228 research outputs found

    Practical free-space quantum key distribution over 1 km

    Full text link
    A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.Comment: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters, May 199

    Test Results on the Silicon Pixel Detector for the TTF-FEL Beam Trajectory Monitor

    Full text link
    Test measurements on the silicon pixel detector for the beam trajectory monitor at the free electron laser of the TESLA test facility are presented. To determine the electronic noise of detector and read-out and to calibrate the signal amplitude of different pixels the 6 keV photons of the manganese K line are used. Two different methods determine the spatial accuracy of the detector: In one setup a laser beam is focused to a straight line and moved across the pixel structure. In the other the detector is scanned using a low-intensity electron beam of an electron microscope. Both methods show that the symmetry axis of the detector defines a straight line within 0.4 microns. The sensitivity of the detector to low energy X-rays is measured using a vacuum ultraviolet beam at the synchrotron light source HASYLAB. Additionally, the electron microscope is used to study the radiation hardness of the detector.Comment: 14 pages (Latex), 13 figures (Postscript), submitted to Nuclear Instruments and Methods

    Daylight quantum key distribution over 1.6 km

    Get PDF
    Quantum key distribution (QKD) has been demonstrated over a point-to-point 1.6\sim1.6-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideratio

    Microbial community response to petroleum hydrocarbon contamination in the unsaturated zone at the experimental field site Vaerlose, Denmark

    Get PDF
    This study investigates the influence of petroleum hydrocarbons on a microbial community in the vadose zone under field conditions. An artificial hydrocarbon mixture consisting of volatile and semi-volatile compounds similar to jet-fuel was emplaced in a previously uncontaminated vadose zone in nutrient-poor glacial melt water sand. The experiment included monitoring of microbial parameters and CO2 concentrations in soil gas over 3 months in and outside the hydrocarbon vapor plume that formed around the buried petroleum. Microbial and chemical analyses of soil and vadose zone samples were performed on samples from cores drilled to 3.3 m depth on three dates and three lateral distances from the buried petroleum mass. Significantly elevated CO2 concentrations were observed after contamination. Total cell numbers as determined by fluorescence microscopy were strongly correlated with soil organic carbon and nitrogen content but varied little with contamination. Redundancy analysis (RDA) allowed direct analysis of effects of selected environmental variables or the artificial contamination on microbiological parameters. Variation in biomass and CO2 production was explained by soil parameters, to 46%, and by the duration of contamination, to 39.8%. The microbial community structure was assessed by community level physiological profiles (CLPP) analysis using Biolog(TM) Eco-Plates. In the CLPP data only 35.9% of the variation could be linked to soil parameters and contamination, however, the samples with greatest exposure to hydrocarbons grouped together on RDA plots. It is concluded that, at this nutrient-poor site, the microbial community was dominated by natural heterogeneity and that the influence of petroleum hydrocarbon vapors was weak. (C) 2004 Federation of European Microbiological Societies. Published by Elsevier B.V. All rights reserved

    Thermal noise limitations to force measurements with torsion pendulums: Applications to the measurement of the Casimir force and its thermal correction

    Full text link
    A general analysis of thermal noise in torsion pendulums is presented. The specific case where the torsion angle is kept fixed by electronic feedback is analyzed. This analysis is applied to a recent experiment that employed a torsion pendulum to measure the Casimir force. The ultimate limit to the distance at which the Casimir force can be measured to high accuracy is discussed, and in particular the prospects for measuring the thermal correction are elaborated upon.Comment: one figure, five pages, to be submitted to Phys Rev

    Quantum key distribution without alternative measurements

    Full text link
    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator.Comment: REVTeX, 5 pages, 2 figures. Published version with some comment

    Measurement of the 3He mass diffusion coefficient in superfluid 4He over the 0.45-0.95 K temperature range

    Full text link
    We have measured the mass diffusion coefficient D of 3He in superfluid 4He at temperatures lower than were previously possible. The experimental technique utilizes scintillation light produced when neutron react with 3He nuclei, and allows measurement of the 3He density integrated along the trajectory of a well-defined neutron beam. By measuring the change in 3He density near a heater as a function of applied heat current, we are able to infer values of D with 20% accuracy. At temperatures below 0.7 K and for concentrations of order 10^{-4} we find D=(2.0+2.4-1.2)T^-(6.5 -/+ 1.2) cm^2/s, in agreement with a theoretical approximation.Comment: 8 pages, 5 figures. Submitted to Europhysics Letters and prepared in that journal's forma

    Comment on ``Measurement of the 3^3He mass diffusion coefficient in superfluid 4^4He over the 0.45--0.95 K temperature range

    Full text link
    The role of 3He-3He collisions in our diffusion experiment is addressed and shown to not be relevant to the measurement of 3He diffusion against phonons in superfluid helium.Comment: Two pages, in Europhysics Letters forma

    Entangled state quantum cryptography: Eavesdropping on the Ekert protocol

    Get PDF
    Using polarization-entangled photons from spontaneous parametric downconversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum non-demolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.Comment: 4 pages, 2 encapsulated postscript files, PRL (tentatively) accepte

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
    corecore