374 research outputs found
Quantum key distribution over 122 km of standard telecom fiber
We report the first demonstration of quantum key distribution over a standard
telecom fiber exceeding 100 km in length. Through careful optimisation of the
interferometer and single photon detector, we achieve a quantum bit error ratio
of 8.9% for a 122km link, allowing a secure shared key to be formed after error
correction and privacy amplification. Key formation rates of up to 1.9 kbit/sec
are achieved depending upon fiber length. We discuss the factors limiting the
maximum fiber length in quantum cryptography
Unconditionally secure quantum key distribution over 50km of standard telecom fibre
We demonstrate a weak pulse quantum key distribution system using the BB84
protocol which is secure against all individual attacks, including photon
number splitting. By carefully controlling the weak pulse intensity we
demonstrate the maximum secure bit rate as a function of the fibre length.
Unconditionally secure keys can be formed for standard telecom fibres exceeding
50 km in length.Comment: 9 pages 2 figure
Passive decoy state quantum key distribution: Closing the gap to perfect sources
We propose a quantum key distribution scheme which closely matches the
performance of a perfect single photon source. It nearly attains the physical
upper bound in terms of key generation rate and maximally achievable distance.
Our scheme relies on a practical setup based on a parametric downconversion
source and present-day, non-ideal photon-number detection. Arbitrary
experimental imperfections which lead to bit errors are included. We select
decoy states by classical post-processing. This allows to improve the effective
signal statistics and achievable distance.Comment: 4 pages, 3 figures. State preparation correcte
Avoiding the Detector Blinding Attack on Quantum Cryptography
We show the detector blinding attack by Lydersen et al [1] will be
ineffective on most single photon avalanche photodiodes (APDs) and certainly
ineffective on any detectors that are operated correctly. The attack is only
successful if a redundant resistor is included in series with the APD, or if
the detector discrimination levels are set inappropriately
Photon-number-solving Decoy State Quantum Key Distribution
In this paper, a photon-number-resolving decoy state quantum key distribution
scheme is presented based on recent experimental advancements. A new upper
bound on the fraction of counts caused by multiphoton pulses is given. This
upper bound is independent of intensity of the decoy source, so that both the
signal pulses and the decoy pulses can be used to generate the raw key after
verified the security of the communication. This upper bound is also the lower
bound on the fraction of counts caused by multiphoton pulses as long as faint
coherent sources and high lossy channels are used. We show that Eve's coherent
multiphoton pulse (CMP) attack is more efficient than symmetric individual (SI)
attack when quantum bit error rate is small, so that CMP attack should be
considered to ensure the security of the final key. finally, optimal intensity
of laser source is presented which provides 23.9 km increase in the
transmission distance. 03.67.DdComment: This is a detailed and extended version of quant-ph/0504221. In this
paper, a detailed discussion of photon-number-resolving QKD scheme is
presented. Moreover, the detailed discussion of coherent multiphoton pulse
attack (CMP) is presented. 2 figures and some discussions are added. A
detailed cauculation of the "new" upper bound 'is presente
Single photon continuous variable quantum key distribution based on energy-time uncertainty relation
In previous quantum key distribution (QKD) protocols, information is encoded
on either the discrete-variable of single-photon signal or continuous-variables
of multi-photon signal. Here, we propose a new QKD protocol by encoding
information on continuous-variables of a single photon. In this protocol, Alice
randomly encodes her information on either the central frequency of a
narrow-band single photon pulse or the time-delay of a broadband single photon
pulse, while Bob randomly chooses to do either frequency measurement or time
measurement. The security of this protocol rests on the energy-time uncertainty
relation, which prevents Eve from simultaneously determining both frequency and
time information with arbitrarily high resolution. In practice, this scheme may
be more robust against various channel noises, such as polarization and phase
fluctuations.Comment: 4 pages, 3 figure
Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution
We propose a method to prepare different non-Poissonian signal pulses from
sources of Poissonian photon number distribution using only linear optical
elements and threshold photon detectors. This method allows a simple passive
preparation of decoy states for quantum key distribution. We show that the
resulting key rates are comparable to the performance of active choices of
intensities of Poissonian signals.Comment: 7 pages, 3 figures, accepted for publication in Opt. Let
Celebrating Economies of Change: Brave Visions for Inclusive Futures
This issue has been inspired by a path-breaking conference held by the Canadian Society for Ecologi-cal Economics (CANSEE), which took place this past May 2019 in Waterloo, Ontario. Entitled Engaging Economies of Change, the conference aimed to ex-pand existing research networks in the economy-environment nexus by building connections beyond the academy in order to meaningfully engage with the practicalities of building and implementing change. This issue captures the rich content shared during the event, as well as descriptions of the pro-cesses and efforts made to create a welcoming and respectful space where academics and community activists could build alliances and discuss common challenges. The conference organizers – all graduate students and activists themselves -- called this ‘building a brave space’.This research was supported by the Social Sciences and Humanities Research Council of Canad
Decoy States and Two Way Quantum Key Distribution Schemes
We study the possible application of the decoy state method on a basic two
way quantum key distribution (QKD) scheme to extend its distance. Noting the
obvious advantage of such a QKD scheme in allowing for single as well as double
photon contributions, we derive relevant lower-bounds on the corresponding
gains in a practical decoy state implementation using two intensities for decoy
states. We work with two different approaches in this vein and compare these
with an ideal infinite decoy state case as well as the simulation of the
original.Comment: Much revised from original manuscript. Accepted for publication in
Optics Communications (some variations may exist in some wordings in the
text
Principal self-government and subjectification: the exercise of principal autonomy in the Western Australian Independent public schools programme.
The launch of the Independent Public Schools (IPS) programme in Western Australia (WA) in 2010 reflects the neoliberal policy discourse of decentralisation and school self-management sweeping across many of the world’s education systems. IPS provides WA state school principals with decision-making authority in a range of areas, including the employment of staff and managing school budgets. Using an analytical toolkit provided by Michel Foucault and Foucauldian scholarship, this article examines how the IPS programme functions as a regime of government and self-government. Data collected from two IPS principals is used to examine the subjective effects of power as it is exercised in the IPS regime. The article finds that the IPS initiative introduces new possibilities for principals to actively participate in practices of self-formation, through which these principals self-steer, exercise their freedom and govern themselves and their schools. It illustrates how governmental mechanisms depend on, harness and shape the autonomy of these principals, and how their individual practices of self-government align with neoliberal governmentalities
- …
