563 research outputs found
Secure and efficient decoy-state quantum key distribution with inexact pulse intensities
We present a general theorem for the efficient verification of the lower
bound of single-photon transmittance. We show how to do decoy-state quantum key
distribution efficiently with large random errors in the intensity control. In
our protocol, the linear terms of fluctuation disappear and only the quadratic
terms take effect. We then show the unconditional security of decoy-state
method with whatever error pattern in intensities of decoy pulses and signal
pulses provided that the intensity of each decoy pulse is less than and
the intensity of each signal pulse is larger than
Three-intensity decoy state method for device independent quantum key distribution with basis dependent errors
We study the measurement device independent quantum key distribution (MDIQKD)
in practice with limited resource, when there are only 3 different states in
implementing the decoy-state method and when there are basis dependent coding
errors. We present general formulas for the decoy-state method for two-pulse
sources with 3 different states, which can be applied to the recently proposed
MDIQKD with imperfect single-photon source such as the coherent states or the
heralded states from the parametric down conversion. We point out that the
existing result for secure QKD with source coding errors does not always hold.
We find that very accurate source coding is not necessary. In particular, we
loosen the precision of existing result by several magnitude orders for secure
QKD.Comment: Published version with Eq.(17) corrected. We emphasize that our major
result (Eq.16) for the decoy-state part can be applied to generate a key rate
very close to the ideal case of using infinite different coherent states, as
was numerically demonstrated in Ref.[21]. Published in PRA, 2013, Ja
Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse
We prove the unconditional security of the original Bennett 1992 protocol
with strong reference pulse. We show that we may place a projection onto
suitably defined qubit spaces before the receiver, which makes the analysis as
simple as qubit-based protocols. Unlike the single-photon-based qubits, the
qubits identified in this scheme are almost surely detected by the receiver
even after a lossy channel. This leads to the key generation rate that is
proportional to the channel transmission rate for proper choices of
experimental parameters.Comment: More detailed presentation and a bit modified security proo
Hong-Ou-Mandel interferometer with cavities: theory
We study the number of coincidences in a Hong-Ou-Mandel interferometer exit
whose arms have been supplemented with the addition of one or two optical
cavities. The fourth-order correlation function at the beam-splitter exit is
calculated. In the regime where the cavity length are larger than the
one-photon coherence length, photon coalescence and anti-coalescence
interference is observed. Feynman's path diagrams for the indistinguishable
processes that lead to quantum interference are presented. As application for
the Hong-Ou-Mandel interferometer with two cavities, it is discussed the
construction of an optical XOR gate
General theory of decoy-state quantum cryptography with source errors
The existing theory of decoy-state quantum cryptography assumes the exact
control of each states from Alice's source. Such exact control is impossible in
practice. We develop the theory of decoy-state method so that it is
unconditionally secure even there are state errors of sources, if the range of
a few parameters in the states are known. This theory simplifies the practical
implementation of the decoy-state quantum key distribution because the
unconditional security can be achieved with a slightly shortened final key,
even though the small errors of pulses are not corrected.Comment: Our results can be used securely for any source of diagonal states,
including the Plug-&-Play protocol with whatever error pattern, if we know
the ranges of errors of a few parameter
Entanglement of coherent states and decoherence
A possibility to produce entangled superpositions of strong coherent states
is discussed. A recent proposal by Howell and Yazell [Phys. Rev. A 62, 012102
(2000)] of a device which entangles two strong coherent coherent states is
critically examined. A serious flaw in their design is found. New modified
scheme is proposed and it is shown that it really can generate non-classical
states that can violate Bell inequality. Moreover, a profound analysis of the
effect of losses and decoherence on the degree of entanglement is accomplished.
It reveals the high sensitivity of the device to any disturbances and the
fragility of generated states
Quantum Forbidden-Interval Theorems for Stochastic Resonance
We extend the classical forbidden-interval theorems for a
stochastic-resonance noise benefit in a nonlinear system to a quantum-optical
communication model and a continuous-variable quantum key distribution model.
Each quantum forbidden-interval theorem gives a necessary and sufficient
condition that determines whether stochastic resonance occurs in quantum
communication of classical messages. The quantum theorems apply to any quantum
noise source that has finite variance or that comes from the family of
infinite-variance alpha-stable probability densities. Simulations show the
noise benefits for the basic quantum communication model and the
continuous-variable quantum key distribution model.Comment: 13 pages, 2 figure
Experimental Long-Distance Decoy-State Quantum Key Distribution Based On Polarization Encoding
We demonstrate the decoy-state quantum key distribution (QKD) with one-way
quantum communication in polarization space over 102km. Further, we simplify
the experimental setup and use only one detector to implement the one-way
decoy-state QKD over 75km, with the advantage to overcome the security
loopholes due to the efficiency mismatch of detectors. Our experimental
implementation can really offer the unconditionally secure final keys. We use 3
different intensities of 0, 0.2 and 0.6 for the pulses of source in our
experiment. In order to eliminate the influences of polarization mode
dispersion in the long-distance single-mode optical fiber, an automatic
polarization compensation system is utilized to implement the active
compensation.Comment: 4 pages,3 figure
Unambiguous State Discrimination of Coherent States with Linear Optics: Application to Quantum Cryptography
We discuss several methods for unambiguous state discrimination of N
symmetric coherent states using linear optics and photodetectors. One type of
measurements is shown to be optimal in the limit of small photon numbers for
any N. For the special case of N=4 this measurement can be fruitfully used by
the receiving end (Bob) in an implementation of the BB84 quantum key
distribution protocol using faint laser pulses. In particular, if Bob detects
only a single photon the procedure is equivalent to the standard measurement
that he would have to perform in a single-photon implementation of BB84, if he
detects two photons Bob will unambiguously know the bit sent to him in 50% of
the cases without having to exchange basis information, and if three photons
are detected, Bob will know unambiguously which quantum state was sent.Comment: 5 RevTeX pages, 2 eps figure
Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers
Continuous-variable quantum key distribution protocols, based on Gaussian
modulation of the quadratures of coherent states, have been implemented in
recent experiments. A present limitation of such systems is the finite
efficiency of the detectors, which can in principle be compensated for by the
use of classical optical preamplifiers. Here we study this possibility in
detail, by deriving the modified secret key generation rates when an optical
parametric amplifier is placed at the output of the quantum channel. After
presenting a general set of security proofs, we show that the use of
preamplifiers does compensate for all the imperfections of the detectors when
the amplifier is optimal in terms of gain and noise. Imperfect amplifiers can
also enhance the system performance, under conditions which are generally
satisfied in practice.Comment: 11 pages, 7 figures, submitted to J. Phys. B (special issue on Few
Atoms Optics
- …