08.04.2013 Views

Quantum Information Theory with Gaussian Systems

Quantum Information Theory with Gaussian Systems

Quantum Information Theory with Gaussian Systems

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography<br />

[23] J. Eisert and M. B. Plenio,Conditions for the Local Manipulation of <strong>Gaussian</strong><br />

States, Phys.Rev.Lett. 89, 097901 (2002).<br />

[24] J. Fiuráˇsek,<strong>Gaussian</strong> Transformations and Distillation of Entangled<br />

<strong>Gaussian</strong> States, Phys.Rev. Lett. 89, 137904 (2002).<br />

[25] K. Kraus, States, Effects and Operations, edited by A. Bohm, J. D. Dollard and<br />

W. H. Wootters (Springer, Berlin, 1983).<br />

[26] W. K. Wooters and W. H. Zurek,A single quantum cannot be cloned,<br />

Nature (London) 299, 802 (1982).<br />

[27] H. Barnum, C. M. Caves, C. A. Fuchs, R. Josza and B. Schumacher,<br />

Noncommuting Mixed States Cannot Be Broadcast, Phys.Rev.Lett. 76,<br />

2818 (1996).<br />

[28] R. F. Werner,<strong>Quantum</strong> information theory – an invitation, in <strong>Quantum</strong><br />

<strong>Information</strong> – An Introduction to Basic Theoretical Concepts and Experiments,<br />

by G. Alber et al., Springer Tracts in Modern Physics Vol. 173<br />

(Springer, Berlin, 2001).<br />

[29] R. F. Werner,The Uncertainty Relation for Joint Measurement of Position<br />

and Momentum, in <strong>Quantum</strong> <strong>Information</strong>, Statistics, Probability, edited by<br />

O. Hirota (Rinton, Princeton/NJ, 2004).<br />

[30] F. Grosshans and N. J.Cerf,Continuous-Variable <strong>Quantum</strong> Cryptography is<br />

Secure against Non-<strong>Gaussian</strong> Attacks, Phys.Rev.Lett. 92, 047905 (2004).<br />

[31] F. Grosshans, G. Van Assche, J.Wenger, R. Brouri, N. J. Cerf and P. Grangier,<br />

<strong>Quantum</strong> key distribution using gaussian-modulated coherent states,<br />

Nature (London) 421, 238 (2003).<br />

[32] S. Iblisdir, G. Van Assche and N. J.Cerf,Security of <strong>Quantum</strong> Key<br />

Distribution <strong>with</strong> Coherent States and Homodyne Detection,<br />

Phys.Rev. Lett. 93, 170502 (2004).<br />

[33] V. Buˇzek and M. Hillery,<strong>Quantum</strong> copying: Beyond the no-cloning theorem,<br />

Phys.Rev. A 54, 1844 (1996).<br />

[34] N. Gisin and S. Massar,Optimal <strong>Quantum</strong> Cloning Machines,<br />

Phys.Rev. Lett. 79, 2153 (1997).<br />

[35] D. Bruss, D. P. DiVincenzo, A. Ekert, C.A. Fuchs, C. Macchiavello and<br />

J. A. Smolin,Optimal universal and state-dependent quantum cloning,<br />

Phys.Rev. A 57, 2368 (1998).<br />

[36] V. Buˇzek and M. Hillery,Universal optimal cloning of qubits and quantum<br />

registers, in Proceedings of the 1st nasa Int.Conf.on <strong>Quantum</strong> Computing<br />

and Communications (1998) and quant-ph/9801009 (1998);Universal<br />

optimal cloning of arbitrary quantum states: from qubits to quantum<br />

registers, Phys.Rev. Lett 81, 5003 (1998).<br />

119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!