On the Security and Degradability of Gaussian Channels View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2009

AUTHORS

Stefano Pirandola , Samuel L. Braunstein , Seth Lloyd

ABSTRACT

We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners. More... »

PAGES

47-55

Book

TITLE

Theory of Quantum Computation, Communication, and Cryptography

ISBN

978-3-642-10697-2
978-3-642-10698-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-10698-9_5

DOI

http://dx.doi.org/10.1007/978-3-642-10698-9_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1050580260


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, University of York, YO10 5DD, York, UK", 
          "id": "http://www.grid.ac/institutes/grid.5685.e", 
          "name": [
            "Research Laboratory of Electronics, MIT, 02139, Cambridge, MA, USA", 
            "Department of Computer Science, University of York, YO10 5DD, York, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pirandola", 
        "givenName": "Stefano", 
        "id": "sg:person.0735101567.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0735101567.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, University of York, YO10 5DD, York, UK", 
          "id": "http://www.grid.ac/institutes/grid.5685.e", 
          "name": [
            "Department of Computer Science, University of York, YO10 5DD, York, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Braunstein", 
        "givenName": "Samuel L.", 
        "id": "sg:person.0666766367.22", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0666766367.22"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Mechanical Engineering, MIT, 02139, Cambridge, MA, USA", 
          "id": "http://www.grid.ac/institutes/grid.116068.8", 
          "name": [
            "Research Laboratory of Electronics, MIT, 02139, Cambridge, MA, USA", 
            "Department of Mechanical Engineering, MIT, 02139, Cambridge, MA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lloyd", 
        "givenName": "Seth", 
        "id": "sg:person.01073441277.50", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01073441277.50"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners.", 
    "editor": [
      {
        "familyName": "Childs", 
        "givenName": "Andrew", 
        "type": "Person"
      }, 
      {
        "familyName": "Mosca", 
        "givenName": "Michele", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-10698-9_5", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-10697-2", 
        "978-3-642-10698-9"
      ], 
      "name": "Theory of Quantum Computation, Communication, and Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "Gaussian channel", 
      "key distribution", 
      "security", 
      "attacks", 
      "quantum key distribution", 
      "channels", 
      "degradability properties", 
      "notion", 
      "canonical form", 
      "cloner", 
      "connection", 
      "form", 
      "distribution", 
      "relation", 
      "properties", 
      "analogues", 
      "one-mode Gaussian channels", 
      "degradability", 
      "canonical attacks", 
      "cryptographic analog", 
      "optimal Gaussian cloners", 
      "Gaussian cloners"
    ], 
    "name": "On the Security and Degradability of Gaussian Channels", 
    "pagination": "47-55", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1050580260"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-10698-9_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-10698-9_5", 
      "https://app.dimensions.ai/details/publication/pub.1050580260"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-12-01T19:55", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/chapter/chapter_110.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-10698-9_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10698-9_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10698-9_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10698-9_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-10698-9_5'


 

This table displays all metadata directly associated to this object as RDF triples.

106 TRIPLES      23 PREDICATES      48 URIs      41 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-10698-9_5 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N3d12e4bb93144f6ea0b69d75ddf277ea
4 schema:datePublished 2009
5 schema:datePublishedReg 2009-01-01
6 schema:description We consider the notion of canonical attacks, which are the cryptographic analog of the canonical forms of a one-mode Gaussian channel. Using this notion, we explore the connections between the degradability properties of the channel and its security for quantum key distribution. Finally, we also show some relations between canonical attacks and optimal Gaussian cloners.
7 schema:editor Na94ffafcbc8949bb82c5defe0c05574e
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Na74ee9ba56b2402abd675745827adb55
12 schema:keywords Gaussian channel
13 Gaussian cloners
14 analogues
15 attacks
16 canonical attacks
17 canonical form
18 channels
19 cloner
20 connection
21 cryptographic analog
22 degradability
23 degradability properties
24 distribution
25 form
26 key distribution
27 notion
28 one-mode Gaussian channels
29 optimal Gaussian cloners
30 properties
31 quantum key distribution
32 relation
33 security
34 schema:name On the Security and Degradability of Gaussian Channels
35 schema:pagination 47-55
36 schema:productId Na7fd63d2bac44ab5b5cab09616df2f06
37 Nacd991bbf6ca451c94ebe3442101bee0
38 schema:publisher N03c6df5f0f7f44da9c5405afce86d72f
39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050580260
40 https://doi.org/10.1007/978-3-642-10698-9_5
41 schema:sdDatePublished 2021-12-01T19:55
42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
43 schema:sdPublisher N006fd53235e94141920860a699c21dbc
44 schema:url https://doi.org/10.1007/978-3-642-10698-9_5
45 sgo:license sg:explorer/license/
46 sgo:sdDataset chapters
47 rdf:type schema:Chapter
48 N006fd53235e94141920860a699c21dbc schema:name Springer Nature - SN SciGraph project
49 rdf:type schema:Organization
50 N03c6df5f0f7f44da9c5405afce86d72f schema:name Springer Nature
51 rdf:type schema:Organisation
52 N14b7c1a6f4c84bfe8c7830b6ebf8835f rdf:first sg:person.0666766367.22
53 rdf:rest Na0886bc5bbdd4e7b8b82d78fe0968b4a
54 N3d12e4bb93144f6ea0b69d75ddf277ea rdf:first sg:person.0735101567.34
55 rdf:rest N14b7c1a6f4c84bfe8c7830b6ebf8835f
56 N6eabfeaa069343babd3f66ee0c2a6369 schema:familyName Mosca
57 schema:givenName Michele
58 rdf:type schema:Person
59 N81c61f3921ad4cfcad0fd143a675216e rdf:first N6eabfeaa069343babd3f66ee0c2a6369
60 rdf:rest rdf:nil
61 N92606f7393d649de8856cbd850bb80ac schema:familyName Childs
62 schema:givenName Andrew
63 rdf:type schema:Person
64 Na0886bc5bbdd4e7b8b82d78fe0968b4a rdf:first sg:person.01073441277.50
65 rdf:rest rdf:nil
66 Na74ee9ba56b2402abd675745827adb55 schema:isbn 978-3-642-10697-2
67 978-3-642-10698-9
68 schema:name Theory of Quantum Computation, Communication, and Cryptography
69 rdf:type schema:Book
70 Na7fd63d2bac44ab5b5cab09616df2f06 schema:name dimensions_id
71 schema:value pub.1050580260
72 rdf:type schema:PropertyValue
73 Na94ffafcbc8949bb82c5defe0c05574e rdf:first N92606f7393d649de8856cbd850bb80ac
74 rdf:rest N81c61f3921ad4cfcad0fd143a675216e
75 Nacd991bbf6ca451c94ebe3442101bee0 schema:name doi
76 schema:value 10.1007/978-3-642-10698-9_5
77 rdf:type schema:PropertyValue
78 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
79 schema:name Information and Computing Sciences
80 rdf:type schema:DefinedTerm
81 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
82 schema:name Data Format
83 rdf:type schema:DefinedTerm
84 sg:person.01073441277.50 schema:affiliation grid-institutes:grid.116068.8
85 schema:familyName Lloyd
86 schema:givenName Seth
87 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01073441277.50
88 rdf:type schema:Person
89 sg:person.0666766367.22 schema:affiliation grid-institutes:grid.5685.e
90 schema:familyName Braunstein
91 schema:givenName Samuel L.
92 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0666766367.22
93 rdf:type schema:Person
94 sg:person.0735101567.34 schema:affiliation grid-institutes:grid.5685.e
95 schema:familyName Pirandola
96 schema:givenName Stefano
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0735101567.34
98 rdf:type schema:Person
99 grid-institutes:grid.116068.8 schema:alternateName Department of Mechanical Engineering, MIT, 02139, Cambridge, MA, USA
100 schema:name Department of Mechanical Engineering, MIT, 02139, Cambridge, MA, USA
101 Research Laboratory of Electronics, MIT, 02139, Cambridge, MA, USA
102 rdf:type schema:Organization
103 grid-institutes:grid.5685.e schema:alternateName Department of Computer Science, University of York, YO10 5DD, York, UK
104 schema:name Department of Computer Science, University of York, YO10 5DD, York, UK
105 Research Laboratory of Electronics, MIT, 02139, Cambridge, MA, USA
106 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...