19,211 research outputs found
Secure Communication Based on Hyperchaotic Chen System with Time-Delay
This research is partially supported by National Natural Science Foundation of China (61172070, 60804040), Fok Ying Tong Education Foundation Young Teacher Foundation(111065), Innovative Research Team of Shaanxi Province(2013KCT-04), The Key Basic Research Fund of Shaanxi Province (2016ZDJC-01), Chao Bai was supported by Excellent Ph.D. research fund (310-252071603) at XAUT.Peer reviewedPostprin
Experimental demonstration of long-distance continuous-variable quantum key distribution
Distributing secret keys with information-theoretic security is arguably one
of the most important achievements of the field of quantum information
processing and communications. The rapid progress in this field has enabled
quantum key distribution (QKD) in real-world conditions and commercial devices
are now readily available. QKD systems based on continuous variables present
the major advantage that they only require standard telecommunication
technology, and in particular, that they do not use photon counters. However,
these systems were considered up till now unsuitable for long-distance
communication. Here, we overcome all previous limitations and demonstrate for
the first time continuous-variable quantum key distribution over 80 km of
optical fibre. The demonstration includes all aspects of a practical scenario,
with real-time generation of secret keys, stable operation in a regular
environment, and use of finite-size data blocks for secret information
computation and key distillation. Our results correspond to an implementation
guaranteeing the strongest level of security for QKD reported to date for such
long distances and pave the way to practical applications of secure quantum
communications
100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm
We report on an integrated photonic transmitter of up to 100 MHz repetition
rate, which emits pulses centered at 850 nm with arbitrary amplitude and
polarization. The source is suitable for free space quantum key distribution
applications. The whole transmitter, with the optical and electronic components
integrated, has reduced size and power consumption. In addition, the
optoelectronic components forming the transmitter can be space-qualified,
making it suitable for satellite and future space missions.Comment: 6 figures, 2 table
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
The ability to distribute secret keys between two parties with
information-theoretic security, that is, regardless of the capacities of a
malevolent eavesdropper, is one of the most celebrated results in the field of
quantum information processing and communication. Indeed, quantum key
distribution illustrates the power of encoding information on the quantum
properties of light and has far reaching implications in high-security
applications. Today, quantum key distribution systems operate in real-world
conditions and are commercially available. As with most quantum information
protocols, quantum key distribution was first designed for qubits, the
individual quanta of information. However, the use of quantum continuous
variables for this task presents important advantages with respect to qubit
based protocols, in particular from a practical point of view, since it allows
for simple implementations that require only standard telecommunication
technology. In this review article, we describe the principle of
continuous-variable quantum key distribution, focusing in particular on
protocols based on coherent states. We discuss the security of these protocols
and report on the state-of-the-art in experimental implementations, including
the issue of side-channel attacks. We conclude with promising perspectives in
this research field.Comment: 21 pages, 2 figures, 1 tabl
ARIES WP3 â Needs and Requirements Analyses
Information and communication technologies have increasingly
influenced and changed our daily life. They allow global
connectivity and easy access to distributed applications and
digital services over the Internet. This report analysis security requirements on trust establishment and trust evaluation based on two different use case scenarios: "Trusted Communication using COTS" and "Trust Establishment for Cross-organizational Crises Management". A systematic needs analysis is performed on both scenarios which haver resulted in a large and well documented set of requirements. This is the first step in a large effort to define a security architecture for the two use case scenarios.
- âŠ