204 research outputs found
Practical free-space quantum key distribution over 1 km
A working free-space quantum key distribution (QKD) system has been developed
and tested over an outdoor optical path of ~1 km at Los Alamos National
Laboratory under nighttime conditions. Results show that QKD can provide secure
real-time key distribution between parties who have a need to communicate
secretly. Finally, we examine the feasibility of surface to satellite QKD.Comment: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters,
May 199
Daylight quantum key distribution over 1.6 km
Quantum key distribution (QKD) has been demonstrated over a point-to-point
-km atmospheric optical path in full daylight. This record
transmission distance brings QKD a step closer to surface-to-satellite and
other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for
publication consideratio
Thermal noise limitations to force measurements with torsion pendulums: Applications to the measurement of the Casimir force and its thermal correction
A general analysis of thermal noise in torsion pendulums is presented. The
specific case where the torsion angle is kept fixed by electronic feedback is
analyzed. This analysis is applied to a recent experiment that employed a
torsion pendulum to measure the Casimir force. The ultimate limit to the
distance at which the Casimir force can be measured to high accuracy is
discussed, and in particular the prospects for measuring the thermal correction
are elaborated upon.Comment: one figure, five pages, to be submitted to Phys Rev
Theoretical efficient high capacity Quantum Key Distribution Scheme
A theoretical quantum key distribution scheme using EPR pairs is presented.
This scheme is efficient in that it uses all EPR pairs in distributing the key
except those chosen for checking eavesdroppers. The high capacity is achieved
because each EPR pair carries 2 bits of key code.Comment: 3 pages and 1 figure, to appear in Physical Review
An arbitrated quantum signature scheme
The general principle for a quantum signature scheme is proposed and
investigated based on ideas from classical signature schemes and quantum
cryptography. The suggested algorithm is implemented by a symmetrical quantum
key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and
relies on the availability of an arbitrator. We can guarantee the unconditional
security of the algorithm, mostly due to the correlation of the GHZ triplet
states and the use of quantum one-time pads.Comment: 10 pages, no figures. Phys. Rev. A 65, (In press
Entangled state quantum cryptography: Eavesdropping on the Ekert protocol
Using polarization-entangled photons from spontaneous parametric
downconversion, we have implemented Ekert's quantum cryptography protocol. The
near-perfect correlations of the photons allow the sharing of a secret key
between two parties. The presence of an eavesdropper is continually checked by
measuring Bell's inequalities. We investigated several possible eavesdropper
strategies, including pseudo-quantum non-demolition measurements. In all cases,
the eavesdropper's presence was readily apparent. We discuss a procedure to
increase her detectability.Comment: 4 pages, 2 encapsulated postscript files, PRL (tentatively) accepte
Controlled order rearrangement encryption for quantum key distribution
A novel technique is devised to perform orthogonal state quantum key
distribution. In this scheme, entangled parts of a quantum information carrier
are sent from Alice to Bob through two quantum channels. However before the
transmission, the orders of the quantum information carrier in one channel is
reordered so that Eve can not steal useful information. At the receiver's end,
the order of the quantum information carrier is restored. The order
rearrangement operation in both parties is controlled by a prior shared control
key which is used repeatedly in a quantum key distribution session.Comment: 5 pages and 2 figure
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks
for realistic signals sources, including weak coherent pulses and
downconversion sources. The proof applies to the BB84 protocol with the
standard detection scheme (no strong reference pulse). I obtain a formula for
the secure bit rate per time slot of an experimental setup which can be used to
optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure
Single photon generation by pulsed excitation of a single dipole
The fluorescence of a single dipole excited by an intense light pulse can
lead to the generation of another light pulse containing a single photon. The
influence of the duration and energy of the excitation pulse on the number of
photons in the fluorescence pulse is studied. The case of a two-level dipole
with strongly damped coherences is considered. The presence of a metastable
state leading to shelving is also investigated.Comment: 17 pages, 4 figures, submitted to PR
A conditional-phase switch at the single-photon level
We present an experimental realization of a two-photon conditional-phase
switch, related to the ``-'' gate of quantum computation. This gate
relies on quantum interference between photon pairs, generating entanglement
between two optical modes through the process of spontaneous parametric
down-conversion (SPDC). The interference effect serves to enhance the effective
nonlinearity by many orders of magnitude, so it is significant at the quantum
(single-photon) level. By adjusting the relative optical phase between the
classical pump for SPDC and the pair of input modes, one can impress a large
phase shift on one beam which depends on the presence or absence of a single
photon in a control mode.Comment: 8 pages, 4 figure
- …