2017
DOI: 10.1038/ncomms15043
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental limits of repeaterless quantum communications

Abstract: Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without qua… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

23
1,638
6
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 1,060 publications
(1,668 citation statements)
references
References 74 publications
(195 reference statements)
23
1,638
6
1
Order By: Relevance
“…[31] proved that D 2 = Q 2 = K = − log 2 (1 − η) corresponding to ≃ 1.44η bits per channel use at high loss. The latter result completely characterizes the fundamental rate-loss scaling that affects any point-to-point protocol of QKD through a lossy communication line, such as an optical fiber or free-space link.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[31] proved that D 2 = Q 2 = K = − log 2 (1 − η) corresponding to ≃ 1.44η bits per channel use at high loss. The latter result completely characterizes the fundamental rate-loss scaling that affects any point-to-point protocol of QKD through a lossy communication line, such as an optical fiber or free-space link.…”
Section: Introductionmentioning
confidence: 99%
“…Only recently, after about 20 years [30], Ref. [31] finally addressed this problem and established the two-way capacities at which two remote parties can distribute entanglement (D 2 ), transmit quantum information (Q 2 ), and generate secret keys (K) over a number of fundamental quantum channels at both finite and infinite dimension, including erasure channels, dephasing channels, bosonic lossy channels and quantum-limited amplifiers. For a review of these results, see also Ref.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, we first calculate the secret key rate with the assumption that ideal quantum memories, meaning those that feature no limitations in performance, are employed. We compare the secret key rate per pulse of both schemes with the maximum rate achievable over a lossy channel, as obtained in [51]. We refer to this bound by the PLOB acronym.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…In section 3, we study the performance of these setups by calculating their secret key rates. In section 4, we present our numerical results by comparing the key rate with the fundamental rate bounds for the distribution of secure keys over a lossy channel found in [51]. We also determine the secret key rate of the quasi-EPR-based setup for different types of ensemble-based quantum memories and we compare the rate with that of no-memory systems.…”
Section: Introductionmentioning
confidence: 99%
“…The increasing attention received by CV-QKD in recent years is justified by the relative simplicity of the experimental setup, and the very high key-rate achievable, which can be close to the secret-key capacity of an optical communication channel, also known as PLOB bound [39,42,43]. Moreover, the possibility of implementing communications exploiting all the electromagnetic spectrum represents an additional appealing feature of CV systems.…”
Section: Introductionmentioning
confidence: 99%