scispace - formally typeset
Search or ask a question
Author

Mario Berta

Bio: Mario Berta is an academic researcher from Imperial College London. The author has contributed to research in topics: Quantum information & Quantum channel. The author has an hindex of 35, co-authored 114 publications receiving 4482 citations. Previous affiliations of Mario Berta include Ludwig Maximilian University of Munich & ETH Zurich.


Papers
More filters
Journal ArticleDOI
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Abstract: Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this paper, we provide both a general introduction and a state-of-the-art description of the recent advances in the field, both theoretical and experimental. We start by reviewing protocols of quantum key distribution based on discrete variable systems. Next we consider aspects of device independence, satellite challenges, and protocols based on continuous-variable systems. We will then discuss the ultimate limits of point-to-point private communications and how quantum repeaters and networks may overcome these restrictions. Finally, we will discuss some aspects of quantum cryptography beyond standard quantum key distribution, including quantum random number generators and quantum digital signatures.

769 citations

Journal ArticleDOI
TL;DR: In this article, the authors extend the Heisenberg uncertainty principle to include the case of quantum memories, and should provide a guide for quantum information applications. But they do not consider the case where a memory device stores quantum information.
Abstract: The Heisenberg uncertainty principle bounds the uncertainties about the outcomes of two incompatible measurements on a quantum particle. This bound, however, changes if a memory device is involved that stores quantum information. New work now extends the uncertainty principle to include the case of quantum memories, and should provide a guide for quantum information applications.

648 citations

Journal ArticleDOI
TL;DR: This review surveys entropic uncertainty relations that capture Heisenberg’s idea that the results of incompatible measurements are impossible to predict, covering both finite- and infinite-dimensional measurements.
Abstract: Heisenberg’s uncertainty principle forms a fundamental element of quantum mechanics. Uncertainty relations in terms of entropies were initially proposed to deal with conceptual shortcomings in the original formulation of the uncertainty principle and, hence, play an important role in quantum foundations. More recently, entropic uncertainty relations have emerged as the central ingredient in the security analysis of almost all quantum cryptographic protocols, such as quantum key distribution and two-party quantum cryptography. This review surveys entropic uncertainty relations that capture Heisenberg’s idea that the results of incompatible measurements are impossible to predict, covering both finite- and infinite-dimensional measurements. These ideas are then extended to incorporate quantum correlations between the observed object and its environment, allowing for a variety of recent, more general formulations of the uncertainty principle. Finally, various applications are discussed, ranging from entanglement witnessing to wave-particle duality to quantum cryptography.

539 citations

Journal ArticleDOI
TL;DR: Quantum cryptography is arguably the fastest growing area in quantum information science as mentioned in this paper, and many quantum key distribution protocols have been proposed, both theoretically and experimentally, over the last few decades.
Abstract: Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of the art description of the recent advances in the field, both theoretically and experimentally. We start by reviewing protocols of quantum key distribution based on discrete variable systems. Next we consider aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems. We will then discuss the ultimate limits of point-to-point private communications and how quantum repeaters and networks may overcome these restrictions. Finally, we will discuss some aspects of quantum cryptography beyond standard quantum key distribution, including quantum data locking and quantum digital signatures.

350 citations

Journal ArticleDOI
TL;DR: A version of the entropic uncertainty relation for smooth entropies is employed to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol.
Abstract: We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

262 citations


Cited by
More filters
Journal ArticleDOI

2,415 citations

01 Jan 1973
TL;DR: In this paper, the authors present a reformulation of quantum theory in a form believed suitable for application to general relativity, from which the conventional interpretation of quantum mechanics can be deduced.
Abstract: The task of quantizing general relativity raises serious questions about the meaning of the present formulation and interpretation of quantum mechanics when applied to so fundamental a structure as the space-time geometry itself. This paper seeks to clarify the foundations of quantum mechanics. It presents a reformulation of quantum theory in a form believed suitable for application to general relativity. The aim is not to deny or contradict the conventional formulation of quantum theory, which has demonstrated its usefulness in an overwhelming variety of problems, but rather to supply a new, more general and complete formulation, from which the conventional interpretation can be deduced. The relationship of this new formulation to the older formulation is therefore that of a metatheory to a theory, that is, it is an underlying theory in which the nature and consistency, as well as the realm of applicability, of the older theory can be investigated and clarified.

2,091 citations

01 Jan 2016
TL;DR: The methods of modern mathematical physics is universally compatible with any devices to read and is available in the digital library an online access to it is set as public so you can download it instantly.
Abstract: Thank you very much for reading methods of modern mathematical physics. Maybe you have knowledge that, people have look numerous times for their favorite novels like this methods of modern mathematical physics, but end up in harmful downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they are facing with some infectious virus inside their desktop computer. methods of modern mathematical physics is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection saves in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Merely said, the methods of modern mathematical physics is universally compatible with any devices to read.

1,536 citations

Journal ArticleDOI
TL;DR: The fundamental rate-loss tradeoff affecting any protocol of quantum key distribution is determined, which sets the limits of point-to-point quantum communications and provides precise and general benchmarks for quantum repeaters.
Abstract: Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed ‘teleportation stretching’, we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters.

1,116 citations