ABOUT OPTIMAL CLONING AND ENTANGLEMENT

2011 ◽  
Vol 09 (03) ◽  
pp. 915-936 ◽  
Author(s):  
THOMAS DURT ◽  
JOHAN VAN DE PUTTE

The main non-classical feature of quantum key distribution (QKD) is that it is characterized by a trade-off relation that limits the information possibly gained by a spy and the quality of the transmission line between the authorized users. In particular, perfect cloning is impossible, due to this trade-off, while optimal imperfect cloning saturates the trade-off relation. We investigate by numerical methods the deep nature of this trade-off relation, in the case of optimal cloning, and find that it reveals a subtle interplay between fidelity and entanglement.

2020 ◽  
Vol 28 (1) ◽  
pp. 168-181 ◽  
Author(s):  
Miralem Mehic ◽  
Peppino Fazio ◽  
Stefan Rass ◽  
Oliver Maurhart ◽  
Momtchil Peev ◽  
...  

2009 ◽  
Vol 15 (6) ◽  
pp. 1622-1629 ◽  
Author(s):  
A. Tanaka ◽  
W. Maeda ◽  
S. Takahashi ◽  
A. Tajima ◽  
A. Tomita

2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Víctor Zapatero ◽  
Marcos Curty

AbstractBesides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ultimate solution to defeat quantum hacking. Its security is based on a loophole-free violation of a Bell inequality, which results in a very limited maximum achievable distance. To overcome this limitation, DIQKD must be furnished with heralding devices like, for instance, qubit amplifiers, which can signal the arrival of a photon before the measurement settings are actually selected. In this way, one can decouple channel loss from the selection of the measurement settings and, consequently, it is possible to safely post-select the heralded events and discard the rest, which results in a significant enhancement of the achievable distance. In this work, we investigate photonic-based DIQKD assisted by two main types of qubit amplifiers in the finite data block size scenario, and study the resources—particularly, the detection efficiency of the photodetectors and the quality of the entanglement sources—that would be necessary to achieve long-distance DIQKD within a reasonable time frame of signal transmission.


Entropy ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. 1275
Author(s):  
Masakazu Yoshida ◽  
Ayumu Nakayama ◽  
Jun Cheng

We introduce a quantum key distribution protocol using mean multi-kings’ problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users’ information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users’ systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.


2010 ◽  
Vol 24 (23) ◽  
pp. 4611-4618 ◽  
Author(s):  
FEI GAO ◽  
FEN-ZHUO GUO ◽  
QIAO-YAN WEN ◽  
FU-CHEN ZHU

A quantum key distribution (QKD) protocol based on constructed nonorthogonal states is proposed. By transmitting the photons from Bell states in random order the sender constructs nonorthogonal states, which can prevent an eavesdropper from extracting the key information. At the destination, the receiver performs Bell measurements and then obtains secure key. Different from previous nonorthogonal-states-based QKD protocols, our protocol exhibits a new feature, that is, the users can also obtain some key bits even when they choose different "bases"! Thus it can reach a higher efficiency in theory. Besides, we present a trade-off between the information that an eavesdropper can elicit and the corresponding error rate he/she would introduce, which shows that our protocol is secure.


2011 ◽  
Vol 09 (06) ◽  
pp. 1427-1435 ◽  
Author(s):  
TAKAYUKI MIYADERA

The "semiquantum" key distribution protocol introduced by Zou et al. is examined. The protocol while using two-way quantum communication requires only Bob to be fully quantum. We derive a trade-off inequality between information gained by Eve and the disturbance observed by legitimate users. It guarantees that Eve cannot obtain large information if the disturbance is sufficiently small.


Sign in / Sign up

Export Citation Format

Share Document