10,530 research outputs found

    Signatures of two-photon pulses from a quantum two-level system

    No full text

    Implementation vulnerabilities in general quantum cryptography

    Full text link
    Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. We propose how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties. Applicable countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.Comment: 13 pages, 8 figure

    Observation of three-body correlations for photons coupled to a Rydberg superatom

    Full text link
    We report on the experimental observation of non-trivial three-photon correlations imprinted onto initially uncorrelated photons through interaction with a single Rydberg superatom. Exploiting the Rydberg blockade mechanism, we turn a cold atomic cloud into a single effective emitter with collectively enhanced coupling to a focused photonic mode which gives rise to clear signatures in the connected part of the three-body correlation function of the out-going photons. We show that our results are in good agreement with a quantitative model for a single, strongly coupled Rydberg superatom. Furthermore, we present an idealized but exactly solvable model of a single two-level system coupled to a photonic mode, which allows for an interpretation of our experimental observations in terms of bound states and scattering states

    Experimental measurement-device-independent quantum digital signatures over a metropolitan network

    Get PDF
    Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here, we exploit a measurement-device-independent (MDI) quantum network, over a 200-square-kilometer metropolitan area, to perform a field test of a three-party measurement-device-independent quantum digital signature (MDI-QDS) scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 1E-7. Remarkably, our work demonstrates the feasibility of MDI-QDS for practical applications.Comment: 5 pages, 1 figure, 2 tables, supplemental materials included as ancillary fil

    Quantum cryptography: key distribution and beyond

    Full text link
    Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
    corecore