Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between… Expand

This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.Expand

The adiabatic theorem has been recently used to design quantum algorithms of a new kind, where the quantum computer evolves slowly enough so that it remains near its instantaneous ground state, which… Expand

This work proposes and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states and shot-noise-limited homodyne detection, which is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories.Expand

The information gained by a potential eavesdropper applying a cloning-based individual attack is derived, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.Expand

Taking the amino-acid frequency into account decreases the fraction of random codes that beat the natural code, and leads to an attempt to propose a tentative picture of primitive life.Expand

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over… Expand

A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented, and Gaussian attacks are shown to be optimal against all collective eavesdropping strategies.Expand

A novel construction is presented that allows the legitimate parties to get equal bit strings out of correlated variables by using a classical channel, with as little leaked information as possible, which opens the way to securely correcting nonbinary key elements.Expand

The Gaussian minimum entropy conjecture—a long-standing open question—has now been proved for single-mode phase-insensitive bosonic Gaussian channels. This establishes the ultimate achievable bit… Expand