187 research outputs found
Long-distance distribution of genuine energy-time entanglement
Any practical realization of entanglement-based quantum communication must be
intrinsically secure and able to span long distances avoiding the need of a
straight line between the communicating parties. The violation of Bell's
inequality offers a method for the certification of quantum links without
knowing the inner workings of the devices. Energy-time entanglement quantum
communication satisfies all these requirements. However, currently there is a
fundamental obstacle with the standard configuration adopted: an intrinsic
geometrical loophole that can be exploited to break the security of the
communication, in addition to other loopholes. Here we show the first
experimental Bell violation with energy-time entanglement distributed over 1 km
of optical fibers that is free of this geometrical loophole. This is achieved
by adopting a new experimental design, and by using an actively stabilized
fiber-based long interferometer. Our results represent an important step
towards long-distance secure quantum communication in optical fibers.Comment: 6 pages, 3 figures. Matches published versio
Quantum Communication
Quantum communication, and indeed quantum information in general, has changed
the way we think about quantum physics. In 1984 and 1991, the first protocol
for quantum cryptography and the first application of quantum non-locality,
respectively, attracted a diverse field of researchers in theoretical and
experimental physics, mathematics and computer science. Since then we have seen
a fundamental shift in how we understand information when it is encoded in
quantum systems. We review the current state of research and future directions
in this new field of science with special emphasis on quantum key distribution
and quantum networks.Comment: Submitted version, 8 pg (2 cols) 5 fig
Practical challenges in quantum key distribution
Quantum key distribution (QKD) promises unconditional security in data
communication and is currently being deployed in commercial applications.
Nonetheless, before QKD can be widely adopted, it faces a number of important
challenges such as secret key rate, distance, size, cost and practical
security. Here, we survey those key challenges and the approaches that are
currently being taken to address them.Comment: To appear in npj Quantum Informatio
Quantum Cryptography
Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological issues.Comment: 55 pages, 32 figures; to appear in Reviews of Modern Physic
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
The ability to distribute secret keys between two parties with
information-theoretic security, that is, regardless of the capacities of a
malevolent eavesdropper, is one of the most celebrated results in the field of
quantum information processing and communication. Indeed, quantum key
distribution illustrates the power of encoding information on the quantum
properties of light and has far reaching implications in high-security
applications. Today, quantum key distribution systems operate in real-world
conditions and are commercially available. As with most quantum information
protocols, quantum key distribution was first designed for qubits, the
individual quanta of information. However, the use of quantum continuous
variables for this task presents important advantages with respect to qubit
based protocols, in particular from a practical point of view, since it allows
for simple implementations that require only standard telecommunication
technology. In this review article, we describe the principle of
continuous-variable quantum key distribution, focusing in particular on
protocols based on coherent states. We discuss the security of these protocols
and report on the state-of-the-art in experimental implementations, including
the issue of side-channel attacks. We conclude with promising perspectives in
this research field.Comment: 21 pages, 2 figures, 1 tabl
Security of quantum key distribution with imperfect devices
We prove the security of the Bennett-Brassard (BB84) quantum key distribution
protocol in the case where the source and detector are under the limited
control of an adversary. Our proof applies when both the source and the
detector have small basis-dependent flaws, as is typical in practical
implementations of the protocol. We derive a general lower bound on the
asymptotic key generation rate for weakly basis-dependent eavesdropping
attacks, and also estimate the rate in some special cases: sources that emit
weak coherent states with random phases, detectors with basis-dependent
efficiency, and misaligned sources and detectors.Comment: 22 pages. (v3): Minor changes. (v2): Extensively revised and
expanded. New results include a security proof for generic small flaws in the
source and the detecto
- …