23,254 research outputs found
Towards Communication-Efficient Quantum Oblivious Key Distribution
Oblivious Transfer, a fundamental problem in the field of secure multi-party
computation is defined as follows: A database DB of N bits held by Bob is
queried by a user Alice who is interested in the bit DB_b in such a way that
(1) Alice learns DB_b and only DB_b and (2) Bob does not learn anything about
Alice's choice b. While solutions to this problem in the classical domain rely
largely on unproven computational complexity theoretic assumptions, it is also
known that perfect solutions that guarantee both database and user privacy are
impossible in the quantum domain. Jakobi et al. [Phys. Rev. A, 83(2), 022301,
Feb 2011] proposed a protocol for Oblivious Transfer using well known QKD
techniques to establish an Oblivious Key to solve this problem. Their solution
provided a good degree of database and user privacy (using physical principles
like impossibility of perfectly distinguishing non-orthogonal quantum states
and the impossibility of superluminal communication) while being loss-resistant
and implementable with commercial QKD devices (due to the use of SARG04).
However, their Quantum Oblivious Key Distribution (QOKD) protocol requires a
communication complexity of O(N log N). Since modern databases can be extremely
large, it is important to reduce this communication as much as possible. In
this paper, we first suggest a modification of their protocol wherein the
number of qubits that need to be exchanged is reduced to O(N). A subsequent
generalization reduces the quantum communication complexity even further in
such a way that only a few hundred qubits are needed to be transferred even for
very large databases.Comment: 7 page
Quantum key distribution via quantum encryption
A quantum key distribution protocol based on quantum encryption is presented
in this Brief Report. In this protocol, the previously shared
Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the
classical cryptography key. The quantum key is reusable and the eavesdropper
cannot elicit any information from the particle Alice sends to Bob. The concept
of quantum encryption is also discussed.Comment: 4 Pages, No Figure. Final version to appear in PR
Continuous-variable teleportation improvement by photon subtraction via conditional measurement
We show that the recently proposed scheme of teleportation of continuous
variables [S.L. Braunstein and H.J. Kimble, Phys. Rev. Lett. 80, 869 (1998)]
can be improved by a conditional measurement in the preparation of the
entangled state shared by the sender and the recipient. The conditional
measurement subtracts photons from the original entangled two-mode squeezed
vacuum, by transmitting each mode through a low-reflectivity beam splitter and
performing a joint photon-number measurement on the reflected beams. In this
way the degree of entanglement of the shared state is increased and so is the
fidelity of the teleported state.Comment: 7 pages REVTeX, 7 figure
Efficient quantum key distribution scheme with nonmaximally entangled states
We propose an efficient quantum key distribution scheme based on
entanglement. The sender chooses pairs of photons in one of the two equivalent
nonmaximally entangled states randomly, and sends a sequence of photons from
each pair to the receiver. They choose from the various bases independently but
with substantially different probabilities, thus reducing the fraction of
discarded data, and a significant gain in efficiency is achieved. We then show
that such a refined data analysis guarantees the security of our scheme against
a biased eavesdropping strategy.Comment: 5 Pages, No Figur
Practical free-space quantum key distribution over 1 km
A working free-space quantum key distribution (QKD) system has been developed
and tested over an outdoor optical path of ~1 km at Los Alamos National
Laboratory under nighttime conditions. Results show that QKD can provide secure
real-time key distribution between parties who have a need to communicate
secretly. Finally, we examine the feasibility of surface to satellite QKD.Comment: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters,
May 199
Thermal optical non-linearity of nematic mesophase enhanced by gold nanoparticles – an experimental and numerical investigation
In this work the mechanisms leading to the enhancement of optical nonlinearity of nematic liquid crystalline material through localized heating by doping the liquid crystals (LCs) with gold nanoparticles (GNPs) are investigated. We present some experimental and theoretical results on the effect of voltage and nanoparticle concentration on the nonlinear response of GNP-LC suspensions. The optical nonlinearity of these systems is characterized by diffraction measurements and the second order nonlinear refractive index, n 2 , is used to compare systems with different configurations and operating conditions. A theoretical model based on heat diffusion that takes into account the intensity and finite size of the incident beam, the nanoparticle concentration dependent absorbance of GNP doped LC systems and the presence of bounding substrates is developed and validated. We use the model to discuss the possibilities of further enhancing the optical nonlinearity
Entangled state quantum cryptography: Eavesdropping on the Ekert protocol
Using polarization-entangled photons from spontaneous parametric
downconversion, we have implemented Ekert's quantum cryptography protocol. The
near-perfect correlations of the photons allow the sharing of a secret key
between two parties. The presence of an eavesdropper is continually checked by
measuring Bell's inequalities. We investigated several possible eavesdropper
strategies, including pseudo-quantum non-demolition measurements. In all cases,
the eavesdropper's presence was readily apparent. We discuss a procedure to
increase her detectability.Comment: 4 pages, 2 encapsulated postscript files, PRL (tentatively) accepte
Quantum State Disturbance vs. Information Gain: Uncertainty Relations for Quantum Information
When an observer wants to identify a quantum state, which is known to be one
of a given set of non-orthogonal states, the act of observation causes a
disturbance to that state. We investigate the tradeoff between the information
gain and that disturbance. This issue has important applications in quantum
cryptography. The optimal detection method, for a given tolerated disturbance,
is explicitly found in the case of two equiprobable non-orthogonal pure states.Comment: 20 pages, standard LaTeX, four png figures (also available from the
authors: [email protected] and [email protected]
Quantum identification system
A secure quantum identification system combining a classical identification
procedure and quantum key distribution is proposed. Each identification
sequence is always used just once and new sequences are ``refuelled'' from a
shared provably secret key transferred through the quantum channel. Two
identification protocols are devised. The first protocol can be applied when
legitimate users have an unjammable public channel at their disposal. The
deception probability is derived for the case of a noisy quantum channel. The
second protocol employs unconditionally secure authentication of information
sent over the public channel, and thus it can be applied even in the case when
an adversary is allowed to modify public communications. An experimental
realization of a quantum identification system is described.Comment: RevTeX, 4 postscript figures, 9 pages, submitted to Physical Review
- …