204 research outputs found

    Practical free-space quantum key distribution over 1 km

    Full text link
    A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.Comment: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters, May 199

    Daylight quantum key distribution over 1.6 km

    Get PDF
    Quantum key distribution (QKD) has been demonstrated over a point-to-point 1.6\sim1.6-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideratio

    Thermal noise limitations to force measurements with torsion pendulums: Applications to the measurement of the Casimir force and its thermal correction

    Full text link
    A general analysis of thermal noise in torsion pendulums is presented. The specific case where the torsion angle is kept fixed by electronic feedback is analyzed. This analysis is applied to a recent experiment that employed a torsion pendulum to measure the Casimir force. The ultimate limit to the distance at which the Casimir force can be measured to high accuracy is discussed, and in particular the prospects for measuring the thermal correction are elaborated upon.Comment: one figure, five pages, to be submitted to Phys Rev

    Theoretical efficient high capacity Quantum Key Distribution Scheme

    Full text link
    A theoretical quantum key distribution scheme using EPR pairs is presented. This scheme is efficient in that it uses all EPR pairs in distributing the key except those chosen for checking eavesdroppers. The high capacity is achieved because each EPR pair carries 2 bits of key code.Comment: 3 pages and 1 figure, to appear in Physical Review

    An arbitrated quantum signature scheme

    Get PDF
    The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.Comment: 10 pages, no figures. Phys. Rev. A 65, (In press

    Entangled state quantum cryptography: Eavesdropping on the Ekert protocol

    Get PDF
    Using polarization-entangled photons from spontaneous parametric downconversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum non-demolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.Comment: 4 pages, 2 encapsulated postscript files, PRL (tentatively) accepte

    Controlled order rearrangement encryption for quantum key distribution

    Full text link
    A novel technique is devised to perform orthogonal state quantum key distribution. In this scheme, entangled parts of a quantum information carrier are sent from Alice to Bob through two quantum channels. However before the transmission, the orders of the quantum information carrier in one channel is reordered so that Eve can not steal useful information. At the receiver's end, the order of the quantum information carrier is restored. The order rearrangement operation in both parties is controlled by a prior shared control key which is used repeatedly in a quantum key distribution session.Comment: 5 pages and 2 figure

    Security against individual attacks for realistic quantum key distribution

    Get PDF
    I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84 protocol with the standard detection scheme (no strong reference pulse). I obtain a formula for the secure bit rate per time slot of an experimental setup which can be used to optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure

    Single photon generation by pulsed excitation of a single dipole

    Get PDF
    The fluorescence of a single dipole excited by an intense light pulse can lead to the generation of another light pulse containing a single photon. The influence of the duration and energy of the excitation pulse on the number of photons in the fluorescence pulse is studied. The case of a two-level dipole with strongly damped coherences is considered. The presence of a metastable state leading to shelving is also investigated.Comment: 17 pages, 4 figures, submitted to PR

    A conditional-phase switch at the single-photon level

    Full text link
    We present an experimental realization of a two-photon conditional-phase switch, related to the ``cc-ϕ\phi '' gate of quantum computation. This gate relies on quantum interference between photon pairs, generating entanglement between two optical modes through the process of spontaneous parametric down-conversion (SPDC). The interference effect serves to enhance the effective nonlinearity by many orders of magnitude, so it is significant at the quantum (single-photon) level. By adjusting the relative optical phase between the classical pump for SPDC and the pair of input modes, one can impress a large phase shift on one beam which depends on the presence or absence of a single photon in a control mode.Comment: 8 pages, 4 figure
    corecore