• Login
    View Item 
    •   Home
    • UA Faculty Research
    • UA Faculty Publications
    • View Item
    •   Home
    • UA Faculty Research
    • UA Faculty Publications
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UA Campus RepositoryCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournal

    My Account

    LoginRegister

    About

    AboutUA Faculty PublicationsUA DissertationsUA Master's ThesesUA Honors ThesesUA PressUA YearbooksUA CatalogsUA Libraries

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    Secret_key_distillation_over_a ...
    Size:
    595.4Kb
    Format:
    PDF
    Description:
    Final Accepted Manuscript
    Download
    Author
    Pan, Ziwen
    Seshadreesan, Kaushik P.
    Clark, William
    Adcock, Mark R.
    Djordjevic, Ivan B.
    Shapiro, Jeffrey H.
    Guha, Saikat
    Affiliation
    Univ Arizona, Dept Elect & Comp Engn
    Univ Arizona, Coll Opt Sci
    Issue Date
    2019-07
    
    Metadata
    Show full item record
    Publisher
    IEEE
    Citation
    Z. Pan et al., "Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping," 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 2019, pp. 3032-3036. doi: 10.1109/ISIT.2019.8849223
    Journal
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)
    Rights
    © 2019 IEEE.
    Collection Information
    This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu.
    Abstract
    Quantum cryptography provides absolute security against an all-powerful eavesdropper (Eve). However, in practice Eve's resources may be restricted to a limited aperture size so that she cannot collect all paraxial light without alerting the communicating parties (Alice and Bob). In this paper we study a quantum wiretap channel in which the connection from Alice to Eve is lossy, so that some of the transmitted quantum information is inaccessible to both Bob and Eve. For a pure-loss channel under such restricted eavesdropping, we show that the key rates achievable with a two-mode squeezed vacuum state, heterodyne detection, and public classical communication assistance-given by the Hashing inequality-can exceed the secret key distillation capacity of the channel against an omnipotent eavesdropper. We report upper bounds on the key rates under the restricted eavesdropping model based on the relative entropy of entanglement, which closely match the achievable rates. For the pure-loss channel under restricted eavesdropping, we compare the secret-key rates of continuous-variable (CV) quantum key distribution (QKD) based on Gaussian-modulated coherent states and heterodyne detection with the discrete variable (DV) decoystate BB84 QKD protocol based on polarization qubits encoded in weak coherent laser pulses.
    ISSN
    2157-8095
    EISSN
    2157-8117
    DOI
    10.1109/isit.2019.8849223
    Version
    Final accepted manuscript
    ae974a485f413a2113503eed53cd6c53
    10.1109/isit.2019.8849223
    Scopus Count
    Collections
    UA Faculty Publications

    entitlement

     
    The University of Arizona Libraries | 1510 E. University Blvd. | Tucson, AZ 85721-0055
    Tel 520-621-6442 | repository@u.library.arizona.edu
    DSpace software copyright © 2002-2017  DuraSpace
    Quick Guide | Contact Us | Send Feedback
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.