scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Gaussian Operations and Privacy

01 Feb 2005-Physical Review A (American Physical Society (APS))-Vol. 72, Iss: 1, pp 012303
TL;DR: It is proved that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.
Abstract: We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article, the basic aspects of entanglement including its characterization, detection, distillation, and quantification are discussed, and a basic role of entonglement in quantum communication within distant labs paradigm is discussed.
Abstract: All our former experience with application of quantum theory seems to say: {\it what is predicted by quantum formalism must occur in laboratory} But the essence of quantum formalism - entanglement, recognized by Einstein, Podolsky, Rosen and Schr\"odinger - waited over 70 years to enter to laboratories as a new resource as real as energy This holistic property of compound quantum systems, which involves nonclassical correlations between subsystems, is a potential for many quantum processes, including ``canonical'' ones: quantum cryptography, quantum teleportation and dense coding However, it appeared that this new resource is very complex and difficult to detect Being usually fragile to environment, it is robust against conceptual and mathematical tools, the task of which is to decipher its rich structure This article reviews basic aspects of entanglement including its characterization, detection, distillation and quantifying In particular, the authors discuss various manifestations of entanglement via Bell inequalities, entropic inequalities, entanglement witnesses, quantum cryptography and point out some interrelations They also discuss a basic role of entanglement in quantum communication within distant labs paradigm and stress some peculiarities such as irreversibility of entanglement manipulations including its extremal form - bound entanglement phenomenon A basic role of entanglement witnesses in detection of entanglement is emphasized

6,980 citations

Journal ArticleDOI
TL;DR: It is proved multiplicativity of maximal output p norm of classical noise channels and thermal noise channels of arbitrary modes for all p>1 under the assumption that the input signal states are Gaussian states.
Abstract: We prove multiplicativity of maximal output $p$ norm of classical noise channels and thermal noise channels of arbitrary modes for all $pg1$ under the assumption that the input signal states are Gaussian states. As a direct consequence, we also show the additivity of the minimal output entropy and that of the energy-constrained Holevo capacity for those Gaussian channels under Gaussian inputs. To the best of our knowledge, newly discovered majorization relation on symplectic eigenvalues, which is also of independent interest, plays a central role in the proof.

45 citations

Journal ArticleDOI
TL;DR: In this article, the authors studied the entanglement properties of two-mode squeezed thermal states subjected to two sources of decoherence: the common reservoirs and the bosonic memory Gaussian channel.
Abstract: We study entanglement properties of two-mode squeezed thermal states subjected to two sources of decoherence: the common reservoirs and the bosonic memory Gaussian channel. For the former one, we find that there exist three different behaviors: no-sudden death, sudden death, and no-creation of entanglement. The range of parameters characterizing these processes is obtained. For the latter one, we obtain a threshold in the degree of squeezing above which the input states remain always entangled. Otherwise, no entanglement is allowed in bosonic Gaussian channel with memory effect. We show that a degree of memory for quantum channel can be help to increase the initial entanglement, while the mean number of added thermal photons is to fasten the decoherence process.

11 citations

Posted Content
TL;DR: For a wide class of Gaussian states that includes all two-mode states, this work proves a recently proposed conjecture on the equality between $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ and the Gaussian intrinsic entanglement, thus endowing both measures with a more solid operational meaning.
Abstract: We establish fundamental upper bounds on the amount of secret key that can be extracted from continuous variable quantum Gaussian states by using only local Gaussian operations, local classical processing, and public communication. For one-way communication, we prove that the key is bounded by the Renyi-$2$ Gaussian entanglement of formation $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$, with the inequality being saturated for pure Gaussian states. The same is true if two-way public communication is allowed but Alice and Bob employ protocols that start with destructive local Gaussian measurements. In the most general setting of two-way communication and arbitrary interactive protocols, we argue that $2 E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ is still a bound on the extractable key, although we conjecture that the factor of $2$ is superfluous. Finally, for a wide class of Gaussian states that includes all two-mode states, we prove a recently proposed conjecture on the equality between $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ and the Gaussian intrinsic entanglement, thus endowing both measures with a more solid operational meaning.

4 citations

References
More filters
Book
01 Jan 1985
TL;DR: In this article, the authors present results of both classic and recent matrix analyses using canonical forms as a unifying theme, and demonstrate their importance in a variety of applications, such as linear algebra and matrix theory.
Abstract: Linear algebra and matrix theory are fundamental tools in mathematical and physical science, as well as fertile fields for research. This new edition of the acclaimed text presents results of both classic and recent matrix analyses using canonical forms as a unifying theme, and demonstrates their importance in a variety of applications. The authors have thoroughly revised, updated, and expanded on the first edition. The book opens with an extended summary of useful concepts and facts and includes numerous new topics and features, such as: - New sections on the singular value and CS decompositions - New applications of the Jordan canonical form - A new section on the Weyr canonical form - Expanded treatments of inverse problems and of block matrices - A central role for the Von Neumann trace theorem - A new appendix with a modern list of canonical forms for a pair of Hermitian matrices and for a symmetric-skew symmetric pair - Expanded index with more than 3,500 entries for easy reference - More than 1,100 problems and exercises, many with hints, to reinforce understanding and develop auxiliary themes such as finite-dimensional quantum systems, the compound and adjugate matrices, and the Loewner ellipsoid - A new appendix provides a collection of problem-solving hints.

23,986 citations

Journal ArticleDOI
TL;DR: An unknown quantum state \ensuremath{\Vert}\ensure Math{\varphi}〉 can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical Einstein-Podolsky-Rosen (EPR) correlations.
Abstract: An unknown quantum state \ensuremath{\Vert}\ensuremath{\varphi}〉 can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical Einstein-Podolsky-Rosen (EPR) correlations. To do so the sender, ``Alice,'' and the receiver, ``Bob,'' must prearrange the sharing of an EPR-correlated pair of particles. Alice makes a joint measurement on her EPR particle and the unknown quantum system, and sends Bob the classical result of this measurement. Knowing this, Bob can convert the state of his EPR particle into an exact replica of the unknown state \ensuremath{\Vert}\ensuremath{\varphi}〉 which Alice destroyed.

11,600 citations

Journal ArticleDOI
TL;DR: The set of states accessible from an initial EPR state by one-particle operations are characterized and it is shown that in a sense they allow two bits to be encoded reliably in one spin-1/2 particle.
Abstract: As is well known, operations on one particle of an Einstein-Podolsky-Rosen (EPR) pair cannot influence the marginal statistics of measurements on the other particle. We characterize the set of states accessible from an initial EPR state by one-particle operations and show that in a sense they allow two bits to be encoded reliably in one spin-1/2 particle: One party, ``Alice,'' prepares an EPR pair and sends one of the particles to another party, ``Bob,'' who applies one of four unitary operators to the particle, and then returns it to Alice. By measuring the two particles jointly, Alice can now reliably learn which operator Bob used.

4,780 citations

Journal ArticleDOI
23 Oct 1998-Science
TL;DR: The first realization of unconditional quantum teleportation where every state entering the device is actually teleported is realized, using squeezed-state entanglement.
Abstract: Quantum teleportation of optical coherent states was demonstrated experimentally using squeezed-state entanglement. The quantum nature of the achieved teleportation was verified by the experimentally determined fidelity Fexp = 0.58 +/- 0.02, which describes the match between input and output states. A fidelity greater than 0.5 is not possible for coherent states without the use of entanglement. This is the first realization of unconditional quantum teleportation where every state entering the device is actually teleported.

2,345 citations

Journal ArticleDOI
Ueli Maurer1
TL;DR: It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary asymmetric channels, even when the enemy's channel is superior to the other two channels.
Abstract: The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y, respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution P/sub XYZ/, can also receive all messages exchanged by the two parties over a public channel. The goal of a protocol is that the enemy obtains at most a negligible amount of information about S. Upper bounds on H(S) as a function of P/sub XYZ/ are presented. Lower bounds on the rate H(S)/N (as N to infinity ) are derived for the case in which X=(X/sub 1/, . . ., X/sub N/), Y=(Y/sub 1/, . . ., Y/sub N/) and Z=(Z/sub 1/, . . ., Z/sub N/) result from N independent executions of a random experiment generating X/sub i/, Y/sub i/ and Z/sub i/ for i=1, . . ., N. It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary symmetric channels, even when the enemy's channel is superior to the other two channels. >

1,901 citations