Gaussian operations and privacy
Journal Article
·
· Physical Review. A
- ICFO-Institut de Ciencies Fotoniques, Jordi Girona 29, Edifici Nexus II, E-08034 Barcelona (Spain)
We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.
- OSTI ID:
- 20718311
- Journal Information:
- Physical Review. A, Vol. 72, Issue 1; Other Information: DOI: 10.1103/PhysRevA.72.012303; (c) 2005 The American Physical Society; Country of input: International Atomic Energy Agency (IAEA); ISSN 1050-2947
- Country of Publication:
- United States
- Language:
- English
Similar Records
Semiquantum secret sharing using entangled states
Semiquantum-key distribution using less than four quantum states
Overcoming a limitation of deterministic dense coding with a nonmaximally entangled initial state
Journal Article
·
Sun Aug 15 00:00:00 EDT 2010
· Physical Review. A
·
OSTI ID:20718311
Semiquantum-key distribution using less than four quantum states
Journal Article
·
Fri May 15 00:00:00 EDT 2009
· Physical Review. A
·
OSTI ID:20718311
+2 more
Overcoming a limitation of deterministic dense coding with a nonmaximally entangled initial state
Journal Article
·
Mon Feb 15 00:00:00 EST 2010
· Physical Review. A
·
OSTI ID:20718311