3,892 research outputs found
Proposal for a new scheme for producing a two-photon, high dimensional hyperentangled state
We propose an experimentally feasible scheme for generating a two
dimensional photons hyperentangled state, entangled in
polarization, frequency and spatial mode. This scheme is mainly based on a
parametric down-conversion source and cross-Kerr nonlinearities, which avoids
the complicated uncertain post-selection. Our method can be easily expanded to
the production of hyperentangled states with more photons in multidimensions.
Hence the expectation for vast quantities of information in quantum information
processing will possibly come true. Finally, we put forward a realizable
quantum key distribution (QKD) protocol based on the high dimensional
hyperentangled state.Comment: 15 pages, 5 figures, to appear in J.Mod Optic
Secret key distribution leveraging color shift over visible light channel
Given the widely adoption of screen and camera in many electronic devices, the visible light communication (VLC) over screen-to-camera channel emerges as a novel short range communication technique in recent years. Active research explores various ways to convey messages over screen-camera channel, such as barcode and unobtrusive optical pattern. However, with the prevalence of LED screens of wide viewing angles and mobile devices equipped with high standard cameras, the threat of information leakage over screen-to-camera channel becomes in-negligible. Few studies have discussed how to ensure the security of data transmission over screen-to-camera channel. In this paper, we propose a secret key distribution system leveraging the unique color shift property over visible light channel. To facilitate such design, we develop a practical secret key matching based method to map the secret key into gridded optical patterns on screen, which can only be correctly recognized by the legitimate user through an accessible region and allow regular data stream transmission through valid grids. The proposed system is prototyped with off-the-shelf devices and validated under various experimental scenarios. The results show that our system can achieve high bit-decoding accuracy for the legitimate users while maintaining comparable data throughput as regular unobtrusive VLC systems with very low recovery accuracy of the encrypted data for the attackers
- …
