2018
DOI: 10.1088/2058-9565/aac394
|View full text |Cite|
|
Sign up to set email alerts
|

Abstract: We review recent results on the simulation of quantum channels, the reduction of adaptive protocols (teleportation stretching), and the derivation of converse bounds for quantum and private communication, as established in PLOB [Pirandola, Laurenza, Ottaviani, Banchi, arXiv:1510.08863]. We start by introducing a general weak converse bound for private communication based on the relative entropy of entanglement. We discuss how combining this bound with channel simulation and teleportation stretching, PLOB estab… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

6
176
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 133 publications
(182 citation statements)
references
References 168 publications
6
176
0
Order By: Relevance
“…For further details see Ref. [32]. Most importantly, notice that our derivation can be generalized to other bosonic broadcast channels, where the M + 1 beamsplitters are replaced by arbitrary Gaussian unitaries…”
Section: B Thermal-loss Quantum Broadcast Channelmentioning
confidence: 98%
See 3 more Smart Citations
“…For further details see Ref. [32]. Most importantly, notice that our derivation can be generalized to other bosonic broadcast channels, where the M + 1 beamsplitters are replaced by arbitrary Gaussian unitaries…”
Section: B Thermal-loss Quantum Broadcast Channelmentioning
confidence: 98%
“…[31] provided three equivalent proofs, based on alternative treatments of the private state involved in the definition of the secret key capacity. The first proof exploits the fact that the dimension of the shield system [43] of the private state has an effective exponential scaling in the number of channel uses; this scaling is an immediate application of well-known results in the literature [46,47], whose adaptation to CVs is trivial as discussed in [31,Supplementary Note 3] and also in the recent review [32]. The second proof assumes an exponential energy growth in the channel uses, while the third proof does not depend on the shield size.…”
Section: Remarkmentioning
confidence: 99%
See 2 more Smart Citations
“…The increasing attention received by CV-QKD in recent years is justified by the relative simplicity of the experimental setup, and the very high key-rate achievable, which can be close to the secret-key capacity of an optical communication channel, also known as PLOB bound [39,42,43]. Moreover, the possibility of implementing communications exploiting all the electromagnetic spectrum represents an additional appealing feature of CV systems.…”
Section: Introductionmentioning
confidence: 99%