Quantum states of light have been shown to be able to provide an advantage over classical ones in a variety of tasks. Our work shows how practical enhancement can be obtained, using quantum correlations, in the readout of classical information from a digital memory. The quantum advantadge is preserved also in a more complex tasks, namely pattern recognition, highlighting the potential for applications of the techniques proposed.
We extend the asymptotic security of continuous variable quantum key distribution using one-way and two-way quantum communication to a multi-way setting: Quantum signals travel many times between the parties before the final detection. We assume that the encoded signals are Gaussian-modulated coherent states that travel each time through the same Gaussian channel characterized by loss and thermal noise. We then quantify the reverse-reconciliation performance of the protocol presenting results for even or odd numbers of signal exchange.
In this general brief overview, we discuss the different types of nodes and associated levels of security that can be considered in a quantum key distribution (QKD) network. This classification lead to different possible scenarios for QKD repeater chains and, more generally, for QKD network architectures.
The protocol of quantum reading refers to the quantum enhanced retrieval of information from an optical memory, whose generic cell stores a bit of information in two possible lossy channels. In the following we analyze the case of a particular class of optical receiver, based on photon counting measurement, since they can be particularly simple in view of real applications. We show that a quantum advantage is achievable when a transmitter based on two-mode squeezed vacuum (TMSV) states is combined with a photon counting receiver, and we experimentally confirm it. In this paper, after introducing some theoretical background, we focus on the experimental realisation, describing the data collection and the data analysis in detail.
We consider private communication over bosonic Gaussian channels via the most general adaptive protocols based on local operations and two-way classical communication. These protocols include all the possible strategies allowed by quantum mechanics where two remote parties have local quantum computers but do not share prior quantum entanglement. In this context, Pirandola-Laurenza-Ottaviani-Banchi (PLOB) [Nat. Commun. 8, 15043 (2017)] established weak converse upper bounds for the secret key capacity of these channels. These bounds were computed by combining teleportation stretching, able to simplify any adaptive protocol into a block form, and the channel’s relative entropy of entanglement, so that data-processing properties allow one to write simple single-letter quantities. Here we discuss an extension of these bounds to repeater-assisted quantum communications. Then, using an energy-constrained version of the diamond norm and the Braunstein-Kimble teleportation protocol, we can rigorously show the strong converse property of the bounds discovered by PLOB. Our analysis provides a full mathematical justification of recent claims appeared in the literature.
Consider two bosonic modes which are prepared in one of two possible Gaussian states with the same local energy: either a tensor-product thermal state (with zero correlations) or a separable Gaussian state with maximal correlations (with both classical and quantum correlations, the latter being quantified by quantum discord). For the discrimination of these states, we compare the optimal joint coherent measurement with the best local measurement based on single-mode Gaussian detections. We show how the coherent measurement always strictly outperforms the local detection strategy for both single- and multi-copy discrimination. This means that using local Gaussian measurements (assisted by classical communication) is strictly suboptimal in detecting discord. A better performance may only be achieved by either using non Gaussian measurements (non linear optics) or coherent non-local measurements.
We consider the secret key capacity of the thermal loss channel, which is modeled by a beam splitter mixing an input signal mode with an environmental thermal mode. This capacity is the maximum value of secret bits that two remote parties can generate by means of the most general adaptive protocols assisted by unlimited and two-way classical communication. To date, only upper and lower bounds are known. The present work improves the lower bound by resorting to Gaussian protocols based on suitable trusted-noise detectors.
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay is locally in her lab and the Bell detection is perfomed with unit efficiency. This configuration allows us to explore the optimal performances achievable by CV measurement-device-independent quantum key distribution. This corresponds to the limit of a trusted local relay, where the detection loss can be re-scaled. Our theoretical analysis is confirmed by an experimental simulation where 10-4 secret bits per use can potentially be distributed at 170km assuming ideal reconciliation.
We consider two bosonic Gaussian channels whose thermal noise is strong enough to break bipartite entanglement. In this scenario, we discuss how the presence of separable correlations between the two channels is able to restore the broken entanglement. This reactivation occurs not only in a scheme of direct distribution, where a third party (Charlie) broadcasts entangled states to remote parties (Alice and Bob), but also in a configuration of indirect distribution which is based on entanglement swapping. In both schemes, the amount of entanglement remotely activated can be large enough to be distilled by one-way distillation protocols.
Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum
cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as
long as the Gaussian interactions of an eavesdropper are independent and identical. In this work, we consider asymmetric strategies where the Gaussian interactions can be different and classically correlated. For several attacks of this kind, we prove that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.