2019
DOI: 10.1038/s41534-019-0133-3
|View full text |Cite
|
Sign up to set email alerts
|

Characterising the correlations of prepare-and-measure quantum networks

Abstract: Prepare-and-measure (P&M) quantum networks are the basic building blocks of quantum communication and cryptography. These networks crucially rely on non-orthogonal quantum encodings to distribute quantum correlations, thus enabling superior communication rates and informationtheoretic security. Here, we present a computational toolbox that is able to efficiently characterise the set of input-output probability distributions for any discrete-variable P&M quantum network, assuming only the inner-product informat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
96
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 63 publications
(98 citation statements)
references
References 61 publications
1
96
1
Order By: Relevance
“…By finding such a characterisation and by understanding the trade-off between the two QRACs, we enable self-tests of Bob's instrument, along with self-tests of Alice's preparations and Charlie's measurements. Note that one may also consider alternative generalisations of QRACs to sequential scenarios [17].…”
Section: Sequential Racsmentioning
confidence: 99%
“…By finding such a characterisation and by understanding the trade-off between the two QRACs, we enable self-tests of Bob's instrument, along with self-tests of Alice's preparations and Charlie's measurements. Note that one may also consider alternative generalisations of QRACs to sequential scenarios [17].…”
Section: Sequential Racsmentioning
confidence: 99%
“…By doing so, we have shown that, as long as the magnitude of the correlations is small, a secret key can still be obtained even when there are correlations over a long range of pulses. Moreover, our framework can be directly applied in combination with existing security proofs such as the GLT protocol (18), the GLLP type security proofs involving the quantum coin idea (19)(20)(21), and the numerical techniques recently introduced in (22)(23)(24). Furthermore, we have proposed a new framework for security proofs, which we call the RT.…”
Section: Discussionmentioning
confidence: 99%
“…x > y 2 (22) No measurement, including any measurement performed by Eve, can induce a larger deviation between the probabilities because Eq. 20 holds for any ˆ M .…”
Section: Rt Based On the Original Lt Protocolmentioning
confidence: 99%
“…Commercially available convex optimization tools, such as Mosek 7 , SeDuMi 8 , or SDPT3 9 , can therefore be used to reliably solve the problem. A more recent technique opted to compute the secret key rate by directly bounding the quantum error rate of a protocol using the Gram matrix of the eavesdropper's information 10,11 . Nevertheless, the problems formulated so far still assumed that Alice and Bob have exchanged an infinite number of signals (and an infinite-key length), which is practically impossible.…”
Section: Introductionmentioning
confidence: 99%