22,560 research outputs found

    Towards Communication-Efficient Quantum Oblivious Key Distribution

    Get PDF
    Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DB_b in such a way that (1) Alice learns DB_b and only DB_b and (2) Bob does not learn anything about Alice's choice b. While solutions to this problem in the classical domain rely largely on unproven computational complexity theoretic assumptions, it is also known that perfect solutions that guarantee both database and user privacy are impossible in the quantum domain. Jakobi et al. [Phys. Rev. A, 83(2), 022301, Feb 2011] proposed a protocol for Oblivious Transfer using well known QKD techniques to establish an Oblivious Key to solve this problem. Their solution provided a good degree of database and user privacy (using physical principles like impossibility of perfectly distinguishing non-orthogonal quantum states and the impossibility of superluminal communication) while being loss-resistant and implementable with commercial QKD devices (due to the use of SARG04). However, their Quantum Oblivious Key Distribution (QOKD) protocol requires a communication complexity of O(N log N). Since modern databases can be extremely large, it is important to reduce this communication as much as possible. In this paper, we first suggest a modification of their protocol wherein the number of qubits that need to be exchanged is reduced to O(N). A subsequent generalization reduces the quantum communication complexity even further in such a way that only a few hundred qubits are needed to be transferred even for very large databases.Comment: 7 page

    Quantum key distribution via quantum encryption

    Full text link
    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed.Comment: 4 Pages, No Figure. Final version to appear in PR

    Continuous-variable teleportation improvement by photon subtraction via conditional measurement

    Get PDF
    We show that the recently proposed scheme of teleportation of continuous variables [S.L. Braunstein and H.J. Kimble, Phys. Rev. Lett. 80, 869 (1998)] can be improved by a conditional measurement in the preparation of the entangled state shared by the sender and the recipient. The conditional measurement subtracts photons from the original entangled two-mode squeezed vacuum, by transmitting each mode through a low-reflectivity beam splitter and performing a joint photon-number measurement on the reflected beams. In this way the degree of entanglement of the shared state is increased and so is the fidelity of the teleported state.Comment: 7 pages REVTeX, 7 figure

    Efficient quantum key distribution scheme with nonmaximally entangled states

    Get PDF
    We propose an efficient quantum key distribution scheme based on entanglement. The sender chooses pairs of photons in one of the two equivalent nonmaximally entangled states randomly, and sends a sequence of photons from each pair to the receiver. They choose from the various bases independently but with substantially different probabilities, thus reducing the fraction of discarded data, and a significant gain in efficiency is achieved. We then show that such a refined data analysis guarantees the security of our scheme against a biased eavesdropping strategy.Comment: 5 Pages, No Figur

    Practical free-space quantum key distribution over 1 km

    Full text link
    A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.Comment: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters, May 199

    Thermal optical non-linearity of nematic mesophase enhanced by gold nanoparticles – an experimental and numerical investigation

    Get PDF
    In this work the mechanisms leading to the enhancement of optical nonlinearity of nematic liquid crystalline material through localized heating by doping the liquid crystals (LCs) with gold nanoparticles (GNPs) are investigated. We present some experimental and theoretical results on the effect of voltage and nanoparticle concentration on the nonlinear response of GNP-LC suspensions. The optical nonlinearity of these systems is characterized by diffraction measurements and the second order nonlinear refractive index, n 2 , is used to compare systems with different configurations and operating conditions. A theoretical model based on heat diffusion that takes into account the intensity and finite size of the incident beam, the nanoparticle concentration dependent absorbance of GNP doped LC systems and the presence of bounding substrates is developed and validated. We use the model to discuss the possibilities of further enhancing the optical nonlinearity

    Entangled state quantum cryptography: Eavesdropping on the Ekert protocol

    Get PDF
    Using polarization-entangled photons from spontaneous parametric downconversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum non-demolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.Comment: 4 pages, 2 encapsulated postscript files, PRL (tentatively) accepte

    Quantum State Disturbance vs. Information Gain: Uncertainty Relations for Quantum Information

    Full text link
    When an observer wants to identify a quantum state, which is known to be one of a given set of non-orthogonal states, the act of observation causes a disturbance to that state. We investigate the tradeoff between the information gain and that disturbance. This issue has important applications in quantum cryptography. The optimal detection method, for a given tolerated disturbance, is explicitly found in the case of two equiprobable non-orthogonal pure states.Comment: 20 pages, standard LaTeX, four png figures (also available from the authors: [email protected] and [email protected]

    Quantum identification system

    Full text link
    A secure quantum identification system combining a classical identification procedure and quantum key distribution is proposed. Each identification sequence is always used just once and new sequences are ``refuelled'' from a shared provably secret key transferred through the quantum channel. Two identification protocols are devised. The first protocol can be applied when legitimate users have an unjammable public channel at their disposal. The deception probability is derived for the case of a noisy quantum channel. The second protocol employs unconditionally secure authentication of information sent over the public channel, and thus it can be applied even in the case when an adversary is allowed to modify public communications. An experimental realization of a quantum identification system is described.Comment: RevTeX, 4 postscript figures, 9 pages, submitted to Physical Review
    corecore