195 research outputs found
Daylight quantum key distribution over 1.6 km
Quantum key distribution (QKD) has been demonstrated over a point-to-point
-km atmospheric optical path in full daylight. This record
transmission distance brings QKD a step closer to surface-to-satellite and
other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for
publication consideratio
Theoretical efficient high capacity Quantum Key Distribution Scheme
A theoretical quantum key distribution scheme using EPR pairs is presented.
This scheme is efficient in that it uses all EPR pairs in distributing the key
except those chosen for checking eavesdroppers. The high capacity is achieved
because each EPR pair carries 2 bits of key code.Comment: 3 pages and 1 figure, to appear in Physical Review
Practical free-space quantum key distribution over 1 km
A working free-space quantum key distribution (QKD) system has been developed
and tested over an outdoor optical path of ~1 km at Los Alamos National
Laboratory under nighttime conditions. Results show that QKD can provide secure
real-time key distribution between parties who have a need to communicate
secretly. Finally, we examine the feasibility of surface to satellite QKD.Comment: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters,
May 199
Preserving entanglement under decoherence and sandwiching all separable states
Every entangled state can be perturbed, for instance by decoherence, and stay
entangled. For a large class of pure entangled states, we show how large the
perturbation can be. Our class includes all pure bipartite and all maximally
entangled states. For an entangled state, E, the constucted neighborhood of
entangled states is the region outside two parallel hyperplanes, which sandwich
the set of all separable states. The states for which these neighborhoods are
largest are the maximally entangled ones. As the number of particles, or the
dimensions of the Hilbert spaces for two of the particles increases, the
distance between two of the hyperplanes which sandwich the separable states
goes to zero. It is easy to decide if a state Q is in the neighborhood of
entangled states we construct for an entangled state E. One merely has to check
if the trace of EQ is greater than a constant which depends upon E and which we
determine.Comment: Corrected first author's e-mail address. All the rest remains
unchange
Entangled state quantum cryptography: Eavesdropping on the Ekert protocol
Using polarization-entangled photons from spontaneous parametric
downconversion, we have implemented Ekert's quantum cryptography protocol. The
near-perfect correlations of the photons allow the sharing of a secret key
between two parties. The presence of an eavesdropper is continually checked by
measuring Bell's inequalities. We investigated several possible eavesdropper
strategies, including pseudo-quantum non-demolition measurements. In all cases,
the eavesdropper's presence was readily apparent. We discuss a procedure to
increase her detectability.Comment: 4 pages, 2 encapsulated postscript files, PRL (tentatively) accepte
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
An arbitrated quantum signature scheme
The general principle for a quantum signature scheme is proposed and
investigated based on ideas from classical signature schemes and quantum
cryptography. The suggested algorithm is implemented by a symmetrical quantum
key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and
relies on the availability of an arbitrator. We can guarantee the unconditional
security of the algorithm, mostly due to the correlation of the GHZ triplet
states and the use of quantum one-time pads.Comment: 10 pages, no figures. Phys. Rev. A 65, (In press
Thermal noise limitations to force measurements with torsion pendulums: Applications to the measurement of the Casimir force and its thermal correction
A general analysis of thermal noise in torsion pendulums is presented. The
specific case where the torsion angle is kept fixed by electronic feedback is
analyzed. This analysis is applied to a recent experiment that employed a
torsion pendulum to measure the Casimir force. The ultimate limit to the
distance at which the Casimir force can be measured to high accuracy is
discussed, and in particular the prospects for measuring the thermal correction
are elaborated upon.Comment: one figure, five pages, to be submitted to Phys Rev
- …