We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in the conditions of Gaussian lossy and noisy channels. The influence of such a noise on the security of Gaussian quantum cryptography can be crucial, even despite the fact that a noise is trusted, due to a strongly nonlinear behavior of the quantum entropies involved in the security analysis. We recapitulate the known effect of the preparation noise in both direct and reverse-reconciliation protocols, as well as the detection noise in the reverse-reconciliation scenario. As a new result, we show the negative role of the trusted detection noise in the direct-reconciliation scheme. We also describe the role of the trusted preparation or detection noise added at the reference side of the protocols in improving the robustness of the protocols to the channel noise, confirming the positive effect for the coherent-state reverse-reconciliation protocol. Finally, we address the combined effect of trusted noise added both in the source and the detector.
{"title":"Trusted noise in continuous-variable quantum key distribution","authors":"Vladyslav C. Usenko, R. Filip","doi":"10.3390/e18010020","DOIUrl":"https://doi.org/10.3390/e18010020","url":null,"abstract":"We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in the conditions of Gaussian lossy and noisy channels. The influence of such a noise on the security of Gaussian quantum cryptography can be crucial, even despite the fact that a noise is trusted, due to a strongly nonlinear behavior of the quantum entropies involved in the security analysis. We recapitulate the known effect of the preparation noise in both direct and reverse-reconciliation protocols, as well as the detection noise in the reverse-reconciliation scenario. As a new result, we show the negative role of the trusted detection noise in the direct-reconciliation scheme. We also describe the role of the trusted preparation or detection noise added at the reference side of the protocols in improving the robustness of the protocols to the channel noise, confirming the positive effect for the coherent-state reverse-reconciliation protocol. Finally, we address the combined effect of trusted noise added both in the source and the detector.","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-04DOI: 10.3233/978-1-60750-547-1-76
V. Scarani
I review the ideas and main results in the derivation of security bounds in quantum key distribution for keys of finite length. In particular, all the detailed studies on specific protocols and implementations indicate that no secret key can be extracted if the number of processed signals per run is smaller than 10^5-10^6. I show how these numbers can be recovered from very basic estimates.
{"title":"QKD: a million signal task","authors":"V. Scarani","doi":"10.3233/978-1-60750-547-1-76","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-76","url":null,"abstract":"I review the ideas and main results in the derivation of security bounds in quantum key distribution for keys of finite length. In particular, all the detailed studies on specific protocols and implementations indicate that no secret key can be extracted if the number of processed signals per run is smaller than 10^5-10^6. I show how these numbers can be recovered from very basic estimates.","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130151732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-01-22DOI: 10.3233/978-1-60750-547-1-231
A. Sheremet, O. Mishina, E. Giacobino, D. Kupriyanov
We consider the coherent stimulated Raman process developing in an optically dense and disordered atomic medium in application to the quantum memory scheme. Our theoretical model predicts that the hyperfine interaction in the excited state of alkali atoms can positively affect on the quantum memory efficiency. Based on the concept of the coherent information transfer we analyze and compare the memory requirements for storage of single photon and macroscopic multi-photon light pulses.
{"title":"Atomic quantum memories for light","authors":"A. Sheremet, O. Mishina, E. Giacobino, D. Kupriyanov","doi":"10.3233/978-1-60750-547-1-231","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-231","url":null,"abstract":"We consider the coherent stimulated Raman process developing in an optically dense and disordered atomic medium in application to the quantum memory scheme. Our theoretical model predicts that the hyperfine interaction in the excited state of alkali atoms can positively affect on the quantum memory efficiency. Based on the concept of the coherent information transfer we analyze and compare the memory requirements for storage of single photon and macroscopic multi-photon light pulses.","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-01-07DOI: 10.3233/978-1-60750-547-1-138
Chen-Fu Chiang, P. Wocjan
In a recent work [10], Poulin and one of us presented a quantum algorithm for preparing thermal Gibbs states of interacting quantum systems. This algorithm is based on Grovers's technique for quantum state engineering, and its running time is dominated by the factor D/Z(beta), where D and Z(beta) denote the dimension of the quantum system and its partition function at inverse temperature beta, respectively. We present here a modified algorithm and a more detailed analysis of the errors that arise due to imperfect simulation of Hamiltonian time evolutions and limited performance of phase estimation (finite accuracy and nonzero probability of failure). This modfication together with the tighter analysis allows us to prove a better running time by the effect of these sources of error on the overall complexity. We think that the ideas underlying of our new analysis could also be used to prove a better performance of quantum Metropolis sampling by Temme et al. [12].
{"title":"Quantum algorithm for preparing thermal Gibbs states - detailed analysis","authors":"Chen-Fu Chiang, P. Wocjan","doi":"10.3233/978-1-60750-547-1-138","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-138","url":null,"abstract":"In a recent work [10], Poulin and one of us presented a quantum algorithm for preparing thermal Gibbs states of interacting quantum systems. This algorithm is based on Grovers's technique for quantum state engineering, and its running time is dominated by the factor D/Z(beta), where D and Z(beta) denote the dimension of the quantum system and its partition function at inverse temperature beta, respectively. \u0000We present here a modified algorithm and a more detailed analysis of the errors that arise due to imperfect simulation of Hamiltonian time evolutions and limited performance of phase estimation (finite accuracy and nonzero probability of failure). This modfication together with the tighter analysis allows us to prove a better running time by the effect of these sources of error on the overall complexity. We think that the ideas underlying of our new analysis could also be used to prove a better performance of quantum Metropolis sampling by Temme et al. [12].","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-60750-547-1-201
A. Mikhalychev, S. Kilin
{"title":"Continuous variable entanglement creation by means of small cross-Kerr nonlinearity","authors":"A. Mikhalychev, S. Kilin","doi":"10.3233/978-1-60750-547-1-201","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-201","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-60750-547-1-249
G. Wendin
{"title":"Solid state hybrid devices for quantum information processing","authors":"G. Wendin","doi":"10.3233/978-1-60750-547-1-249","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-249","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-60750-547-1-171
L. Czekaj, J. Korbicz, R. Chhajlany, P. Horodecki
{"title":"Superadditivity of multiple access gaussian channels","authors":"L. Czekaj, J. Korbicz, R. Chhajlany, P. Horodecki","doi":"10.3233/978-1-60750-547-1-171","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-171","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124715101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-60750-547-1-24
D. Horoshko, S. Kilin
{"title":"Quantum voting via NV centers in diamond","authors":"D. Horoshko, S. Kilin","doi":"10.3233/978-1-60750-547-1-24","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-24","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134035372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-60750-547-1-108
A. Wójcik, Krystian Hausmann
{"title":"Eavesdropping on the LM05 secure communication protocol","authors":"A. Wójcik, Krystian Hausmann","doi":"10.3233/978-1-60750-547-1-108","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-108","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132922507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-60750-547-1-148
A. Nizovtsev, S. Kilin, A. Pushkarchuk, V. Pushkarchuk, S. Kuten
{"title":"Spin-Hamiltonian analysis of quantum registers on single NV center and proximal 13C nuclei in diamond","authors":"A. Nizovtsev, S. Kilin, A. Pushkarchuk, V. Pushkarchuk, S. Kuten","doi":"10.3233/978-1-60750-547-1-148","DOIUrl":"https://doi.org/10.3233/978-1-60750-547-1-148","url":null,"abstract":"","PeriodicalId":116912,"journal":{"name":"Quantum Cryptography and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}