The security of practical quantum key distribution
- V. Scarani, H. Bechmann-Pasquinucci, N. Cerf, M. Dušek, N. Lutkenhaus, M. Peev
- Computer Science
- 28 February 2008
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Gaussian quantum information
- C. Weedbrook, S. Pirandola, S. Lloyd
- Physics, Computer Science
- 14 October 2011
This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.
Quantum search by local adiabatic evolution
The adiabatic theorem has been recently used to design quantum algorithms of a new kind, where the quantum computer evolves slowly enough so that it remains near its instantaneous ground state, which…
Quantum key distribution using gaussian-modulated coherent states
- F. Grosshans, G. V. Assche, J. Wenger, R. Brouri, N. Cerf, P. Grangier
- PhysicsNature
- 16 January 2003
This work proposes and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states and shot-noise-limited homodyne detection, which is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories.
Security of quantum key distribution using d-level systems.
- N. Cerf, M. Bourennane, A. Karlsson, N. Gisin
- Computer Science, MathematicsPhysical Review Letters
- 26 July 2001
The information gained by a potential eavesdropper applying a cloning-based individual attack is derived, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.
Optimality of the genetic code with respect to protein stability and amino-acid frequencies
Taking the amino-acid frequency into account decreases the fraction of random codes that beat the natural code, and leads to an attempt to propose a tentative picture of primitive life.
Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.
- R. García-Patrón, N. Cerf
- Physics, Computer SciencePhysical Review Letters
- 3 August 2006
A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented, and Gaussian attacks are shown to be optimal against all collective eavesdropping strategies.
Quantum key distribution over 25 km with an all-fiber continuous-variable system
- J. Lodewyck, M. Bloch, P. Grangier
- Physics
- 28 June 2007
We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over…
Reconciliation of a quantum-distributed Gaussian key
- G. V. Assche, J. Cardinal, N. Cerf
- Computer ScienceIEEE Transactions on Information Theory
- 20 July 2001
A novel construction is presented that allows the legitimate parties to get equal bit strings out of correlated variables by using a classical channel, with as little leaked information as possible, which opens the way to securely correcting nonbinary key elements.
Ultimate classical communication rates of quantum optical channels
- V. Giovannetti, R. García-Patrón, N. Cerf, A. Holevo
- Physics
- 1 October 2014
The Gaussian minimum entropy conjecture—a long-standing open question—has now been proved for single-mode phase-insensitive bosonic Gaussian channels. This establishes the ultimate achievable bit…
...
...