The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many partially-successful attempts have been made to find the most natural discrete-variable version of Shannon's entropy power inequality (EPI). We develop an axiomatic framework from which we deduce the natural form of a discrete-variable EPI and an associated entropic monotonicity in a discrete-variable central limit theorem. In this discrete EPI, the geometric distribution, which has the maximum...
We establish the classical capacity of optical quantum channels as a sharp transition between two regimes—one which is an error-free regime for communication rates below the capacity, and the other in which the probability of correctly decoding a classical message converges exponentially fast to zero if the communication rate exceeds the classical capacity. This result is obtained by proving a strong...
We prove that a strong converse theorem holds for the classical capacity of all phase-insensitive bosonic Gaussian channels, when imposing a maximum photon number constraint on the inputs of the channel. This class is a natural extension of classical continuous Gaussian channels, and the well studied pure-loss, thermal, additive noise, and amplifier channels are all in this class of channels. The...
An intercept-resend attack on a continuous-variable quantum key distribution protocol is investigated experimentally. The users and eavesdropper available information rates are consistent with the optimality of Gaussian attacks resulting from the security proofs.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.