253 research outputs found

    Exploring the Local Orthogonality Principle

    Full text link
    Nonlocality is arguably one of the most fundamental and counterintuitive aspects of quantum theory. Nonlocal correlations could, however, be even more nonlocal than quantum theory allows, while still complying with basic physical principles such as no-signaling. So why is quantum mechanics not as nonlocal as it could be? Are there other physical or information-theoretic principles which prohibit this? So far, the proposed answers to this question have been only partially successful, partly because they are lacking genuinely multipartite formulations. In Nat. Comm. 4, 2263 (2013) we introduced the principle of Local Orthogonality (LO), an intrinsically multipartite principle which is satisfied by quantum mechanics but is violated by non-physical correlations. Here we further explore the LO principle, presenting new results and explaining some of its subtleties. In particular, we show that the set of no-signaling boxes satisfying LO is closed under wirings, present a classification of all LO inequalities in certain scenarios, show that all extremal tripartite boxes with two binary measurements per party violate LO, and explain the connection between LO inequalities and unextendible product bases.Comment: Typos corrected; data files uploade

    Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation

    Full text link
    We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.Comment: 4 pages, 2 figure

    Multidimensional reconciliation for continuous-variable quantum key distribution

    Get PDF
    We propose a method for extracting an errorless secret key in a continuous-variable quantum key distribution protocol, which is based on Gaussian modulation of coherent states and homodyne detection. The crucial feature is an eight-dimensional reconciliation method, based on the algebraic properties of octonions. Since the protocol does not use any postselection, it can be proven secure against arbitrary collective attacks, by using well-established theorems on the optimality of Gaussian attacks. By using this new coding scheme with an appropriate signal to noise ratio, the distance for secure continuous-variable quantum key distribution can be significantly extended.Comment: 8 pages, 3 figure

    De Finetti theorem on the CAR algebra

    Full text link
    The symmetric states on a quasi local C*-algebra on the infinite set of indices J are those invariant under the action of the group of the permutations moving only a finite, but arbitrary, number of elements of J. The celebrated De Finetti Theorem describes the structure of the symmetric states (i.e. exchangeable probability measures) in classical probability. In the present paper we extend De Finetti Theorem to the case of the CAR algebra, that is for physical systems describing Fermions. Namely, after showing that a symmetric state is automatically even under the natural action of the parity automorphism, we prove that the compact convex set of such states is a Choquet simplex, whose extremal (i.e. ergodic w.r.t. the action of the group of permutations previously described) are precisely the product states in the sense of Araki-Moriya. In order to do that, we also prove some ergodic properties naturally enjoyed by the symmetric states which have a self--containing interest.Comment: 23 pages, juornal reference: Communications in Mathematical Physics, to appea

    Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution

    Full text link
    As quantum key distribution becomes a mature technology, it appears clearly that some assumptions made in the security proofs cannot be justified in practical implementations. This might open the door to possible side-channel attacks. We examine several discrepancies between theoretical models and experimental setups in the case of continuous-variable quantum key distribution. We study in particular the impact of an imperfect modulation on the security of Gaussian protocols and show that approximating the theoretical Gaussian modulation with a discrete one is sufficient in practice. We also address the issue of properly calibrating the detection setup, and in particular the value of the shot noise. Finally, we consider the influence of phase noise in the preparation stage of the protocol and argue that taking this noise into account can improve the secret key rate because this source of noise is not controlled by the eavesdropper.Comment: 4 figure

    Decision and function problems based on boson sampling

    Get PDF
    Boson sampling is a mathematical problem that is strongly believed to be intractable for classical computers, whereas passive linear interferometers can produce samples efficiently. So far, the problem remains a computational curiosity, and the possible usefulness of boson-sampling devices is mainly limited to the proof of quantum supremacy. The purpose of this work is to investigate whether boson sampling can be used as a resource of decision and function problems that are computationally hard, and may thus have cryptographic applications. After the definition of a rather general theoretical framework for the design of such problems, we discuss their solution by means of a brute-force numerical approach, as well as by means of non-boson samplers. Moreover, we estimate the sample sizes required for their solution by passive linear interferometers, and it is shown that they are independent of the size of the Hilbert space.Comment: Close to the version published in PR

    A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution

    Full text link
    We discuss excess noise contributions of a practical balanced homodyne detector in Gaussian-modulated coherent-state (GMCS) quantum key distribution (QKD). We point out the key generated from the original realistic model of GMCS QKD may not be secure. In our refined realistic model, we take into account excess noise due to the finite bandwidth of the homodyne detector and the fluctuation of the local oscillator. A high speed balanced homodyne detector suitable for GMCS QKD in the telecommunication wavelength region is built and experimentally tested. The 3dB bandwidth of the balanced homodyne detector is found to be 104MHz and its electronic noise level is 13dB below the shot noise at a local oscillator level of 8.5*10^8 photon per pulse. The secure key rate of a GMCS QKD experiment with this homodyne detector is expected to reach Mbits/s over a few kilometers.Comment: 22 pages, 11 figure

    Effect of Intensity Modulator Extinction on Practical Quantum Key Distribution System

    Full text link
    We study how the imperfection of intensity modulator effects on the security of a practical quantum key distribution system. The extinction ratio of the realistic intensity modulator is considered in our security analysis. We show that the secret key rate increases, under the practical assumption that the indeterminable noise introduced by the imperfect intensity modulator can not be controlled by the eavesdropper.Comment: 6 pages, 5 figures. EPJD accepte
    corecore