| Literature DB >> 19519086 |
Todd A Brun1, Jim Harrington, Mark M Wilde.
Abstract
We show that qubits traveling along closed timelike curves are a resource that a party can exploit to distinguish perfectly any set of quantum states. As a result, an adversary with access to closed timelike curves can break any prepare-and-measure quantum key distribution protocol. Our result also implies that a party with access to closed timelike curves can violate the Holevo bound.Year: 2009 PMID: 19519086 DOI: 10.1103/PhysRevLett.102.210402
Source DB: PubMed Journal: Phys Rev Lett ISSN: 0031-9007 Impact factor: 9.161