-
1
-
-
85037231636
-
-
C. H. Bennett and G. Brassard, in Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179
-
C. H. Bennett and G. Brassard, in Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179.
-
-
-
-
2
-
-
85037193967
-
-
Introduction to Quantum Computation and Information, edited by H. K. Lo, S. Popescu, and T. P. Spiller (World Scientific, Singapore, 1998)
-
Introduction to Quantum Computation and Information, edited by H. K. Lo, S. Popescu, and T. P. Spiller (World Scientific, Singapore, 1998).
-
-
-
-
3
-
-
0036013605
-
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Rev. Mod. Phys. 74, 145 (2002).
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
5
-
-
85037191088
-
-
It is a well-known fact that the existence of a perfect quantum cloning machine would allow to beat Heisenberg’s uncertainty principle
-
It is a well-known fact that the existence of a perfect quantum cloning machine would allow to beat Heisenberg’s uncertainty principle.
-
-
-
-
6
-
-
0037171183
-
-
N. J. Cerf, M. Bourennane, A. Karlsson, and N. Gisin, Phys. Rev. Lett. 88, 127 902 (2002).
-
(2002)
Phys. Rev. Lett.
, vol.88
, pp. 127 902
-
-
Cerf, N.J.1
Bourennane, M.2
Karlsson, A.3
Gisin, N.4
-
8
-
-
0037191433
-
-
A. Beveratos, R. Brouri, T. Gacoin, A. Villing, J.-P. Poizat, and P. Grangier, Phys. Rev. Lett. 89, 187 901 (2002)
-
(2002)
Phys. Rev. Lett.
, vol.89
, pp. 187 901
-
-
Beveratos, A.1
Brouri, R.2
Gacoin, T.3
Villing, A.4
Poizat, J.-P.5
Grangier, P.6
-
9
-
-
0037180773
-
-
E. Waks, K. Inoue, C. Santori, D. Fattal, J. Vuckovic, G. S. Solomon, and Y. Yamamoto, Nature (London) 420, 762 (2002).
-
(2002)
Nature (London)
, vol.420
, pp. 762
-
-
Waks, E.1
Inoue, K.2
Santori, C.3
Fattal, D.4
Vuckovic, J.5
Solomon, G.S.6
Yamamoto, Y.7
-
13
-
-
0343536431
-
-
G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, Phys. Rev. Lett. 85, 1330 (2000).
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 1330
-
-
Brassard, G.1
Lütkenhaus, N.2
Mor, T.3
Sanders, B.C.4
-
15
-
-
0000600063
-
-
B. Huttner, N. Imoto, N. Gisin, and T. Mor, Phys. Rev. A 51, 1863 (1995).
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
16
-
-
85037204200
-
-
V. Scarani, A. Acín, N. Gisin, and G. Ribordy, Phys. Rev. Lett. (to be published)
-
V. Scarani, A. Acín, N. Gisin, and G. Ribordy, Phys. Rev. Lett. (to be published).
-
-
-
-
17
-
-
84855942678
-
-
D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, Adv. Geophys. 4, 41 (2002).
-
(2002)
Adv. Geophys.
, vol.4
, pp. 41
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
18
-
-
85037195977
-
-
It has been shown in W. Xiang-bin, quant-ph/0110089, that no finite coherent attack is more powerful than the incoherent one when Eve’s measurement takes place before the error correction and privacy amplification process. However his demonstration does not apply to the case of a coherent attack on an infinite number of pulses.
-
-
-
Xiang-bin, W.1
-
22
-
-
85037241987
-
-
We take (Formula presented) for all the figures in this paper
-
We take (Formula presented) for all the figures in this paper.
-
-
-
-
23
-
-
85037198254
-
-
We believe that Eve must necessarily have access to Bob’s lab in order to modify his detectors. In contrary to this, one might think that Eve is able to shift the signals she wants to be detected into a wavelength region of higher detector efficiency. But this can be simply avoided by putting a narrow filter before the detector. Or, she can send pulses with large mean photon number whenever she wants the pulse to be detected, but this produces a significant increase of the double counts when Bob chooses the wrong measurement
-
We believe that Eve must necessarily have access to Bob’s lab in order to modify his detectors. In contrary to this, one might think that Eve is able to shift the signals she wants to be detected into a wavelength region of higher detector efficiency. But this can be simply avoided by putting a narrow filter before the detector. Or, she can send pulses with large mean photon number whenever she wants the pulse to be detected, but this produces a significant increase of the double counts when Bob chooses the wrong measurement.
-
-
-
-
24
-
-
85037237640
-
-
all of the article, we take as the computational basis, |0〉 and |1〉, the eigenvectors of (Formula presented) with eigenvalues ±1
-
In all of the article, we take as the computational basis, |0〉 and |1〉, the eigenvectors of (Formula presented) with eigenvalues ±1.
-
-
-
-
25
-
-
85037197116
-
-
A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1998), Sec. 9-5
-
A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1998), Sec. 9-5.
-
-
-
-
26
-
-
0000579401
-
-
B. Huttner, A. Muller, J. D. Gautier, H. Zbinden, and N. Gisin, Phys. Rev. A 54, 3783 (1996).
-
(1996)
Phys. Rev. A
, vol.54
, pp. 3783
-
-
Huttner, B.1
Muller, A.2
Gautier, J.D.3
Zbinden, H.4
Gisin, N.5
-
27
-
-
85037213712
-
-
C. W. Helstrom, Quantum Detection and Estimation Theory (Academic, New York, 1976)
-
C. W. Helstrom, Quantum Detection and Estimation Theory (Academic, New York, 1976).
-
-
-
-
30
-
-
85037239600
-
-
The optimal generalized measurement of Eq. (28) in (Formula presented) can indeed be seen as a von Neumann measurement in (Formula presented) 14. It is very plausible that there is no measurement using just linear optics reaching the optimal probability of unambiguous discrimination
-
The optimal generalized measurement of Eq. (28) in (Formula presented) can indeed be seen as a von Neumann measurement in (Formula presented) 14. It is very plausible that there is no measurement using just linear optics reaching the optimal probability of unambiguous discrimination.
-
-
-
-
31
-
-
85037201426
-
-
Incidentally note that using the nonperfect but subpoissonian sources of Ref. 8, this distance can be further increased, since the higher photon-number components are proportionally much smaller than in the poissonian case
-
Incidentally note that using the nonperfect but subpoissonian sources of Ref. 8, this distance can be further increased, since the higher photon-number components are proportionally much smaller than in the poissonian case.
-
-
-
-
35
-
-
5344222062
-
-
C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, Phys. Rev. A 56, 1163 (1997).
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163
-
-
Fuchs, C.A.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.-S.4
Peres, A.5
-
36
-
-
85037213255
-
-
After completition of this work, the optimal (Formula presented) phase covariant cloning machine was found in G. M. D’Ariano and C. Macchiavello, quant-ph/0301175. There, the optimal fidelity is shown to be equal to (Formula presented) slightly larger than the one given in Appendix D of the present paper, (Formula presented)
-
-
-
D’Ariano, G.M.1
Macchiavello, C.2
-
38
-
-
85037219647
-
-
There may be other generalizations of the initial four-state protocol. For instance, for (Formula presented) one can consider a bit encoding different from the one in Fig. 88. The bit (Formula presented) can be associated to the states |0〉, |π/4〉, |π〉, |5π/4〉, where (Formula presented) and (Formula presented) to the other four states. In the sifting process, Alice always announces two states having an overlap of (Formula presented) as in the initial four-state protocol. In this way, (i) the discrimination on Bob’s side is more robust against imperfect measurement apparatus and (ii) the probability of accepting a bit is greater, (Formula presented) and then (Formula presented) only increases linearly with (Formula presented) Since the mean photon number does not need to be very large for having the same key rate generation, the number of multiphoton pulses at a given distance is smaller, and the protocol is more secure against PNS attacks using unambiguous discrimination. However, when one considers storing attacks, the protocol is not efficient. Indeed, Eve can always keep some photons (Formula presented) without being detected and wait for Alice’s announcement. Then, she has to distinguish between (Formula presented) copies of two states with overlap (Formula presented) While (Formula presented) increases with the number of bases, the overlap is independent of (Formula presented) Therefore, to increase (Formula presented) does not provide any advantage to the honest parties when they use this alternative encoding
-
There may be other generalizations of the initial four-state protocol. For instance, for (Formula presented) one can consider a bit encoding different from the one in Fig. 88. The bit (Formula presented) can be associated to the states |0〉, |π/4〉, |π〉, |5π/4〉, where (Formula presented) and (Formula presented) to the other four states. In the sifting process, Alice always announces two states having an overlap of (Formula presented) as in the initial four-state protocol. In this way, (i) the discrimination on Bob’s side is more robust against imperfect measurement apparatus and (ii) the probability of accepting a bit is greater, (Formula presented) and then (Formula presented) only increases linearly with (Formula presented) Since the mean photon number does not need to be very large for having the same key rate generation, the number of multiphoton pulses at a given distance is smaller, and the protocol is more secure against PNS attacks using unambiguous discrimination. However, when one considers storing attacks, the protocol is not efficient. Indeed, Eve can always keep some photons (Formula presented) without being detected and wait for Alice’s announcement. Then, she has to distinguish between (Formula presented) copies of two states with overlap (Formula presented) While (Formula presented) increases with the number of bases, the overlap is independent of (Formula presented) Therefore, to increase (Formula presented) does not provide any advantage to the honest parties when they use this alternative encoding.
-
-
-
|