Gaussian Operations and Privacy
Preprint
- 1 February 2005
Abstract
We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in M. Navascues et al., Phys. Rev. Lett. 94, 010502 (2005). Then, we prove that a generalized version of this protocol does not allow to distill a secret key out of bound entangled Gaussian states.Keywords
All Related Versions
- Version 1, 2005-02-01, ArXiv
- Published version: Physical Review A, 72 (1).
This publication has 0 references indexed in Scilit: