scispace - formally typeset
Search or ask a question
Author

Stefano Pirandola

Bio: Stefano Pirandola is an academic researcher from University of York. The author has contributed to research in topics: Quantum & Quantum entanglement. The author has an hindex of 51, co-authored 286 publications receiving 14410 citations. Previous affiliations of Stefano Pirandola include Centre for Quantum Technologies & Massachusetts Institute of Technology.


Papers
More filters
Journal ArticleDOI
TL;DR: A two-way quantum communication protocol where Gaussian-modulated thermal states are subject to random Gaussian displacements and finally homodyned is considered, showing how its security threshold is extremely robust with respect to the preparation noise and able to outperform the security thresholds of one-way protocols at any wavelength.
Abstract: We study the security of two-way quantum cryptography at different wavelengths of the electromagnetic spectrum, from the optical down to the microwave range. In particular, we consider a two-way quantum communication protocol where Gaussian-modulated thermal states are subject to random Gaussian displacements and finally homodyned. We show how its security threshold (in reverse reconciliation) is extremely robust with respect to the preparation noise and able to outperform the security thresholds of one-way protocols at any wavelength. As a result, improved security distances are now accessible for implementing quantum key distribution in the very challenging regime of infrared frequencies.

76 citations

Journal ArticleDOI
25 Mar 2021
TL;DR: This work bound the ultimate rates for key and entanglement distribution through a free-space link, where the propagation of quantum systems is generally affected by diffraction, atmospheric extinction, turbulence, pointing errors, and background noise.
Abstract: This work establishes the limits for free-space quantum communications under the effects of diffraction, atmospheric extinction, pointing error, turbulence, and background noise.

75 citations

Journal ArticleDOI
TL;DR: It is found that, increasing the block-size, the performance of the protocol converges towards the ideal one, and that block-sizes between 10^{6} and 10^{9} data points can already provide a key rate $\sim10^{-2}$ bit/use over metropolitan distances.
Abstract: We study the impact of finite-size effects on the key rate of continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD), considering two-mode Gaussian attacks. Inspired by the parameter estimation technique developed in by Ruppert et al. [Phys. Rev. A 90, 062310 (2014)], we adapt it to study CV-MDI-QKD and, assuming realistic experimental conditions, we analyze the impact of finite-size effects on the key rate. We find that the performance of the protocol approaches the ideal one, increasing the block size, and, most importantly, that blocks between ${10}^{6}$ and ${10}^{9}$ data points may provide key rates $\ensuremath{\sim}{10}^{\ensuremath{-}2}$ bit/use over metropolitan distances.

74 citations

Journal ArticleDOI
TL;DR: This work investigates the symmetric discrimination of two arbitrary qudit channels by means of the most general protocols based on adaptive (feedback-assisted) quantum operations, and derives ultimate limits and no-go theorems for adaptive quantum illumination and single-photon quantum optical resolution.
Abstract: What is the ultimate performance for discriminating two arbitrary quantum channels acting on a finite-dimensional Hilbert space? Here we address this basic question by deriving a general and fundamental lower bound. More precisely, we investigate the symmetric discrimination of two arbitrary qudit channels by means of the most general protocols based on adaptive (feedback-assisted) quantum operations. In this general scenario, we first show how port-based teleportation can be used to simplify these adaptive protocols into a much simpler non-adaptive form, designing a new type of teleportation stretching. Then, we prove that the minimum error probability affecting the channel discrimination cannot beat a bound determined by the Choi matrices of the channels, establishing a general, yet computable formula for quantum hypothesis testing. As a consequence of this bound, we derive ultimate limits and no-go theorems for adaptive quantum illumination and single-photon quantum optical resolution. Finally, we show how the methodology can also be applied to other tasks, such as quantum metrology, quantum communication and secret key generation.

73 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal Article
TL;DR: The first direct detection of gravitational waves and the first observation of a binary black hole merger were reported in this paper, with a false alarm rate estimated to be less than 1 event per 203,000 years, equivalent to a significance greater than 5.1σ.
Abstract: On September 14, 2015 at 09:50:45 UTC the two detectors of the Laser Interferometer Gravitational-Wave Observatory simultaneously observed a transient gravitational-wave signal. The signal sweeps upwards in frequency from 35 to 250 Hz with a peak gravitational-wave strain of 1.0×10(-21). It matches the waveform predicted by general relativity for the inspiral and merger of a pair of black holes and the ringdown of the resulting single black hole. The signal was observed with a matched-filter signal-to-noise ratio of 24 and a false alarm rate estimated to be less than 1 event per 203,000 years, equivalent to a significance greater than 5.1σ. The source lies at a luminosity distance of 410(-180)(+160) Mpc corresponding to a redshift z=0.09(-0.04)(+0.03). In the source frame, the initial black hole masses are 36(-4)(+5)M⊙ and 29(-4)(+4)M⊙, and the final black hole mass is 62(-4)(+4)M⊙, with 3.0(-0.5)(+0.5)M⊙c(2) radiated in gravitational waves. All uncertainties define 90% credible intervals. These observations demonstrate the existence of binary stellar-mass black hole systems. This is the first direct detection of gravitational waves and the first observation of a binary black hole merger.

4,375 citations

Journal ArticleDOI
TL;DR: The field of cavity optomechanics explores the interaction between electromagnetic radiation and nano-or micromechanical motion as mentioned in this paper, which explores the interactions between optical cavities and mechanical resonators.
Abstract: We review the field of cavity optomechanics, which explores the interaction between electromagnetic radiation and nano- or micromechanical motion This review covers the basics of optical cavities and mechanical resonators, their mutual optomechanical interaction mediated by the radiation pressure force, the large variety of experimental systems which exhibit this interaction, optical measurements of mechanical motion, dynamical backaction amplification and cooling, nonlinear dynamics, multimode optomechanics, and proposals for future cavity quantum optomechanics experiments In addition, we describe the perspectives for fundamental quantum physics and for possible applications of optomechanical devices

4,031 citations

Journal ArticleDOI
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Abstract: Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete-variable, continuous-variable, and distributed-phase-reference protocols).

2,926 citations