Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines
Author(s)
Pirandola, Stefano; Mancini, Stefano; Lloyd, Seth; Braunstein, Samuel L.
DownloadPirandola-2009-Eavesdropping of two-way coherent-state quantum cryptography via gaussian quantum cloning machines.pdf (161.4Kb)
PUBLISHER_POLICY
Publisher Policy
Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.
Terms of use
Metadata
Show full item recordAbstract
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.
Date issued
2009-02Department
Massachusetts Institute of Technology. Department of Mechanical Engineering; Massachusetts Institute of Technology. Research Laboratory of ElectronicsJournal
Third International Conference on Quantum, Nano and Micro Technologies, 2009. ICQNM '09.
Publisher
Institute of Electrical and Electronics Engineers
Citation
Pirandola, S. et al. “Eavesdropping of Two-Way Coherent-State Quantum Cryptography via Gaussian Quantum Cloning Machines.” Quantum, Nano and Micro Technologies, 2009. ICQNM '09. Third International Conference on. 2009. 38-41. © Copyright 2009 IEEE
Version: Final published version
ISBN
978-1-4244-3349-0