dc.contributor.author | Pirandola, Stefano | |
dc.contributor.author | Braunstein, Samuel L. | |
dc.contributor.author | Lloyd, Seth | |
dc.date.accessioned | 2013-06-10T19:35:44Z | |
dc.date.available | 2013-06-10T19:35:44Z | |
dc.date.issued | 2009 | |
dc.identifier.isbn | 978-3-642-10697-2 | |
dc.identifier.isbn | 978-3-642-10698-9 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.issn | 1611-3349 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/79087 | |
dc.description.abstract | We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners. | en_US |
dc.description.sponsorship | Marie Curie International Fellowship | en_US |
dc.description.sponsorship | W. M. Keck Foundation | en_US |
dc.language.iso | en_US | |
dc.publisher | Springer-Verlag | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-642-10698-9_5 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | arXiv | en_US |
dc.title | On the Security and Degradability of Gaussian Channels | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Pirandola, Stefano, Samuel L. Braunstein, and Seth Lloyd. On the Security and Degradability of Gaussian Channels. Springer-Verlag, 2009. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Mechanical Engineering | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Research Laboratory of Electronics | en_US |
dc.contributor.mitauthor | Pirandola, Stefano | en_US |
dc.contributor.mitauthor | Braunstein, Samuel L. | en_US |
dc.contributor.mitauthor | Lloyd, Seth | en_US |
dc.relation.journal | Theory of Quantum Computation, Communication, and Cryptography | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dspace.orderedauthors | Pirandola, Stefano; Braunstein, Samuel L.; Lloyd, Seth | en_US |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |