# Composable end-to-end security of Gaussian quantum networks with untrusted relays

@article{Ghalaii2022ComposableES, title={Composable end-to-end security of Gaussian quantum networks with untrusted relays}, author={Masoud Ghalaii and Panagiotis Papanastasiou and Stefano Pirandola}, journal={npj Quantum Information}, year={2022}, volume={8}, pages={1-10} }

Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated Gaussian channels, while auxiliary Gaussian components, such as Gaussian relays, are entailed. Whilst the theoretical backbone of classical Gaussian networks is well established, the quantum analog is yet immature. Here, we theoretically tackle composable security of arbitrary Gaussian quantum networks, with generally untrusted nodes, in the finite-size…

## References

SHOWING 1-10 OF 69 REFERENCES

### End-to-end capacities of a quantum communication network

- PhysicsCommunications Physics
- 2019

This work derives single-letter upper bounds for the end-to-end capacities achievable by the most general (adaptive) protocols of quantum and private communication, from a single repeater chain to an arbitrarily complex quantum network, where systems may be routed through single or multiple paths.

### High-rate measurement-device-independent quantum cryptography

- Computer Science
- 2015

A coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved, is designed and proposed.

### Capacity-approaching quantum repeaters for quantum communications

- Physics, Computer SciencePhysical Review A
- 2020

A design for continuous-variable quantum repeaters is put forward and it is shown that it can actually achieve the feat of securing high rates and long distances, and that potential quantum communications rates would deviate from the theoretical capacities if the quantum link is too noisy and/or low-quality quantum memories and amplifiers are employed.

### Fundamental limits of repeaterless quantum communications

- Computer ScienceNature communications
- 2017

The fundamental rate-loss tradeoff affecting any protocol of quantum key distribution is determined, which sets the limits of point-to-point quantum communications and provides precise and general benchmarks for quantum repeaters.

### Limits and security of free-space quantum communications

- Physics, Computer SciencePhysical Review Research
- 2020

This work bound the ultimate rates for key and entanglement distribution through a free-space link, where the propagation of quantum systems is generally affected by diffraction, atmospheric extinction, turbulence, pointing errors, and background noise.

### Gaussian-only regenerative stations cannot act as quantum repeaters

- Physics
- 2014

Higher transmission loss diminishes the performance of optical communication|be it the rate at which classical or quantum data can be sent reliably, or the secure key generation rate of quantum key…

### The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet

- Computer ScienceIEEE Communications Surveys & Tutorials
- 2022

This work describes the general QKD network architecture, its elements, as well as its interfaces and protocols, and provides an in-depth overview of the associated physical layer and network layer solutions.

### Measurement-based noiseless linear amplification for quantum communication

- Computer Science, PhysicsPhotonics Asia
- 2014

This protocol is capable of distilling entanglement to a level stronger than that achievable by transmitting a maximally entangled state through the same channel and provides a proof-of-principle demonstration of secret key extraction from an otherwise insecure regime via MBNLA.

### Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.

- Computer Science, MathematicsPhysical review letters
- 2017

This work considers a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U(n) (instead of the symmetric group S_{n} as in usual definetti theorems), and introduces generalized SU(2,2) coherent states.

### Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective Gaussian attacks

- Computer Science, Mathematics
- 2019

This work provides a composable security analysis in the finite-size regime assuming the realistic but restrictive hypothesis of collective Gaussian attacks and efficiently estimates the parameters of the channel via maximum likelihood estimators and bound the corresponding error in the final secret key rate.