Universal squash model for optical communications using linear optics and threshold detectors

被引:26
作者
Fung, Chi-Hang Fred [1 ,2 ]
Chau, H. F. [1 ,2 ]
Lo, Hoi-Kwong [3 ,4 ]
机构
[1] Univ Hong Kong, Dept Phys, Hong Kong, Hong Kong, Peoples R China
[2] Univ Hong Kong, Ctr Computat & Theoret Phys, Hong Kong, Hong Kong, Peoples R China
[3] Univ Toronto, Ctr Quantum Informat & Quantum Control, Dept Phys, Toronto, ON M5S 3G4, Canada
[4] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
来源
PHYSICAL REVIEW A | 2011年 / 84卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
QUANTUM CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.84.020303
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Transmission of photons through open-air or optical fibers is an important primitive in quantum-information processing. Theoretical descriptions of this process often consider single photons as information carriers and thus fail to accurately describe experimental implementations where any number of photons may enter a detector. It has been a great challenge to bridge this big gap between theory and experiments. One powerful method for achieving this goal is by conceptually squashing the received multiphoton states to single-photon states. However, until now, only a few protocols admit a squash model; furthermore, a recently proven no-go theorem appears to rule out the existence of a universal squash model. Here we show that a necessary condition presumed by all existing squash models is in fact too stringent. By relaxing this condition, we find that, rather surprisingly, a universal squash model actually exists for many protocols, including quantum key distribution, quantum state tomography, Bell's inequality testing, and entanglement verification.
引用
收藏
页数:4
相关论文
共 17 条
[1]   Squashing models for optical measurements in quantum communication [J].
Beaudry, Normand J. ;
Moroder, Tobias ;
Lutkenhaus, Norbert .
PHYSICAL REVIEW LETTERS, 2008, 101 (09)
[2]  
Bennett C. H., 1984, IBM Technical Disclosure Bulletin, V26, P4363
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[5]   High-quality asynchronous heralded single-photon source at telecom wavelength [J].
Fasel, S ;
Alibart, O ;
Tanzilli, S ;
Baldi, P ;
Beveratos, A ;
Gisin, N ;
Zbinden, H .
NEW JOURNAL OF PHYSICS, 2004, 6 :1-11
[6]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[7]   Upper bounds of eavesdropper's performances in finite-length code with the decoy method [J].
Hayashi, Masahito .
PHYSICAL REVIEW A, 2007, 76 (01)
[8]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014
[9]  
KATO G, ARXIV10084663QUANTPH
[10]  
Koashi M., ARXIVQUANTPH0507154