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10698-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-10698-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10697-2
Online ISBN: 978-3-642-10698-9
eBook Packages: Computer ScienceComputer Science (R0)