Fundamental rate-loss tradeoff for optical quantum key distribution.
Reads0
Chats0
TLDR
It is shown that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use.Abstract:
An open question in quantum key distribution (QKD) is whether there exist protocols avoiding the exponential decay of the secret key generation rate with distance. Takeoka et al. show a fundamental tradeoff between the secret-key generation rate and the channel loss for optical repeater-less QKD protocols.read more
Citations
More filters
Journal ArticleDOI
Quantum internet: A vision for the road ahead
TL;DR: What it will take to achieve this so-called quantum internet is reviewed and different stages of development that each correspond to increasingly powerful applications are defined, including a full-blown quantum internet with functional quantum computers as nodes connected through quantum communication channels.
Journal ArticleDOI
Fundamental limits of repeaterless quantum communications.
TL;DR: The fundamental rate-loss tradeoff affecting any protocol of quantum key distribution is determined, which sets the limits of point-to-point quantum communications and provides precise and general benchmarks for quantum repeaters.
Journal ArticleDOI
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.
TL;DR: This work introduces an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station, enabling a form of quantum key distribution that can exceed the secret-key capacity without using quantum repeaters and that has security independent of the measuring devices.
Journal ArticleDOI
Advances in quantum cryptography
Stefano Pirandola,Ulrik L. Andersen,Leonardo Banchi,Mario Berta,Darius Bunandar,Roger Colbeck,Dirk Englund,Tobias Gehring,Cosmo Lupo,Carlo Ottaviani,Jason Pereira,Mohsen Razavi,Jesni Shamsul Shaari,Marco Tomamichel,Vladyslav C. Usenko,Giuseppe Vallone,Paolo Villoresi,Petros Wallden +17 more
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Journal ArticleDOI
Cavity-based quantum networks with single atoms and optical photons
Andreas Reiserer,Gerhard Rempe +1 more
TL;DR: In this article, a review describes progress towards the goal of multinode networks using the current generation of experiments, which have achieved unprecedented levels of atomic qubit control and light-matter coupling efficiencies.
References
More filters
Journal ArticleDOI
Quantum cryptography based on Bell's theorem.
TL;DR: Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Journal ArticleDOI
Quantum cryptography
TL;DR: A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Journal ArticleDOI
The security of practical quantum key distribution
Valerio Scarani,Helle Bechmann-Pasquinucci,Nicolas J. Cerf,Miloslav Dušek,Norbert Lütkenhaus,Momtchil Peev +5 more
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Journal ArticleDOI
Simple proof of security of the BB84 quantum key distribution protocol
Peter W. Shor,John Preskill +1 more
TL;DR: It is proved that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure, and a key distribution protocol based on entanglement purification is given, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol.