29,139 research outputs found
Field test of quantum key distribution in the Tokyo QKD Network
A novel secure communication network with quantum key distribution in a
metropolitan area is reported. Different QKD schemes are integrated to
demonstrate secure TV conferencing over a distance of 45km, stable long-term
operation, and application to secure mobile phones.Comment: 21 pages, 19 figure
Quantum Image Processing and Its Application to Edge Detection: Theory and Experiment
Processing of digital images is continuously gaining in volume and relevance,
with concomitant demands on data storage, transmission and processing power.
Encoding the image information in quantum-mechanical systems instead of
classical ones and replacing classical with quantum information processing may
alleviate some of these challenges. By encoding and processing the image
information in quantum-mechanical systems, we here demonstrate the framework of
quantum image processing, where a pure quantum state encodes the image
information: we encode the pixel values in the probability amplitudes and the
pixel positions in the computational basis states. Our quantum image
representation reduces the required number of qubits compared to existing
implementations, and we present image processing algorithms that provide
exponential speed-up over their classical counterparts. For the commonly used
task of detecting the edge of an image, we propose and implement a quantum
algorithm that completes the task with only one single-qubit operation,
independent of the size of the image. This demonstrates the potential of
quantum image processing for highly efficient image and video processing in the
big data era.Comment: 13 pages, including 9 figures and 5 appendixe
Field test of a practical secure communication network with decoy-state quantum cryptography
We present a secure network communication system that operated with
decoy-state quantum cryptography in a real-world application scenario. The full
key exchange and application protocols were performed in real time among three
nodes, in which two adjacent nodes were connected by approximate 20 km of
commercial telecom optical fiber. The generated quantum keys were immediately
employed and demonstrated for communication applications, including unbreakable
real-time voice telephone between any two of the three communication nodes, or
a broadcast from one node to the other two nodes by using one-time pad
encryption.Comment: 10 pages, 2 figures, 2 tables, typos correcte
Roadmap on optical security
Postprint (author's final draft
- …