Gaussian operations and privacy
- 5 July 2005
- journal article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 72 (1)
- https://doi.org/10.1103/physreva.72.012303
Abstract
We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in M. Navascues et al., Phys. Rev. Lett. 94, 010502 (2005). Then, we prove that a generalized version of this protocol does not allow to distill a secret key out of bound entangled Gaussian states.Keywords
All Related Versions
This publication has 28 references indexed in Scilit:
- Quantum Correlations and Secret BitsPhysical Review Letters, 2005
- Quantum Key Distillation from Gaussian States by Gaussian OperationsPhysical Review Letters, 2005
- Relating Quantum Privacy and Quantum Coherence: An Operational ApproachPhysical Review Letters, 2004
- Entanglement as a Precondition for Secure Quantum Key DistributionPhysical Review Letters, 2004
- Continuous Variable Quantum Cryptography: Beating the 3 dB Loss LimitPhysical Review Letters, 2002
- Distilling Gaussian States with Gaussian Operations is ImpossiblePhysical Review Letters, 2002
- The “transition probability” in the state space of a ∗-algebraPublished by Elsevier ,2002
- Continuous Variable Quantum Cryptography Using Coherent StatesPhysical Review Letters, 2002
- Secure quantum key distribution using squeezed statesPhysical Review A, 2001
- Noncommuting Mixed States Cannot Be BroadcastPhysical Review Letters, 1996