scispace - formally typeset
Search or ask a question

Showing papers by "Stefano Pirandola published in 2008"


Journal ArticleDOI
TL;DR: By making the optimum joint measurement on the light received from the target region together with the retained spontaneous parametric down-conversion idler beam, the quantum-illumination system realizes a 6 dB advantage in the error-probability exponent over the optimum reception coherent-state system.
Abstract: An optical transmitter irradiates a target region containing a bright thermal-noise bath in which a low-reflectivity object might be embedded. The light received from this region is used to decide whether the object is present or absent. The performance achieved using a coherent-state transmitter is compared with that of a quantum-illumination transmitter, i.e., one that employs the signal beam obtained from spontaneous parametric down-conversion. By making the optimum joint measurement on the light received from the target region together with the retained spontaneous parametric down-conversion idler beam, the quantum-illumination system realizes a 6 dB advantage in the error-probability exponent over the optimum reception coherent-state system. This advantage accrues despite there being no entanglement between the light collected from the target region and the retained idler beam.

584 citations


Journal ArticleDOI
TL;DR: A class of quantum-cryptographic protocols is proposed that involves back-and-forth communication between two parties and should tolerate higher levels of noise and loss than conventional ‘one-way’ protocols.
Abstract: A class of quantum-cryptographic protocols is proposed that involves back-and-forth communication between two parties. The approach is shown to provide enhanced security and should tolerate higher levels of noise and loss than conventional ‘one-way’ protocols.

257 citations


Journal ArticleDOI
TL;DR: A simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography is provided and the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication are analyzed.
Abstract: We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

192 citations


Journal ArticleDOI
TL;DR: By combining the Minkowski inequality and the quantum Chernoff bound, easy-to-compute upper bounds for the error probability affecting the optimal discrimination of Gaussian states are derived.
Abstract: By combining the Minkowski inequality and the quantum Chernoff bound, we derive easy-to-compute upper bounds for the error probability affecting the optimal discrimination of Gaussian states. In particular, these bounds are useful when the Gaussian states are unitarily inequivalent, i.e., they differ in their symplectic invariants.

151 citations


Journal ArticleDOI
TL;DR: Using the stabilizer formalism, the minimal code is constructed into a D-dimensional Hilbert space to protect a qubit against phase damping and the e-ectiveness of this code is studied by means of input-output consistency.
Abstract: Using the stabilizer formalism we construct the minimal code into a $D$-dimensional Hilbert space (qudit) to protect a qubit against phase damping. The effectiveness of this code is then studied by means of input-output fidelity.

42 citations


Journal ArticleDOI
01 Oct 2008-EPL
TL;DR: It is shown how continuous-variable systems can allow the direct communication of messages with an acceptable degree of privacy by combining a suitable phase-space encoding of the plain message with real-time checks of the quantum communication channel.
Abstract: We show how continuous-variable systems can allow the direct communication of messages with an acceptable degree of privacy. This is possible by combining a suitable phase-space encoding of the plain message with real-time checks of the quantum communication channel. The resulting protocol works properly when a small amount of noise affects the quantum channel. If this noise is non-tolerable, the protocol stops leaving a limited amount of information to a potential eavesdropper.

25 citations


Journal ArticleDOI
TL;DR: In this paper, the authors consider the collective eavesdropping of the BB84 and six-state protocols and show how these symmetric collective attacks are sufficiently strong in order to minimize the Devetak-Winter rates.
Abstract: We consider the collective eavesdropping of the BB84 and six-state protocols. Since these protocols are symmetric in the eigenstates of conjugate bases, we consider collective attacks having the same kind of symmetry. We then show how these symmetric collective attacks are sufficiently strong in order to minimize the Devetak–Winter rates. In fact, it is quite easy to construct simple examples able to reach the unconditionally secure key rates of these protocols.

7 citations


Journal ArticleDOI
TL;DR: This work considers the collective eavesdropping of the BB84 and six-state protocols and shows how these symmetric collective attacks are sufficiently strong in order to minimize the Devetak-Winter rates.
Abstract: We consider the collective eavesdropping of the BB84 and six-state protocols. Since these protocols are symmetric in the eigenstates of conjugate bases, we consider collective attacks having the same kind of symmetry. We then show how these symmetric collective attacks are sufficiently strong in order to minimize the Devetak-Winter rates. In fact, it is quite easy to construct simple examples able to reach the unconditionally-secure key-rates of these protocols.

5 citations


DOI
05 Sep 2008
TL;DR: In this paper, the authors considered asymmetric strategies where the Gaussian interactions can be different and classically correlated, and they proved that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.
Abstract: Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an eavesdropper are independent and identical. In this work, we consider asymmetric strategies where the Gaussian interactions can be different and classically correlated. For several attacks of this kind, we prove that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.

2 citations


01 Jan 2008
TL;DR: This work considers asymmetric strategies where the Gaussian interactions can bedifferent and classically correlated and proves that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.
Abstract: Computer Science, University of York, York YO10 5DD, United Kingdom(Dated: September 18, 2008)Recently, we have shown the advantages of two-way quantum communications in continuousvariable quantum cryptography Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an eavesdropper are independentand identical In thiswork, we consider asymmetric strategies where theGaussian interactions can bedifferent and classically correlated For several attacks of this kind, we prove that the enhancementof security still holds when the two-way protocols are used in direct reconciliationINTRODUCTION TO CONTINUOUS VARIABLEQUANTUM CRYPTOGRAPHY

2 citations


Posted ContentDOI
TL;DR: This work considers asymmetric strategies where the Gaussian interactions can be different and classically correlated and proves that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.
Abstract: Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an eavesdropper are independent and identical. In this work, we consider asymmetric strategies where the Gaussian interactions can be different and classically correlated. For several attacks of this kind, we prove that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.