Eavesdropping of two-way coherent-state quantum cryptography via Gaussian quantum cloning machines

Stefano Pirandola, Stefano Mancini, Seth Lloyd, Sam Braunstein

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)). This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.

Original languageEnglish
Title of host publicationICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS
Place of PublicationLOS ALAMITOS
PublisherIEEE Computer Society
Pages38-41
Number of pages4
ISBN (Print)978-1-4244-3349-0
DOIs
Publication statusPublished - 2009

Keywords

  • COMMUNICATION

Cite this