203 research outputs found
Experimental Test of Two-way Quantum Key Distribution in Presence of Controlled Noise
We describe the experimental test of a quantum key distribution performed
with a two-way protocol without using entanglement. An individual incoherent
eavesdropping is simulated and induces a variable amount of noise on the
communication channel. This allows a direct verification of the agreement
between theory and practice.Comment: 4 pages, 3 figure
Delayed commutation in quantum computer networks
In the same way that classical computer networks connect and enhance the
capabilities of classical computers, quantum networks can combine the
advantages of quantum information and communications. We propose a
non-classical network element, a delayed commutation switch, that can solve the
problem of switching time in packet switching networks. With the help of some
local ancillary qubits and superdense codes we can route the information after
part of it has left the network node.Comment: 4 pages. 4 figures. Preliminar versio
Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors
Quantum Key Distribution with the BB84 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon
signals. The distances that can be covered by these methods are limited due to
the loss in the quantum channel (e.g. loss in the optical fiber) and in the
single-photon counters of the receivers. One can argue that the loss in the
detectors cannot be changed by an eavesdropper in order to increase the covered
distance. Here we show that the security analysis of this scenario is not as
easy as is commonly assumed, since already two-photon processes allow
eavesdropping strategies that outperform the known photon-number splitting
attack. For this reason there is, so far, no satisfactory security analysis
available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix
added, references update
Controlled order rearrangement encryption for quantum key distribution
A novel technique is devised to perform orthogonal state quantum key
distribution. In this scheme, entangled parts of a quantum information carrier
are sent from Alice to Bob through two quantum channels. However before the
transmission, the orders of the quantum information carrier in one channel is
reordered so that Eve can not steal useful information. At the receiver's end,
the order of the quantum information carrier is restored. The order
rearrangement operation in both parties is controlled by a prior shared control
key which is used repeatedly in a quantum key distribution session.Comment: 5 pages and 2 figure
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
Quantum Cryptography Based on the Time--Energy Uncertainty Relation
A new cryptosystem based on the fundamental time--energy uncertainty relation
is proposed. Such a cryptosystem can be implemented with both correlated photon
pairs and single photon states.Comment: 5 pages, LaTex, no figure
Quantum cryptography using balanced homodyne detection
We report an experimental quantum key distribution that utilizes balanced
homodyne detection, instead of photon counting, to detect weak pulses of
coherent light. Although our scheme inherently has a finite error rate, it
allows high-efficiency detection and quantum state measurement of the
transmitted light using only conventional devices at room temperature. When the
average photon number was 0.1, an error rate of 0.08 and "effective" quantum
efficiency of 0.76 were obtained.Comment: Errors in the sentence citing ref.[20] are correcte
Pulsed energy-time entangled twin-photon source for quantum communication
A pulsed source of energy-time entangled photon pairs pumped by a standard
laser diode is proposed and demonstrated. The basic states can be distinguished
by their time of arrival. This greatly simplifies the realization of 2-photon
quantum cryptography, Bell state analyzers, quantum teleportation, dense
coding, entanglement swapping, GHZ-states sources, etc. Moreover the
entanglement is well protected during photon propagation in telecom optical
fibers, opening the door to few-photon applications of quantum communication
over long distances.Comment: 8 pages, 4 figure
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks
for realistic signals sources, including weak coherent pulses and
downconversion sources. The proof applies to the BB84 protocol with the
standard detection scheme (no strong reference pulse). I obtain a formula for
the secure bit rate per time slot of an experimental setup which can be used to
optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure
- …