#### Filter Results:

- Full text PDF available (32)

#### Publication Year

1975

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- V Giovannetti, S Guha, S Lloyd, L Maccone, J H Shapiro, H P Yuen
- Physical review letters
- 2004

The classical capacity of the lossy bosonic channel is calculated exactly. It is shown that its Holevo information is not superadditive, and that a coherent-state encoding achieves capacity. The capacity of far-field, free-space optical communications is given as an example.

- Horace P. Yuen, Robert S. Kennedy, Melvin Lax
- IEEE Trans. Information Theory
- 1975

Strengthening a result of Yuen-Kennedy-Lax and Holevo (YKLH), we relax the (redundant) standard conditions for optimality of minimum-error quantum measurements while retaining sufficiency. This result is made robust by giving quantitative bounds on non-optimality when the simplified conditions fail to hold. These conditions serendipitously appeared as an… (More)

- Geraldo A Barbosa, Eric Corndorf, Prem Kumar, Horace P Yuen
- Physical review letters
- 2003

We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme allows optical… (More)

- Horace P. Yuen
- 2000

A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that… (More)

- Horace P. Yuen, Jeffrey H. Shapiro
- IEEE Trans. Information Theory
- 1980

In this paper, we present a proof-of-concept experimental demonstration of the secret key quantum cryptographic scheme. A tabletop communication link was set up in the free-space channel using ordinary lasers as transmitters, which emit coherent states of light, and quantum-limited direct detection was employed in the receivers. In the secret key scheme,… (More)

- Horace P. Yuen
- 2009

—The fundamental security and efficiency considerations for fresh key generation will be described. It is shown that the attacker's optimal probability of finding the generated key is an indispensable measure of security and that this probability limits the possibility of privacy amplification and the amount of fresh key that can be generated. A new… (More)

- Vittorio Giovannetti, Saikat Guha, +4 authors Horace P. Yuen
- Quantum Information & Computation
- 2004

The classical-information capacity of lossy bosonic channels is studied, with emphasis on the far-field free space channel. 1 Classical capacity A prominent landmark in the extension of Shannon information theory to the quantum domain is the realization that any particular physical system can store only a finite amount of information. As a consequence, the… (More)

- Horace P. Yuen, Jeffrey H. Shapiro
- IEEE Trans. Information Theory
- 1978

- Horace P. Yuen
- IEEE Access
- 2016