On the Security and Degradability of Gaussian Channels

We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also sho...

Full description

Bibliographic Details
Main Authors: Pirandola, Stefano (Contributor), Braunstein, Samuel L. (Contributor), Lloyd, Seth (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Mechanical Engineering (Contributor), Massachusetts Institute of Technology. Research Laboratory of Electronics (Contributor)
Format: Article
Language:English
Published: Springer-Verlag, 2013-06-10T19:35:44Z.
Subjects:
Online Access:Get fulltext
LEADER 01334 am a22002533u 4500
001 79087
042 |a dc 
100 1 0 |a Pirandola, Stefano  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Mechanical Engineering  |e contributor 
100 1 0 |a Massachusetts Institute of Technology. Research Laboratory of Electronics  |e contributor 
100 1 0 |a Pirandola, Stefano  |e contributor 
100 1 0 |a Braunstein, Samuel L.  |e contributor 
100 1 0 |a Lloyd, Seth  |e contributor 
700 1 0 |a Braunstein, Samuel L.  |e author 
700 1 0 |a Lloyd, Seth  |e author 
245 0 0 |a On the Security and Degradability of Gaussian Channels 
260 |b Springer-Verlag,   |c 2013-06-10T19:35:44Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/79087 
520 |a We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners. 
520 |a Marie Curie International Fellowship 
520 |a W. M. Keck Foundation 
546 |a en_US 
655 7 |a Article 
773 |t Theory of Quantum Computation, Communication, and Cryptography