Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
Author(s)Pirandola, Stefano; Mancini, Stefano; Lloyd, Seth; Braunstein, Samuel L.
DownloadPirandola-2009-Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines.pdf (161.4Kb)
MetadataShow full item record
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.
DepartmentMassachusetts Institute of Technology. Department of Mechanical Engineering; Massachusetts Institute of Technology. Research Laboratory of Electronics
Third International Conference on Quantum, Nano and Micro Technologies, 2009. ICQNM '09.
Institute of Electrical and Electronics Engineers
Pirandola, S. et al. “Eavesdropping of Two-Way Coherent-State Quantum Cryptography via Gaussian Quantum Cloning Machines.” Quantum, Nano and Micro Technologies, 2009. ICQNM '09. Third International Conference on. 2009. 38-41. © Copyright 2009 IEEE
Final published version