Quantum computing for healthcare: A review

R Ur Rasool, HF Ahmad, W Rafique, A Qayyum… - Future Internet, 2023 - mdpi.com
In recent years, the interdisciplinary field of quantum computing has rapidly developed and
garnered substantial interest from both academia and industry due to its ability to process …

Continuous‐variable quantum information processing

UL Andersen, G Leuchs… - Laser & Photonics …, 2010 - Wiley Online Library
Observables of quantum systems can possess either a discrete or a continuous spectrum.
For example, upon measurements of the photon number of a light state, discrete outcomes …

Optimality of Gaussian attacks in continuous-variable quantum cryptography

M Navascués, F Grosshans, A Acin - Physical review letters, 2006 - APS
We analyze the asymptotic security of the family of Gaussian modulated quantum key
distribution protocols for continuous-variables systems. We prove that the Gaussian unitary …

[图书][B] Quantum cryptography and secret-key distillation

G Van Assche - 2006 - books.google.com
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that
exploits properties of quantum mechanics to guarantee the secure exchange of secret keys …

Continuous-variable quantum cryptography using two-way quantum communication

S Pirandola, S Mancini, S Lloyd, SL Braunstein - Nature Physics, 2008 - nature.com
Quantum cryptography has recently been extended to continuous-variable systems, such as
the bosonic modes of the electromagnetic field possessing continuous degrees of freedom …

No-switching quantum key distribution using broadband modulated coherent light

AM Lance, T Symul, V Sharma, C Weedbrook… - Physical review …, 2005 - APS
We realize an end-to-end no-switching quantum key distribution protocol using continuous-
wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude …

Collective Attacks and Unconditional Security in Continuous Variable Quantum<? format?> Key Distribution

F Grosshans - Physical review letters, 2005 - APS
We present here an information theoretic study of Gaussian collective attacks on the
continuous variable key distribution protocols based on Gaussian modulation of coherent …

[图书][B] Quantum communications and cryptography

AV Sergienko - 2018 - books.google.com
All current methods of secure communication such as public-key cryptography can
eventually be broken by faster computing. At the interface of physics and computer science …

Security bounds for continuous variables quantum key distribution

M Navascués, A Acín - Physical review letters, 2005 - APS
Security bounds for key distribution protocols using coherent and squeezed states and
homodyne measurements are presented. These bounds refer to (i) general attacks and (ii) …

Applying Gaussian quantum discord to quantum key distribution

X Su - Chinese science bulletin, 2014 - Springer
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field
can be used to complete continuous variable (CV) quantum key distribution (QKD). The …