88 research outputs found
Unconditionally secure quantum key distribution over 50km of standard telecom fibre
We demonstrate a weak pulse quantum key distribution system using the BB84
protocol which is secure against all individual attacks, including photon
number splitting. By carefully controlling the weak pulse intensity we
demonstrate the maximum secure bit rate as a function of the fibre length.
Unconditionally secure keys can be formed for standard telecom fibres exceeding
50 km in length.Comment: 9 pages 2 figure
Quantum key distribution over 122 km of standard telecom fiber
We report the first demonstration of quantum key distribution over a standard
telecom fiber exceeding 100 km in length. Through careful optimisation of the
interferometer and single photon detector, we achieve a quantum bit error ratio
of 8.9% for a 122km link, allowing a secure shared key to be formed after error
correction and privacy amplification. Key formation rates of up to 1.9 kbit/sec
are achieved depending upon fiber length. We discuss the factors limiting the
maximum fiber length in quantum cryptography
Passive decoy state quantum key distribution: Closing the gap to perfect sources
We propose a quantum key distribution scheme which closely matches the
performance of a perfect single photon source. It nearly attains the physical
upper bound in terms of key generation rate and maximally achievable distance.
Our scheme relies on a practical setup based on a parametric downconversion
source and present-day, non-ideal photon-number detection. Arbitrary
experimental imperfections which lead to bit errors are included. We select
decoy states by classical post-processing. This allows to improve the effective
signal statistics and achievable distance.Comment: 4 pages, 3 figures. State preparation correcte
Photon-number-solving Decoy State Quantum Key Distribution
In this paper, a photon-number-resolving decoy state quantum key distribution
scheme is presented based on recent experimental advancements. A new upper
bound on the fraction of counts caused by multiphoton pulses is given. This
upper bound is independent of intensity of the decoy source, so that both the
signal pulses and the decoy pulses can be used to generate the raw key after
verified the security of the communication. This upper bound is also the lower
bound on the fraction of counts caused by multiphoton pulses as long as faint
coherent sources and high lossy channels are used. We show that Eve's coherent
multiphoton pulse (CMP) attack is more efficient than symmetric individual (SI)
attack when quantum bit error rate is small, so that CMP attack should be
considered to ensure the security of the final key. finally, optimal intensity
of laser source is presented which provides 23.9 km increase in the
transmission distance. 03.67.DdComment: This is a detailed and extended version of quant-ph/0504221. In this
paper, a detailed discussion of photon-number-resolving QKD scheme is
presented. Moreover, the detailed discussion of coherent multiphoton pulse
attack (CMP) is presented. 2 figures and some discussions are added. A
detailed cauculation of the "new" upper bound 'is presente
Avoiding the Detector Blinding Attack on Quantum Cryptography
We show the detector blinding attack by Lydersen et al [1] will be
ineffective on most single photon avalanche photodiodes (APDs) and certainly
ineffective on any detectors that are operated correctly. The attack is only
successful if a redundant resistor is included in series with the APD, or if
the detector discrimination levels are set inappropriately
Experimental demonstration of counterfactual quantum key distribution
Counterfactual quantum key distribution provides natural advantage against
the eavesdropping on the actual signal particles. It can prevent the
photon-number-splitting attack when a weak coherent light source is used for
the practical implementation. We realized the counterfactual quantum key
distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long
quantum channel with a high-fringe visibility of 96:4%. As a result, we
obtained secure keys against the noise-induced attack (eg. the vacuum attack)
and passive photon-number-splitting attack.Comment: 5 pages, 3 figure
Optical fibers with interferometric path length stability by controlled heating for transmission of optical signals and as components in frequency standards
We present a simple method to stabilize the optical path length of an optical
fiber to an accuracy of about 1/100 of the laser wavelength. We study the
dynamic response of the path length to modulation of an electrically conductive
heater layer of the fiber. The path length is measured against the laser
wavelength by use of the Pound-Drever-Hall method; negative feedback is applied
via the heater. We apply the method in the context of a cryogenic resonator
frequency standard.Comment: Expanded introduction and outlook. 9 pages, 5 figure
Quantification of the performance of chaotic micromixers on the basis of finite time Lyapunov exponents
Chaotic micromixers such as the staggered herringbone mixer developed by
Stroock et al. allow efficient mixing of fluids even at low Reynolds number by
repeated stretching and folding of the fluid interfaces. The ability of the
fluid to mix well depends on the rate at which "chaotic advection" occurs in
the mixer. An optimization of mixer geometries is a non trivial task which is
often performed by time consuming and expensive trial and error experiments. In
this paper an algorithm is presented that applies the concept of finite-time
Lyapunov exponents to obtain a quantitative measure of the chaotic advection of
the flow and hence the performance of micromixers. By performing lattice
Boltzmann simulations of the flow inside a mixer geometry, introducing massless
and non-interacting tracer particles and following their trajectories the
finite time Lyapunov exponents can be calculated. The applicability of the
method is demonstrated by a comparison of the improved geometrical structure of
the staggered herringbone mixer with available literature data.Comment: 9 pages, 8 figure
Obliged to calculate: My School, markets, and equipping parents for calculativeness
This paper argues neoliberal programs of government in education are equipping parents for calculativeness. Regimes of testing and the publication of these results and other organizational data are contributing to a public economy of numbers that increasingly oblige citizens to calculate. Using the notions of calculative and market devices, this paper examines the Australian Government’s My School website, which publishes academic and organizational information about schools, including national test results. While it is often assumed that such performance technologies contribute to neoliberal reform of education through school choice, the paper argues the website is technically limited in its capacity to facilitate the economic calculations and calculated action of parents resulting in school choice. The paper instead opens My School to analysis as a technique of governmental self-formation. Using the theoretical resources of actor-network theory and Foucauldian scholarship, this paper complicates assumptions in the literature about the extent to which My School actually operates as a ‘market mechanism’. It argues My School attempts to cultivate a calculated form of parental educational agency, irreducible to economic market agency
Quantum Communication
Quantum communication, and indeed quantum information in general, has changed
the way we think about quantum physics. In 1984 and 1991, the first protocol
for quantum cryptography and the first application of quantum non-locality,
respectively, attracted a diverse field of researchers in theoretical and
experimental physics, mathematics and computer science. Since then we have seen
a fundamental shift in how we understand information when it is encoded in
quantum systems. We review the current state of research and future directions
in this new field of science with special emphasis on quantum key distribution
and quantum networks.Comment: Submitted version, 8 pg (2 cols) 5 fig
- …