87 research outputs found

    Unconditionally secure quantum key distribution over 50km of standard telecom fibre

    Full text link
    We demonstrate a weak pulse quantum key distribution system using the BB84 protocol which is secure against all individual attacks, including photon number splitting. By carefully controlling the weak pulse intensity we demonstrate the maximum secure bit rate as a function of the fibre length. Unconditionally secure keys can be formed for standard telecom fibres exceeding 50 km in length.Comment: 9 pages 2 figure

    Quantum key distribution over 122 km of standard telecom fiber

    Full text link
    We report the first demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimisation of the interferometer and single photon detector, we achieve a quantum bit error ratio of 8.9% for a 122km link, allowing a secure shared key to be formed after error correction and privacy amplification. Key formation rates of up to 1.9 kbit/sec are achieved depending upon fiber length. We discuss the factors limiting the maximum fiber length in quantum cryptography

    Passive decoy state quantum key distribution: Closing the gap to perfect sources

    Full text link
    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present-day, non-ideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical post-processing. This allows to improve the effective signal statistics and achievable distance.Comment: 4 pages, 3 figures. State preparation correcte

    Photon-number-solving Decoy State Quantum Key Distribution

    Full text link
    In this paper, a photon-number-resolving decoy state quantum key distribution scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused by multiphoton pulses is given. This upper bound is independent of intensity of the decoy source, so that both the signal pulses and the decoy pulses can be used to generate the raw key after verified the security of the communication. This upper bound is also the lower bound on the fraction of counts caused by multiphoton pulses as long as faint coherent sources and high lossy channels are used. We show that Eve's coherent multiphoton pulse (CMP) attack is more efficient than symmetric individual (SI) attack when quantum bit error rate is small, so that CMP attack should be considered to ensure the security of the final key. finally, optimal intensity of laser source is presented which provides 23.9 km increase in the transmission distance. 03.67.DdComment: This is a detailed and extended version of quant-ph/0504221. In this paper, a detailed discussion of photon-number-resolving QKD scheme is presented. Moreover, the detailed discussion of coherent multiphoton pulse attack (CMP) is presented. 2 figures and some discussions are added. A detailed cauculation of the "new" upper bound 'is presente

    Avoiding the Detector Blinding Attack on Quantum Cryptography

    Full text link
    We show the detector blinding attack by Lydersen et al [1] will be ineffective on most single photon avalanche photodiodes (APDs) and certainly ineffective on any detectors that are operated correctly. The attack is only successful if a redundant resistor is included in series with the APD, or if the detector discrimination levels are set inappropriately

    Experimental demonstration of counterfactual quantum key distribution

    Full text link
    Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 96:4%. As a result, we obtained secure keys against the noise-induced attack (eg. the vacuum attack) and passive photon-number-splitting attack.Comment: 5 pages, 3 figure

    Optical fibers with interferometric path length stability by controlled heating for transmission of optical signals and as components in frequency standards

    Full text link
    We present a simple method to stabilize the optical path length of an optical fiber to an accuracy of about 1/100 of the laser wavelength. We study the dynamic response of the path length to modulation of an electrically conductive heater layer of the fiber. The path length is measured against the laser wavelength by use of the Pound-Drever-Hall method; negative feedback is applied via the heater. We apply the method in the context of a cryogenic resonator frequency standard.Comment: Expanded introduction and outlook. 9 pages, 5 figure

    Quantification of the performance of chaotic micromixers on the basis of finite time Lyapunov exponents

    Get PDF
    Chaotic micromixers such as the staggered herringbone mixer developed by Stroock et al. allow efficient mixing of fluids even at low Reynolds number by repeated stretching and folding of the fluid interfaces. The ability of the fluid to mix well depends on the rate at which "chaotic advection" occurs in the mixer. An optimization of mixer geometries is a non trivial task which is often performed by time consuming and expensive trial and error experiments. In this paper an algorithm is presented that applies the concept of finite-time Lyapunov exponents to obtain a quantitative measure of the chaotic advection of the flow and hence the performance of micromixers. By performing lattice Boltzmann simulations of the flow inside a mixer geometry, introducing massless and non-interacting tracer particles and following their trajectories the finite time Lyapunov exponents can be calculated. The applicability of the method is demonstrated by a comparison of the improved geometrical structure of the staggered herringbone mixer with available literature data.Comment: 9 pages, 8 figure

    Obliged to calculate: My School, markets, and equipping parents for calculativeness

    Get PDF
    This paper argues neoliberal programs of government in education are equipping parents for calculativeness. Regimes of testing and the publication of these results and other organizational data are contributing to a public economy of numbers that increasingly oblige citizens to calculate. Using the notions of calculative and market devices, this paper examines the Australian Government’s My School website, which publishes academic and organizational information about schools, including national test results. While it is often assumed that such performance technologies contribute to neoliberal reform of education through school choice, the paper argues the website is technically limited in its capacity to facilitate the economic calculations and calculated action of parents resulting in school choice. The paper instead opens My School to analysis as a technique of governmental self-formation. Using the theoretical resources of actor-network theory and Foucauldian scholarship, this paper complicates assumptions in the literature about the extent to which My School actually operates as a ‘market mechanism’. It argues My School attempts to cultivate a calculated form of parental educational agency, irreducible to economic market agency

    Quantum Communication

    Get PDF
    Quantum communication, and indeed quantum information in general, has changed the way we think about quantum physics. In 1984 and 1991, the first protocol for quantum cryptography and the first application of quantum non-locality, respectively, attracted a diverse field of researchers in theoretical and experimental physics, mathematics and computer science. Since then we have seen a fundamental shift in how we understand information when it is encoded in quantum systems. We review the current state of research and future directions in this new field of science with special emphasis on quantum key distribution and quantum networks.Comment: Submitted version, 8 pg (2 cols) 5 fig
    corecore