2005
DOI: 10.1103/physrevlett.94.010502
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Key Distillation from Gaussian States by Gaussian Operations

Abstract: We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with nonpositive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
46
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 24 publications
(47 citation statements)
references
References 30 publications
(49 reference statements)
1
46
0
Order By: Relevance
“…Notice that Eve can gain information if the overlap between her states after Alice and Bob have measured coincident results is sufficiently small. The above inequalities come from the fact that in the case of individual attacks the error on Eve's estimation of the final bit b is bound from below by a term proportional to | e ++ |e −− | N [1]. Therefore, Alice and Bob can establish a key if…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Notice that Eve can gain information if the overlap between her states after Alice and Bob have measured coincident results is sufficiently small. The above inequalities come from the fact that in the case of individual attacks the error on Eve's estimation of the final bit b is bound from below by a term proportional to | e ++ |e −− | N [1]. Therefore, Alice and Bob can establish a key if…”
Section: Resultsmentioning
confidence: 99%
“…In [1] it was shown that any 1 × 1 NPPT state fulfills the above inequality and thus any NPPT gaussian state can be used to establish a secure key in front of individual eavesdropper attacks.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations