195 research outputs found

    Daylight quantum key distribution over 1.6 km

    Get PDF
    Quantum key distribution (QKD) has been demonstrated over a point-to-point 1.6\sim1.6-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideratio

    Theoretical efficient high capacity Quantum Key Distribution Scheme

    Full text link
    A theoretical quantum key distribution scheme using EPR pairs is presented. This scheme is efficient in that it uses all EPR pairs in distributing the key except those chosen for checking eavesdroppers. The high capacity is achieved because each EPR pair carries 2 bits of key code.Comment: 3 pages and 1 figure, to appear in Physical Review

    Practical free-space quantum key distribution over 1 km

    Full text link
    A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.Comment: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters, May 199

    Preserving entanglement under decoherence and sandwiching all separable states

    Get PDF
    Every entangled state can be perturbed, for instance by decoherence, and stay entangled. For a large class of pure entangled states, we show how large the perturbation can be. Our class includes all pure bipartite and all maximally entangled states. For an entangled state, E, the constucted neighborhood of entangled states is the region outside two parallel hyperplanes, which sandwich the set of all separable states. The states for which these neighborhoods are largest are the maximally entangled ones. As the number of particles, or the dimensions of the Hilbert spaces for two of the particles increases, the distance between two of the hyperplanes which sandwich the separable states goes to zero. It is easy to decide if a state Q is in the neighborhood of entangled states we construct for an entangled state E. One merely has to check if the trace of EQ is greater than a constant which depends upon E and which we determine.Comment: Corrected first author's e-mail address. All the rest remains unchange

    Entangled state quantum cryptography: Eavesdropping on the Ekert protocol

    Get PDF
    Using polarization-entangled photons from spontaneous parametric downconversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum non-demolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.Comment: 4 pages, 2 encapsulated postscript files, PRL (tentatively) accepte

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    An arbitrated quantum signature scheme

    Get PDF
    The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.Comment: 10 pages, no figures. Phys. Rev. A 65, (In press

    Thermal noise limitations to force measurements with torsion pendulums: Applications to the measurement of the Casimir force and its thermal correction

    Full text link
    A general analysis of thermal noise in torsion pendulums is presented. The specific case where the torsion angle is kept fixed by electronic feedback is analyzed. This analysis is applied to a recent experiment that employed a torsion pendulum to measure the Casimir force. The ultimate limit to the distance at which the Casimir force can be measured to high accuracy is discussed, and in particular the prospects for measuring the thermal correction are elaborated upon.Comment: one figure, five pages, to be submitted to Phys Rev
    corecore