|
|
|
|
LEADER |
01334 am a22002533u 4500 |
001 |
79087 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Pirandola, Stefano
|e author
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Department of Mechanical Engineering
|e contributor
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Research Laboratory of Electronics
|e contributor
|
100 |
1 |
0 |
|a Pirandola, Stefano
|e contributor
|
100 |
1 |
0 |
|a Braunstein, Samuel L.
|e contributor
|
100 |
1 |
0 |
|a Lloyd, Seth
|e contributor
|
700 |
1 |
0 |
|a Braunstein, Samuel L.
|e author
|
700 |
1 |
0 |
|a Lloyd, Seth
|e author
|
245 |
0 |
0 |
|a On the Security and Degradability of Gaussian Channels
|
260 |
|
|
|b Springer-Verlag,
|c 2013-06-10T19:35:44Z.
|
856 |
|
|
|z Get fulltext
|u http://hdl.handle.net/1721.1/79087
|
520 |
|
|
|a We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners.
|
520 |
|
|
|a Marie Curie International Fellowship
|
520 |
|
|
|a W. M. Keck Foundation
|
546 |
|
|
|a en_US
|
655 |
7 |
|
|a Article
|
773 |
|
|
|t Theory of Quantum Computation, Communication, and Cryptography
|