374 research outputs found

    Quantum key distribution over 122 km of standard telecom fiber

    Full text link
    We report the first demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimisation of the interferometer and single photon detector, we achieve a quantum bit error ratio of 8.9% for a 122km link, allowing a secure shared key to be formed after error correction and privacy amplification. Key formation rates of up to 1.9 kbit/sec are achieved depending upon fiber length. We discuss the factors limiting the maximum fiber length in quantum cryptography

    Unconditionally secure quantum key distribution over 50km of standard telecom fibre

    Full text link
    We demonstrate a weak pulse quantum key distribution system using the BB84 protocol which is secure against all individual attacks, including photon number splitting. By carefully controlling the weak pulse intensity we demonstrate the maximum secure bit rate as a function of the fibre length. Unconditionally secure keys can be formed for standard telecom fibres exceeding 50 km in length.Comment: 9 pages 2 figure

    Passive decoy state quantum key distribution: Closing the gap to perfect sources

    Full text link
    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present-day, non-ideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical post-processing. This allows to improve the effective signal statistics and achievable distance.Comment: 4 pages, 3 figures. State preparation correcte

    Avoiding the Detector Blinding Attack on Quantum Cryptography

    Full text link
    We show the detector blinding attack by Lydersen et al [1] will be ineffective on most single photon avalanche photodiodes (APDs) and certainly ineffective on any detectors that are operated correctly. The attack is only successful if a redundant resistor is included in series with the APD, or if the detector discrimination levels are set inappropriately

    Photon-number-solving Decoy State Quantum Key Distribution

    Full text link
    In this paper, a photon-number-resolving decoy state quantum key distribution scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused by multiphoton pulses is given. This upper bound is independent of intensity of the decoy source, so that both the signal pulses and the decoy pulses can be used to generate the raw key after verified the security of the communication. This upper bound is also the lower bound on the fraction of counts caused by multiphoton pulses as long as faint coherent sources and high lossy channels are used. We show that Eve's coherent multiphoton pulse (CMP) attack is more efficient than symmetric individual (SI) attack when quantum bit error rate is small, so that CMP attack should be considered to ensure the security of the final key. finally, optimal intensity of laser source is presented which provides 23.9 km increase in the transmission distance. 03.67.DdComment: This is a detailed and extended version of quant-ph/0504221. In this paper, a detailed discussion of photon-number-resolving QKD scheme is presented. Moreover, the detailed discussion of coherent multiphoton pulse attack (CMP) is presented. 2 figures and some discussions are added. A detailed cauculation of the "new" upper bound 'is presente

    Single photon continuous variable quantum key distribution based on energy-time uncertainty relation

    Full text link
    In previous quantum key distribution (QKD) protocols, information is encoded on either the discrete-variable of single-photon signal or continuous-variables of multi-photon signal. Here, we propose a new QKD protocol by encoding information on continuous-variables of a single photon. In this protocol, Alice randomly encodes her information on either the central frequency of a narrow-band single photon pulse or the time-delay of a broadband single photon pulse, while Bob randomly chooses to do either frequency measurement or time measurement. The security of this protocol rests on the energy-time uncertainty relation, which prevents Eve from simultaneously determining both frequency and time information with arbitrarily high resolution. In practice, this scheme may be more robust against various channel noises, such as polarization and phase fluctuations.Comment: 4 pages, 3 figure

    Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution

    Full text link
    We propose a method to prepare different non-Poissonian signal pulses from sources of Poissonian photon number distribution using only linear optical elements and threshold photon detectors. This method allows a simple passive preparation of decoy states for quantum key distribution. We show that the resulting key rates are comparable to the performance of active choices of intensities of Poissonian signals.Comment: 7 pages, 3 figures, accepted for publication in Opt. Let

    Celebrating Economies of Change: Brave Visions for Inclusive Futures

    Get PDF
    This issue has been inspired by a path-breaking conference held by the Canadian Society for Ecologi-cal Economics (CANSEE), which took place this past May 2019 in Waterloo, Ontario. Entitled Engaging Economies of Change, the conference aimed to ex-pand existing research networks in the economy-environment nexus by building connections beyond the academy in order to meaningfully engage with the practicalities of building and implementing change. This issue captures the rich content shared during the event, as well as descriptions of the pro-cesses and efforts made to create a welcoming and respectful space where academics and community activists could build alliances and discuss common challenges. The conference organizers – all graduate students and activists themselves -- called this ‘building a brave space’.This research was supported by the Social Sciences and Humanities Research Council of Canad

    Decoy States and Two Way Quantum Key Distribution Schemes

    Full text link
    We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributions, we derive relevant lower-bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states. We work with two different approaches in this vein and compare these with an ideal infinite decoy state case as well as the simulation of the original.Comment: Much revised from original manuscript. Accepted for publication in Optics Communications (some variations may exist in some wordings in the text

    Principal self-government and subjectification: the exercise of principal autonomy in the Western Australian Independent public schools programme.

    Get PDF
    The launch of the Independent Public Schools (IPS) programme in Western Australia (WA) in 2010 reflects the neoliberal policy discourse of decentralisation and school self-management sweeping across many of the world’s education systems. IPS provides WA state school principals with decision-making authority in a range of areas, including the employment of staff and managing school budgets. Using an analytical toolkit provided by Michel Foucault and Foucauldian scholarship, this article examines how the IPS programme functions as a regime of government and self-government. Data collected from two IPS principals is used to examine the subjective effects of power as it is exercised in the IPS regime. The article finds that the IPS initiative introduces new possibilities for principals to actively participate in practices of self-formation, through which these principals self-steer, exercise their freedom and govern themselves and their schools. It illustrates how governmental mechanisms depend on, harness and shape the autonomy of these principals, and how their individual practices of self-government align with neoliberal governmentalities
    corecore