scispace - formally typeset
Search or ask a question
Author

Stefano Pirandola

Bio: Stefano Pirandola is an academic researcher from University of York. The author has contributed to research in topics: Quantum & Quantum entanglement. The author has an hindex of 51, co-authored 286 publications receiving 14410 citations. Previous affiliations of Stefano Pirandola include Centre for Quantum Technologies & Massachusetts Institute of Technology.


Papers
More filters
Proceedings ArticleDOI
18 May 2021
TL;DR: In this paper, the performance of Gaussian-modulated coherent-state QKD protocols in the presence of canonical attacks is investigated, which are collective Gaussian attacks resulting into Gaussian channels described by one of the possible canonical forms.
Abstract: We investigate the performance of Gaussian-modulated coherent-state QKD protocols in the presence of canonical attacks, which are collective Gaussian attacks resulting into Gaussian channels described by one of the possible canonical forms. We present asymptotic key rates and then we extend the results to the finite-size regime using a recently-developed toolbox for composable security.

3 citations

Journal ArticleDOI
TL;DR: This result further confirms that the security analysis of CV-MDI-QKD must involve a careful minimization over two-mode attacks as originally performed in Pirandola et al. (2015).
Abstract: The security proof of continuous variable (CV) measurement device independent (MDI) quantum key distribution (QKD) cannot be reduced to the analysis of one-mode Gaussian attacks (in particular, independent entangling-cloner attacks). To stress this point, the present note provides a very simple (almost trivial) argument, showing that there are an infinite number of two-mode Gaussian attacks which cannot be reduced to or simulated by one-mode Gaussian attacks. This result further confirms that the security analysis of CV-MDI-QKD must involve a careful minimization over two-mode attacks as originally performed in [S. Pirandola et al., Nature Photon. 9, 397-402 (2015)].

2 citations

Journal ArticleDOI
TL;DR: This work considers the paradigmatic case of channel position finding, where the aim is to determine the position of a target quantum channel within a sequence of background channels, and designs an explicit protocol that gives numerical bounds on the ultimate error probability and often achieves quantum advantage.
Abstract: Quantum channels model many physical processes. For this reason, hypothesis testing between quantum channels is a fundamental task in quantum information theory. Here we consider the paradigmatic case of channel position finding, where the aim is to determine the position of a target quantum channel within a sequence of background channels. We explore this model in the setting of bosonic systems, considering Gaussian channels with the same transmissivity (or gain) but different levels of environmental noise. Thus the goal of the problem becomes detecting the position of a target environment among a number of identical background environments, all acting on an input multi-mode system. We derive bounds for the ultimate error probability affecting this multi-ary discrimination problem and find an analytic condition for quantum advantage over protocols involving classical input states. We also design an explicit protocol that gives numerical bounds on the ultimate error probability and often achieves quantum advantage. Finally, we consider direct applications of the model for tasks of thermal imaging (finding a warmer pixel in a colder background) and quantum communication (for localizing a different level of noise in a sequence of lines or a frequency spectrum).

2 citations

Proceedings ArticleDOI
TL;DR: In this paper, the authors consider a two-way quantum key distribution protocol between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state.
Abstract: We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Physics 4, 726 (2008)]. This protocol consists in a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.

2 citations

Journal ArticleDOI
TL;DR: In this paper , the authors theoretically tackle composable security of arbitrary Gaussian quantum networks (quantum networks), with generally untrusted nodes, in the finite-size regime, and they put forward a general methodology for parameter estimation, which is only based on the data shared by the remote end-users.
Abstract: Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated Gaussian channels while auxiliary Gaussian components, such as Gaussian relays, are entailed. Whilst the theoretical backbone of classical Gaussian networks is well established, the quantum analogue is yet immature. Here, we theoretically tackle composable security of arbitrary Gaussian quantum networks (quantum networks), with generally untrusted nodes, in the finite-size regime. We put forward a general methodology for parameter estimation, which is only based on the data shared by the remote end-users. Taking a chain of identical quantum links as an example, we further demonstrate our study. Additionally, we find that the key rate of a quantum amplifier-assisted chain can ideally beat the fundamental repeaterless limit with practical block sizes. However, this objective is practically questioned leading the way to new network/chain designs.

2 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal Article
TL;DR: The first direct detection of gravitational waves and the first observation of a binary black hole merger were reported in this paper, with a false alarm rate estimated to be less than 1 event per 203,000 years, equivalent to a significance greater than 5.1σ.
Abstract: On September 14, 2015 at 09:50:45 UTC the two detectors of the Laser Interferometer Gravitational-Wave Observatory simultaneously observed a transient gravitational-wave signal. The signal sweeps upwards in frequency from 35 to 250 Hz with a peak gravitational-wave strain of 1.0×10(-21). It matches the waveform predicted by general relativity for the inspiral and merger of a pair of black holes and the ringdown of the resulting single black hole. The signal was observed with a matched-filter signal-to-noise ratio of 24 and a false alarm rate estimated to be less than 1 event per 203,000 years, equivalent to a significance greater than 5.1σ. The source lies at a luminosity distance of 410(-180)(+160) Mpc corresponding to a redshift z=0.09(-0.04)(+0.03). In the source frame, the initial black hole masses are 36(-4)(+5)M⊙ and 29(-4)(+4)M⊙, and the final black hole mass is 62(-4)(+4)M⊙, with 3.0(-0.5)(+0.5)M⊙c(2) radiated in gravitational waves. All uncertainties define 90% credible intervals. These observations demonstrate the existence of binary stellar-mass black hole systems. This is the first direct detection of gravitational waves and the first observation of a binary black hole merger.

4,375 citations

Journal ArticleDOI
TL;DR: The field of cavity optomechanics explores the interaction between electromagnetic radiation and nano-or micromechanical motion as mentioned in this paper, which explores the interactions between optical cavities and mechanical resonators.
Abstract: We review the field of cavity optomechanics, which explores the interaction between electromagnetic radiation and nano- or micromechanical motion This review covers the basics of optical cavities and mechanical resonators, their mutual optomechanical interaction mediated by the radiation pressure force, the large variety of experimental systems which exhibit this interaction, optical measurements of mechanical motion, dynamical backaction amplification and cooling, nonlinear dynamics, multimode optomechanics, and proposals for future cavity quantum optomechanics experiments In addition, we describe the perspectives for fundamental quantum physics and for possible applications of optomechanical devices

4,031 citations

Journal ArticleDOI
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Abstract: Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete-variable, continuous-variable, and distributed-phase-reference protocols).

2,926 citations