15,850 research outputs found
Unconditional security at a low cost
By simulating four quantum key distribution (QKD) experiments and analyzing
one decoy-state QKD experiment, we compare two data post-processing schemes
based on security against individual attack by L\"{u}tkenhaus, and
unconditional security analysis by Gottesman-Lo-L\"{u}tkenhaus-Preskill. Our
results show that these two schemes yield close performances. Since the Holy
Grail of QKD is its unconditional security, we conclude that one is better off
considering unconditional security, rather than restricting to individual
attacks.Comment: Accepted by International Conference on Quantum Foundation and
Technology: Frontier and Future 2006 (ICQFT'06
Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense
We address the role of the phase-insensitive trusted preparation and
detection noise in the security of a continuous-variable quantum key
distribution, considering the Gaussian protocols on the basis of coherent and
squeezed states and studying them in the conditions of Gaussian lossy and noisy
channels. The influence of such a noise on the security of Gaussian quantum
cryptography can be crucial, even despite the fact that a noise is trusted, due
to a strongly nonlinear behavior of the quantum entropies involved in the
security analysis. We recapitulate the known effect of the preparation noise in
both direct and reverse-reconciliation protocols, as well as the detection
noise in the reverse-reconciliation scenario. As a new result, we show the
negative role of the trusted detection noise in the direct-reconciliation
scheme. We also describe the role of the trusted preparation or detection noise
added at the reference side of the protocols in improving the robustness of the
protocols to the channel noise, confirming the positive effect for the
coherent-state reverse-reconciliation protocol. Finally, we address the
combined effect of trusted noise added both in the source and the detector.Comment: 25 pages, 9 figure
Quantum key distribution using a triggered quantum dot source emitting near 1.3 microns
We report the distribution of a cryptographic key, secure from photon number
splitting attacks, over 35 km of optical fiber using single photons from an
InAs quantum dot emitting ~1.3 microns in a pillar microcavity. Using below
GaAs-bandgap optical excitation, we demonstrate suppression of multiphoton
emission to 10% of the Poissonian level without detector dark count
subtraction. The source is incorporated into a phase encoded interferometric
scheme implementing the BB84 protocol for key distribution over standard
telecommunication optical fiber. We show a transmission distance advantage over
that possible with (length-optimized) uniform intensity weak coherent pulses at
1310 nm in the same system.Comment: 4 pages, 4 figure
- …