Cloning and cryptography with quantum continuous variables

Abstract:The cloning of quantum variables with continuous spectra is investigated. We define a Gaussian 1-to-2 cloning machine that copies equally well two conjugate variables such as position and momentum or the two quadrature components of a light mode. The resulting cloning fidelity for coherent states, namely F = 2/3, is shown to be optimal. An asymmetric version of this Gaussian cloner is then used to assess the security of a continuous-variable quantum key distribution scheme that allows two remote parties to share a Gaussian key. The information versus disturbance tradeoff underlying this continuous quantum cryptographic scheme is then analyzed for the optimal individual attack. Methods to convert the resulting Gaussian keys into secret key bits are also studied. Finally, the extension of the Gaussian cloner to optimal N-to-M continuous cloners is discussed, and it is shown how to implement these cloners for light modes using a phase-insensitive optical amplifier and beam splitters. In addition, a phase-conjugate input cloner is defined, yielding M clones and M' anticlones from N replicas of a coherent state and N' replicas of its phase-conjugate (with M' - M = N' - N). This novel kind of cloners is shown to outperform the standard N-to-M cloners in some cases.

[1]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[2]  N. J. Cerf,et al.  Phase conjugation of continuous quantum variables , 2001 .

[3]  A. Furusawa,et al.  Teleportation of continuous quantum variables , 1998, Technical Digest. Summaries of Papers Presented at the International Quantum Electronics Conference. Conference Edition. 1998 Technical Digest Series, Vol.7 (IEEE Cat. No.98CH36236).

[4]  N. Cerf,et al.  Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.

[5]  J Fiurásek Optical implementation of continuous-variable quantum cloning machines. , 2001, Physical review letters.

[6]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[7]  S. Braunstein,et al.  Telecloning of continuous quantum variables. , 2001, Physical review letters.

[8]  N J Cerf,et al.  Optimal cloning of coherent states with a linear amplifier and beam splitters. , 2000, Physical review letters.

[9]  Vaidman Teleportation of quantum states. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[10]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[11]  T.C.Ralph Security of Continuous Variable Quantum Cryptography , 2000 .

[12]  Philippe Grangier,et al.  Quantum cloning and teleportation criteria for continuous quantum variables , 2001 .

[13]  T. Sugimoto,et al.  A Study on Secret key Reconciliation Protocol "Cascade" , 2000 .

[14]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[15]  S. Massar,et al.  Optimal Quantum Cloning Machines , 1997, quant-ph/9705046.

[16]  J. L. Kelly,et al.  B.S.T.J. briefs: On the simultaneous measurement of a pair of conjugate observables , 1965 .

[17]  Ipe,et al.  Cloning of continuous quantum variables , 1999, Physical review letters.

[18]  Jean Cardinal,et al.  Reconciliation of a quantum-distributed Gaussian key , 2001, IEEE Transactions on Information Theory.

[19]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[20]  C. Caves Quantum limits on noise in linear amplifiers , 1982 .

[21]  N. Cerf,et al.  Optimal N-to-M cloning of conjugate quantum variables , 2000 .