Skip to main content
Nature Communications logoLink to Nature Communications
. 2017 Apr 26;8:15043. doi: 10.1038/ncomms15043

Fundamental limits of repeaterless quantum communications

Stefano Pirandola 1,a, Riccardo Laurenza 1, Carlo Ottaviani 1, Leonardo Banchi 2
PMCID: PMC5414096  PMID: 28443624

Abstract

Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed ‘teleportation stretching', we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters.


Quantum communications will be used to transmit entanglement and secure keys, but it is important to estimate their optimal transfer rates. Here the authors compute the fundamental limit of repeaterless quantum communications for the most relevant practical scenario.


Quantum information1,2,3 is evolving towards next-generation quantum technologies, such as the realization of completely secure quantum communications4,5,6 and the long-term construction of a quantum Internet7,8,9,10. But quantum information is more fragile than its classical counterpart, so that the ideal performances of quantum protocols may rapidly degrade in realistic practical implementations. In particular, this is a basic limitation that affects any point-to-point protocol of quantum communication over a quantum channel, where two remote parties transmit qubits, distribute entanglement or secret keys. In this communication context, it is a crucial open problem to determine the ultimate rates achievable by the remote parties, assuming that they may apply arbitrary local operations (LOs) assisted by unlimited two-way classical communication (CCs), that we may briefly call adaptive LOCCs. The maximum rates achievable by these adaptive protocols are known as two-way (assisted) capacities of a quantum channel and represent fundamental benchmarks for quantum repeaters11.

Before our work, a single two-way capacity was known, discovered about 20 years ago12. For the important case of bosonic channels2, there were only partial results. Building on previous ideas13, ref. 14 introduced the reverse coherent information. By exploiting this notion and other tools15,16, the authors of ref. 17 established lower bounds for the two-way capacities of a Gaussian channel. This inspired a subsequent work18, which exploited the notion of squashed entanglement19 to build upper bounds; unfortunately the latter were too large to close the gap with the best-known lower bounds.

Our work addresses this basic problem. We devise a general methodology that completely simplifies the study of adaptive protocols and allows us to upperbound the two-way capacities of an arbitrary quantum channel with a computable single-letter quantity. In this way, we are able to establish exact formulas for the two-way capacities of several fundamental channels, such as bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. For these channels, we determine the ultimate rates for transmitting quantum information (two-way quantum capacity Q2), distributing entanglement (two-way entanglement distribution capacity D2) and generating secret keys (secret-key capacity K). In particular, we establish the exact rate-loss scaling that restricts any point-to-point protocol of quantum key distribution (QKD) when implemented through a lossy communication line, such as an optical fibre or a free-space link.

Results

General overview of the results

As already mentioned in the Introduction, we establish the two-way capacities (Q2, D2 and K) for a number of quantum channels at both finite and infinite dimension, that is, we consider channels defined on both discrete variable (DV) and continuous variable (CV) systems2. Two-way capacities are benchmarks for quantum repeaters because they are derived by removing any technical limitation from the point-to-point protocols between the remote parties, who may perform the most general strategies allowed by quantum mechanics in the absence of pre-shared entanglement. Clearly, these ultimate limits cannot be achieved by imposing restrictions on the number of channel uses or enforcing energy constraints at the input. The relaxation of such constraints has also practical reasons since it approximates the working regime of current QKD protocols, that exploit large data blocks and high-energy Gaussian modulations13,20.

To achieve our results we suitably combine the relative entropy of entanglement (REE)21,22,23 with teleportation9,24,25,26 to design a general reduction method, which remarkably simplifies the study of adaptive protocols and two-way capacities. The first step is to show that the two-way capacities of a quantum channel cannot exceed a general bound based on the REE. The second step is the application of a technique, dubbed ‘teleportation stretching', which is valid for any channel at any dimension. This allows us to reduce any adaptive protocol into a block form, so that the general REE bound becomes a single-letter quantity. In this way, we easily upperbound the two-way capacities of any quantum channel, with closed formulas proven for bosonic Gaussian channels2, Pauli channels, erasure channels and amplitude damping channels1.

Most importantly, by showing coincidence with suitable lower bounds, we prove simple formulas for the two-way quantum capacity Q2 (=D2) and the secret-key capacity K of several fundamental channels. In fact, for the erasure channel we show that K=1−p where p is the erasure probability (only its Q2 was previously known12); for the dephasing channel we show that Q2=K=1−H2(p), where H2 is the binary Shannon entropy and p is the dephasing probability (these results for qubits are extended to any finite dimension). Then, for a quantum-limited amplifier, we show that Inline graphic where g is the gain. Finally, for the lossy channel, we prove that Inline graphic where η is the transmissivity. In particular, the secret-key capacity of the lossy channel is the maximum rate achievable by any optical implementation of QKD. At long distance, that is, high loss η≃0, we find the optimal rate-loss scaling of K≃1.44 η secret bits per channel use, a fundamental bound that only quantum repeaters may surpass.

In the following, we start by giving the main definitions. Then we formulate our reduction method and we derive the analytical results for the various quantum channels.

Adaptive protocols and two-way capacities

Suppose that Alice and Bob are separated by a quantum channel Inline graphic and want to implement the most general protocol assisted by adaptive LOCCs. This protocol may be stated for an arbitrary quantum task and then specified for the transmission of quantum information, distribution of entanglement or secret correlations. Assume that Alice and Bob have countable sets of systems, a and b, respectively. These are local registers which are updated before and after each transmission. The steps of an arbitrary adaptive protocol are described in Fig. 1.

Figure 1. Adaptive quantum protocol.

Figure 1

The first step is the preparation of the initial separable state Inline graphic of a and b by some adaptive LOCC Λ0. After the preparation of the local registers, there is the first transmission: Alice picks a system from her local register a1a, so that the register is updated as aaa1; system a1 is sent through the channel Inline graphic, with Bob getting the output b1; Bob includes the output in his local register, which is updated as b1bb; finally, Alice and Bob apply another adaptive LOCC Λ1 to their registers a,b. In the second transmission, Alice picks and sends another system a2a through channel Inline graphic with output b2 for Bob. The parties apply a further adaptive LOCC Λ2 to their registers and so on. This procedure is repeated n times, with output state Inline graphic for the Alice's and Bob's local registers.

After n transmissions, Alice and Bob share an output state Inline graphic depending on the sequence of adaptive LOCCs Inline graphic. By definition, this adaptive protocol has a rate equal to Rn if the output Inline graphic is sufficiently close to a target state φn with nRn bits, that is, we may write Inline graphic in trace norm. The rate of the protocol is an average quantity, which means that the sequence Inline graphic is assumed to be averaged over local measurements, so that it becomes trace-preserving. Thus, by taking the asymptotic limit in n and optimizing over Inline graphic, we define the generic two-way capacity of the channel as

graphic file with name ncomms15043-m10.jpg

In particular, if the aim of the protocol is entanglement distribution, then the target state φn is a maximally entangled state and Inline graphic. Because an ebit can teleport a qubit and a qubit can distribute an ebit, Inline graphic coincides with the two-way quantum capacity Inline graphic. If the goal is to implement QKD, then the target state φn is a private state27 and Inline graphic. Here the secret-key capacity satisfies Inline graphic, because ebits are specific types of secret bits and LOCCs are equivalent to LOs and public communication27. Thus, the generic two-way capacity Inline graphic can be any of D2, Q2 or K, and these capacities must satisfy D2=Q2K. Also, note that we may consider the two-way private capacity Inline graphic, which is the maximum rate at which classical messages can be securely transmitted15. Because of the unlimited two-way CCs and the one-time pad, we have Inline graphic, so that this equivalence is implicitly assumed hereafter.

General bounds for two-way capacities

Let us design suitable bounds for Inline graphic. From below we know that we may use the coherent28,29 or reverse coherent14,17 information. Take a maximally entangled state of two systems A and B, that is, an Einstein–Podolsky–Rosen (EPR) state ΦAB. Propagating the B-part through the channel defines its Choi matrix Inline graphic. This allows us to introduce the coherent information of the channel Inline graphic and its reverse counterpart Inline graphic, defined as Inline graphic, where S(·) is the von Neumann entropy. These quantities represent lower bounds for the entanglement that is distillable from the Choi matrix Inline graphic via one-way CCs, denoted as Inline graphic. In other words, we can write the hashing inequality16

graphic file with name ncomms15043-m26.jpg

For bosonic systems, the ideal EPR state has infinite-energy, so that the Choi matrix of a bosonic channel is energy-unbounded (see Methods for notions on bosonic systems). In this case we consider a sequence of two-mode squeezed vacuum (TMSV) states2 Φμ with variance μ=Inline graphic+1/2, where Inline graphic is the mean number of thermal photons in each mode. This sequence defines the bosonic EPR state as Inline graphic. At the output of the channel, we have the sequence of quasi-Choi matrices

graphic file with name ncomms15043-m30.jpg

defining the asymptotic Choi matrix Inline graphic. As a result, the coherent information quantities must be computed as limits on Inline graphic and the hashing inequality needs to be suitably extended (see Supplementary Note 2, which exploits the truncation tools of Supplementary Note 1).

In this work the crucial tool is the upper bound. Recall that, for any bipartite state ρ, the REE is defined as Inline graphic, where σs is an arbitrary separable state and Inline graphic is the relative entropy23. Hereafter we extend this definition to include asymptotic (energy-unbounded) states. For an asymptotic state Inline graphic defined by a sequence of states σμ, we define its REE as

graphic file with name ncomms15043-m36.jpg

where Inline graphic is an arbitrary sequence of separable states such that Inline graphic→0 for some separable σs. In general, we also consider the regularized REE

graphic file with name ncomms15043-m39.jpg

where Inline graphic for an asymptotic state σ.

Thus, the REE of a Choi matrix Inline graphic is correctly defined for channels of any dimension, both finite and infinite. We may also define the channel's REE as

graphic file with name ncomms15043-m42.jpg

where the supremum includes asymptotic states for bosonic channels. In the following, we prove that these single-letter quantities, Inline graphic and Inline graphic, bound the two-way capacity Inline graphic of basic channels. The first step is the following general result.

Theorem 1 (general weak converse): At any dimension, finite or infinite, the generic two-way capacity of a quantum channel Inline graphic is upper bounded by the REE bound

graphic file with name ncomms15043-m47.jpg

In Supplementary Note 3, we provide various equivalent proofs. The simplest one assumes an exponential growth of the shield system in the target private state27 as proven by ref. 30 and trivially adapted to CVs. Another proof is completely independent from the shield system. Once established the bound Inline graphic, our next step is to simplify it by applying the technique of teleportation stretching, which is in turn based on a suitable simulation of quantum channels.

Simulation of quantum channels

The idea of simulating channels by teleportation was first developed31,32 for Pauli channels33, and further studied in finite dimension34,35,36 after the introduction of generalized teleportation protocols37. Then, ref. 38 moved the first steps in the simulation of Gaussian channels via the CV teleportation protocol25,26. Another type of simulation is a deterministic version39 of a programmable quantum gate array40. Developed for DV systems, this is based on joint quantum operations, therefore failing to catch the LOCC structure of quantum communication. Here not only we fully extend the teleportation-simulation to CV systems, but we also design the most general channel simulation in a communication scenario; this is based on arbitrary LOCCs and may involve systems of any dimension, finite or infinite (see Supplementary Note 8 for comparisons and advances).

As explained in Fig. 2a, performing a teleportation LOCC (that is, Bell detection and unitary corrections) over a mixed state σ is a way to simulate a (certain type of) quantum channel Inline graphic from Alice to Bob. However, more generally, the channel simulation can be realized using an arbitrary trace-preserving LOCC Inline graphic and an arbitrary resource state σ (see Fig. 2b). Thus, at any dimension, we say that a channel Inline graphic is ‘σ-stretchable' or ‘stretchable into σ' if there is a trace-preserving LOCC Inline graphic such that

Figure 2. From teleportation- to LOCC-simulation of quantum channels.

Figure 2

(a) Consider the generalized teleportation of an input state ρ of a d-dimensional system a by using a resource state σ of two systems, A and B, with corresponding dimensions d and d′ (finite or infinite). Systems a and A are subject to a Bell detection (triangle) with random outcome k. This outcome is associated with a projection onto a maximally entangled state up to an associated teleportation unitary Uk which is a Pauli operator for d<+∞ and a phase-displacement for d=+∞ (see Methods for the basics of quantum teleportation and the characterization of the teleportation unitaries). The classical outcome k is communicated to Bob, who applies a correction unitary Inline graphic to his system B with output b. In general, Vk does not necessarily belong to the set {Uk}. On average, this teleportation LOCC defines a teleportation channel Inline graphic from a to b. It is clear that this construction also teleports part a of an input state involving ancillary systems. (b) In general we may replace the teleportation LOCC (Bell detection and unitary corrections) with an arbitrary LOCC Inline graphic: Alice performs a quantum operation Inline graphic on her systems a and A, communicates the classical variable k to Bob, who then applies another quantum operation Inline graphic on his system B. By averaging over the variable k, so that Inline graphic is certainly trace-preserving, we achieve the simulation Inline graphic for any input state ρ. We say that a channel Inline graphic is ‘σ-stretchable' if it can be simulated by a resource state σ for some LOCC Inline graphic. Note that Alice's and Bob's LOs Inline graphic and Inline graphic are arbitrary quantum operations; they may involve other local ancillas and also have extra labels (due to additional local measurements), in which case Inline graphic is assumed to be averaged over all these labels. (c) The most important case is when channel Inline graphic can be simulated by a trace-preserving LOCC Inline graphic applied to its Choi matrix Inline graphic Inline graphic, with Φ being an EPR state. In this case, we say that the channel is ‘Choi-stretchable'. These definitions are suitably extended to bosonic channels.

graphic file with name ncomms15043-m53.jpg

In general, we can simulate the same channel Inline graphic with different choices of Inline graphic and σ. In fact, any channel is stretchable into some state σ: A trivial choice is decomposing Inline graphic, inserting Inline graphic in Alice's LO and simulating Inline graphic with teleportation over the ideal EPR state σ=Φ. Therefore, among all simulations, one needs to identify the best resource state that optimizes the functional under study. In our work, the best results are achieved when the state σ can be chosen as the Choi matrix of the channel. This is not a property of any channel but defines a class. Thus, we define ‘Choi-stretchable' a channel that can be LOCC-simulated over its Choi matrix, so that we may write equation (8) with Inline graphic (see also Fig. 2c).

In infinite dimension, the LOCC simulation may involve limits Inline graphic and Inline graphic of sequences Inline graphic and σμ. For any finite μ, the simulation Inline graphic provides some teleportation channel Inline graphic. Now, suppose that an asymptotic channel Inline graphic is defined as a pointwise limit of the sequence Inline graphic, that is, we have Inline graphic for any bipartite state ρ. Then, we say that Inline graphic is stretchable with asymptotic simulation Inline graphic. This is important for bosonic channels, for which Choi-based simulations can only be asymptotic and based on sequences Inline graphic.

Teleportation covariance

We now discuss a property which easily identifies Choi-stretchable channels. Call Inline graphic the random unitaries which are generated by the Bell detection in a teleportation process. For a qudit, Inline graphic is composed of generalized Pauli operators, that is, the generators of the Weyl–Heisenberg group. For a CV system, the set Inline graphic is composed of displacement operators9, spanning the infinite dimensional version of the previous group. In arbitrary dimension (finite or infinite), we say that a quantum channel is ‘teleportation-covariant' if, for any teleportation unitary Inline graphic, we may write

graphic file with name ncomms15043-m75.jpg

for some another unitary V (not necessarily in Inline graphic).

The key property of a teleportation-covariant channel is that the input teleportation unitaries can be pushed out of the channel, where they become other correctable unitaries. Because of this property, the transmission of a system through the channel can be simulated by a generalized teleportation protocol over its Choi matrix. This is the content of the following proposition.

Proposition 2 (tele-covariance): At any dimension, a teleportation-covariant channel Inline graphic is Choi-stretchable. The simulation is a teleportation LOCC over its Choi matrix Inline graphic, which is asymptotic for a bosonic channel.

The simple proof is explained in Fig. 3. The class of teleportation-covariant channels is wide and includes bosonic Gaussian channels, Pauli and erasure channels at any dimension (see Methods for a more detailed classification). All these fundamental channels are therefore Choi-stretchable. There are channels that are not (or not known to be) Choi-stretchable but still have decompositions Inline graphic where the middle part Inline graphic is Choi-stretchable. In this case, Inline graphic and Inline graphic can be made part of Alice's and Bob's LOs, so that channel Inline graphic can be stretched into the state Inline graphic. An example is the amplitude damping channel as we will see afterwards.

Figure 3. Teleportation-covariant channels are Choi-stretchable.

Figure 3

(a) Consider the teleportation of an input state ρa by using an EPR state ΦAA of systems A and A′. The Bell detection Inline graphic on systems a and A teleports the input state onto A′, up to a random teleportation unitary, that is, ρA=UkρaInline graphic. Because Inline graphic is teleportation-covariant, Uk is mapped into an output unitary Vk and we may write Inline graphic. Therefore, Bob just needs to receive the outcome k and apply Inline graphic, so that Inline graphic. Globally, the process describes the simulation of channel Inline graphic by means of a generalized teleportation protocol over the Choi matrix Inline graphic. (b) The procedure is also valid for CV systems. If the input a is a bosonic mode, we need to consider finite-energy versions for the EPR state Φ and the Bell detection Inline graphic, that is, we use a TMSV state Φμ and a corresponding quasi-projection Inline graphic onto displaced TMSV states. At finite energy μ, the teleportation process from a to A′ is imperfect with some output Inline graphic. However, for any ɛ>0 and input state ρa, there is a sufficiently large value of μ such that Inline graphic (refs 25, 26). Consider the transmitted state Inline graphic. Because the trace distance decreases under channels, we have Inline graphic. After the application of the correction unitary Inline graphic, we have the output state Inline graphic which satisfies Inline graphic. Taking the asymptotic limit of large μ, we achieve Inline graphic→0 for any input ρa, therefore achieving the perfect asymptotic simulation of the channel. The asymptotic teleportation-LOCC is therefore Inline graphic where Inline graphic. The result is trivially extended to the presence of ancillas.

Teleportation stretching of adaptive protocols

We are now ready to describe the reduction of arbitrary adaptive protocols. The procedure is schematically shown in Fig. 4. We start by considering the ith transmission through the channel Inline graphic, so that Alice and Bob's register state is updated from Inline graphic to Inline graphic. By using a simulation Inline graphic, we show the input–output formula

Figure 4. Teleportation stretching of an adaptive quantum protocol.

Figure 4

(a) Consider the ith transmission through channel Inline graphic, where the input (i−1)th register state is given by Inline graphic. After transmission through Inline graphic and the adaptive LOCC Λi, the register state is updated to Inline graphic. (b) Let us simulate the channel Inline graphic by a LOCC Inline graphic and a resource state σ. (c) The simulation LOCC Inline graphic can be combined with the adaptive LOCC Λi into a single ‘extended' LOCC Δi while the resource state σ can be stretched back in time and out of the adaptive operations. We may therefore write Inline graphici(Inline graphicσ). (d) We iterate the previous steps for all transmissions, so as to stretch n copies σn and collapse all the extended LOCCs Δn o …o Δ1 into a single LOCC Λ. In other words, we may write Inline graphic=Λ(Inline graphicσn). (e) Finally, we include the preparation of the separable state Inline graphic into Λ and we also average over all local measurements present in Λ, so that we may write the output state as Inline graphic=Inline graphic(σn) for a trace-preserving LOCC Inline graphic. The procedure is asymptotic in the presence of asymptotic channel simulations (bosonic channels).

graphic file with name ncomms15043-m89.jpg

for some ‘extended' LOCC Δi (Fig. 4c). By iterating the previous formula n times, we may write the output state Inline graphic=Λ(Inline graphicσn) for Inline graphic (as in Fig. 4d). Because the initial state Inline graphic is separable, its preparation can be included in Λ and we may directly write Inline graphic=Λ(σn). Finally, we average over all local measurements present in Λ, so that Inline graphic=Inline graphic(σn) for a trace-preserving LOCC Inline graphic (Fig. 4e). More precisely, for any sequence of outcomes u with probability p(u), there is a conditional LOCC Λu with output Inline graphic(u)=p(u)−1Λu(σn). Thus, the mean output state Inline graphic is generated by Inline graphic=∑uΛu (see Methods for more technical details on this LOCC averaging).

Note that the simulation of a bosonic channel Inline graphic is typically asymptotic, with infinite-energy limits Inline graphic and Inline graphic. In this case, we repeat the procedure for some μ, with output Inline graphic, where Inline graphicμ is derived assuming the finite-energy LOCCs Inline graphic. Then, we take the limit for large μ, so that Inline graphic converges to Inline graphic in trace norm (see Methods for details on teleportation stretching with bosonic channels). Thus, at any dimension, we have proven the following result.

Lemma 3 (Stretching): Consider arbitrary n transmissions through a channel Inline graphic which is stretchable into a resource state σ. The output of an adaptive protocol can be decomposed into the block form

graphic file with name ncomms15043-m110.jpg

for some trace-preserving LOCC Inline graphic. If the channel Inline graphic is Choi-stretchable, then we may write

graphic file with name ncomms15043-m113.jpg

In particular, Inline graphic for an asymptotic channel simulation Inline graphic.

According to this Lemma, teleportation stretching reduces an adaptive protocol performing an arbitrary task (quantum communication, entanglement distribution or key generation) into an equivalent block protocol, whose output state Inline graphic is the same but suitably decomposed as in equation (11) for any number n of channel uses. In particular, for Choi-stretchable channels, the output is decomposed into a tensor product of Choi matrices. An essential feature that makes the technique applicable to many contexts is the fact that the adaptive-to-block reduction maintains task and output of the original protocol so that, for example, adaptive key generation is reduced to block key generation and not entanglement distillation.

Remark 4: Some aspects of our method might be traced back to a precursory but very specific argument discussed in Section V of ref. 31, where protocols of quantum communication (through Pauli channels) were transformed into protocols of entanglement distillation (the idea was developed for one-way CCs, with an implicit extension to two-way CCs). However, while this argument may be seen as precursory, it is certainly not developed at the level of generality of the present work where the adaptive-to-block reduction is explicitly proven for any type of protocol and any channel at any dimension (see Supplementary Notes 9 and 10 for remarks on previous literature).

REE as a single-letter converse bound

The combination of Theorem 1 and Lemma 3 provides the insight of our entire reduction method. In fact, let us compute the REE of the output state Inline graphic, decomposed as in equation (11). Using the monotonicity of the REE under trace-preserving LOCCs, we derive

graphic file with name ncomms15043-m118.jpg

where the complicated Inline graphic is fully discarded. Then, by replacing equation (13) into equation (7), we can ignore the supremum in the definition of Inline graphic and get the simple bound

graphic file with name ncomms15043-m121.jpg

Thus, we can state the following main result.

Theorem 5 (one-shot REE bound): Let us stretch an arbitrary quantum channel Inline graphic into some resource state σ, according to equation (8). Then, we may write

graphic file with name ncomms15043-m123.jpg

In particular, if Inline graphic is Choi-stretchable, we have

graphic file with name ncomms15043-m125.jpg

See Methods for a detailed proof, with explicit derivations for bosonic channels. We have therefore reached our goal and found single-letter bounds. In particular, note that Inline graphic measures the entanglement distributed by a single EPR state, so that we may call it the ‘entanglement flux' of the channel Inline graphic. Remarkably, there is a sub-class of Choi-stretchable channels for which Inline graphic coincides with the lower bound Inline graphic in equation (2). We call these ‘distillable channels'. We establish all their two-way capacities as Inline graphic. They include lossy channels, quantum-limited amplifiers, dephasing and erasure channels. See also Fig. 5.

Figure 5. Classification of channels in DVs and CVs.

Figure 5

We depict the classes of channels that are considered in this work, together with the bounds for their two-way capacities.

Immediate generalizations

Consider a fading channel, described by an ensemble Inline graphic, where channel Inline graphic occurs with probability pi. Let us stretch Inline graphic into a resource state σi. For large n, we may decompose the output of an adaptive protocol as Inline graphic, so that the two-way capacity of this channel is bounded by

graphic file with name ncomms15043-m135.jpg

Then consider adaptive protocols of two-way quantum communication, where the parties have forward (Inline graphic) and backward Inline graphic channels. The capacity Inline graphic maximizes the number of target bits per channel use. Stretching Inline graphic into a pair of states (σ, σ′), we find Inline graphic. For Choi-stretchable channels, this means Inline graphic, which reduces to Inline graphic if they are distillable. In the latter case, the optimal strategy is using the channel with the maximum capacity (see Methods).

Yet another scenario is the multiband channel Inline graphic, where Alice exploits m independent channels or ‘bands' Inline graphic, so that the capacity Inline graphic maximizes the number of target bits per multiband transmission. By stretching the bands Inline graphic into resource states {σi}, we find Inline graphic. For Choi-stretchable bands, this means Inline graphic, giving the additive capacity Inline graphic if they are distillable (see Methods).

Ultimate limits of bosonic communications

We now apply our method to derive the ultimate rates for quantum and secure communication through bosonic Gaussian channels. These channels are Choi-stretchable with an asymptotic simulation involving Inline graphic. From equations (4) and (16), we may write

graphic file with name ncomms15043-m151.jpg

for a suitable converging sequence of separable states Inline graphic.

For Gaussian channels, the sequences in equation (18) involve Gaussian states, for which we easily compute the relative entropy. In fact, for any two Gaussian states, ρ1 and ρ2, we prove the general formula S(ρ1||ρ2)=Σ(V1, V2)−S(ρ1), where Σ is a simple functional of their statistical moments (see Methods). After technical derivations (Supplementary Note 4), we then bound the two-way capacities of all Gaussian channels, starting from the most important, the lossy channel.

Fundamental rate-loss scaling

Optical communications through free-space links or telecom fibres are inevitably lossy and the standard model to describe this scenario is the lossy channel. This is a bosonic Gaussian channel characterized by a transmissivity parameter η, which quantifies the fraction of input photons surviving the channel. It can be represented as a beam splitter mixing the signals with a zero-temperature environment (background thermal noise is negligible at optical and telecom frequencies).

For a lossy channel Inline graphic with arbitrary transmissivity η we apply our reduction method and compute the entanglement flux Inline graphic. This coincides with the reverse coherent information of this channel IRC(η), first derived in ref. 17. Thus, we find that this channel is distillable and all its two-way capacities are given by

graphic file with name ncomms15043-m155.jpg

Interestingly, this capacity coincides with the maximum discord41 that can be distributed, since we may write42 IRC(η)=D(B|A), where the latter is the discord of the (asymptotic) Gaussian Choi matrix Inline graphic (ref. 43). We also prove the strict separation Q2(η)>Q(η), where Q is the unassisted quantum capacity28,29.

Expanding equation (19) at high loss Inline graphic, we find

graphic file with name ncomms15043-m158.jpg

or about η nats per channel use. This completely characterizes the fundamental rate-loss scaling which rules long-distance quantum optical communications in the absence of quantum repeaters. It is important to remark that our work also proves the achievability of this scaling. This is a major advance with respect to existing literature, where previous studies with the squashed entanglement18 only identified a non-achievable upper bound. In Fig. 6, we compare the scaling of equation (20) with the maximum rates achievable by current QKD protocols.

Figure 6. Ideal performances in QKD.

Figure 6

We plot the secret-key rate (bits per channel use) versus Alice–Bob's distance (km) at the loss rate of 0.2 dB per km. The secret-key capacity of the channel (red line) sets the fundamental rate limit for point-to-point QKD in the presence of loss. Compare this capacity with a previous non-achievable upperbound18 (dotted line). We then show the maximum rates that are potentially achievable by current protocols, assuming infinitely long keys and ideal conditions, such as unit detector efficiencies, zero dark count rates, zero intrinsic error, unit error correction efficiency, zero excess noise (for CVs) and large modulation (for CVs). In the figure, we see that ideal implementations of CV protocols (purple lines) are not so far from the ultimate limit. In particular, we consider: (i) One-way no-switching protocol63, coinciding with CV-MDI-QKD20,64 in the most asymmetric configuration (relay approaching Alice65). For high loss Inline graphic, the rate scales as η/ln 4, which is just 1/2 of the capacity. Same scaling for the one-way switching protocol of ref. 13; (ii) Two-way protocol with coherent states and homodyne detection66,67 which scales as Inline graphic for high loss (thermal noise is needed for two-way to beat one-way QKD66). For the DV protocols (dashed lines), we consider: BB84 with single-photon sources4 with rate η/2; BB84 with weak coherent pulses and decoy states6 with rate η/(2e); and DV-MDI-QKD68,69 with rate η/(2e2). See Supplementary Note 6 for details on these ideal rates.

The capacity in equation (19) is also valid for two-way quantum communication with lossy channels, assuming that η is the maximum transmissivity between the forward and feedback channels. It can also be extended to a multiband lossy channel, for which we write Inline graphic, where ηi are the transmissivities of the various bands or frequency components. For instance, for a multimode telecom fibre with constant transmissivity η and bandwidth W, we have

graphic file with name ncomms15043-m160.jpg

Finally, note that free-space satellite communications may be modelled as a fading lossy channel, that is, an ensemble of lossy channels Inline graphic with associated probabilities pi (ref. 44). In particular, slow fading can be associated with variations of satellite-Earth radial distance45,46. For a fading lossy channel Inline graphic, we may write

graphic file with name ncomms15043-m163.jpg

Quantum communications with Gaussian noise

The fundamental limit of the lossy channel bounds the two-way capacities of all channels decomposable as Inline graphic where Inline graphic is a lossy component while Inline graphic and Inline graphic are extra channels. A channel Inline graphic of this type is stretchable with resource state Inline graphic and we may write Inline graphic. For Gaussian channels, such decompositions are known but we achieve tighter bounds if we directly stretch them using their own Choi matrix.

Let us start from the thermal-loss channel, which can be modelled as a beam splitter with transmissivity η in a thermal background with Inline graphic mean photons. Its action on input quadratures Inline graphic is given by Inline graphicInline graphic with E being a thermal mode. This channel is central for microwave communications47,48,49,50 but also important for CV QKD at optical and telecom frequencies, where Gaussian eavesdropping via entangling cloners results into a thermal-loss channel2.

For an arbitrary thermal-loss channel Inline graphic we apply our reduction method and compute the entanglement flux

graphic file with name ncomms15043-m176.jpg

for Inline graphic<η/(1−η), while zero otherwise. Here we set

graphic file with name ncomms15043-m178.jpg

Combining this result with the lower bound given by the reverse coherent information17, we write the following inequalities for the two-way capacity of this channel

graphic file with name ncomms15043-m179.jpg

As shown in Fig. 7a, the two bounds tend to coincide at sufficiently high transmissivity. We clearly retrieve the previous result of the lossy channel for Inline graphic=0.

Figure 7. Two-way capacities for Gaussian channels in terms of the relevant channel parameters.

Figure 7

(a) Two-way capacity Inline graphic of the thermal-loss channel as a function of transmissivity η for Inline graphic=1 thermal photon. It is contained in the shadowed area identified by the lower bound (LB) and upper bound (UB) of equation (25). Our upper bound is clearly tighter than those based on the squashed entanglement, computed in ref. 18 (dotted) and ref. 54 (dashed). Note that Inline graphic at high transmissivities. For Inline graphic=0 (lossy channel) the shadowed region shrinks into a single line. (b) Two-way capacity Inline graphic of the amplifier channel as a function of the gain g for Inline graphic=1 thermal photon. It is contained in the shadowed specified by the bounds in equation (27). For small gains, we have Inline graphic. For Inline graphic=0 (quantum-limited amplifier) the shadowed region shrinks into a single line. (c) Two-way capacity Inline graphic of the additive-noise Gaussian channel with added noise ξ. It is contained in the shadowed region specified by the bounds in equation (30). For small noise, we have Inline graphic. Our upper bound is much tighter than those of ref. 18 (dotted), ref. 54 (dashed) and ref. 51 (dot-dashed).

Another important Gaussian channel is the quantum amplifier. This channel Inline graphic is described by Inline graphicInline graphic, where g>1 is the gain and E is the thermal environment with Inline graphic mean photons. We compute

graphic file with name ncomms15043-m185.jpg

for Inline graphic<(g−1)−1, while zero otherwise. Combining this result with the coherent information51, we get

graphic file with name ncomms15043-m187.jpg

whose behaviour is plotted in Fig. 7b.

In the absence of thermal noise (Inline graphic=0), the previous channel describes a quantum-limited amplifier Inline graphic, for which the bounds in equation (27) coincide. This channel is therefore distillable and its two-way capacities are

graphic file with name ncomms15043-m190.jpg

In particular, this proves that Q2(g) coincides with the unassisted quantum capacity Q(g)51,52. Note that a gain-2 amplifier can transmit at most 1 qubit per use.

Finally, one of the simplest models of bosonic decoherence is the additive-noise Gaussian channel2. This is the direct extension of the classical model of a Gaussian channel to the quantum regime. It can be seen as the action of a random Gaussian displacement over incoming states. In terms of input–output transformations, it is described by Inline graphicInline graphic where z is a classical Gaussian variable with zero mean and variance ξ≥0. For this channel Inline graphic we find the entanglement flux

graphic file with name ncomms15043-m194.jpg

for ξ<1, while zero otherwise. Including the lower bound given by the coherent information51, we get

graphic file with name ncomms15043-m195.jpg

In Fig. 7c, see its behaviour and how the two bounds tend to rapidly coincide for small added noise.

Ultimate limits in qubit communications

We now study the ultimate rates for quantum communication, entanglement distribution and secret-key generation through qubit channels, with generalizations to any finite dimension. For any DV channel Inline graphic from dimension dA to dimension dB, we may write the dimensionality bound Inline graphic. This is because we may always decompose the channel into Inline graphic (or Inline graphic), include Inline graphic in Alice's (or Bob's) LOs and stretch the identity map into a Bell state with dimension dB (or dA). For DV channels, we may also write the following simplified version of our Theorem 5 (see Methods for proof).

Proposition 6: For a Choi-stretchable channel Inline graphic in finite dimension, we may write the chain

graphic file with name ncomms15043-m202.jpg

where Inline graphic is the distillable key of Inline graphic.

In the following, we provide our results for DV channels, with technical details available in Supplementary Note 5.

Pauli channels

A general error model for the transmission of qubits is the Pauli channel

graphic file with name ncomms15043-m205.jpg

where X, Y, and Z are Pauli operators1 and p:={pk} is a probability distribution. It is easy to check that this channel is Choi-stretchable and its Choi matrix is Bell-diagonal. We compute its entanglement flux as

graphic file with name ncomms15043-m206.jpg

if pmax:=max{pk}≥1/2, while zero otherwise. Since the channel is unital, we have that Inline graphic, where H is the Shannon entropy. Thus, the two-way capacity of a Pauli channel satisfies

graphic file with name ncomms15043-m208.jpg

This can be easily generalized to arbitrary finite dimension (see Supplementary Note 5).

Consider the depolarising channel, which is a Pauli channel shrinking the Bloch sphere. With probability p, an input state becomes the maximally-mixed state

graphic file with name ncomms15043-m209.jpg

Setting κ(p):=1−H2 (3p/4), we may then write

graphic file with name ncomms15043-m210.jpg

for p⩽2/3, while 0 otherwise (Fig. 8a). The result can be extended to any dimension d≥2. A qudit depolarising channel is defined as in equation (35) up to using the mixed state I/d. Setting f:=p(d2−1)/d2 and Inline graphic, we find

Figure 8. Two-way capacities of basic qubit channels.

Figure 8

(a) Two-way capacity of the depolarizing channel Inline graphic with arbitrary probability p. It is contained in the shadowed region specified by the bounds in equation (36). We also depict the best-known bound based on the squashed entanglement54 (dashed). (b) Two-way capacity of the amplitude damping channel Inline graphic for arbitrary damping probability p. It is contained in the shadowed area identified by the lower bound (LB) of equation (48) and the upper bound (UB) of equation (49). We also depict the bound of equation (47) (upper solid line), which is good only at high dampings; and the bound Inline graphic of ref. 54 (dotted line), which is computed from the entanglement-assisted classical capacity CA. Finally, note the separation of the two-way capacity Inline graphic from the unassisted quantum capacity Inline graphic (dashed line).

graphic file with name ncomms15043-m212.jpg

for pd/(d+1), while zero otherwise.

Consider now the dephasing channel. This is a Pauli channel, which deteriorates quantum information without energy decay, as it occurs in spin-spin relaxation or photonic scattering through waveguides. It is defined as

graphic file with name ncomms15043-m213.jpg

where p is the probability of a phase flip. We can easily check that the two bounds of equation (34) coincide, so that this channel is distillable and its two-way capacities are

graphic file with name ncomms15043-m214.jpg

Note that this also proves Inline graphic, where the latter was derived in ref. 53.

For an arbitrary qudit with computational basis {|j〉}, the generalized dephasing channel is defined as

graphic file with name ncomms15043-m216.jpg

where Pi is the probability of i phase flips, with a single flip being Inline graphic. This channel is distillable and its two-way capacities are functionals of P={Pi}

graphic file with name ncomms15043-m218.jpg

Quantum erasure channel

A simple decoherence model is the erasure channel. This is described by

graphic file with name ncomms15043-m219.jpg

where p is the probability of getting an orthogonal erasure state Inline graphic. We already know that Inline graphic (ref. 12). Therefore, we compute the secret-key capacity.

Following ref. 12, one shows that Inline graphic. In fact, suppose that Alice sends halves of EPR states to Bob. A fraction 1−p will be perfectly distributed. These good cases can be identified by Bob applying the measurement Inline graphic on each output system, and communicating the results back to Alice in a single and final CC. Therefore, they distill at least 1−p ebits per copy. It is then easy to check that this channel is Choi-stretchable and we compute Inline graphic. Thus, the erasure channel is distillable and we may write

graphic file with name ncomms15043-m225.jpg

In arbitrary dimension d, the generalized erasure channel is defined as in equation (42), where ρ is now the state of a qudit and the erasure state Inline graphic lives in the extra d+1 dimension. We can easily generalize the previous derivations to find that this channel is distillable and

graphic file with name ncomms15043-m227.jpg

Note that the latter result can also be obtained by computing the squashed entanglement of the erasure channel, as shown by the independent derivation of ref. 54.

Amplitude damping channel

Finally, an important model of decoherence in spins or optical cavities is energy dissipation or amplitude damping55,56. The action of this channel on a qubit is

graphic file with name ncomms15043-m228.jpg

where Inline graphic, Inline graphic, and p is the damping probability. Note that Inline graphic is not teleportation-covariant. However, it is decomposable as

graphic file with name ncomms15043-m232.jpg

where Inline graphic teleports the original qubit into a single-rail bosonic qubit9; then, Inline graphic is a lossy channel with transmissivity η(p):=1−p; and Inline graphicCV→DV teleports the single-rail qubit back to the original qubit. Thus, Inline graphic is stretchable into the asymptotic Choi matrix of the lossy channel Inline graphic. This shows that we need a dimension-independent theory even for stretching DV channels.

From Theorem 5 we get Inline graphic, implying

graphic file with name ncomms15043-m239.jpg

while the reverse coherent information implies14

graphic file with name ncomms15043-m240.jpg

The bound in equation (47) is simple but only good for strong damping (p>0.9). A shown in Fig. 8b, we find a tighter bound using the squashed entanglement, that is,

graphic file with name ncomms15043-m241.jpg

Discussion

In this work, we have established the ultimate rates for point-to-point quantum communication, entanglement distribution and secret-key generation at any dimension, from qubits to bosonic systems. These limits provide the fundamental benchmarks that only quantum repeaters may surpass. To achieve our results we have designed a general reduction method for adaptive protocols, based on teleportation stretching and the relative entropy of entanglement, suitably extended to quantum channels. This method has allowed us to bound the two-way capacities (Q2, D2 and K) with single-letter quantities, establishing exact formulas for bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels, after about 20 years since the first studies12,31.

In particular, we have characterized the fundamental rate-loss scaling which affects any quantum optical communication, setting the ultimate achievable rate for repeaterless QKD at Inline graphic bits per channel use, that is, about 1.44η bits per use at high loss. There are two remarkable aspects to stress about this bound. First, it remains sufficiently tight even when we consider input energy constraints (down to ≃1 mean photon). Second, it can be reached by using one-way CCs with a maximum cost of just Inline graphic classical bits per channel use; this means that our bound directly provides the throughput in terms of bits per second, once a clock is specified (see Supplementary Note 7 for more details).

Our reduction method is very general and goes well beyond the scope of this work. It has been already used to extend the results to quantum repeaters.57 has shown how to simplify the most general adaptive protocols of quantum and private communication between two end-points of a repeater chain and, more generally, of an arbitrary multi-hop quantum network, where systems may be routed though single or multiple paths. Depending on the type of routing, the end-to-end capacities are determined by quantum versions of the widest path problem and the max-flow min-cut theorem. More recently, teleportation stretching has been also used to completely simplify adaptive protocols of quantum parameter estimation and quantum channel discrimination58. See Supplementary Discussion for a summary of our findings, other follow-up works and further remarks.

Methods

Basics of bosonic systems and Gaussian states

Consider n bosonic modes with quadrature operators Inline graphic. The latter satisfy the canonical commutation relations59

graphic file with name ncomms15043-m245.jpg

with In being the n × n identity matrix. An arbitrary multimode Gaussian state ρ(u, V), with mean value u and covariance matrix (CM) V, can be written as60

graphic file with name ncomms15043-m246.jpg

where the Gibbs matrix G is specified by

graphic file with name ncomms15043-m247.jpg

Using symplectic transformations2, the CM V can be decomposed into the Williamson's form Inline graphic where the generic symplectic eigenvalue νk satisfies the uncertainty principle νk≥1/2. Similarly, we may write νk=Inline graphick+1/2 where Inline graphick are thermal numbers, that is, mean number of photons in each mode. The von Neumann entropy of a Gaussian state can be easily computed as

graphic file with name ncomms15043-m251.jpg

where h(x) is given in equation (24).

A two-mode squeezed vacuum (TMSV) state Φμ is a zero-mean pure Gaussian state with CM

graphic file with name ncomms15043-m252.jpg

where Inline graphic and μ=Inline graphic+1/2. Here Inline graphic is the mean photon number of the reduced thermal state associated with each mode A and B. The Wigner function of a TMSV state Φμ is the Gaussian

graphic file with name ncomms15043-m256.jpg

where x :=(qA, qB, pA, pB)T. For large μ, this function assumes the delta-like expression25

graphic file with name ncomms15043-m257.jpg

where N is a normalization factor, function of the anti-squeezed quadratures q+:=qA+qB and p:=pApB, such that Inline graphic. Thus, the infinite-energy limit of TMSV states Inline graphic defines the asymptotic CV EPR state Φ, realizing the ideal EPR conditions Inline graphic for position and Inline graphic for momentum.

Finally, recall that single-mode Gaussian channels can be put in canonical form2, so that their action on input quadratures Inline graphic is

graphic file with name ncomms15043-m263.jpg

where T and N are diagonal matrices, E is an environmental mode with Inline graphicE mean photons, and z is a classical Gaussian variable, with zero mean and CM ξI ≥0.

Relative entropy between Gaussian states

We now provide a simple formula for the relative entropy between two arbitrary Gaussian states ρ1(u1, V1) and ρ2(u2, V2) directly in terms of their statistical moments. Because of this feature, our formula supersedes previous expressions61,62. We have the following.

Theorem 7: For two arbitrary multimode Gaussian states, ρ1(u1, V1) and ρ2(u2, V2), the entropic functional

graphic file with name ncomms15043-m265.jpg

is given by

graphic file with name ncomms15043-m266.jpg

where δ:=u1u2 and G:=g(V) as given in equation (52). As a consequence, the von Neumann entropy of a Gaussian state ρ(u, V) is equal to

graphic file with name ncomms15043-m267.jpg

and the relative entropy of two Gaussian states ρ1(u1, V1) and ρ2(u2, V2) is given by

graphic file with name ncomms15043-m268.jpg

Proof: The starting point is the use of the Gibbs-exponential form for Gaussian states60 given in equation (51). Start with zero-mean Gaussian states, which can be written as Inline graphic, where Gi=g(Vi)is the Gibbs-matrix and Zi=det(Vi+iΩ/2)1/2 is the normalization factor (with i=1, 2). Then, replacing into the definition of Σ given in equation (58), we find

graphic file with name ncomms15043-m270.jpg

Using the commutator Inline graphic and the anticommutator Inline graphic, we derive

graphic file with name ncomms15043-m273.jpg

where we also exploit the fact that Tr(ΩG)=0, because Ω is antisymmetric and G is symmetric (as V).

Let us now extend the formula to non-zero mean values (with difference δ=u1u2). This means to perform the replacement Inline graphicInline graphic, so that

graphic file with name ncomms15043-m276.jpg

By replacing this expression in equation (63), we get

graphic file with name ncomms15043-m277.jpg

Thus, by combining equations (62) and (65), we achieve equation (59). The other equations (60) and (61) are immediate consequences. This completes the proof of Theorem 7.

As discussed in ref. 60, the Gibbs-matrix G becomes singular for a pure state or, more generally, for a mixed state containing vacuum contributions (that is, with some of the symplectic eigenvalues equal to 1/2). In this case the Gibbs-exponential form must be used carefully by making a suitable limit. Since Σ is basis independent, we can perform the calculations in the basis in which V2, and therefore G2, is diagonal. In this basis

graphic file with name ncomms15043-m278.jpg

where {v2k} is the symplectic spectrum of V2, and

graphic file with name ncomms15043-m279.jpg

Now, if v2k=1/2 for some k, then its contribution to the sum in equation (66) is either zero or infinity.

Basics of quantum teleportation

Ideal teleportation exploits an ideal EPR state Inline graphic of systems A (for Alice) and B (for Bob). In finite dimension d, this is the maximally entangled Bell state

graphic file with name ncomms15043-m281.jpg

In particular, it is the usual Bell state Inline graphic for a qubit. To teleport, we need to apply a Bell detection Inline graphic on the input system a and the EPR system A (that is, Alice's part of the EPR state). This detection corresponds to projecting onto a basis of Bell states Inline graphic where the outcome k takes d2 values with probabilities pk=d−2.

More precisely, the Bell detection is a positive-operator valued measure with operators

graphic file with name ncomms15043-m285.jpg

where Inline graphic is the Bell state as in equation (68) and Uk is one of d2 teleportation unitaries, corresponding to generalized Pauli operators (described below). For any state ρ of the input system a, and outcome k of the Bell detection, the other EPR system B (Bob's part) is projected onto UkρInline graphic. Once Alice has communicated k to Bob (feed-forward), he applies the correction unitary Uk−1 to retrieve the original state ρ on its system B. Note that this process also teleports all correlations that the input system a may have with ancillary systems.

For CV systems (d→+∞), the ideal EPR source ΦAB can be expressed as a TMSV state Φμ in the limit of infinite-energy μ →+ ∞. The unitaries Uk are phase-space displacements D(k) with complex amplitude k (ref. 9). The CV Bell detection is also energy-unbounded, corresponding to a projection onto the asymptotic EPR state up to phase-space displacements D(k). To deal with this, we need to consider a finite-energy version of the measurement, defined as a quasi-projection onto displaced versions of the TMSV state Φμ with finite parameter μ. This defines a positive-operator valued measure Inline graphic with operators

graphic file with name ncomms15043-m289.jpg

Optically, this can be interpreted as applying a balanced beam-splitter followed by two projections, one onto a position-squeezed state and the other onto a momentum-squeezed state (both with finite squeezing). The ideal CV Bell detection Inline graphic is reproduced by taking the limit of μ→+∞ in equation (70). Thus, CV teleportation must always be interpreted a la Braunstein and Kimble25, so that we first consider finite resources Inline graphic to compute the μ-dependent output and then we take the limit of large μ.

Teleportation unitaries

Let us characterize the set of teleportation unitaries Inline graphic for a qudit of dimension d. First, let us write k as a multi-index k=(a, b) with Inline graphic. The teleportation set is therefore composed of d2 generalized Pauli operators Inline graphic, where Uab :=XaZb. These are defined by introducing unitary (non-Hermitian) operators

graphic file with name ncomms15043-m295.jpg

where ⊕ is the modulo d addition and

graphic file with name ncomms15043-m296.jpg

so that they satisfy the generalized commutation relation

graphic file with name ncomms15043-m297.jpg

Note that any qudit unitary can be expanded in terms of these generalized Pauli operators. We may construct the set of finite-dimensional displacement operators D(j, a, b):=ωjXaZb with Inline graphic which form the finite-dimensional Weyl–Heisenberg group (or Pauli group). For instance, for a qubit (d=2), we have Inline graphic and the group ±1 × {I, X, XZ, Z}. For a CV system (d=+∞), the teleportation set is composed of infinite displacement operators, that is, we have Inline graphic, where D(k) is a phase-space displacement operator2 with complex amplitude k. This set is the infinite-dimensional Weyl–Heisenberg group.

It is important to note that, at any dimension (finite or infinite), the teleportation unitaries satisfy

graphic file with name ncomms15043-m301.jpg

where Uf is another teleportation unitary and Inline graphic is a phase. In fact, for finite d, let us write k and Inline graphic as multi-indices, that is, k=(a, b) and Inline graphic. From Inline graphic, we see that Inline graphic. Then, for infinite d, we know that the displacement operators satisfy Inline graphic, for any two complex amplitudes u and v.

Now, let us represent a teleportation unitary as

graphic file with name ncomms15043-m308.jpg

It is clear that we have Inline graphic for DV systems, and Inline graphic for CV systems. Therefore Inline graphic satisfies the group structure

graphic file with name ncomms15043-m312.jpg

where G is a product of two groups of addition modulo d for DVs, while G is the translation group for CVs. Thus, the (multi-)index of the teleportation unitaries can be taken from the abelian group G.

Teleportation-covariant channels

Let us a give a group representation to the property of teleportation covariance specified by equation (9). Following equation (75), we may express an arbitrary teleportation unitary as Inline graphic where gG. Calling Inline graphic, we see that equation (9) implies

graphic file with name ncomms15043-m315.jpg

so that Inline graphic and Inline graphic are generally different unitary representations of the same abelian group G. Thus, equation (9) can also be written as

graphic file with name ncomms15043-m318.jpg

for all hG, where Inline graphic.

The property of equation (9) is certainly satisfied if the channel is covariant with respect to the Weyl–Heisenberg group, describing the teleportation unitaries in both finite- and infinite-dimensional Hilbert spaces. This happens when the channel is dimension-preserving and we may set Vk=Uk for some k′ in equation (9). Equivalently, this also means that Inline graphic and Inline graphic are exactly the same unitary representation in equation (78). We call ‘Weyl-covariant' these specific types of tele-covariant channels.

In finite-dimension, a Weyl-covariant channel must necessarily be a Pauli channel. In infinite-dimension, a Weyl-covariant channel commutes with displacements, which is certainly a property of the bosonic Gaussian channels. A simple channel that is tele-covariant but not Weyl-covariant is the erasure channel. This is in fact dimension-altering (since it adds an orthogonal state to the input Hilbert space) and the output correction unitaries to be used in equation (9) have the augmented form Vk=UkI. Hybrid channels, mapping DVs into CVs or vice versa, cannot be Weyl-covariant but they may be tele-covariant. Finally, the amplitude damping channel is an example of a channel, which is not tele-covariant.

Note that, for a quantum channel in finite dimension, we may easily re-write equation (9) in terms of an equivalent condition for the Choi matrix. In fact, by evaluating the equality in equation (9) on the EPR state Inline graphic and using the property that Inline graphic, one finds

graphic file with name ncomms15043-m324.jpg

Thus, a finite-dimensional Inline graphic is tele-covariant if and only if, for any teleportation unitary Uk, we may write

graphic file with name ncomms15043-m326.jpg

for another generally different unitary Vk. There are finite-dimensional channels satisfying conditions stronger than equation (80). For Pauli channels, we may write Inline graphic for any k, that is, the Choi matrix is invariant under twirling operations restricted to the generators of the Pauli group {Uk}. For depolarising channels, we may even write Inline graphic for an arbitrary unitary U. This means that the Choi matrix of a depolarising channel is an isotropic state.

LOCC-averaging in teleportation stretching

Consider an arbitrary adaptive protocol described by some fundamental preparation of the local registers ρa0ρb0 and a sequence of adaptive LOCCs Inline graphic. In general, these LOs may involve measurements. Call ui the (vectorial) outcome of Alice's and Bob's local measurements performed within the ith adaptive LOCC, so that Inline graphic. It is clear that Inline graphic will be conditioned by measurements and outcomes of all the previous LOCCs, so that a more precise notation will be Inline graphic where the output ui is achieved with a conditional probability Inline graphic. After n transmissions, we have a sequence of outcomes u=u0un with joint probability

graphic file with name ncomms15043-m334.jpg

and a sequence of LOCCs

graphic file with name ncomms15043-m335.jpg

The mean rate of the protocol is achieved by averaging the output state over all possible outcomes u, which is equivalent to considering the output state generated by the trace-preserving LOCC-sequence Inline graphic.

In fact, suppose that the (normalized) output state Inline graphic(u) generated by the conditional Inline graphic is epsilon-close to a corresponding target state φn(u) with rate Rn(u). This means that we have Inline graphic in trace distance. The mean rate of the protocol Inline graphic is associated with the average target state Inline graphic. It is easy to show that φn is approximated by the mean output state Inline graphic generated by Inline graphic. In fact, by using the joint convexity of the trace distance1, we may write

graphic file with name ncomms15043-m344.jpg

Now we show that the LOCC-simulation of a channel Inline graphic does not change the average output state Inline graphic and this state can be re-organized in a block form. The ith (normalized) conditional output Inline graphic can be expressed in terms of the i−1th output Inline graphic as follows

graphic file with name ncomms15043-m349.jpg

where Inline graphic is meant as Inline graphic with ai being the system transmitted. Thus, after n transmissions, the conditional output state is Inline graphic, where

graphic file with name ncomms15043-m353.jpg

and the average output state is given by

graphic file with name ncomms15043-m354.jpg

where Inline graphic.

For some LOCC Inline graphic and resource state σ, let us write the simulation

graphic file with name ncomms15043-m357.jpg

where Inline graphic is Alice and Bob's conditional LOCC with probability p(k). For simplicity we omit other technical labels that may describe independent local measurements or classical channels, because they will also be averaged at the end of the procedure. Let us introduce the vector k=k1kn where ki identifies a conditional LOCC Inline graphic associated with the ith transmission. Because the LOCC-simulation of the channel is fixed, we have the factorized probability p(k)=p(k1) … p(kn).

By replacing the simulation in equation (84), we obtain

graphic file with name ncomms15043-m360.jpg

By iteration, the latter equation yields

graphic file with name ncomms15043-m361.jpg

where

graphic file with name ncomms15043-m362.jpg

Therefore, the average output state of the original protocol may be equivalently expressed in the form

graphic file with name ncomms15043-m363.jpg

Finally, we may include the preparation ρa0ρb0 in the LOCC, so that we may write

graphic file with name ncomms15043-m364.jpg

To extend this technical proof to CV systems, we perform the replacement Inline graphicInline graphic with the probabilities becoming probability densities. Then, Inline graphic and σ may be both asymptotic, that is, defined as infinite-energy limits Inline graphic and Inline graphic from corresponding finite-versions Inline graphic and σμ. In this case, we repeat the previous procedure for some μ and then we take the limit on the output state Inline graphic.

Details on Lemma 3 in relation to teleportation stretching with bosonic channels

For a bosonic channel, the Choi matrix and the ideal Bell detection are both energy-unbounded. Therefore, any Choi-based LOCC simulation of these channels must necessarily be asymptotic. Here we discuss in more detail how an asymptotic channel simulation Inline graphic leads to an asymptotic form of stretching as described in Lemma 3. Any operation or functional applied to Inline graphic is implicitly meant to be applied to the finite-energy simulation Inline graphic, whose output then undergoes the μ-limit.

Consider a bosonic channel Inline graphic with asymptotic simulation Inline graphic. As depicted in Fig. 9, this means that there is a channel Inline graphic generated by Inline graphic such that Inline graphic in the sense that

Figure 9. Asymptotic LOCC simulation of bosonic channels.

Figure 9

The finite-energy LOCC simulation Inline graphic generates a teleportation channel Inline graphic. Assume that Inline graphic defines a target bosonic channel Inline graphic according to the pointwise limit in equation (93). Then, we say that the bosonic channel Inline graphic has asymptotic simulation Inline graphic.

graphic file with name ncomms15043-m380.jpg

In other words, for any (energy-bounded) bipartite state ρaa, whose a′-part is propagated, the original channel output Inline graphic and the simulated channel output Inline graphic satisfy the limit

graphic file with name ncomms15043-m383.jpg

By teleportation stretching, we may equivalently decompose the output state ρabμ into the form

graphic file with name ncomms15043-m384.jpg

where Inline graphicμ is a trace-preserving LOCC, which is includes both Inline graphic and the preparation of ρaa (it is trace-preserving because we implicitly assume that we average over all possible measurements present in the simulation LOCC Inline graphic). By taking the limit of μ→+∞ in equation (95), the state Inline graphic becomes the channel output state ρab according to equation (94). Therefore, we have the limit

graphic file with name ncomms15043-m389.jpg

that we may compactly write as

graphic file with name ncomms15043-m390.jpg

Note that we may express equation (93) in a different form. In fact, consider the set of energy-constrained bipartite states Inline graphic, where Inline graphic is the total number operator. Then, for two bosonic channels, Inline graphic and Inline graphic, we may define the energy-bounded diamond norm

graphic file with name ncomms15043-m395.jpg

Using the latter definition and the fact that Inline graphic is a compact set, we have that the pointwise limit in equation (93) implies the following uniform limit

graphic file with name ncomms15043-m397.jpg

The latter expression is useful to generalize the reasoning to the adaptive protocol, with LOCCs applied before and after transmission. Consider the output Inline graphic after n adaptive uses of the channel Inline graphic, and the simulated output Inline graphic, which is generated by replacing Inline graphic with the imperfect channel Inline graphic. Explicitly, we may write

graphic file with name ncomms15043-m403.jpg

with its approximate version

graphic file with name ncomms15043-m404.jpg

where it is understood that Inline graphic and Inline graphic are applied to system ai in the ith transmission, that is, Inline graphic.

Assume that the mean photon number of the total register states Inline graphic and Inline graphic is bounded by some large but yet finite value N(n). For instance, we may consider a sequence N(n)=N(0)+nt, where N(0) is the initial photon contribution and t is the channel contribution, which may be negative for energy-decreasing channels (like the thermal-loss channel) or positive for energy-increasing channels (like the quantum amplifier). We then prove

graphic file with name ncomms15043-m410.jpg

In fact, for n=2, we may write

graphic file with name ncomms15043-m411.jpg

where: (1) we use monotonicity under Λ2; (2) we use the triangle inequality; (3) we use monotonicity with respect to Inline graphic; and (4) we use the definition of equation (98) assuming a′=ai and the energy bound N(n). Generalization to arbitrary n is just a technicality.

By using equation (99) we may write that, for any bound N(n) and ɛ≥0, there is a sufficiently large μ such that Inline graphic, so that equation (102) becomes

graphic file with name ncomms15043-m415.jpg

By applying teleportation stretching we derive Inline graphic, where Inline graphicμ includes the original LOCCs Λi and the teleportation LOCCs Inline graphic. Thus, equation (104) implies

graphic file with name ncomms15043-m419.jpg

or, equivalently, Inline graphic.

Therefore, given an adaptive protocol with arbitrary register energy, and performed n times through a bosonic channel Inline graphic with asymptotic simulation, we may write its output state as the (trace-norm) limit

graphic file with name ncomms15043-m422.jpg

This means that we may formally write the asymptotic stretching Inline graphic for an asymptotic channel simulation Inline graphic.

More details on the one-shot REE bound given in Theorem 5

The main steps for proving equation (15) are already given in the main text. Here we provide more details of the formalism for the specific case of bosonic channels, involving asymptotic simulations Inline graphic. Given the asymptotic stretching of the output state Inline graphic as in equation (106), the simplification of the REE bound ERInline graphic explicitly goes as follows

graphic file with name ncomms15043-m428.jpg

where: (1) Inline graphic is a generic sequence of separable states that converges in trace norm, that is, such that there is a separable state Inline graphic so that Inline graphic; (2) we use the lower semi-continuity of the relative entropy3; (3) we use that Inline graphicμInline graphic are specific types of converging separable sequences within the set of all such sequences; (4) we use the monotonicity of the relative entropy under trace-preserving LOCCs; and (5) we use the definition of REE for asymptotic states given in equation (4).

Thus, from Theorem 1, we may write the following upper bound for the two-way capacity of a bosonic channel

graphic file with name ncomms15043-m434.jpg

The supremum over all adaptive protocols, which defines Inline graphic disappears in the right hand side of equation (108). The resulting bound applies to both energy-constrained protocols and the limit of energy-unconstrained protocols. The proof of the further condition Inline graphic in equation (15) comes from the subadditivity of the REE over tensor product states. This subadditivity also holds for a tensor product of asymptotic states; it is proven by restricting the minimization on tensor product sequences Inline graphic in the corresponding definition of the REE.

Let us now prove equation (16). The two inequalities in equation (16) are simply obtained by using Inline graphic for a Choi-stretchable channel (where the Choi matrix is intended to be asymptotic for a bosonic channel). Then we show the equality Inline graphic. By restricting the optimization in Inline graphic to an input EPR state Φ, we get the direct part Inline graphic as already noticed in equation (6). For CVs, this means to choose an asymptotic EPR state Inline graphic, so that

graphic file with name ncomms15043-m443.jpg

and therefore

graphic file with name ncomms15043-m444.jpg

For the converse part, consider first DVs. By applying teleportation stretching to a single use of the channel Inline graphic, we may write Inline graphic for a trace-preserving LOCC Inline graphic. Then, the monotonicity of the REE leads to

graphic file with name ncomms15043-m448.jpg

For CVs, we have an asymptotic stretching Inline graphic where Inline graphic. Therefore, we may write

graphic file with name ncomms15043-m451.jpg

Since this is true for any ρ, it also applies to the supremum and, therefore, to the channel's REE Inline graphic.

Proof of Proposition 6 on the one-shot REE bound for DV channels

At finite dimension, we may first use teleportation stretching to derive Inline graphic and then apply any upper bound to the distillable key Inline graphic, among which the REE bound has the best performance. Consider a key generation protocol described by a sequence Inline graphic of adaptive LOCCs (implicitly assumed to be averaged). If the protocol is implemented over a Choi-stretchable channel Inline graphic in finite dimension d, its stretching allows us to write the output as Inline graphic for a trace-preserving LOCC Inline graphic. Since any LOCC-sequence Inline graphic is transformed into Inline graphic, any key generation protocol through Inline graphic becomes a key distillation protocol over copies of the Choi matrix Inline graphic. For large n, this means Inline graphic.

To derive the opposite inequality, consider Alice sending EPR states through the channel, so that the shared output will be Inline graphic. There exists an optimal LOCC on these states, which reaches the distillable key Inline graphic for large n. This is a specific key generation protocol over Inline graphic, so that we may write Inline graphic. Thus, for a d-dimensional Choi-stretchable channel, we find

graphic file with name ncomms15043-m468.jpg

where we also exploit the fact that the distillable key of a DV state is bounded by its regularized REE27. It is also clear that Inline graphic, where the latter equality is demonstrated in the proof of Theorem 5.

Note that Inline graphic cannot be directly written for a bosonic channel, because its Choi matrix Inline graphic is energy-unbounded, so that its distillable key Inline graphic is not well-defined. By contrast, we know how to extend Inline graphic to bosonic channels and show Inline graphic at any dimension: This is the more general procedure of Theorem 5, which first exploits the general REE bound Inline graphic and then simplifies Inline graphic by means of teleportation stretching at any dimension.

Two-way quantum communication

Our method can be extended to more complex forms of quantum communication. In fact, our weak converse theorem can be applied to any scenario where two parties produce an output state by means of an adaptive protocol. All the details of the protocol are contained in the LOCCs Inline graphic which are collapsed into Inline graphic by teleportation stretching and then discarded using the REE.

Consider the scenario where Alice and Bob send systems to each other by choosing between two possible channels, Inline graphic (forward) or Inline graphic (backward), and performing adaptive LOCC after each single transmission (see also Fig. 10). The capacity Inline graphic is defined as the maximum number of target bits distributed per individual transmission, by using one of the two channels Inline graphic and Inline graphic, and assuming LOs assisted by unlimited two-way CCs.

Figure 10. Adaptive protocol for two-way quantum or private communication.

Figure 10

The protocol employs a forward channel Inline graphic and backward channel Inline graphic. Transmissions are alternated with adaptive LOCCs Inline graphic.

In general, the feedback transmission may occur a fraction p of the rounds, with associated capacity

graphic file with name ncomms15043-m484.jpg

The lower bound is a convex combination of the individual capacities of the two channels, which is achievable by using independent LOCC-sequences for the two channels.

Assume that Inline graphic are stretchable into the pair of resource states (σ, σ′). Then, we can stretch the protocol and decompose the output state as

graphic file with name ncomms15043-m486.jpg

where the tensor exponents n(1−p) and np are integers for suitably large n (it is implicitly understood that we consider suitable limits in the bosonic case). Using the monotonicity of the REE under trace-preserving LOCCs and its subadditivity over tensor products, we write

graphic file with name ncomms15043-m487.jpg

As previously said, our weak converse theorem can be applied to any adaptive protocol where two parties finally share a bipartite state Inline graphic. Thus, we may write

graphic file with name ncomms15043-m489.jpg

From equations (114) and (117), we find that Inline graphic must satisfy

graphic file with name ncomms15043-m491.jpg

For Choi-stretchable channels, this means

graphic file with name ncomms15043-m492.jpg

In particular, if the two channels are distillable, that is, Inline graphic and Inline graphic, then we may write

graphic file with name ncomms15043-m495.jpg

and the optimal strategy (value of p) corresponds to using the channel with maximum capacity.

Note that we may also consider a two-way quantum communication protocol where the forward and backward transmissions occur simultaneously, and correspondingly define a capacity that quantifies the maximum number of target bits which are distributed in each double communication, forward and backward (instead of each single transmission, forward or backward). However, this case can be considered as a double-band quantum channel.

Multiband quantum channel

Consider the communication scenario where Alice and Bob can exploit a multiband quantum channel, that is, a quantum channel whose single use involves the simultaneous transmission of m distinct systems. In practice, this channel Inline graphic is represented by a set of m independent channels or bands Inline graphic, that is, it can be written as

graphic file with name ncomms15043-m498.jpg

For instance, the bands may be bosonic Gaussian channels associated with difference frequencies.

In this case, the adaptive protocol is modified in such a way that each (multiband) transmission involves Alice simultaneously sending m quantum systems to Bob. These m input systems may be in a generally entangled state, which may also involve correlations with the remaining systems in Alice's register. Before and after each multiband transmission, the parties perform adaptive LOCCs on their local registers a and b. The multiband protocol is therefore characterized by a LOCC sequence Inline graphic after n transmissions.

The definition of the generic two-way capacity is immediately extended to a multiband channel. This capacity quantifies the maximum number of target bits that are distributed (in parallel) for each multiband transmission by means of adaptive protocols. It must satisfy

graphic file with name ncomms15043-m500.jpg

where the lower bound is the sum of the two-way capacities of the single bands Inline graphic. This lower bound is obtained by using adaptive LOCCs that are independent between different Inline graphic, and considering an output state of the form Inline graphic where Inline graphic is the output associated with Inline graphic.

Now consider an adaptive protocol performed over a multiband channel, whose m bands Inline graphic are stretchable into m resources states {σi}. By teleportation stretching, we find that Alice and Bob's output state can be decomposed in the form

graphic file with name ncomms15043-m507.jpg

(it is understood that the formulation is asymptotic for bosonic channels). This previous decomposition leads to

graphic file with name ncomms15043-m508.jpg

Using our weak converse theorem, we can then write

graphic file with name ncomms15043-m509.jpg

Combining equations (122) and (125) we may then write

graphic file with name ncomms15043-m510.jpg

For Choi-stretchable bands, this means

graphic file with name ncomms15043-m511.jpg

Finally, if the bands are distillable, that is, Inline graphic, then we find the additive result

graphic file with name ncomms15043-m513.jpg

Code availability

Source codes of the plots are available from the authors on request.

Data availability

No relevant research data were generated in this study.

Additional information

How to cite this article: Pirandola, S. et al. Fundamental limits of repeaterless quantum communications. Nat. Commun. 8, 15043 doi: 10.1038/ncomms15043 (2017).

Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Material

Supplementary Information

Supplementary Figures, Supplementary Notes, Supplementary Discussion and Supplementary References.

ncomms15043-s1.pdf (457.2KB, pdf)

Acknowledgments

We acknowledge support from the EPSRC via the ‘UK Quantum Communications Hub' (EP/M013472/1) and ‘qDATA' (EP/L011298/1), and from the ERC (Starting Grant 308253 PACOMANEDIA). In alphabetic order we would like to thank G. Adesso, S. Bose, S.L. Braunstein, M. Christandl, T.P.W. Cope, R. Demkowicz-Dobrzanski, K. Goodenough, F. Grosshans, S. Guha, M. Horodecki, L. Jiang, J. Kolodynski, S. Lloyd, C. Lupo, L. Maccone, S. Mancini, A. Müller-Hermes, B. Schumacher, G. Spedalieri, G. Vallone, M. Westmoreland, M.M. Wilde and A. Winter.

Footnotes

The authors declare no competing financial interests.

Author contributions S.P. designed the general methodology, which reduces the study of adaptive protocols to single-letter bounds, by devising the technique of teleportation stretching at any dimension and showing its combination with the channel's relative entropy of entanglement; S.P. proved the theorems, propositions and lemmas (with the exception of Theorem 7); S.P. also derived the analytical results for the bosonic Gaussian channels and wrote the manuscript. R.L. contributed to investigate bosonic channels and derived the analytical bounds for the discrete-variable channels, besides studying the classical communication cost. C.O. analysed the ideal rates of current QKD protocols and performed numerical simulations. L.B. proved the general formula for the relative entropy of Gaussian states (Theorem 7), contributed to refine mathematical aspects of teleportation covariance and to improve the bounds for the discrete-variable channels. All the authors checked the manuscript for accuracy.

References

  1. Nielsen M. A. & Chuang I. L. Quantum Computation and Quantum Information Cambridge Univ. Press (2000). [Google Scholar]
  2. Weedbrook C. et al. Gaussian quantum information. Rev. Mod. Phys. 84, 621–669 (2012). [Google Scholar]
  3. Holevo A. in Quantum Systems, Channels, Information: A Mathematical Introduction De Gruyter (2012). [Google Scholar]
  4. Bennett C. H. & Brassard G. in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175–179 (Bangalore, India, 1984).
  5. Gisin N., Ribordy G., Tittel W. & Zbinden H. Quantum cryptography. Rev. Mod. Phys. 74, 145–196 (2002). [Google Scholar]
  6. Scarani V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009). [Google Scholar]
  7. Kimble H. J. The quantum internet. Nature 453, 1023–1030 (2008). [DOI] [PubMed] [Google Scholar]
  8. Pirandola S. & Braunstein S. L. Unite to build a quantum internet. Nature 532, 169–171 (2016). [DOI] [PubMed] [Google Scholar]
  9. Pirandola S. et al. Advances in quantum teleportation. Nat. Photon. 9, 641–652 (2015). [Google Scholar]
  10. Andersen U. L., Neergaard-Nielsen J. S., van Loock P. & Furusawa A. Hybrid discrete- and continuous-variable quantum information. Nat. Phys. 11, 713–719 (2015). [Google Scholar]
  11. Briegel H.-J., Dür W., Cirac J. I. & Zoller P. Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998). [Google Scholar]
  12. Bennett C. H., DiVincenzo D. P. & Smolin J. A. Capacities of quantum erasure channels. Phys. Rev. Lett. 78, 3217–3220 (1997). [Google Scholar]
  13. Grosshans F. et al. Quantum key distribution using gaussian-modulated coherent states. Nature 421, 238–241 (2003). [DOI] [PubMed] [Google Scholar]
  14. Garca-Patrón R., Pirandola S., Lloyd S. & Shapiro J. H. Reverse coherent information. Phys. Rev. Lett. 102, 210501 (2009). [DOI] [PubMed] [Google Scholar]
  15. Devetak I. The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Info. Theory 51, 44–55 (2005). [Google Scholar]
  16. Devetak I. & Winter A. Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A 461, 207–235 (2005). [Google Scholar]
  17. Pirandola S., Garca-Patrón R., Braunstein S. L. & Lloyd S. Direct and reverse secret-key capacities of a quantum channel. Phys. Rev. Lett. 102, 050503 (2009). [DOI] [PubMed] [Google Scholar]
  18. Takeoka M., Guha S. & Wilde M. M. Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 5, 5235 (2014). [DOI] [PubMed] [Google Scholar]
  19. Christandl M. The Structure of Bipartite Quantum States: Insights from Group Theory and Cryptography (PhD thesis, University of Cambridge, 2006).
  20. Pirandola S. et al. High-rate measurement-device-independent quantum cryptography. Nat. Photon. 9, 397–402 (2015). [Google Scholar]
  21. Vedral V., Plenio M. B., Rippin M. A. & Knight P. L. Quantifying Entanglement. Phys. Rev. Lett. 78, 2275–2279 (1997). [Google Scholar]
  22. Vedral V. & Plenio M. B. Entanglement measures and purification procedures. Phys. Rev. A 57, 1619–1633 (1998). [Google Scholar]
  23. Vedral V. The role of relative entropy in quantum information theory. Rev. Mod. Phys. 74, 197–234 (2002). [Google Scholar]
  24. Bennett C. H. et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993). [DOI] [PubMed] [Google Scholar]
  25. Braunstein S. L. & Kimble H. J. Teleportation of continuous quantum variables. Phys. Rev. Lett. 80, 869–872 (1998). [Google Scholar]
  26. Braunstein S. L., D'Ariano G. M., Milburn G. J. & Sacchi M. F. Universal teleportation with a twist. Phys. Rev. Lett. 84, 3486–3489 (2000). [DOI] [PubMed] [Google Scholar]
  27. Horodecki K., Horodecki M., Horodecki P. & Oppenheim J. Secure key from bound entanglement. Phys. Rev. Lett. 94, 160502 (2005). [DOI] [PubMed] [Google Scholar]
  28. Schumacher B. & Nielsen M. A. Quantum data processing and error correction. Phys. Rev. A 54, 2629–2635 (1996). [DOI] [PubMed] [Google Scholar]
  29. Lloyd S. Capacity of the noisy quantum channel. Phys. Rev. A 55, 1613–1622 (1997). [Google Scholar]
  30. Christiandl M., Schuch N. & Winter A. Entanglement of the antisymmetric state. Commun. Math. Phys. 311, 397–422 (2012). [Google Scholar]
  31. Bennett C. H., DiVincenzo D. P., Smolin J. A. & Wootters W. K. Mixed-state entanglement and quantum error correction. Phys. Rev. A 54, 3824–3851 (1996). [DOI] [PubMed] [Google Scholar]
  32. Horodecki M., Horodecki P. & Horodecki R. General teleportation channel, singlet fraction, and quasidistillation. Phys. Rev. A 99, 1888–1898 (1999). [Google Scholar]
  33. Bowen G. & Bose S. Teleportation as a depolarizing quantum channel, relative entropy and classical capacity. Phys. Rev. Lett. 87, 267901 (2001). [DOI] [PubMed] [Google Scholar]
  34. Albeverio S., Fei S.-M. & Yang W.-L. Optimal teleportation based on Bell measurements. Phys. Rev. A 66, 012301 (2002). [Google Scholar]
  35. Müller-Hermes A. Transposition in Quantum Information Theory (MSc Thesis, Technische Universität München, 2012).
  36. Leung D. & Matthews W. On the power of ppt-preserving and nonsignalling codes. IEEE Trans. Inf. Theory 61, 4486–4499 (2015). [Google Scholar]
  37. Werner R. F. All teleportation and dense coding schemes. J. Phys. A 34, 7081–7094 (2001). [Google Scholar]
  38. Niset J., Fiurasek J. & Cerf N. J. No-go theorem for Gaussian quantum error correction. Phys. Rev. Lett. 102, 120501 (2009). [DOI] [PubMed] [Google Scholar]
  39. Ji Z., Wang G., Duan R., Feng Y. & Ying M. Parameter estimation of quantum channels. IEEE Trans. Inform. Theory 54, 5172–5185 (2008). [Google Scholar]
  40. Nielsen M. A. & Chuang I. L. Programmable quantum gate arrays. Phys. Rev. Lett. 79, 321–324 (1997). [Google Scholar]
  41. Modi K. et al. The classical-quantum boundary for correlations: discord and related measures. Rev. Mod. Phys. 84, 1655–1707 (2012). [Google Scholar]
  42. Pirandola S. Quantum discord as a resource for quantum cryptography. Sci. Rep. 4, 6956 (2014). [DOI] [PMC free article] [PubMed] [Google Scholar]
  43. Pirandola S., Spedalieri G., Braunstein S. L., Cerf N. J. & Lloyd S. Optimality of Gaussian discord. Phys. Rev. Lett. 113, 140405 (2014). [DOI] [PubMed] [Google Scholar]
  44. Hosseinidehaj N. & Malaney R. Gaussian entanglement distribution via satellite. Phys. Rev. A 91, 022304 (2015). [Google Scholar]
  45. Vallone G. et al. Experimental satellite quantum communications. Phys. Rev. Lett. 115, 040502 (2015). [DOI] [PubMed] [Google Scholar]
  46. Dequal D. et al. Experimental single-photon exchange along a space link of 7,000 km. Phys. Rev. A 93, 010301 (R) (2016). [Google Scholar]
  47. Usenko V. C. & Filip R. Feasibility of continuous-variable quantum key distribution with noisy coherent states. Phys. Rev. A 81, 022318 (2010). [Google Scholar]
  48. Weedbrook C. et al. Quantum cryptography approaching the classical limit. Phys. Rev. Lett. 105, 110501 (2010). [DOI] [PubMed] [Google Scholar]
  49. Weedbrook C. et al. Continuous-variable quantum key distribution using thermal states. Phys. Rev. A 86, 022318 (2012). [Google Scholar]
  50. Weedbrook C., Ottaviani C. & Pirandola S. Two-way quantum cryptography at different wavelengths. Phys. Rev. A 89, 012309 (2014). [Google Scholar]
  51. Holevo A. S. & Werner R. F. Evaluating capacities of bosonic Gaussian channels. Phys. Rev. A 63, 032312 (2001). [Google Scholar]
  52. Wolf M. M., Pérez-Garca D. & Giedke G. Quantum capacities of bosonic channels. Phys. Rev. Lett. 98, 130501 (2007). [DOI] [PubMed] [Google Scholar]
  53. Devetak I. & Shor P. W. The capacity of a quantum channel for simultaneous transmission of classical and quantum information. Commun. Math. Phys. 256, 287–303 (2005). [Google Scholar]
  54. Goodenough K., Elkouss D. & Wehner S. Assessing the performance of quantum repeaters for all phase-insensitive Gaussian bosonic channels. Preprint at https://arxiv.org/abs/1511.08710v1 (2015).
  55. Bose S. Quantum communication through an Unmodulated Spin Chain. Phys. Rev. Lett. 20, 207901 (2003). [DOI] [PubMed] [Google Scholar]
  56. Bose S., Bayat A., Sodano P., Banchi L. & Verrucchi P. in Quantum State Transfer and Network Engineering 1–37Springer (2014). [Google Scholar]
  57. Pirandola S. Capacities of repeater-assisted quantum communications. Preprint at https://arxiv.org/abs/1601.00966 (2016).
  58. Pirandola S. & Lupo C. Ultimate precision of adaptive noise estimation. Phys. Rev. Lett. 118, 100502 (2017). [DOI] [PubMed] [Google Scholar]
  59. Dutta A. B., Mukunda N. & Simon R. The real symplectic groups in quantum mechanics and optics. Pramana 45, 471–497 (1995). [Google Scholar]
  60. Banchi L., Braunstein S. L. & Pirandola S. Quantum fidelity for arbitrary Gaussian states. Phys. Rev. Lett. 115, 260501 (2015). [DOI] [PubMed] [Google Scholar]
  61. Chen X. Y. Gaussian relative entropy of entanglement. Phys. Rev. A 71, 062320 (2005). [Google Scholar]
  62. Scheel S. & Welsch D.-G. Entanglement generation and degradation by passive optical devices. Phys. Rev. A 64, 063811 (2001). [Google Scholar]
  63. Weedbrook C. et al. Quantum cryptography without switching. Phys. Rev. Lett. 93, 170504 (2004). [DOI] [PubMed] [Google Scholar]
  64. Ottaviani C., Spedalieri G., Braunstein S. L. & Pirandola S. Continuous-variable quantum cryptography with an untrusted relay: detailed security analysis of the symmetric configuration. Phys. Rev. A 91, 022320 (2015). [Google Scholar]
  65. Spedalieri G. et al. in Proceedings of SPIE Security+Defence 2015 Conference on Quantum Information Science and Technology 9648-47 (Toulouse, France, 2015).
  66. Pirandola S., Mancini S., Lloyd S. & Braunstein S. L. Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 4, 726–730 (2008). [Google Scholar]
  67. Ottaviani C. & Pirandola S. General immunity and superadditivity of two-way Gaussian quantum cryptography. Sci. Rep. 6, 22225 (2016). [DOI] [PMC free article] [PubMed] [Google Scholar]
  68. Braunstein S. L. & Pirandola S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012). [DOI] [PubMed] [Google Scholar]
  69. Lo H.-K., Curty M. & Qi B. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 108, 130503 (2012). [DOI] [PubMed] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Supplementary Information

Supplementary Figures, Supplementary Notes, Supplementary Discussion and Supplementary References.

ncomms15043-s1.pdf (457.2KB, pdf)

Data Availability Statement

No relevant research data were generated in this study.


Articles from Nature Communications are provided here courtesy of Nature Publishing Group

RESOURCES