4,870 research outputs found
Daylight operation of a free space, entanglement-based quantum key distribution system
Many quantum key distribution (QKD) implementations using a free space
transmission path are restricted to operation at night time in order to
distinguish the signal photons used for a secure key establishment from
background light. Here, we present a lean entanglement-based QKD system
overcoming that imitation. By implementing spectral, spatial and temporal
filtering techniques, we were able to establish a secure key continuously over
several days under varying light and weather conditions.Comment: 13 pages, 6 figure
Resource-efficient quantum key distribution with integrated silicon photonics
Integrated photonics provides a promising platform for quantum key
distribution (QKD) system in terms of miniaturization, robustness and
scalability. Tremendous QKD works based on integrated photonics have been
reported. Nonetheless, most current chip-based QKD implementations require
additional off-chip hardware to demodulate quantum states or perform auxiliary
tasks such as time synchronization and polarization basis tracking. Here, we
report a demonstration of resource-efficient chip-based BB84 QKD with a
silicon-based encoder and decoder. In our scheme, the time synchronization and
polarization compensation are implemented relying on the preparation and
measurement of the quantum states generated by on-chip devices, thus no need
additional hardware. The experimental tests show that our scheme is highly
stable with a low intrinsic QBER of in a 6-h continuous run.
Furthermore, over a commercial fiber channel up to 150 km, the system enables
realizing secure key distribution at a rate of 866 bps. Our demonstration paves
the way for low-cost, wafer-scale manufactured QKD system.Comment: comments are welcome
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue
Reference frames, superselection rules, and quantum information
Recently, there has been much interest in a new kind of ``unspeakable''
quantum information that stands to regular quantum information in the same way
that a direction in space or a moment in time stands to a classical bit string:
the former can only be encoded using particular degrees of freedom while the
latter are indifferent to the physical nature of the information carriers. The
problem of correlating distant reference frames, of which aligning Cartesian
axes and synchronizing clocks are important instances, is an example of a task
that requires the exchange of unspeakable information and for which it is
interesting to determine the fundamental quantum limit of efficiency. There
have also been many investigations into the information theory that is
appropriate for parties that lack reference frames or that lack correlation
between their reference frames, restrictions that result in global and local
superselection rules. In the presence of these, quantum unspeakable information
becomes a new kind of resource that can be manipulated, depleted, quantified,
etcetera. Methods have also been developed to contend with these restrictions
using relational encodings, particularly in the context of computation,
cryptography, communication, and the manipulation of entanglement. This article
reviews the role of reference frames and superselection rules in the theory of
quantum information processing.Comment: 55 pages, published versio
Correlation-powered Information Engines and the Thermodynamics of Self-Correction
Information engines can use structured environments as a resource to generate
work by randomizing ordered inputs and leveraging the increased Shannon entropy
to transfer energy from a thermal reservoir to a work reservoir. We give a
broadly applicable expression for the work production of an information engine,
generally modeled as a memoryful channel that communicates inputs to outputs as
it interacts with an evolving environment. The expression establishes that an
information engine must have more than one memory state in order to leverage
input environment correlations. To emphasize this functioning, we designed an
information engine powered solely by temporal correlations and not by
statistical biases, as employed by previous engines. Key to this is the
engine's ability to synchronize---the engine automatically returns to a desired
dynamical phase when thrown into an unwanted, dissipative phase by corruptions
in the input---that is, by unanticipated environmental fluctuations. This
self-correcting mechanism is robust up to a critical level of corruption,
beyond which the system fails to act as an engine. We give explicit analytical
expressions for both work and critical corruption level and summarize engine
performance via a thermodynamic-function phase diagram over engine control
parameters. The results reveal a new thermodynamic mechanism based on
nonergodicity that underlies error correction as it operates to support
resilient engineered and biological systems.Comment: 22 pages, 13 figures;
http://csc.ucdavis.edu/~cmg/compmech/pubs/tos.ht
The Security of Practical Quantum Key Distribution
Quantum key distribution (QKD) is the first quantum information task to reach
the level of mature technology, already fit for commercialization. It aims at
the creation of a secret key between authorized partners connected by a quantum
channel and a classical authenticated channel. The security of the key can in
principle be guaranteed without putting any restriction on the eavesdropper's
power.
The first two sections provide a concise up-to-date review of QKD, biased
toward the practical side. The rest of the paper presents the essential
theoretical tools that have been developed to assess the security of the main
experimental platforms (discrete variables, continuous variables and
distributed-phase-reference protocols).Comment: Identical to the published version, up to cosmetic editorial change
- …